21. You are the administrator of a Windows 2000 Server computer named Intra. Intra is a member of an Active Directory domain and hosts an Intranet Web-Ske for your company. Company policy requires that only authenticated users have access to the intranet site. All company users have a user account in the Active Directory domain. You configure directory security for the Web Site to use integrated security. However, you discover that users can access the Web Site without authentication. You need to ensure that only authenticated users can access the web site. What should you do?
A. Install Active Directory on the server
B. Select Basic Authentication checkbox
C. Clear the Allow Anonymous Connection checkbox
D. Disable the IUSE_inta user account on Intra
E. Clear the Allow IIS to Control Password checkbox
22. You are the administrator of a Windows 2000 Server computer. You configure the server to audit all access to files that are places in shared folders. One week after you configured the server, users report that the server has stopped responding. You investigate the problem and discover a stop error with the error message: Stop C0000244 (Audit Failed) An attempt to generate a security audit failed. You restart the computer. You need to ensure that you can keep a record of all files access on the server. You also need to ensure that the stop error will not occur again.
A. Set the CrashonAuditFail registry key to 0
B. Set the Security Log to overwrite events as needed
C. Delete the Liscense Trial registry key
D. Increase the size of the security log
E. Save the security log to a file, and clear it every morning
23. You have just configured two Windows NT Servers, Monitor 1 and Monitor 2 with no other software installed. You have an application server that needs to be monitored for performance to figure out what it’s problem is, or to get some kind of baseline. You install Network Monitor on Monitor 2. What would you do to monitor Application server?
A. Install Network Monitor on Monitor 1
B. Install Network Monitor on Application Server
C. Configure the network monitor ECP port something for TCP
D. Configure the network monitor EDP port something for UDP
E. Configure Monitor 2 and Application server as monitoring partners (or something) to monitor the performance
24. You install and run a third-party 32-bit application named Application on your Windows 2000 Server computer. After several days, the application stops responding. You open Task Manager and find that the CPU usage is at 100 percent. The normal range of CPU usage on the server is from 20 percent to 30 percent You end the application. However, you see that the CPU on the server is still at 100 percent. Task Manager shows no other applications running. You then examine the Processes page in Task Manager and confirm that the Application.exe process is no longer running. You want to return the CPU usage to its normal range. What should you do?
A. Use Computer Management to stop and restart the Server service
B. Use Computer Management to stop and restart the Workstation service
C. Use Task Manager to end any related child processes
D. Use Task Manager to end and automatically restart the Explorer.exe process
E. None of above
25. You are the administrator of Windows 2000 domain and TWO Windows NT domains. The Windows 2000 domains trust each of the Windows NT domains. Each of Windows NT domains trust the Windows 2000 domain. A Windows 2000 domain controller named DC1 is configured to use a highly secure domain controller template. Users in the Windows NT domain report that they cannot access DC1. You need to allow the users of computers in the Windows NT domain to access resources on DC1. What should you do?
A. Apply a less restrictive custom security template to DC1
B. Apply a less restrictive custom policy to Windows NT domain controller
C. Ensure the Windows 2000 domain is configured in the mixed mode
D. Ensure the Windows 2000 domain is configured to run in the native mode
E. None of above