Windows 2000 Server
You install and run a third-party 32-bit application named Application on your Windows 2000 Server computer. After several days, the application stops responding. You open Task Manager and find that the CPU usage is at 100 percent. The normal range of CPU usage on the server is from 20 percent to 30 percent You end the application. However, you see that the CPU on the server is still at 100 percent. Task Manager shows no other applications running. You then examine the Processes page in Task Manager and confirm that the Application.exe process is no longer running. You want to return the CPU usage to its normal range. What should you do?

Use Task Manager to end and automatically restart the Explorer.exe process
Use Computer Management to stop and restart the Workstation service
Use Task Manager to end any related child processes
None of above
Use Computer Management to stop and restart the Server service

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of a Windows 2000 Server computer named Intra. Intra is a member of an Active Directory domain and hosts an Intranet Web-Ske for your company. Company policy requires that only authenticated users have access to the intranet site. All company users have a user account in the Active Directory domain. You configure directory security for the Web Site to use integrated security. However, you discover that users can access the Web Site without authentication. You need to ensure that only authenticated users can access the web site. What should you do?

Clear the Allow Anonymous Connection check box
Disable the IUSE_inta user account on Intra
Install Active Directory on the server
Select Basic Authentication check box
Clear the Allow IIS to Control Password check box

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of a Windows 2000 Server computer. The server contains one network adapter and is a file and print server for critical company resources. You install a second network adpater in the server and connect it to the same network subnet as the first adapter. You want to ensure that the first adapter is used for all network traffic and the second adapter is used only if the first adapter fails or is disconnected from the network. You also want to ensure that the server always has network connectivity even if one network adapter fails. What should you do?

Set the second adapters status to disable
Configure the first adapter to use a TCP/IP metric of 100
Configure the second adapter to use a TCP/IP metric of 25
None of above
Configure the binding order on the second adapter to bind TCP/IP last

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of the Windows 2000 Server network shown in the exhibit. Users in the Research group and the Executive group have permission to access the Internet through a Windows 2000 Server computer running Microsoft Proxy Server. These users must enter their proxy server user names and passwords to connect to the proxy server, to the Internet, and to your local intranet server. The users who do not access the Internet do not have user accounts on the proxy server and, therefore, cannot connect to the intranet server. You want all users to be able to connect to the intranet server without entering a separate user name and password. What should you do?

Configure each client computer to use port 81 for the proxy server
Configure each client computer to bypass the proxy server for local addresses
Move the proxy server to the server segment of the network
Move the intranet server to the client segment of the network
None of above

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of a Windows 2000 Server computer. You configure the server to audit all access to files that are places in shared folders. One week after you configured the server, users report that the server has stopped responding. You investigate the problem and discover a stop error with the error message: Stop C0000244 (Audit Failed) An attempt to generate a security audit failed. You restart the computer. You need to ensure that you can keep a record of all files access on the server. You also need to ensure that the stop error will not occur again.

Delete the Liscense Trial registry key
Set the CrashonAuditFail registry key to 0
Save the security log to a file, and clear it every morning
Increase the size of the security log
Set the Security Log to overwrite events as needed

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
Your Windows 2000 Server computer contains a stripe set with parity on a four-disk array. You convert the stripe set with parity to a dynamic RAID-5 volume. Six months later, users report that disk access on the server is slower than it had been on the previous day, You use Disk Management and discover that the status of the third disk in the array is Missing. You want to recover the failed RAID-5 volume. What should you do first?

None of above
Replace the third disk and restart the server. Use disk Management to repair the volume
Ensure that the third disk is attached to the server and has power. Use Disk Management to reactivate the disk
Ensure that the third disk is attached to the server and has power. Use Disk Management to repair the volume
Install a new disk and create a single extended partition on the new disk. Restart the computer and allow Windows 2000 to automatically repair the volume on the extended partition

ANSWER DOWNLOAD EXAMIANS APP