Windows 2000 Server
Your network is configured as shown in the exhibit. "Engineering! and Salesl have DHCP installed up them." All the servers are Windows 2000 Server computers that use TCP/IP as the only network protocol. The sales department uses one subnet and has servers named Salesl and Sales2. The engineering department uses another subnet and has servers named Engineeringl and Engineering2. Salesl and Engineeringl are configured to act as DHCP servers. The router that joins the two subnets is not RFC 1542 compliant and does not support DHCP/BOOTP relay. You want to allow Salesl and Engineeringl to support client computers on each other's subnets. What should you do?

None of above
On Engineering2 and Sales2, install Routing and Remote Access, and configure RIP as a routing protocol
Configure Engineering2 and Sales2 as DHCP servers without any scopes
On Engineering2 and Sales2, install and configure the DHCP Relay Agent service
Set the router option in the DHCP Scopes to 192.168.2.1 for Engineeringl and 192.168.1.1 for Salesl

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
A Windows 2000 Server computer named server2 runs numerous 32bit applications and two 16bit applications. Users start the 16bit applications by running APP1.EXE for one application and APP2.EXE for another application. The 16bit applications are configured to run in the separate memory space. You want to create a performance base like chart in the system monitor for all the applications on server2. You add all of 32bit applications and now you want to add two 16bit applications. What should you do?

None of above
Add the APP1 and APP2 instances to the processor time counter for the process object
Add the NTVDM 1 and NTVDM #2 instances for processor time counter for the process object
Add the NTVDM, APP1 and APP2 instances for the processor time counter for the process object
Add only the NTVDM instance for the percent processor time counter for the process object

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of your company's network. You are configuring the security policy for a group of users in the finance organizational unit (OU). You need to configure a group policy so that future changes to group policy will be applied within 15 minutes to any computers that are log on to the network. What should you do?

Enable and configure the group policy refresh interval for computers
Enable the asynchronous group policy application settings
Enable and configure the group policy refresh interval for domain controller
None of above
Enable the background refresh settings to use the default group policy refresh date

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of contoso.local domain. You organize the domain into organizational units as shown in the EXHIBIT. You configure the local security options and other settings for the default domain policy object You delegate administration of Michigan and Florida OU. You want to prevent those administrators from creating any other group policy objects with settings that conflict with those you configured.What should you do?

From the group policy options from the Michigan and Florida OU, set the option not override
Block the group policy inheritance for the contoso.local domain
None of above
From the group policy options from the contoso.local domains set the option not override
Block the group policy inheritance for Michigan and Florida OU

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You enable the Routing and Remote Access Service (RRAS) on a computer running Windows 2000 Server. You configure the computer as a RAS server. You want to provide mutual authentication between the RAS server and RAS clients. You also want to ensure that data passing between the RAS server and RAS clients is encrypted. Which authentication method should you use for your incoming connections to support mutual authentication and data encryption?

MS-CHAP v2
SPAP
CHAP
None of above
PAP

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of a Windows 2000 Server computer named Intra. Intra is a member of an Active Directory domain and hosts an Intranet Web-Ske for your company. Company policy requires that only authenticated users have access to the intranet site. All company users have a user account in the Active Directory domain. You configure directory security for the Web Site to use integrated security. However, you discover that users can access the Web Site without authentication. You need to ensure that only authenticated users can access the web site. What should you do?

Clear the Allow IIS to Control Password check box
Select Basic Authentication check box
Install Active Directory on the server
Disable the IUSE_inta user account on Intra
Clear the Allow Anonymous Connection check box

ANSWER DOWNLOAD EXAMIANS APP