Windows 2000 Server
You install your boot volume on volume C on your Windows 2000 Server computer. You mirror volume C on dynamic Disk 1. Two years later, during routine server maintenance, you open Disk Management and find that the status of volume C is Failed Redundancy. The status of Disk 1 is Missing. You attempt to reactivate Disk 1, but the status of volume C does not return to Healthy. What should you do next?

None of above
Rescan the disks, remove the mirror, and delete the data on Disk 1. Then re-create the mirror
Replace Disk 1 and copy all data from volume C to a new NTFS primary partition on the new Disk 1. Restart the computer
Replace Disk 1 and restart the computer. The mirror will automatically regenerate
Remove the mirror on Disk 1, replace the disk, and then add back the mirror to the new Disk 1

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You enable the Routing and Remote Access Service (RRAS) on a computer running Windows 2000 Server. You configure the computer as a RAS server. You want to provide mutual authentication between the RAS server and RAS clients. You also want to ensure that data passing between the RAS server and RAS clients is encrypted. Which authentication method should you use for your incoming connections to support mutual authentication and data encryption?

MS-CHAP v2
CHAP
None of above
PAP
SPAP

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of a Windows 2000 Server computer named Intra. Intra is a member of an Active Directory domain and hosts an Intranet Web-Ske for your company. Company policy requires that only authenticated users have access to the intranet site. All company users have a user account in the Active Directory domain. You configure directory security for the Web Site to use integrated security. However, you discover that users can access the Web Site without authentication. You need to ensure that only authenticated users can access the web site. What should you do?

Install Active Directory on the server
Select Basic Authentication check box
Clear the Allow IIS to Control Password check box
Disable the IUSE_inta user account on Intra
Clear the Allow Anonymous Connection check box

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of a network that consists of Windows 2000 Server computers and Windows 2000 Professional computers. You want to configure the deployment of the most recent Windows 2000 service pack so that users of the Windows 2000 Professional computers receive the service pack automatically when they log on to the domain. What should you do?

Create a Microsoft Windows Installer package for the service pack. Configure the package in a Group Policy
Place the service pack in a Distributed file system (Dfs)
Create a Microsoft Windows installer package for the service pack. Configure RIS to use the package
Create a Microsoft -Windows Installer package for the service pack. Configure the package in the Local Computer Policy
None of above

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
Your computer has a mirrored volume and you wish to now install the Recovery Console for future troubleshooting. How do you do this?

Break the mirror, run X:i386winnt32.exe /cmdcons Reestablish the mirror
None of above
Run the add and remove programs and add the recovery console
Run X:i386winnt32.exe / cmdcons
Reinstall Windows, this can only be applied during the installation

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of the Windows 2000 Server network shown in the exhibit. Users in the Research group and the Executive group have permission to access the Internet through a Windows 2000 Server computer running Microsoft Proxy Server. These users must enter their proxy server user names and passwords to connect to the proxy server, to the Internet, and to your local intranet server. The users who do not access the Internet do not have user accounts on the proxy server and, therefore, cannot connect to the intranet server. You want all users to be able to connect to the intranet server without entering a separate user name and password. What should you do?

Configure each client computer to use port 81 for the proxy server
Move the proxy server to the server segment of the network
None of above
Move the intranet server to the client segment of the network
Configure each client computer to bypass the proxy server for local addresses

ANSWER DOWNLOAD EXAMIANS APP