Windows 2000 Server
You install and run a third-party 32-bit application named Application on your Windows 2000 Server computer. After several days, the application stops responding. You open Task Manager and find that the CPU usage is at 100 percent. The normal range of CPU usage on the server is from 20 percent to 30 percent You end the application. However, you see that the CPU on the server is still at 100 percent. Task Manager shows no other applications running. You then examine the Processes page in Task Manager and confirm that the Application.exe process is no longer running. You want to return the CPU usage to its normal range. What should you do?

Use Task Manager to end any related child processes
None of above
Use Task Manager to end and automatically restart the Explorer.exe process
Use Computer Management to stop and restart the Server service
Use Computer Management to stop and restart the Workstation service

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of a Windows 2000 Server computer named Intra. Intra is a member of an Active Directory domain and hosts an Intranet Web-Ske for your company. Company policy requires that only authenticated users have access to the intranet site. All company users have a user account in the Active Directory domain. You configure directory security for the Web Site to use integrated security. However, you discover that users can access the Web Site without authentication. You need to ensure that only authenticated users can access the web site. What should you do?

Clear the Allow Anonymous Connection check box
Disable the IUSE_inta user account on Intra
Clear the Allow IIS to Control Password check box
Install Active Directory on the server
Select Basic Authentication check box

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of contoso.local domain. You organize the domain into organizational units as shown in the EXHIBIT. You configure the local security options and other settings for the default domain policy object You delegate administration of Michigan and Florida OU. You want to prevent those administrators from creating any other group policy objects with settings that conflict with those you configured.What should you do?

None of above
Block the group policy inheritance for Michigan and Florida OU
Block the group policy inheritance for the contoso.local domain
From the group policy options from the Michigan and Florida OU, set the option not override
From the group policy options from the contoso.local domains set the option not override

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You install a Windows 2000 Server computer on your network. You place several shared folders on a 12-GB primary partition formatted by FAT32. During nine months of continuous operation, the number of users who access the server and their access frequency remains constant. The average size of the files on the server remains approximately constant. After the server runs continuous for nine months, users report that the server does not retrieve files from the shared folders as fast as when you first installed the server. What should you do to resolve the problem?

Convert the partition that contains the shared folders to NTFS
Defragment the disk that contains the shared folders
Convert the disk that contains the shared folders to a dynamic disk
None of above
Move the paging file to the partition that contains the shared folders

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of the Windows 2000 Server network shown in the exhibit. Users in the Research group and the Executive group have permission to access the Internet through a Windows 2000 Server computer running Microsoft Proxy Server. These users must enter their proxy server user names and passwords to connect to the proxy server, to the Internet, and to your local intranet server. The users who do not access the Internet do not have user accounts on the proxy server and, therefore, cannot connect to the intranet server. You want all users to be able to connect to the intranet server without entering a separate user name and password. What should you do?

None of above
Configure each client computer to use port 81 for the proxy server
Move the proxy server to the server segment of the network
Configure each client computer to bypass the proxy server for local addresses
Move the intranet server to the client segment of the network

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
Your network is configured as shown in the exhibit. "Engineering! and Salesl have DHCP installed up them." All the servers are Windows 2000 Server computers that use TCP/IP as the only network protocol. The sales department uses one subnet and has servers named Salesl and Sales2. The engineering department uses another subnet and has servers named Engineeringl and Engineering2. Salesl and Engineeringl are configured to act as DHCP servers. The router that joins the two subnets is not RFC 1542 compliant and does not support DHCP/BOOTP relay. You want to allow Salesl and Engineeringl to support client computers on each other's subnets. What should you do?

Set the router option in the DHCP Scopes to 192.168.2.1 for Engineeringl and 192.168.1.1 for Salesl
None of above
On Engineering2 and Sales2, install Routing and Remote Access, and configure RIP as a routing protocol
On Engineering2 and Sales2, install and configure the DHCP Relay Agent service
Configure Engineering2 and Sales2 as DHCP servers without any scopes

ANSWER DOWNLOAD EXAMIANS APP