单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The company has an office in San Diego, which is configured as a single Active Directory site. The company has 500 users. The company opens a new office in Los Angeles, which employs 50 users. A T1 line connects both offices. You configure the Los Angeles office as a single site. You create a subnet object for the Los Angeles office.  In the Los Angeles office, you install and configure a server named DC1 as a domain controller and global catalog server. You configure the Los Angeles site to use DC1 and the Los Angeles subnet object. You configure a site link that connects the site in San Diego and the site in Los Angeles.  You need to ensure that client computers in Los Angeles connect to DC1 for authentication. You also need to ensure that changes to the domain are replicated as soon as possible.  What should you do?()A Configure the interval for the site link to its minimum value.B Remove the Los Angeles site and move DC1 and the Los Angeles subnet object to the San Diego site.C Create an RPC­based connection object at each of the two sites.D Create a site link bridge between the two sites.

单选题
You are the network administrator for your company. The network consists of a single Active Directory domain. The company has an office in San Diego, which is configured as a single Active Directory site. The company has 500 users. The company opens a new office in Los Angeles, which employs 50 users. A T1 line connects both offices. You configure the Los Angeles office as a single site. You create a subnet object for the Los Angeles office.  In the Los Angeles office, you install and configure a server named DC1 as a domain controller and global catalog server. You configure the Los Angeles site to use DC1 and the Los Angeles subnet object. You configure a site link that connects the site in San Diego and the site in Los Angeles.  You need to ensure that client computers in Los Angeles connect to DC1 for authentication. You also need to ensure that changes to the domain are replicated as soon as possible.  What should you do?()
A

 Configure the interval for the site link to its minimum value.

B

 Remove the Los Angeles site and move DC1 and the Los Angeles subnet object to the San Diego site.

C

 Create an RPC­based connection object at each of the two sites.

D

 Create a site link bridge between the two sites.


参考解析

解析: 暂无解析

相关考题:

You are an administrator of the Ezonexam switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in the Ezonexam network.However, you need to share the VLAN information across numerous switches. Which of the following would allow you accomplish this?A. STPB. GVRPC. SNMPD. VTPE. DHCPF. None of the above

You are the network administrator for your company. The network originally consists of a single Windows NT 4.0 domain.You upgrade the domain to a single Active Directory domain. All network servers now run Windows Server 2003, and all client computers run Windows XP Professional.Your staff provides technical support to the network. They frequently establish Remote Desktop connections with a domain controller named DC1.You hire 25 new support specialists for your staff. You use Csvde.exe to create Active Directory user accounts for all 25.A new support specialist named Paul reports that he cannot establish a Remote Desktop connection with DC1. He receives the message shown in the Logon Message exhibit. (Click the Exhibit button.)You open Gpedit.msc on DC1. You see the display shown in the Security Policy exhibit. (Click the Exhibit button.)You need to ensure that Paul can establish Remote Desktop connections with DC1.What should you do? ()

You are a network administrator for your company. You currently automate backups of the System State data on the servers in your network by using NTBackup. Your manager instructs you to document the procedure for restoring a server from a backup of the System State data.You need to select the correct method for performing a restoration of a backup of the System State data.What should you do?()A. Run the following command: ntbackup.exe backup /F {FileName}B. Run the following command: ntbackup.exe backup systemstate /F {FileName}C. In Control Panel, open System, and configure the Startup and Recovery settings on the Advanced tab.D. Use NTBackup interactively.

You are a network administrator for your company. All servers run Windows Server 2003. A server namedServer34 runs an application named App1.Users report that App1 is performing slowly. You suspect that an unauthorized application is installed on Server34.You run the netstat command and examine the output, as shown in the exhibit. (Click the Exhibit button.)You need to identify the unauthorized application by using the output from the netstat command.Which tool should you use to identify the application? ()A. Performance consoleB. System MonitorC. Network MonitorD. Task Manager

You are an administrator of Ezonexam.com's network. You want to perform. routine upgrades on your Windows 2000 Server computer. You use your non-administrator user account in the domain to logon to the server.You want to upgrade all of the critical system files and patches on the server in the shortest possible time.What should you do?A.Use Windows Update.B.Run System File Checker.C.Log on as administrator and run Windows Update.D.Log on as administrator and run System File Checker.

You are a network administrator for Ezonexam.com's Windows 2000 network.Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers.Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Jack Bauer leaves the company. You grant her manager the Full Control NTFS permission to Jack's home folder. When the manager attempts to open any of the files, she receives the following error message: "Access is denied."What should you do?A.Use System File Checker (SFC) to decrypt the file.B.Log on the network as the Recovery Agent. Decrypt the files for the manager.C.Log on the network as the administrator. Use the cipher command to decrypt the files.D.Log on the network as a member of the Backup Operators group. Decrypt the files for the manager.

You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet.Which PIN architecture is applicable in those environments?()A.CampusB.TeleworkerC.BranchD.Data center

You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()A、STPB、GVRPC、SNMPD、VTPE、DHCP

You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain. The domain contains a Windows Server 2003 computer named Server1.   You are planning a public key infrastructure (PKI) for the company. You want to deploy a certification authority (CA) on Server1.   You create a new global security group named Cert Administrators. You need to delegate the tasks to issue, approve, and revoke certificates to members of the Cert Administrators group.   What should you do?()A、 Add the Cert Administrators group to the Cert Publishers group in the domain.B、 Configure the Certificates Templates container in the Active Directory configuration naming context to assign the Cert Administrators group the Allow - Write permission.C、 Configure the CertSrv virtual directory on Server1 to assign the Cert Administrators group the Allow - Modify permission.D、 Assign the Certificate Managers role to the Cert Administrators group.

You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()A、RepeaterB、Wireless routerC、HubD、Wireless network adapter

You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()A、CampusB、TeleworkerC、BranchD、Data center

You are the network administrator for ExamSheet.net.  You install Windows 2000 Professional on your portable computer. You use a docking station for your portable computer when you are in the office. You install a ISA-based network adapter in your docking station. You insert your computer into the docking station and start the computer. The network adapter is not detected during the startup process. You obtain a disk that contains the supported driver from the network adapter manufacturer. You want to allow Windows 2000 Professional to use the network adapter. What should you do?()A、Restart the computer in the docking station.B、Run the Add/Remove Hardware wizard.C、Use Device Manager to scan for hardware changes.D、Copy the network adapter driver to the Winnt/Driver Cache/i386 folder.E、Install the new network adapter driver.

You are the network administrator for Company. Company has recently upgraded its network to a 100Mbps standard and you are now in the process of removing all the old adapter and installing a new Token Ring network adapter into the Windows 2000 Professional computer. On the first computer you install the new hardware and configure the static TCP/IP protocol settings to be the same as they were for the previously installed network adapter. When you restart the computer, however, you cannot access the network. You try to ping your network adapter's TCP/IP address locally. You receive the following error message: "Request timed out." You want to enable the computer to communicate on the new network. What should you do? ()A、Enable DHCP in the TCP/IP properties.B、Replace the Token Ring network adapter with an Ethernet network adapter.C、Configure a different TCP/IP address on the same subnet.D、Configure a valid DNS Server in the TCP/IP properties.

You are a network administrator for ExamSheet.net's Windows 2000 network.  Your computer is installed with Windows 2000 Professional. You schedule a task that will copy files from your computer to another computer on the network. You notice that the task is not completing correctly. You manually copy the files from your computer to other computers on the network without any errors. You verify that all of your other tasks are working correctly. You want the task to complete successfully.  What should you do? ()A、Start the Remote Procedure Call (RPC) Locater service and configure the service to start automatically.B、Start the RunAs service and configure the service to start automatically.C、Configure the Task Scheduler service account to use the local Administrator account and password. Restart the service.D、Use Scheduled Tasks to configure the task to run under the security context of your account.

You are the network administrator for your company. Your network consists of a single Active Directory domain named All network servers run Windows Server 2003. A total of three servers are configured as domain controllers. You need to restore a failed domain controller named DC3. The last backup for any domain controller on the network occurred one week ago. First, you reinstall Windows Server 2003 on DC3. What should you do next?()A、Start DC3 and select Directory Services Restore Mode. Perform a nonauthoriative restoration.B、Start DC3 and select the Recovery Console. Perform a nonauthoriative restoration.C、Run Ntbackup.exe on DC3 to restore the System State data.D、Run the Active Directory Installation Wizard on DC3.

You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains an application server running Windows Server 2003.   Users report intermittent slow performance when they access the application server throughout the day. You find out that the network interface on the application server is being heavily used during the periods of slow performance. You suspect that a single computer is causing the problem.You need to create a plan to identify the problem computer.   What should you do?()A、 Monitor the performance monitor counters on the application server by using System Monitor.  B、 Monitor the network traffic on the application server by using Network Monitor.C、 Monitor network statistics on the application server by using Task Manager.D、 Run network diagnostics on the application server by using Network Diagnostics.

You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm.   Immediately send a notification to a network administrator that the infected computer needs to be repaired.  What should you do?()A、Configure a WMI event trigger.B、Configure a Network Monitor capture filter.C、Configure a Network Monitor trigger.D、Configure a System Monitor alert.

You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. You need to update six high-visibility servers with critical updates by using Windows Server Update Services (WSUS). You approve all of the updates.You need to ensure that the updates are applied within one hour.  What should you do?()A、On the WSUS server, type the gpupdate /force command at the command prompt.B、On the WSUS server, type the wuauclt /detectnow command at the command prompt.C、On each of the six servers, type the gpupdate /force command at the command prompt.D、On each of the six servers, type the wuauclt /detectnow command at the command prompt.

You are a network administrator for your company. You currently automate backups of the System State data on the servers in your network by using NTBackup. Your manager instructs you to document the procedure for restoring a server from a backup of the System State data.You need to select the correct method for performing a restoration of a backup of the System State data.What should you do?()A、Run the following command: ntbackup.exe backup /F {"FileName"}B、Run the following command: ntbackup.exe backup systemstate /F {"FileName"}C、In Control Panel, open System, and configure the Startup and Recovery settings on the Advanced tab.D、Use NTBackup interactively.

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All network servers run Windows Server 2003. The domain contains three domain controllers: DC1, DC2, and DC3. Each one hosts user data. DC1 experiences hard disk failure. You need to temporarily restore the user data to DC2. Which type of restoration should you perform? ()AAutomated System Recovery (ASR)BnormalCprimaryDauthoritative

单选题You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? ()AEnable the Require domain controller to unlock policy.BSet the Number of previous logons to cache policy to 0.  CRemove all user and group accounts from the Log on locally user right. DRemove all user and group accounts from the Access this computer from the network user right.

单选题You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()ASTPBGVRPCSNMPDVTPEDHCP

单选题You are the administrator of your company’s network. Using Windows Installer packages, you want to install customized versions of Microsoft Excel on different departments in the company. Which type of file should you apply to the installation database?()AmsiBmstCzapDzip

单选题You are the administrator of your company’s network. Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers. Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled.   A user named John leaves the company. You move all of the files from John’s home folder to his manager’s folder. When the manager attempts to open any of the files, she receives the following error message. “Access denied.”   You want the manager to be able to access the files. What should you do?()AGrant the manager NTFS Full Control permission to the files.BGrant the manager NTFS Take Ownership permission to the files.CLog on to the network as a recovery Agent.  Decrypt the files for the manager.DLog on to the network as a member of the Backup Operators group. Decrypt the files for the manager.

多选题You work as a network technician at Company. Your boss, Mrs., is interested in  the Cisco Compatible Extensions program.  What are three features of this program? ()AAccountingBAnalog and digital voiceCMobilityDSecurityERouting and switchingFVLAN and QoS

单选题You are the network administrator for your company. All network servers run Windows Server 2003. All client computers run Windows XP Professional. A member server named Server1 is located at a branch office that does not permit the use of Remote Desktop Protocol. Another administrator uses the Backup utility to create a scheduled backup job on Server1. The backup job performs a normal backup of an application server. The application server is removed from the network. You need to use a client computer to remove the backup job from Server1. You cannot travel to the branch office. What should you do? ()AUse the RUNAS feature to run the at /delete command as the Server1/Administrator account.BLog on by using your Administrator account and run the ntbackup /D command.CLog on by using your Administrator account and run the schtasks /delete command.DUse the RUNAS feature to run the taskkill command as the Server1/Administrator account.

单选题You are the network administrator for your company. All network servers run Windows Server 2003. All client computers run Windows XP Professional. A member server named Server1 is located at a branch office that does not permit the use of Remote Desktop Protocol. Another administrator uses the Backup utility to create a scheduled backup job on Server1. The backup job performs a normal backup of an application server. The application server is removed from the network. You need to use a client computer to remove the backup job from Server1. You cannot travel to the branch office. What should you do?()AUse the RUNAS feature to run the at /delete command as the Server1/Administrator account.BLog on by using your Administrator account and run the ntbackup /D command.CLog on by using your Administrator account and run the schtasks /delete command.DUse the RUNAS feature to run the taskkill command as the Server1/Administrator account.

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All network servers run Windows Server 2003. The domain contains three domain controllers: DC1, DC2, and DC3. Each one hosts user data. DC1 experiences hard disk failure. You need to temporarily restore the user data to DC2. Which type of restoration should you perform? ()AAutomated System Recovery (ASR)BnormalCprimaryDauthoritative