Windows 2000 Server
You want to improve the TCP transmission speed of a Windows 2000 Server computer. You also want to remove an unused registry key. You use Regedit32 to edit the registry of the Windows 2000 Server. You insert a value in the registry named TCPWindowSize, and you remove the unused key. You restart the computer, but the computer stops responding before the logon screen appears. You want to return the computer to its previous configuration. What should you do?

Restart the computer by using the Recovery Console. Run the enable winlogon service_auto_start command, and then run the Exit command
Restart the computer by using the last known good configuration
Restart the computer in safe mode. Then restart the computer again
Restart the computer by using the Recovery Console. Run the Fixboot c: command, and then run the Exit command
None of above

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of Windows 2000 domain and TWO Windows NT domains. The Windows 2000 domains trust each of the Windows NT domains. Each of Windows NT domains trust the Windows 2000 domain. A Windows 2000 domain controller named DC1 is configured to use a highly secure domain controller template. Users in the Windows NT domain report that they cannot access DC1. You need to allow the users of computers in the Windows NT domain to access resources on DC1. What should you do?

Apply a less restrictive custom policy to Windows NT domain controller
Ensure the Windows 2000 domain is configured to run in the native mode
Apply a less restrictive custom security template to DC1
Ensure the Windows 2000 domain is configured in the mixed mode
None of above

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of a Windows 2000 Server computer. The server hosts several web sites that have logging enabled. You use a third-party reporting utility to analyze the log files produced by the web sites. You notice that all data from 7:00pm to midnight each night is included in the following day's logfile. You want all data to be included in the correct day's log file. What should you do?

Change the time zone setting in the time properties on the web server
Change the log rollover property in the website's logging properties
Ensure that the log type is set to W3C
Configure the time service on the web server to use local system account
None of above

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of a Windows 2000 Server computer named Intra. Intra is a member of an Active Directory domain and hosts an Intranet Web-Ske for your company. Company policy requires that only authenticated users have access to the intranet site. All company users have a user account in the Active Directory domain. You configure directory security for the Web Site to use integrated security. However, you discover that users can access the Web Site without authentication. You need to ensure that only authenticated users can access the web site. What should you do?

Clear the Allow IIS to Control Password check box
Clear the Allow Anonymous Connection check box
Disable the IUSE_inta user account on Intra
Install Active Directory on the server
Select Basic Authentication check box

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You want to install Windows 2000 server on 15 new computers. You want to install, configure and test all 2000 servers before shipping them to your branch offices. You want the users at the branch offices to enter the serial numbers and computer names once they receive the computers. What should you do?

Create a UDF file by using setup manager. Create an Unattend.txt file that identifies the names of the new computers
None of above
Install Windows 2000 server on the computers. Use Setup Manager to create a sysprep.inf file for use with sysprep.exe Place the sysprep.inf on the computers and run sysprep -noidgen
Create an Unattend.txt file by using Setup Manager. Create a UDF file that identifies the names of the new computers
Install Windows 2000 server on the computers. Use Sysprep.exe to create the Unattend.txt file, place file on the root of the drive

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
A Windows 2000 Server computer named server2 runs numerous 32bit applications and two 16bit applications. Users start the 16bit applications by running APP1.EXE for one application and APP2.EXE for another application. The 16bit applications are configured to run in the separate memory space. You want to create a performance base like chart in the system monitor for all the applications on server2. You add all of 32bit applications and now you want to add two 16bit applications. What should you do?

Add the NTVDM, APP1 and APP2 instances for the processor time counter for the process object
Add the APP1 and APP2 instances to the processor time counter for the process object
None of above
Add only the NTVDM instance for the percent processor time counter for the process object
Add the NTVDM 1 and NTVDM #2 instances for processor time counter for the process object

ANSWER DOWNLOAD EXAMIANS APP