Your company has a network that has 100 servers. A server named Server1 is configured as a file server. Server1 is connected to a SAN and has 15 logical drives.You want to automatically run a data archiving script if the free space on any of the logical drives is below 30 percent.You need to automate the script execution.You create a new Data Collector Set. What should you do next?()A、Add the Event trace data collector.B、Add the Performance counter alert.C、Add the Performance counter data collector.D、Add the System configuration information data collector.

Your company has a network that has 100 servers. A server named Server1 is configured as a file server. Server1 is connected to a SAN and has 15 logical drives.You want to automatically run a data archiving script if the free space on any of the logical drives is below 30 percent.You need to automate the script execution.You create a new Data Collector Set. What should you do next?()

  • A、Add the Event trace data collector.
  • B、Add the Performance counter alert.
  • C、Add the Performance counter data collector.
  • D、Add the System configuration information data collector.

相关考题:

Our long _________ with your company has brought great benefits.AimplicationBresistanceCassociationDsubstance

All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Your company policy requires that all unnecessary services be disabled on the computers. The Sales department staff has been provided with new mobile broadband adapters that use the Global System for Mobile Communications (GSM) technology. You need to ensure that portable computers can connect to the broadband GSM network. Which service should be enabled on the portable computers?()A.WLAN AutoConfigB.WWAN AutoConfigC.Computer BrowserD.Portable Device Enumerator Service

You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()A.AB.BC.CD.D

You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet.Which PIN architecture is applicable in those environments?()A.CampusB.TeleworkerC.BranchD.Data center

The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch.What must be done to ensure that this new switch becomes the root bridge on the network?()A、One router is running RIPv1.B、RIP neighbor is 224.0.0.9.C、The network contains a loop.D、Network 10.10.1.0 is reachable.

Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system .Which two of these are characteristics of an IDS sensor?()A、 has a permissive interface that is used to monitor networksB、 is an active device in the traffic pathC、 passively listens to network trafficD、 has a promiscuous interface that is used to monitor the network

Your company has two primary divisions: Products and Services. The Products division is on network 150.10.640/21. The Services division is on network 150.10.72.0/21. You want to summarize both networks into one routing statement. Which IP address and subnet mask combination would most efficiently accomplish this?()A、 150.10.64.0/21B、 150.10.64.0/22C、 150.10.64.0/20D、 150.10.0.0./16

You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()A、CampusB、TeleworkerC、BranchD、Data center

All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()A、Configure the Network authentication (Shared mode) setting.B、Apply a Wireless Network Policy to set the network type to WPA-PSK.C、Apply a Wireless Network Policy to automatically connect to the company wireless network.D、Apply a Wireless Network Policy to set the company wireless network as the preferred network.

.You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.the Company.com network contains a client access server named - ex05.during routine monitoring you discover that -ex05 has failed.you receive an instruction from the cio to install a new member server named -ex05 on the network as well as to recovering the client access server role on -ex05.What should you do?()A、Your best option would be to run Setup /RecoverCMS from the Exchange Server installation source files.B、your best option would be to have the inetpub folder as well as the system state restored from -ex05.C、Your best option would be to run Setup /M:RecoverServer from the Exchange Server installation source files.D、your best option would be to have the inetsrv folder as well as the system state restored from - ex05.

All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Your company policy requires that all unnecessary services be disabled on the computers. The Sales department staff has been provided with new mobile broadband adapters that use the Global System for Mobile Communications (GSM) technology. You need to ensure that portable computers can connect to the broadband GSM network. Which service should be enabled on the portable computers?()A、WLAN AutoConfigB、WWAN AutoConfigC、Computer BrowserD、Portable Device Enumerator Service

You work as the Exchange administrator at Company.com.The Company.com network contains an Exchange Server 2010 Organization.You are responsible for managing the Exchange network for Company.com.The network contains numerous Mailbox servers.During the course of the week you receive an instruction from the CIO to determine the message latency between the Mailbox servers in the organization.What should you do?()A、Your best option would be to increase the MSExchangeMailSubmission diagnostic logging level to Expert.B、Your best option would be to run the Test-Mailflow cmdlet.C、Your best option would be to increase the MSExchangeTransport diagnostic logging level to Expert.D、Your best option would be to run the Test-OutlookConnectivity cmdlet.

Your company has a single Active Directory domain. The company network is protected by a firewall.Remote users connect to your network through a VPN server by using PPTP.When the users try to connect to the VPN server, they receive the following error message :Error 721:The remote computer is not responding.You need to ensure that users can establish a VPN connection.What should you do?()A、Open port 1423 on the firewall.B、Open port 1723 on the firewall.C、Open port 3389 on the firewall.D、Open port 6000 on the firewall.

You are a systems engineer for your company. Your company has 20,000 users in a large campus environment located in Los Angeles. Each department in the company is located in its own building. Each department has its own IT staff, which is responsible for all network administration within the building.   The company’s network is divided into several IP subnets that are connected to one another by using dedicated routers. Each building on the company’s main campus contains at least one subnet, and possibly up to five subnets. Each building has at least one router. All routers use RIP version 2 (RIPv2) broadcasts.   The company acquires a new business unit located in Denver. The Denver office has 25 users. The network in the Denver office is connected to the network at the main campus by using a leased frame relay connection. The network administrator at the Denver office installs a Windows Server 2003 computer and configures Routing and Remote Access on this server. The network administrator at the Denver office configures this server as a router and implements RIPv2 in Routing and Remote Access.   Later, the Denver administrator reports that his router is not receiving routing table updates from the routers on the main campus network. He must manually add routing entries to the routing table to enable connectivity between the locations. You investigate and discover that the RIPv2 broadcasts are not being received at the Denver office. You also discover that no routing table announcements from the Denver office are being received on the main campus network.  You need to ensure that the network in the Denver office can communicate with the main campus network and can send and receive automatic routing table updates as network conditions change.   What should you do on the router in the Denver office?()A、 Configure the router to use RIPv1 broadcasts.B、 Configure the router to use auto-static update mode.C、 Add the IP address ranges of the main campus network to the router’s Accept list and Announce list.D、 Add the IP addresses of the main campus routers to the router’s Neighbors list.

You are the administrator of Etechsol.com Enterprises. Your company consists of a small 20-user network. Management has decided to upgrade all computers to Windows 2000.   After having a closer examination of your company’s network, you realize that only half of the network interface cards are Net PC compliant. You decide to create Windows 2000 remote boot floppies.  What executable is used for creating RIS boot disks for non-PXE compliant clients?()A、RBFG*EXEB、RIPREP*EXEC、RIS*EXED、RISPXE*EXEE、RISBOO*EXE

单选题Your company has an Active Directory forest. The company has servers that run Windows Server 2008 amd client computers that run Windows Vista. The domain uses a set of GPO administrative templates that have been approved to support regulatory compliance requirements. Your partner company has an Active Directory forest that contains a single domain, The company has servers that run Windows Server 2008 and client computers that run Windows Vista. You need to configure your partner company’s domain to use the approved set of administrative templates. What should you do()AUse the Group Policy Management Console (GPMC) utility to back up the GPO to a file. In each site, import the GPO to the default domain policy.BCopy the ADMX files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PDC emulatorCCopy the ADML files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PDC emulatorDDownload the conf.adm, system.adm, wuau.adm, and inetres.adm files from the Microsoft Updates Web site. Copy the ADM files to the PolicyDefinitions folder on thr partner company’s emulator.

单选题Your company has just upgraded its CATAGORY 5 Ethernet network from 10Mbps to 100Mbps. After the upgrade, the 20 Windows 2000 Professional computers in the marketing department can no longer connect to the network. The remaining 80 Windows 2000 computers in the company can connect, however. Your company uses NWLink as the only network protocol.You need to connect the computers in the marketing department to the network. What must you do? ()AConfigure the NWLink frame type of the network adapters to be ethernet 802.3.BConfigure the NWLink frame type of the network adapters to be ethernet II.CReplace the network adapters with 10/100 BNC adapters.DReplace the network adapters with 10/100 UTP network adapters.

单选题You want to connect your Windows 2000 Professional computer to multiple TCP/IP subnets on your company’s network. Your computer currently has an ISA network adapter installed. You install a second ISA network adapter. After you restart your computer, you notice that the second ISA network adapter is not functioning. What should you do?()ASet the driver signing option to block.BSet the driver signing option to ignore.CIn the computer’s BIOS, reserve an unused IRQ for ISA devices.DIn the Device Manager, configure the second ISA network adapter to use an unused IRQ.

单选题You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? ()AEnable the Require domain controller to unlock policy.BSet the Number of previous logons to cache policy to 0.  CRemove all user and group accounts from the Log on locally user right. DRemove all user and group accounts from the Access this computer from the network user right.

单选题Your company has 250 client computers connected to the office LAN. The company has a pool of five public IP addresses. All client computers have dynamically assigned IP addresses. You need to provide all client computers with Internet access.  What should you use?()A DHCP Relay AgentB Routing Information Protocol (RIP)C Internet Group Management Protocol (IGMP)D Network Address Translation (NAT)/Basic Firewall

单选题Your company has an Active Directory forest. The company has servers that run Windows Server  2008 R2 and client computers that run Windows 7. The domain uses a set of GPO administrative  templates that have been approved to support regulatory compliance requirements.     Your partner company has an Active Directory forest that contains a single domain. The company  has servers that run Windows Server 2008 R2 and client computers that run Windows 7.     You need to configure your partner company’s domain to use the approved set of administrative  templates.   What should you do()AUse the Group Policy Management Console (GPMC) utility to back up the GPO to a file. In each site, import the GPBCopy the ADMX files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PDCCCopy the ADML files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PDC DDownload the conf.adm, system.adm, wuau.adm, and inetres.adm files from the Microsoft Updates Web site.

单选题Your company has an IPv6 Ethernet network. A router named R1 connects your segment to the internet. A router named R2 joins your subnet with a segment named Private1. The Private1 segment has a network address of 10.128.4.0/26. Your computer named WKS2 required access to servers on the Private1 network. The WKS1 computer configuration in shown in the following table. (again table missing). The routers are configured as shown in the following table. (missing too)WKS1 is unable to connect to the Private1 network by using the current configuration. You need to add a persistent route for the Private1 network to the routing table on WKS1.()ARout add -p 10.128.4.0/22 10.128.4.1BRoute add Cp 10.128.4.0/26 10.128.64.10CRoute add Cp 10.128.4.0 mask 255.255.255.192 10.12.64.1DRoute add Cp 10.128.64.10 mask 255.255.255.192 10.128.4.0

多选题Your IT director has decided to allow employees to use their laptops at home as well as in the office. You have deployed the Junos Pulse client to allow access to the offices 802.1X-enabled wired network. Your company also has the Junos Pulse Secure Access Service deployed. You want the Junos Pulse client to automatically launch the appropriate access method depending on each users location. Which three are supported to determine the users location?()AMAC addressBDNS serverCDHCP serverDresolve addressEendpoint address

多选题Your company has a server named Server1 that runs Windows Server 2008 and Microsoft Hyper-V. Server1 hosts three virtual machines.  Company policy states that the virtual machines must not connect to the company network.  You need to configure all of the virtual machines to connect to each other. You must meet the company policy.  Which two actions should you perform?()ASelect the Not connected option for each virtual machine.BEnable the Enable virtual LAN identification option for each virtual machine.CSet the Connection to Host for the network interface card.DSet the Connection to None for the network interface card.

单选题The company has a Windows 2008 Active Directory-based network.The network contains an Exchange Server 2003 organization.The management instructs you to deploy Exchange Server 2010 in your network.You decide to prepare the schema and domain first.Which of the following commands should you run prior to performing the normal schema and domain preparation?()ASetup /PrepareSchemaBSetup /PrepareLegacyExchangePermissionsCSetup /PrepareADDSetup /PrepareLegacyExchangePermissions:child.Xxx

单选题You are the administrator of your company’s network. Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers. Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled.   A user named John leaves the company. You move all of the files from John’s home folder to his manager’s folder. When the manager attempts to open any of the files, she receives the following error message. “Access denied.”   You want the manager to be able to access the files. What should you do?()AGrant the manager NTFS Full Control permission to the files.BGrant the manager NTFS Take Ownership permission to the files.CLog on to the network as a recovery Agent.  Decrypt the files for the manager.DLog on to the network as a member of the Backup Operators group. Decrypt the files for the manager.

单选题Your company has two primary divisions: Products and Services. The Products division is on network 150.10.640/21. The Services division is on network 150.10.72.0/21. You want to summarize both networks into one routing statement. Which IP address and subnet mask combination would most efficiently accomplish this?()A 150.10.64.0/21B 150.10.64.0/22C 150.10.64.0/20D 150.10.0.0./16

问答题Practice 2  ● Recently your company is planning to bid for hosting an exhibition and now the manager of your company has asked you to write a letter to the organizing committee to introduce your company to them.  ● Write a letter to introduce the details about your company.  ● introducing the department structure and service,  ● introducing previous exhibitions you have hosted,  ● expressing your confidence in the success if you are permitted to host it.