Windows 2000 Server
You are the administrator of a Windows 2000 Server computer. The server contains one network adapter and is a file and print server for critical company resources. You install a second network adpater in the server and connect it to the same network subnet as the first adapter. You want to ensure that the first adapter is used for all network traffic and the second adapter is used only if the first adapter fails or is disconnected from the network. You also want to ensure that the server always has network connectivity even if one network adapter fails. What should you do?

Configure the first adapter to use a TCP/IP metric of 100
None of above
Configure the second adapter to use a TCP/IP metric of 25
Set the second adapters status to disable
Configure the binding order on the second adapter to bind TCP/IP last

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You install Internet Information Services 5.0 on a computer running Windows 2000 Server. You create two new department web sites for the Human Resources and Sales departments. You use host headers to define these two new sites. You stop the Sales web site while a developer updates the contents of the site. If a user attempts to access the Sales site while it is stopped, what response will the user receive?

The user will receive a 404 - File Not Found error message
None of above
The user will receive a 403.2 -Read Access Forbidden error message
The user will be redirected to the Default Web site home page
The user will be redirected to an alternate default page for the Sales site's home directory

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
A Windows 2000 Server computer named server2 runs numerous 32bit applications and two 16bit applications. Users start the 16bit applications by running APP1.EXE for one application and APP2.EXE for another application. The 16bit applications are configured to run in the separate memory space. You want to create a performance base like chart in the system monitor for all the applications on server2. You add all of 32bit applications and now you want to add two 16bit applications. What should you do?

Add the NTVDM 1 and NTVDM #2 instances for processor time counter for the process object
Add the NTVDM, APP1 and APP2 instances for the processor time counter for the process object
Add only the NTVDM instance for the percent processor time counter for the process object
Add the APP1 and APP2 instances to the processor time counter for the process object
None of above

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator responsible for security and user desktop settings on your network. You need to configure a custom registry entry for all users. You want to add the custom registry entry into a Group Policy object (GPO) with the least amount of administrative effort What should you do?

Configure,an INF policy and add the policy to the GPO
Configure an ADM template and add the template to the GPO
Configure a Microsoft Windows Installer package and add the package to the GPO
Configure RIS to include the registry entry
None of above

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of a Windows 2000 Server computer. You configure the server to audit all access to files that are places in shared folders. One week after you configured the server, users report that the server has stopped responding. You investigate the problem and discover a stop error with the error message: Stop C0000244 (Audit Failed) An attempt to generate a security audit failed. You restart the computer. You need to ensure that you can keep a record of all files access on the server. You also need to ensure that the stop error will not occur again.

Save the security log to a file, and clear it every morning
Delete the Liscense Trial registry key
Set the CrashonAuditFail registry key to 0
Set the Security Log to overwrite events as needed
Increase the size of the security log

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the network administrator for your company. Mike Nash is a member of the Administration group, and Nate Sun is a member of the Intern group. Both groups are in the same domain. On the intranet server, the Administration group is placed in the Security group, and the Intern group is placed in the Nonsecurity group. The Security group is then granted Full Control permission for the Sales virtual directory. Nate needs to update new sales information that is located on the Sales virtual directory. What should you do so that Nate can perform this task?

Make Nate a member of the Security group
Remove Nate fmm the Intern group
Enable Anonymous access for the Sales virtual directory
None of above
Enable Anonymous access for the intranet server

ANSWER DOWNLOAD EXAMIANS APP