Windows 2000 Server
You install your boot volume on volume C on your Windows 2000 Server computer. You mirror volume C on dynamic Disk 1. Two years later, during routine server maintenance, you open Disk Management and find that the status of volume C is Failed Redundancy. The status of Disk 1 is Missing. You attempt to reactivate Disk 1, but the status of volume C does not return to Healthy. What should you do next?

Replace Disk 1 and restart the computer. The mirror will automatically regenerate
Replace Disk 1 and copy all data from volume C to a new NTFS primary partition on the new Disk 1. Restart the computer
Remove the mirror on Disk 1, replace the disk, and then add back the mirror to the new Disk 1
Rescan the disks, remove the mirror, and delete the data on Disk 1. Then re-create the mirror
None of above

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of a Windows 2000 Server computer. You configure the server to audit all access to files that are places in shared folders. One week after you configured the server, users report that the server has stopped responding. You investigate the problem and discover a stop error with the error message: Stop C0000244 (Audit Failed) An attempt to generate a security audit failed. You restart the computer. You need to ensure that you can keep a record of all files access on the server. You also need to ensure that the stop error will not occur again.

Save the security log to a file, and clear it every morning
Delete the Liscense Trial registry key
Set the Security Log to overwrite events as needed
Increase the size of the security log
Set the CrashonAuditFail registry key to 0

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You enable the Routing and Remote Access Service (RRAS) on a computer running Windows 2000 Server. You configure the computer as a RAS server. You want to provide mutual authentication between the RAS server and RAS clients. You also want to ensure that data passing between the RAS server and RAS clients is encrypted. Which authentication method should you use for your incoming connections to support mutual authentication and data encryption?

None of above
MS-CHAP v2
SPAP
PAP
CHAP

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the network administrator for your company. Mike Nash is a member of the Administration group, and Nate Sun is a member of the Intern group. Both groups are in the same domain. On the intranet server, the Administration group is placed in the Security group, and the Intern group is placed in the Nonsecurity group. The Security group is then granted Full Control permission for the Sales virtual directory. Nate needs to update new sales information that is located on the Sales virtual directory. What should you do so that Nate can perform this task?

Make Nate a member of the Security group
Remove Nate fmm the Intern group
Enable Anonymous access for the Sales virtual directory
None of above
Enable Anonymous access for the intranet server

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You install a Windows 2000 Server computer on your network. You place several shared folders on a 12-GB primary partition formatted by FAT32. During nine months of continuous operation, the number of users who access the server and their access frequency remains constant. The average size of the files on the server remains approximately constant. After the server runs continuous for nine months, users report that the server does not retrieve files from the shared folders as fast as when you first installed the server. What should you do to resolve the problem?

Convert the disk that contains the shared folders to a dynamic disk
Move the paging file to the partition that contains the shared folders
Convert the partition that contains the shared folders to NTFS
None of above
Defragment the disk that contains the shared folders

ANSWER DOWNLOAD EXAMIANS APP