Windows 2000 Server
You are the administrator of a Windows 2000 server computer. The server has a single hard disk with two partitions. An application that runs on your server creates a very large log file in the SystemrootYTemp folder. There is not enough free space on the system partition to accommodate the log file. The application does not provide a way to change the path to the log file. You want to run the application on your server. What should you do?

In the systemroot folder, create a shortcut named Temp that points to the second partition on the disk
On the second partition, create a shared folder named Temp
Add a second hard disk. Create and format a partition from the free space on the second hard disk. Create a Temp folder on the new partition. Mount the system partition as the Temp folder on the new p
None of above
Add a second hard disk. Delete the contents of the SystemrootYTemp folder. Create and format a partition from the free space on the second hard disk. Mount the partition as the SystemrootYTemp folder

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of a Windows 2000 Server computer. The server hosts several web sites that have logging enabled. You use a third-party reporting utility to analyze the log files produced by the web sites. You notice that all data from 7:00pm to midnight each night is included in the following day's logfile. You want all data to be included in the correct day's log file. What should you do?

Change the time zone setting in the time properties on the web server
None of above
Change the log rollover property in the website's logging properties
Configure the time service on the web server to use local system account
Ensure that the log type is set to W3C

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You have just configured two Windows NT Servers, Monitor 1 and Monitor 2 with no other software installed. You have an application server that needs to be monitored for performance to figure out what it's problem is, or to get some kind of baseline. You install Network Monitor on Monitor 2. What would you do to monitor Application server?

Configure Monitor 2 and Application server as monitoring partners (or something) to monitor the performance
Install Network Monitor on Monitor 1
Configure the network monitor EDP port something for UDP
Configure the network monitor ECP port something for TCP
Install Network Monitor on Application Server

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You install and run a third-party 32-bit application named Application on your Windows 2000 Server computer. After several days, the application stops responding. You open Task Manager and find that the CPU usage is at 100 percent. The normal range of CPU usage on the server is from 20 percent to 30 percent You end the application. However, you see that the CPU on the server is still at 100 percent. Task Manager shows no other applications running. You then examine the Processes page in Task Manager and confirm that the Application.exe process is no longer running. You want to return the CPU usage to its normal range. What should you do?

None of above
Use Task Manager to end any related child processes
Use Computer Management to stop and restart the Server service
Use Task Manager to end and automatically restart the Explorer.exe process
Use Computer Management to stop and restart the Workstation service

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of a Windows 2000 Server computer. You configure the server to audit all access to files that are places in shared folders. One week after you configured the server, users report that the server has stopped responding. You investigate the problem and discover a stop error with the error message: Stop C0000244 (Audit Failed) An attempt to generate a security audit failed. You restart the computer. You need to ensure that you can keep a record of all files access on the server. You also need to ensure that the stop error will not occur again.

Increase the size of the security log
Set the Security Log to overwrite events as needed
Delete the Liscense Trial registry key
Save the security log to a file, and clear it every morning
Set the CrashonAuditFail registry key to 0

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of Windows 2000 domain and TWO Windows NT domains. The Windows 2000 domains trust each of the Windows NT domains. Each of Windows NT domains trust the Windows 2000 domain. A Windows 2000 domain controller named DC1 is configured to use a highly secure domain controller template. Users in the Windows NT domain report that they cannot access DC1. You need to allow the users of computers in the Windows NT domain to access resources on DC1. What should you do?

Apply a less restrictive custom security template to DC1
Ensure the Windows 2000 domain is configured in the mixed mode
None of above
Apply a less restrictive custom policy to Windows NT domain controller
Ensure the Windows 2000 domain is configured to run in the native mode

ANSWER DOWNLOAD EXAMIANS APP