Windows 2000 Server
You are the administrator of a Windows 2000 Server computer. The server contains one network adapter and is a file and print server for critical company resources. You install a second network adpater in the server and connect it to the same network subnet as the first adapter. You want to ensure that the first adapter is used for all network traffic and the second adapter is used only if the first adapter fails or is disconnected from the network. You also want to ensure that the server always has network connectivity even if one network adapter fails. What should you do?

None of above
Configure the binding order on the second adapter to bind TCP/IP last
Configure the first adapter to use a TCP/IP metric of 100
Configure the second adapter to use a TCP/IP metric of 25
Set the second adapters status to disable

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You install a new multiple-process database application named Application on your Windows 2000 Server computer. Two days later, users begin to report that the new application has suddenly stopped responding to queries. You verify that the server is operation and decide that you need to restart the application. What should you do before you restart the application?

End both the Explorer.exe process and the Application.exe process
End the Application.exe process
End the task named Application
End the Application.exe process tree
None of above

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
A Windows 2000 Server computer named server2 runs numerous 32bit applications and two 16bit applications. Users start the 16bit applications by running APP1.EXE for one application and APP2.EXE for another application. The 16bit applications are configured to run in the separate memory space. You want to create a performance base like chart in the system monitor for all the applications on server2. You add all of 32bit applications and now you want to add two 16bit applications. What should you do?

Add the APP1 and APP2 instances to the processor time counter for the process object
Add only the NTVDM instance for the percent processor time counter for the process object
Add the NTVDM 1 and NTVDM #2 instances for processor time counter for the process object
Add the NTVDM, APP1 and APP2 instances for the processor time counter for the process object
None of above

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You want to improve the TCP transmission speed of a Windows 2000 Server computer. You also want to remove an unused registry key. You use Regedit32 to edit the registry of the Windows 2000 Server. You insert a value in the registry named TCPWindowSize, and you remove the unused key. You restart the computer, but the computer stops responding before the logon screen appears. You want to return the computer to its previous configuration. What should you do?

Restart the computer by using the last known good configuration
None of above
Restart the computer by using the Recovery Console. Run the Fixboot c: command, and then run the Exit command
Restart the computer in safe mode. Then restart the computer again
Restart the computer by using the Recovery Console. Run the enable winlogon service_auto_start command, and then run the Exit command

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You enable the Routing and Remote Access Service (RRAS) on a computer running Windows 2000 Server. You configure the computer as a RAS server. You want to provide mutual authentication between the RAS server and RAS clients. You also want to ensure that data passing between the RAS server and RAS clients is encrypted. Which authentication method should you use for your incoming connections to support mutual authentication and data encryption?

MS-CHAP v2
None of above
PAP
SPAP
CHAP

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of the Windows 2000 Server network shown in the exhibit. Users in the Research group and the Executive group have permission to access the Internet through a Windows 2000 Server computer running Microsoft Proxy Server. These users must enter their proxy server user names and passwords to connect to the proxy server, to the Internet, and to your local intranet server. The users who do not access the Internet do not have user accounts on the proxy server and, therefore, cannot connect to the intranet server. You want all users to be able to connect to the intranet server without entering a separate user name and password. What should you do?

Move the proxy server to the server segment of the network
Configure each client computer to use port 81 for the proxy server
None of above
Configure each client computer to bypass the proxy server for local addresses
Move the intranet server to the client segment of the network

ANSWER DOWNLOAD EXAMIANS APP