Windows 2000 Server
How can you assign an application to one processor exclusively?

Right click on application executable, select properties and select assign processor
Right click on application process in Task Manager, select Set Affinity, and select the appropriate processor
None of above.
Open Task Manager, chose options from task bar, select processor and assign processes to appropriate processor
Open Task Manager, chose Performance, chose view all processors, assign processes to appropriate processor

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You install your boot volume on volume C on your Windows 2000 Server computer. You mirror volume C on dynamic Disk 1. Two years later, during routine server maintenance, you open Disk Management and find that the status of volume C is Failed Redundancy. The status of Disk 1 is Missing. You attempt to reactivate Disk 1, but the status of volume C does not return to Healthy. What should you do next?

Rescan the disks, remove the mirror, and delete the data on Disk 1. Then re-create the mirror
Replace Disk 1 and copy all data from volume C to a new NTFS primary partition on the new Disk 1. Restart the computer
Remove the mirror on Disk 1, replace the disk, and then add back the mirror to the new Disk 1
None of above
Replace Disk 1 and restart the computer. The mirror will automatically regenerate

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of the Windows 2000 Server network shown in the exhibit. Users in the Research group and the Executive group have permission to access the Internet through a Windows 2000 Server computer running Microsoft Proxy Server. These users must enter their proxy server user names and passwords to connect to the proxy server, to the Internet, and to your local intranet server. The users who do not access the Internet do not have user accounts on the proxy server and, therefore, cannot connect to the intranet server. You want all users to be able to connect to the intranet server without entering a separate user name and password. What should you do?

None of above
Move the intranet server to the client segment of the network
Configure each client computer to use port 81 for the proxy server
Configure each client computer to bypass the proxy server for local addresses
Move the proxy server to the server segment of the network

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
Your network uses TCP/IP as the only network protocol. Devices on the network are configured to use IP address from the private 10.0.0.0 range. All the client computers on the network runs Windows 2000 Professional. The network includes Windows 2000 Server computers and UNIX servers. User's print jobs are sent to shared printers on a Windows 2000 Server computer named PrintServ that directs the print jobs to print devices attached directly to the network. You have a high-capacity print device that is attached to one of the UNIX servers. The UNIX computer uses the LPR printing protocol, and it's IP address is 10.1.1.99. The name of the printer queue is GIANT. You want users to be able to connect to this printer from their computers. What should you do?

Install Microsoft Print Services for Unix on PrintServ. Create a network printer on users' computers, and specify that the printer URL is LPR://10.1.1.99/ GIANT
Create a local printer on PrintServ. Create a new TCP/IP port for an LPR server at address 10.1.1.99 with a queue name of GIANT. Share this printer and connect to it from users' computers
Install Microsoft Print Services for Unix on users* Computers. Create a network printer, and specify that the printer name is \10.1.1.99GIANT
None of above
Create a network printer on PrintServ, and specify that the printer name is \16.1.1.99GIANT. Share this printer and connect to it from users computers

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are installing Windows 2000 Server on a multiprocessor computer. The manufacturer has provided a customized HAL to use with the computer. The HAL is on the floppy disk. You want to install the customized HAL design for the computer. What should you do?

During the text mode portion of the Windows 2000 setup install the customized HAL
After the text mode portion your windows 2000 setup is complete use the emergency repair process to replace the existing HAL with the customized HAL and then continue the windows 2000 setup
After the Windows 2000 setup is complete use the device manager to scan for Hardware changes when prompted install the customized HAL
None of above
After text mode portion of Windows 2000 setup is complete use the recovery console to copy the customized HAL to the system32 folder on the boot partition

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of Windows 2000 domain and TWO Windows NT domains. The Windows 2000 domains trust each of the Windows NT domains. Each of Windows NT domains trust the Windows 2000 domain. A Windows 2000 domain controller named DC1 is configured to use a highly secure domain controller template. Users in the Windows NT domain report that they cannot access DC1. You need to allow the users of computers in the Windows NT domain to access resources on DC1. What should you do?

Ensure the Windows 2000 domain is configured to run in the native mode
None of above
Apply a less restrictive custom policy to Windows NT domain controller
Apply a less restrictive custom security template to DC1
Ensure the Windows 2000 domain is configured in the mixed mode

ANSWER DOWNLOAD EXAMIANS APP