Windows 2000 Server
You install and run a third-party 32-bit application named Application on your Windows 2000 Server computer. After several days, the application stops responding. You open Task Manager and find that the CPU usage is at 100 percent. The normal range of CPU usage on the server is from 20 percent to 30 percent You end the application. However, you see that the CPU on the server is still at 100 percent. Task Manager shows no other applications running. You then examine the Processes page in Task Manager and confirm that the Application.exe process is no longer running. You want to return the CPU usage to its normal range. What should you do?

Use Computer Management to stop and restart the Workstation service
None of above
Use Task Manager to end and automatically restart the Explorer.exe process
Use Task Manager to end any related child processes
Use Computer Management to stop and restart the Server service

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
Your Windows 2000 Server computer uses a non-Plug and Play ISA modem configured to use IRQ 5. You add a PCI modem and restart the computer. Device Manager reports an IRQ conflict between the two modems. Both modem are trying to use IRQ 5. You want to resolve the problem. What should you do?

Edit the CMOS settings on the computer to reserve IRQ 5 for non-Plug and Play devices
Use Device Manager to change the IRQ for the original modem to IRQ 9
None Of above
Use Device Manager to change the IRQ for the original modem to IRQ 10
Edit the CMOS settings on the computer to reserve IRQ 10 for non-Plug and Play devices

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of a Windows 2000 Server computer that has FIVE hard disks. Four 100 GB hard disks on the server are configured as a single stripe volume. You want to reconfigure the fourth disk so that the volume is fault tolerant and has as much space possible available for storing data. You want to use only existing hardware. What should you do?

Backup the data on the stripe volume and delete the stripe volume. Create a raidS volume on the four disks, restore the data to the new raid5 volume
None of above
Convert the disk to dynamic disk shut doWn and restart the server
Backup the data on the stripe volume and delete the stripe
Backup the data on the stripe volume and delete the stripe volume. Create a mirror volume, shut down and restart the server. Restore the data to new mirror volumes

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
Your Windows 2000 Server computer contains a stripe set with parity on a four-disk array. You convert the stripe set with parity to a dynamic RAID-5 volume. Six months later, users report that disk access on the server is slower than it had been on the previous day, You use Disk Management and discover that the status of the third disk in the array is Missing. You want to recover the failed RAID-5 volume. What should you do first?

Install a new disk and create a single extended partition on the new disk. Restart the computer and allow Windows 2000 to automatically repair the volume on the extended partition
None of above
Ensure that the third disk is attached to the server and has power. Use Disk Management to reactivate the disk
Ensure that the third disk is attached to the server and has power. Use Disk Management to repair the volume
Replace the third disk and restart the server. Use disk Management to repair the volume

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You enable the Routing and Remote Access Service (RRAS) on a computer running Windows 2000 Server. You configure the computer as a RAS server. You want to provide mutual authentication between the RAS server and RAS clients. You also want to ensure that data passing between the RAS server and RAS clients is encrypted. Which authentication method should you use for your incoming connections to support mutual authentication and data encryption?

MS-CHAP v2
CHAP
PAP
None of above
SPAP

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of Windows 2000 domain and TWO Windows NT domains. The Windows 2000 domains trust each of the Windows NT domains. Each of Windows NT domains trust the Windows 2000 domain. A Windows 2000 domain controller named DC1 is configured to use a highly secure domain controller template. Users in the Windows NT domain report that they cannot access DC1. You need to allow the users of computers in the Windows NT domain to access resources on DC1. What should you do?

Apply a less restrictive custom security template to DC1
None of above
Ensure the Windows 2000 domain is configured to run in the native mode
Ensure the Windows 2000 domain is configured in the mixed mode
Apply a less restrictive custom policy to Windows NT domain controller

ANSWER DOWNLOAD EXAMIANS APP