Windows 2000 Server
You are the administrator of a Windows 2000 Server computer. The server contains one network adapter and is a file and print server for critical company resources. You install a second network adpater in the server and connect it to the same network subnet as the first adapter. You want to ensure that the first adapter is used for all network traffic and the second adapter is used only if the first adapter fails or is disconnected from the network. You also want to ensure that the server always has network connectivity even if one network adapter fails. What should you do?

Configure the first adapter to use a TCP/IP metric of 100
Configure the second adapter to use a TCP/IP metric of 25
Configure the binding order on the second adapter to bind TCP/IP last
Set the second adapters status to disable
None of above

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
A Windows 2000 Server computer named server2 runs numerous 32bit applications and two 16bit applications. Users start the 16bit applications by running APP1.EXE for one application and APP2.EXE for another application. The 16bit applications are configured to run in the separate memory space. You want to create a performance base like chart in the system monitor for all the applications on server2. You add all of 32bit applications and now you want to add two 16bit applications. What should you do?

Add the APP1 and APP2 instances to the processor time counter for the process object
Add the NTVDM, APP1 and APP2 instances for the processor time counter for the process object
None of above
Add the NTVDM 1 and NTVDM #2 instances for processor time counter for the process object
Add only the NTVDM instance for the percent processor time counter for the process object

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of a Windows 2000 Server computer that has FIVE hard disks. Four 100 GB hard disks on the server are configured as a single stripe volume. You want to reconfigure the fourth disk so that the volume is fault tolerant and has as much space possible available for storing data. You want to use only existing hardware. What should you do?

Convert the disk to dynamic disk shut doWn and restart the server
None of above
Backup the data on the stripe volume and delete the stripe volume. Create a mirror volume, shut down and restart the server. Restore the data to new mirror volumes
Backup the data on the stripe volume and delete the stripe
Backup the data on the stripe volume and delete the stripe volume. Create a raidS volume on the four disks, restore the data to the new raid5 volume

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
Your Windows 2000 server Computer contains data files that users of client computers access throughout the day. You install a driver for the new tape drive on the computer. After restarting the computer you log on as an administrator, shortly after you log on you receive the following stop error "irql_not_less_6r_equal". You need to bring the server back on line as quickly and reliably as possible. What should you do?

Perform an emergency repair and select fast repair, restart the computer
Restart the computer by using the last known good menu option
None of above
Restart the computer in the safe mode, remove the driver and restart the computer
Restart the computer by using the recovery console, disable the driver. Restart the computer, remove the driver

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You enable the Routing and Remote Access Service (RRAS) on a computer running Windows 2000 Server. You configure the computer as a RAS server. You want to provide mutual authentication between the RAS server and RAS clients. You also want to ensure that data passing between the RAS server and RAS clients is encrypted. Which authentication method should you use for your incoming connections to support mutual authentication and data encryption?

CHAP
PAP
MS-CHAP v2
SPAP
None of above

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of the Windows 2000 Server network shown in the exhibit. Users in the Research group and the Executive group have permission to access the Internet through a Windows 2000 Server computer running Microsoft Proxy Server. These users must enter their proxy server user names and passwords to connect to the proxy server, to the Internet, and to your local intranet server. The users who do not access the Internet do not have user accounts on the proxy server and, therefore, cannot connect to the intranet server. You want all users to be able to connect to the intranet server without entering a separate user name and password. What should you do?

Move the intranet server to the client segment of the network
Configure each client computer to use port 81 for the proxy server
Configure each client computer to bypass the proxy server for local addresses
None of above
Move the proxy server to the server segment of the network

ANSWER DOWNLOAD EXAMIANS APP