Windows 2000 Server
You install your boot volume on volume C on your Windows 2000 Server computer. You mirror volume C on dynamic Disk 1. Two years later, during routine server maintenance, you open Disk Management and find that the status of volume C is Failed Redundancy. The status of Disk 1 is Missing. You attempt to reactivate Disk 1, but the status of volume C does not return to Healthy. What should you do next?

Replace Disk 1 and restart the computer. The mirror will automatically regenerate
None of above
Rescan the disks, remove the mirror, and delete the data on Disk 1. Then re-create the mirror
Replace Disk 1 and copy all data from volume C to a new NTFS primary partition on the new Disk 1. Restart the computer
Remove the mirror on Disk 1, replace the disk, and then add back the mirror to the new Disk 1

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You enable the Routing and Remote Access Service (RRAS) on a computer running Windows 2000 Server. You configure the computer as a RAS server. You want to provide mutual authentication between the RAS server and RAS clients. You also want to ensure that data passing between the RAS server and RAS clients is encrypted. Which authentication method should you use for your incoming connections to support mutual authentication and data encryption?

SPAP
None of above
CHAP
PAP
MS-CHAP v2

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are a network administrator for your company. The company is currently configuring its branch offices with a Windows 2000 Server computer at each office. Each branch office has a technical-support department but not a network administrator. You want to configure the remote Windows 2000 Server computers so that whenever a new Microsoft driver becomes available, the branch offices are notified automaticaly when the administrator logs onto the server. What should you do?

Install the Windows 2000 Resource Kit
Configure system file checker to notify the branch offices
Install Windows critical update notification
None of above
Configure Windows file protection to notify the branch offices

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
The network uses TCP/IP as the only network protocol. You configure the remote access server on the network. Some users report that when they connect to the server they receive the following message |" IPX SPX compatible computer deported error 733" The EPP control network protocol for the network is not available. If the users allow the connection to continue they are able to connect to the services that use TCP/IP. You want to prevent this message from being displayed. What should you do?

None of above
Configure the remote access server to allow IPX based remote access demand dial connections
Configure a client computer to use only TCP/IP for the connections to the remote access server
Configure the client computer to use a defined IPX network address for the connection to the remote access servers
Configure the remote access server to disable multi-link connection

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You install and run a third-party 32-bit application named Application on your Windows 2000 Server computer. After several days, the application stops responding. You open Task Manager and find that the CPU usage is at 100 percent. The normal range of CPU usage on the server is from 20 percent to 30 percent You end the application. However, you see that the CPU on the server is still at 100 percent. Task Manager shows no other applications running. You then examine the Processes page in Task Manager and confirm that the Application.exe process is no longer running. You want to return the CPU usage to its normal range. What should you do?

Use Task Manager to end any related child processes
Use Task Manager to end and automatically restart the Explorer.exe process
Use Computer Management to stop and restart the Server service
Use Computer Management to stop and restart the Workstation service
None of above

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of Windows 2000 domain and TWO Windows NT domains. The Windows 2000 domains trust each of the Windows NT domains. Each of Windows NT domains trust the Windows 2000 domain. A Windows 2000 domain controller named DC1 is configured to use a highly secure domain controller template. Users in the Windows NT domain report that they cannot access DC1. You need to allow the users of computers in the Windows NT domain to access resources on DC1. What should you do?

Ensure the Windows 2000 domain is configured in the mixed mode
None of above
Apply a less restrictive custom security template to DC1
Ensure the Windows 2000 domain is configured to run in the native mode
Apply a less restrictive custom policy to Windows NT domain controller

ANSWER DOWNLOAD EXAMIANS APP