Warning: Undefined variable $ext in /www/wwwroot/gkfeed.com/public_html/wp-content/plugins/show-hidecollapse-expand/bg_show_hide.php on line 281
Warning: Undefined variable $ext in /www/wwwroot/gkfeed.com/public_html/wp-content/plugins/show-hidecollapse-expand/bg_show_hide.php on line 281
Warning: Undefined variable $ext in /www/wwwroot/gkfeed.com/public_html/wp-content/plugins/show-hidecollapse-expand/bg_show_hide.php on line 281
Warning: Undefined variable $ext in /www/wwwroot/gkfeed.com/public_html/wp-content/plugins/show-hidecollapse-expand/bg_show_hide.php on line 281
Warning: Undefined variable $ext in /www/wwwroot/gkfeed.com/public_html/wp-content/plugins/show-hidecollapse-expand/bg_show_hide.php on line 281
16. You want to provide complete redundancy for all data stored on your hardware RAID 5 array. You install second h/w Raid 5. You want to create a mirror set of the original array. However, when you right click the free space on new array you see no option to create a new volume or mirrored volume. What should you do?
A. Convert both to dynamic disks
B. Create an empty extended partition on new disk
C. Create a single unformatted primary partition on new array
D. Format new disk array as a single NTFS primary partition
E. Format the new disk array as a single NTFS logical drive in an extended partition
17. You are the administrator of the Windows 2000 Server network shown in the exhibit. Users in the Research group and the Executive group have permission to access the Internet through a Windows 2000 Server computer running Microsoft Proxy Server. These users must enter their proxy server user names and passwords to connect to the proxy server, to the Internet, and to your local intranet server. The users who do not access the Internet do not have user accounts on the proxy server and, therefore, cannot connect to the intranet server. You want all users to be able to connect to the intranet server without entering a separate user name and password. What should you do?
A. Move the intranet server to the client segment of the network
B. Move the proxy server to the server segment of the network
C. Configure each client computer to bypass the proxy server for local addresses
D. Configure each client computer to use port 81 for the proxy server
E. None of above
18. You are the administrator of a Windows 2000 Server computer that has FIVE hard disks. Four 100 GB hard disks on the server are configured as a single stripe volume. You want to reconfigure the fourth disk so that the volume is fault tolerant and has as much space possible available for storing data. You want to use only existing hardware. What should you do?
A. Convert the disk to dynamic disk shut down and restart the server
B. Backup the data on the stripe volume and delete the stripe volume. Create a raid5 volume on the four disks, restore the data to the new raidS volume
C. Backup the data on the stripe volume and delete the stripe volume. Create to mirror volume, shut down and restart the server. Restore the data to new mirror volumes
D. Backup the data on the stripe volume and delete the stripe volume. Create a span volume for the first two disks, create a second span volume for the last two disk. Mount the root of the second span volume in the root of the first span volume. Restore the data to the first span volume
E. None of above
19. You are the administrator of a network that consists of Windows 2000 Server computers and Windows 2000 Professional computers. You want to configure the deployment of the most recent Windows 2000 service pack so that users of the Windows 2000 Professional computers receive the service pack automatically when they log on to the domain. What should you do?
A. Create a Microsoft Windows installer package for the service pack. Configure RIS to use the package
B. Create a Microsoft Windows Installer package for the service pack. Configure the package in a Group Policy
C. Create a Microsoft -Windows Installer package for the service pack. Configure the package in the Local Computer Policy
D. Place the service pack in a Distributed file system (Dfs)
E. None of above
20. You enable the Routing and Remote Access Service (RRAS) on a computer running Windows 2000 Server. You configure the computer as a RAS server. You want to provide mutual authentication between the RAS server and RAS clients. You also want to ensure that data passing between the RAS server and RAS clients is encrypted. Which authentication method should you use for your incoming connections to support mutual authentication and data encryption?
A. CHAP
B. MS-CHAP v2
C. PAP
D. SPAP
E. None of above
Warning: Undefined variable $in_same_cat in /www/wwwroot/gkfeed.com/public_html/wp-content/plugins/EXP.GKFEED.COM/function.php on line 27
Warning: Undefined variable $excluded_categories in /www/wwwroot/gkfeed.com/public_html/wp-content/plugins/EXP.GKFEED.COM/function.php on line 27