Windows 2000 Server
You install a new multiple-process database application named Application on your Windows 2000 Server computer. Two days later, users begin to report that the new application has suddenly stopped responding to queries. You verify that the server is operation and decide that you need to restart the application. What should you do before you restart the application?

End the task named Application
End both the Explorer.exe process and the Application.exe process
None of above
End the Application.exe process tree
End the Application.exe process

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of Windows 2000 Server computer. Your computer has a span volume that consists of areas on three physical hard disks on the server. The three disks support hot swapping. You regularly backup the span volume by using windows backup. One of the disk fail, you replace the disk with a new un-partitioned disk. You want to recover the span volume and disk data as soon as possible. What should you do?

Extend the span volume to include the new disk, rescan the disk
Re scan the disk, remove the span volume and create a new span volume that includes the new disk. Format the span volume, use Windows back up to restore the data
Re scan the disk, format the span volume. Use windows back up to restore the data
Extend the span volume to include the new disk, shut down and restart the server, use windows backup to restore the data
Re scan the disk, extend the span volume to include the new disk. Shut down and restart the server, use windows backup to restore the new data

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You enable the Routing and Remote Access Service (RRAS) on a computer running Windows 2000 Server. You configure the computer as a RAS server. You want to provide mutual authentication between the RAS server and RAS clients. You also want to ensure that data passing between the RAS server and RAS clients is encrypted. Which authentication method should you use for your incoming connections to support mutual authentication and data encryption?

CHAP
SPAP
MS-CHAP v2
None of above
PAP

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of the Windows 2000 Server network shown in the exhibit. Users in the Research group and the Executive group have permission to access the Internet through a Windows 2000 Server computer running Microsoft Proxy Server. These users must enter their proxy server user names and passwords to connect to the proxy server, to the Internet, and to your local intranet server. The users who do not access the Internet do not have user accounts on the proxy server and, therefore, cannot connect to the intranet server. You want all users to be able to connect to the intranet server without entering a separate user name and password. What should you do?

Configure each client computer to use port 81 for the proxy server
None of above
Move the intranet server to the client segment of the network
Configure each client computer to bypass the proxy server for local addresses
Move the proxy server to the server segment of the network

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
Five Lakes Publishing has a Windows 2000 network serving 200 users. A server named User_srv is used to hold users' files. User_srv is configured with a single, large NTFS volume. Every user has a home folder on User_srv. Users can also use a shared folder named IN_PROGRESS to store files for books that are being prepared. The network administrator at Five Lakes Publishing configured disk quotas for the NTFS volume on User_srv. All users have a default limit of 100 MB, and the option to deny space to users who exceed their limit has been enabled. When a user named Amy Jones attempts to save a chapter of a new book to her home folder on the server, she receives the following error message: "The disk is full or too many files are open." What should Amy do to allow this document to be saved?

Move some of the files from her home folder to the IN_PROGRESS shared folder
None of above
Remove files from her home folder until the total uncompressed file size is less than 100 MB
Compress the files in her home folder to save disk space
Change the security setting of some of the files in her home folder to grant Full Control permission to a user who has not reached the quota level

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You have just configured two Windows NT Servers, Monitor 1 and Monitor 2 with no other software installed. You have an application server that needs to be monitored for performance to figure out what it's problem is, or to get some kind of baseline. You install Network Monitor on Monitor 2. What would you do to monitor Application server?

Configure the network monitor ECP port something for TCP
Install Network Monitor on Application Server
Configure the network monitor EDP port something for UDP
Configure Monitor 2 and Application server as monitoring partners (or something) to monitor the performance
Install Network Monitor on Monitor 1

ANSWER DOWNLOAD EXAMIANS APP