Windows 2000 Server
Your network uses TCP/IP as the only network protocol. Devices on the network are configured to use IP address from the private 10.0.0.0 range. All the client computers on the network runs Windows 2000 Professional. The network includes Windows 2000 Server computers and UNIX servers. User's print jobs are sent to shared printers on a Windows 2000 Server computer named PrintServ that directs the print jobs to print devices attached directly to the network. You have a high-capacity print device that is attached to one of the UNIX servers. The UNIX computer uses the LPR printing protocol, and it's IP address is 10.1.1.99. The name of the printer queue is GIANT. You want users to be able to connect to this printer from their computers. What should you do?

Install Microsoft Print Services for Unix on users* Computers. Create a network printer, and specify that the printer name is \10.1.1.99GIANT
Create a local printer on PrintServ. Create a new TCP/IP port for an LPR server at address 10.1.1.99 with a queue name of GIANT. Share this printer and connect to it from users' computers
Create a network printer on PrintServ, and specify that the printer name is \16.1.1.99GIANT. Share this printer and connect to it from users computers
None of above
Install Microsoft Print Services for Unix on PrintServ. Create a network printer on users' computers, and specify that the printer URL is LPR://10.1.1.99/ GIANT

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
A Windows 2000 Server computer named server2 runs numerous 32bit applications and two 16bit applications. Users start the 16bit applications by running APP1.EXE for one application and APP2.EXE for another application. The 16bit applications are configured to run in the separate memory space. You want to create a performance base like chart in the system monitor for all the applications on server2. You add all of 32bit applications and now you want to add two 16bit applications. What should you do?

Add the NTVDM 1 and NTVDM #2 instances for processor time counter for the process object
Add the NTVDM, APP1 and APP2 instances for the processor time counter for the process object
Add only the NTVDM instance for the percent processor time counter for the process object
Add the APP1 and APP2 instances to the processor time counter for the process object
None of above

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator responsible for security and user desktop settings on your network. You need to configure a custom registry entry for all users. You want to add the custom registry entry into a Group Policy object (GPO) with the least amount of administrative effort What should you do?

Configure RIS to include the registry entry
Configure,an INF policy and add the policy to the GPO
Configure a Microsoft Windows Installer package and add the package to the GPO
Configure an ADM template and add the template to the GPO
None of above

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You install and run a third-party 32-bit application named Application on your Windows 2000 Server computer. After several days, the application stops responding. You open Task Manager and find that the CPU usage is at 100 percent. The normal range of CPU usage on the server is from 20 percent to 30 percent You end the application. However, you see that the CPU on the server is still at 100 percent. Task Manager shows no other applications running. You then examine the Processes page in Task Manager and confirm that the Application.exe process is no longer running. You want to return the CPU usage to its normal range. What should you do?

Use Computer Management to stop and restart the Server service
Use Task Manager to end and automatically restart the Explorer.exe process
Use Task Manager to end any related child processes
Use Computer Management to stop and restart the Workstation service
None of above

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You enable the Routing and Remote Access Service (RRAS) on a computer running Windows 2000 Server. You configure the computer as a RAS server. You want to provide mutual authentication between the RAS server and RAS clients. You also want to ensure that data passing between the RAS server and RAS clients is encrypted. Which authentication method should you use for your incoming connections to support mutual authentication and data encryption?

PAP
CHAP
None of above
SPAP
MS-CHAP v2

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of the Windows 2000 Server network shown in the exhibit. Users in the Research group and the Executive group have permission to access the Internet through a Windows 2000 Server computer running Microsoft Proxy Server. These users must enter their proxy server user names and passwords to connect to the proxy server, to the Internet, and to your local intranet server. The users who do not access the Internet do not have user accounts on the proxy server and, therefore, cannot connect to the intranet server. You want all users to be able to connect to the intranet server without entering a separate user name and password. What should you do?

Move the proxy server to the server segment of the network
Move the intranet server to the client segment of the network
None of above
Configure each client computer to bypass the proxy server for local addresses
Configure each client computer to use port 81 for the proxy server

ANSWER DOWNLOAD EXAMIANS APP