Windows 2000 Server
You want to improve the TCP transmission speed of a Windows 2000 Server computer. You also want to remove an unused registry key. You use Regedit32 to edit the registry of the Windows 2000 Server. You insert a value in the registry named TCPWindowSize, and you remove the unused key. You restart the computer, but the computer stops responding before the logon screen appears. You want to return the computer to its previous configuration. What should you do?

Restart the computer by using the Recovery Console. Run the enable winlogon service_auto_start command, and then run the Exit command
Restart the computer by using the Recovery Console. Run the Fixboot c: command, and then run the Exit command
Restart the computer by using the last known good configuration
None of above
Restart the computer in safe mode. Then restart the computer again

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You want to install Windows 2000 server on 15 new computers. You want to install, configure and test all 2000 servers before shipping them to your branch offices. You want the users at the branch offices to enter the serial numbers and computer names once they receive the computers. What should you do?

None of above
Install Windows 2000 server on the computers. Use Setup Manager to create a sysprep.inf file for use with sysprep.exe Place the sysprep.inf on the computers and run sysprep -noidgen
Create a UDF file by using setup manager. Create an Unattend.txt file that identifies the names of the new computers
Create an Unattend.txt file by using Setup Manager. Create a UDF file that identifies the names of the new computers
Install Windows 2000 server on the computers. Use Sysprep.exe to create the Unattend.txt file, place file on the root of the drive

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of the Windows 2000 Server network shown in the exhibit. Users in the Research group and the Executive group have permission to access the Internet through a Windows 2000 Server computer running Microsoft Proxy Server. These users must enter their proxy server user names and passwords to connect to the proxy server, to the Internet, and to your local intranet server. The users who do not access the Internet do not have user accounts on the proxy server and, therefore, cannot connect to the intranet server. You want all users to be able to connect to the intranet server without entering a separate user name and password. What should you do?

Move the intranet server to the client segment of the network
Configure each client computer to use port 81 for the proxy server
Configure each client computer to bypass the proxy server for local addresses
Move the proxy server to the server segment of the network
None of above

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are configuring a Windows 2000 Server computer as a Routing and Remote Access server for a Branch office. You discover that an incorrect driver was installed during the installation of the modem. You attempt to remove the modem by using Phone and Modem Options in Control Panel. After each attempt to remove the modem by using this method, the computer stops responding. You restart the computer again. You must install the correct driver for the modem as quickly as possible. What should you do?

Shut down the server, remove the modem card, and restart the server. Shut down the server again, insert the modem card, and restart the server
Use the Add/Remove Hardware wizard to uninstall the modem. Restart the server
Run the Modem troubleshooter and remove the modem when prompted. Restart the server
None of above
Delete all references to modems in the registry

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You enable the Routing and Remote Access Service (RRAS) on a computer running Windows 2000 Server. You configure the computer as a RAS server. You want to provide mutual authentication between the RAS server and RAS clients. You also want to ensure that data passing between the RAS server and RAS clients is encrypted. Which authentication method should you use for your incoming connections to support mutual authentication and data encryption?

SPAP
None of above
PAP
MS-CHAP v2
CHAP

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You install your boot volume on volume C on your Windows 2000 Server computer. You mirror volume C on dynamic Disk 1. Two years later, during routine server maintenance, you open Disk Management and find that the status of volume C is Failed Redundancy. The status of Disk 1 is Missing. You attempt to reactivate Disk 1, but the status of volume C does not return to Healthy. What should you do next?

Replace Disk 1 and restart the computer. The mirror will automatically regenerate
Replace Disk 1 and copy all data from volume C to a new NTFS primary partition on the new Disk 1. Restart the computer
Remove the mirror on Disk 1, replace the disk, and then add back the mirror to the new Disk 1
None of above
Rescan the disks, remove the mirror, and delete the data on Disk 1. Then re-create the mirror

ANSWER DOWNLOAD EXAMIANS APP