Windows 2000 Server
You are the administrator of a Windows 2000 Server computer. The server contains one network adapter and is a file and print server for critical company resources. You install a second network adpater in the server and connect it to the same network subnet as the first adapter. You want to ensure that the first adapter is used for all network traffic and the second adapter is used only if the first adapter fails or is disconnected from the network. You also want to ensure that the server always has network connectivity even if one network adapter fails. What should you do?

Configure the binding order on the second adapter to bind TCP/IP last
Set the second adapters status to disable
None of above
Configure the first adapter to use a TCP/IP metric of 100
Configure the second adapter to use a TCP/IP metric of 25

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of contoso.local domain. You organize the domain into organizational units as shown in the EXHIBIT. You configure the local security options and other settings for the default domain policy object You delegate administration of Michigan and Florida OU. You want to prevent those administrators from creating any other group policy objects with settings that conflict with those you configured.What should you do?

From the group policy options from the contoso.local domains set the option not override
Block the group policy inheritance for Michigan and Florida OU
None of above
Block the group policy inheritance for the contoso.local domain
From the group policy options from the Michigan and Florida OU, set the option not override

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You enable the Routing and Remote Access Service (RRAS) on a computer running Windows 2000 Server. You configure the computer as a RAS server. You want to provide mutual authentication between the RAS server and RAS clients. You also want to ensure that data passing between the RAS server and RAS clients is encrypted. Which authentication method should you use for your incoming connections to support mutual authentication and data encryption?

None of above
MS-CHAP v2
SPAP
PAP
CHAP

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
Your Windows 2000 Server computer uses a non-Plug and Play ISA modem configured to use IRQ 5. You add a PCI modem and restart the computer. Device Manager reports an IRQ conflict between the two modems. Both modem are trying to use IRQ 5. You want to resolve the problem. What should you do?

Edit the CMOS settings on the computer to reserve IRQ 5 for non-Plug and Play devices
Use Device Manager to change the IRQ for the original modem to IRQ 10
Use Device Manager to change the IRQ for the original modem to IRQ 9
None Of above
Edit the CMOS settings on the computer to reserve IRQ 10 for non-Plug and Play devices

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of a Windows 2000 Server computer. The server hosts several web sites that have logging enabled. You use a third-party reporting utility to analyze the log files produced by the web sites. You notice that all data from 7:00pm to midnight each night is included in the following day's logfile. You want all data to be included in the correct day's log file. What should you do?

Ensure that the log type is set to W3C
Configure the time service on the web server to use local system account
Change the time zone setting in the time properties on the web server
Change the log rollover property in the website's logging properties
None of above

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
Some applications on your company network use defined domain user accounts as their service accounts. Each computer that runs one of these applications should have the respective service account in the Local Administrators Group. Currently, you individually place these service accounts in the Local Administrators Group on the appropriate Windows 2000 Professional computers. You need to centralize this process. What should you do?

Add the applications service accounts to the Domain Administrator Group
Add the applications service accounts to the Local Administrator Group. Use the Restricted Groups option in a Domain Group Policy
None of above
Add the applications service accounts to the Local Administrator Group. Use the Restricted Groups option in an OU Group Policy
Add the applications service accounts to the Local Administrator Group. Use the Restricted Groups option in each computer's local group policy

ANSWER DOWNLOAD EXAMIANS APP