Windows 2000 Server
You want to provide complete redundancy for all data stored on your hardware RAID 5 array. You install second h/w Raid 5. You want to create a mirror set of the original array. However when you right click the free space on new array you see no option to create a new volume or mirrrored volume. What should you do?

Create a single unformatted primary partition on new array
Format the new disk array as a single NTFS logical drive in an extended partition.
Create an empty extended partition on new disk
Format new disk array as a single NTFS primary partition
Convert both to dynamic disks

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of the Windows 2000 Server network shown in the exhibit. Users in the Research group and the Executive group have permission to access the Internet through a Windows 2000 Server computer running Microsoft Proxy Server. These users must enter their proxy server user names and passwords to connect to the proxy server, to the Internet, and to your local intranet server. The users who do not access the Internet do not have user accounts on the proxy server and, therefore, cannot connect to the intranet server. You want all users to be able to connect to the intranet server without entering a separate user name and password. What should you do?

Configure each client computer to bypass the proxy server for local addresses
Move the intranet server to the client segment of the network
None of above
Move the proxy server to the server segment of the network
Configure each client computer to use port 81 for the proxy server

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
A Windows 2000 Server computer named server2 runs numerous 32bit applications and two 16bit applications. Users start the 16bit applications by running APP1.EXE for one application and APP2.EXE for another application. The 16bit applications are configured to run in the separate memory space. You want to create a performance base like chart in the system monitor for all the applications on server2. You add all of 32bit applications and now you want to add two 16bit applications. What should you do?

Add the NTVDM 1 and NTVDM #2 instances for processor time counter for the process object
Add only the NTVDM instance for the percent processor time counter for the process object
Add the APP1 and APP2 instances to the processor time counter for the process object
Add the NTVDM, APP1 and APP2 instances for the processor time counter for the process object
None of above

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the administrator of Windows 2000 domain and TWO Windows NT domains. The Windows 2000 domains trust each of the Windows NT domains. Each of Windows NT domains trust the Windows 2000 domain. A Windows 2000 domain controller named DC1 is configured to use a highly secure domain controller template. Users in the Windows NT domain report that they cannot access DC1. You need to allow the users of computers in the Windows NT domain to access resources on DC1. What should you do?

Apply a less restrictive custom security template to DC1
Apply a less restrictive custom policy to Windows NT domain controller
Ensure the Windows 2000 domain is configured in the mixed mode
Ensure the Windows 2000 domain is configured to run in the native mode
None of above

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You are the network administrator for your company. The company has numerous branch offices, and each office uses Internet Connecting Sharing to connect to the Internet. A new employee named David Johnson is configuring a Windows 2000 Server computer as a file server. When David uses Windows update for the first time and select Product Update, he receives an error message stating that access is denied. David needs to be able to update the file by using his account. What should you do?

Instruct David to log on as a domain administrator on the Windows 2000 Server computer
None of above
Configure the settings for Internet Connecting Sharing to allow POP3 access
Give David's user account administrator privileges on the Windows 2000 Server computer
Configure the settings for Internet Connecting Sharing to allow SMTP access

ANSWER DOWNLOAD EXAMIANS APP

Windows 2000 Server
You install and run a third-party 32-bit application named Application on your Windows 2000 Server computer. After several days, the application stops responding. You open Task Manager and find that the CPU usage is at 100 percent. The normal range of CPU usage on the server is from 20 percent to 30 percent You end the application. However, you see that the CPU on the server is still at 100 percent. Task Manager shows no other applications running. You then examine the Processes page in Task Manager and confirm that the Application.exe process is no longer running. You want to return the CPU usage to its normal range. What should you do?

None of above
Use Task Manager to end and automatically restart the Explorer.exe process
Use Computer Management to stop and restart the Server service
Use Task Manager to end any related child processes
Use Computer Management to stop and restart the Workstation service

ANSWER DOWNLOAD EXAMIANS APP