adplus-dvertising
frame-decoration

Question

Your network contains 10 domain controllers, 10 member servers, and approximately 1,000 client computers. All the servers run Windows 2000 Server, and all the client computers run Windows 2000 Professional. Two of the domain controllers act as DNS servers. Users of client computers use file sharing to grant access to files stored locally. The network has 10 subnets and uses TCP/IP as the only network protocol. You want to configure the network so that all computers can resolve the addresses of all other computers by using DNS. Client computers must be able to register and resolve addresses if a server fails. How should you configure the DNS servers?

a.

Configure one server with a standard primary zone for the domain, and configure at least one server with standard secondary zone

b.

Configure one server with a standard primary zone for the domain, and configure at least one server with an Active Directory integrated primary zone

c.

Configure one server with an Active directory integrated primary zone for the domain, and configure at least one server with a standard secondary zone

d.

Configure at least two servers with Active Directory integrated primary zones for the domain

Posted under Operating System

Answer: (d).Configure at least two servers with Active Directory integrated primary zones for the domain

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Your network contains 10 domain controllers, 10 member servers, and approximately 1,000 client computers. All the servers run Windows 2000 Server, and all the client computers run...

Similar Questions

Discover Related MCQs

Q. You are the network administrator for your company. The company has numerous branch offices, and each office uses Internet Connecting Sharing to connect to the Internet. A new employee named David Johnson is configuring a Windows 2000 Server computer as a file server. When David uses Windows update for the first time and select Product Update, he receives an error message stating that access is denied. David needs to be able to update the file by using his account. What should you do?

Q. You install Terminal Services on a Windows 2000 domain controller. You install Terminal Services Client on users' client computers. Users report that when they try to connect to the Terminal server, they receive the following error message: "The local policy of this system does not allow you to logon interactively." When you attempt to log on to the Terminal server as an administrator from a user's computer, you log on successfully. You want users to be able to log on to the Terminal server. What should you do?

Q. How can you assign an application to one processor exclusively?

Q. You install your boot volume on volume C on your Windows 2000 Server computer. You mirror volume C on dynamic Disk 1. Two years later, during routine server maintenance, you open Disk Management and find that the status of volume C is Failed Redundancy. The status of Disk 1 is Missing. You attempt to reactivate Disk 1, but the status of volume C does not return to Healthy. What should you do next?

Q. You want to install Windows 2000 server on 15 new computers. You want to install, configure and test all 2000 servers before shipping them to your branch offices. You want the users at the branch offices to enter the serial numbers and computer names once they receive the computers. What should you do?

Q. You are the administrator of a Windows 2000 server computer. The server has a single hard disk with two partitions. An application that runs on your server creates a very large log file in the SystemrootYTemp folder. There is not enough free space on the system partition to accommodate the log file. The application does not provide a way to change the path to the log file. You want to run the application on your server. What should you do?

Q. You are the administrator of a network that consists of a single Windows NT 4.0 domain. The network contains five Windows NT Server domain controllers and 1,000 Windows NT Workstation client computers. You want to install Windows 2000 Server on a new computer. You want the new computer to act as a domain controller in the existing domain. What should you do?

Q. You are installing Windows 2000 Server on a multiprocessor computer. The manufacturer has provided a customized HAL to use with the computer. The HAL is on the floppy disk. You want to install the customized HAL design for the computer. What should you do?

Q. A Windows 2000 Server computer named server2 runs numerous 32bit applications and two 16bit applications. Users start the 16bit applications by running APP1.EXE for one application and APP2.EXE for another application. The 16bit applications are configured to run in the separate memory space. You want to create a performance base like chart in the system monitor for all the applications on server2. You add all of 32bit applications and now you want to add two 16bit applications. What should you do?

Q. Your Windows 2000 Server computer includes an integrated 10-MB Ethernet adapter. You are replacing the integrated adapter with a new 100-MB Ethernet adapter. You install the new adapter in an available PCI slot. When you restart the computer, you receive error messages in the System log stating that the new adapter Is missing or is not working. What should you do to resolve the problem?

Q. Your Windows 2000 server Computer contains data files that users of client computers access throughout the day. You install a driver for the new tape drive on the computer. After restarting the computer you log on as an administrator, shortly after you log on you receive the following stop error "irql_not_less_6r_equal". You need to bring the server back on line as quickly and reliably as possible. What should you do?

Q. Your Windows 2000 Server computer contains a stripe set with parity on a four-disk array. You convert the stripe set with parity to a dynamic RAID-5 volume. Six months later, users report that disk access on the server is slower than it had been on the previous day, You use Disk Management and discover that the status of the third disk in the array is Missing. You want to recover the failed RAID-5 volume. What should you do first?

Q. You are the administrator of the Windows 2000 Server network shown in the exhibit. Users in the Research group and the Executive group have permission to access the Internet through a Windows 2000 Server computer running Microsoft Proxy Server. These users must enter their proxy server user names and passwords to connect to the proxy server, to the Internet, and to your local intranet server. The users who do not access the Internet do not have user accounts on the proxy server and, therefore, cannot connect to the intranet server. You want all users to be able to connect to the intranet server without entering a separate user name and password. What should you do?

Q. You are the administrator of a network that consists of Windows 2000 Server computers and Windows 2000 Professional computers. You want to configure the deployment of the most recent Windows 2000 service pack so that users of the Windows 2000 Professional computers receive the service pack automatically when they log on to the domain. What should you do?

Q. You enable the Routing and Remote Access Service (RRAS) on a computer running Windows 2000 Server. You configure the computer as a RAS server. You want to provide mutual authentication between the RAS server and RAS clients. You also want to ensure that data passing between the RAS server and RAS clients is encrypted. Which authentication method should you use for your incoming connections to support mutual authentication and data encryption?

Q. You are the administrator of a Windows 2000 Server computer named Intra. Intra is a member of an Active Directory domain and hosts an Intranet Web-Ske for your company. Company policy requires that only authenticated users have access to the intranet site. All company users have a user account in the Active Directory domain. You configure directory security for the Web Site to use integrated security. However, you discover that users can access the Web Site without authentication. You need to ensure that only authenticated users can access the web site. What should you do?

Q. You are the administrator of a Windows 2000 Server computer. You configure the server to audit all access to files that are places in shared folders. One week after you configured the server, users report that the server has stopped responding. You investigate the problem and discover a stop error with the error message: Stop C0000244 (Audit Failed) An attempt to generate a security audit failed. You restart the computer. You need to ensure that you can keep a record of all files access on the server. You also need to ensure that the stop error will not occur again.

Q. You have just configured two Windows NT Servers, Monitor 1 and Monitor 2 with no other software installed. You have an application server that needs to be monitored for performance to figure out what it's problem is, or to get some kind of baseline. You install Network Monitor on Monitor 2. What would you do to monitor Application server?

Q. You install and run a third-party 32-bit application named Application on your Windows 2000 Server computer. After several days, the application stops responding. You open Task Manager and find that the CPU usage is at 100 percent. The normal range of CPU usage on the server is from 20 percent to 30 percent You end the application. However, you see that the CPU on the server is still at 100 percent. Task Manager shows no other applications running. You then examine the Processes page in Task Manager and confirm that the Application.exe process is no longer running. You want to return the CPU usage to its normal range. What should you do?

Q. You are the administrator of Windows 2000 domain and TWO Windows NT domains. The Windows 2000 domains trust each of the Windows NT domains. Each of Windows NT domains trust the Windows 2000 domain. A Windows 2000 domain controller named DC1 is configured to use a highly secure domain controller template. Users in the Windows NT domain report that they cannot access DC1. You need to allow the users of computers in the Windows NT domain to access resources on DC1. What should you do?