单选题You are the system administrator for an electronics manufacturing company. The accounting department uses Windows 98 computers. The department has purchased a third-party spreadsheet application that only runs on Windows 2000 Professional. You need to upgrade the computers to Windows 2000 Professional and install the new application. You choose an unattended installation method for both the operating system and the application.  The Windows 2000 Professional installation files reside on a server named Companyrv in a shared folder name W2Ksource. You place the installation files for the spreadsheet application in //Companyrv/W2Ksource/i386/$OEMS$. You create an answer files named Acctanswer.txt and place in //Companyrv/W2Ksource. You map drive letter H: to //Companyrv/W2Ksource and begin the installation on a test computer by running the winnt32 /s:H:/i386/u:H:/acctanswer.text command. Windows 2000 Professional is installed successfully. However, the spreadsheet application is not installed. You want to ensure that the spreadsheet application is installed during the unattended installation.  What should you do? ()A Run the winnt /s:H:/i386 /u:H:/acctanswer.txt command instead of the winnt32 /s:H:/i386/u:H:/acctanswer.text command. B Move the spreadsheet application installation files to //Companyrv/W2Ksource/i386, and thenrun the winnt /s:H:/i386 /u:H:/acctanswer.txt command. C Edit the [Unattended] section of the answer file to contain the parameter OemPreinstall = Yes, and then run the winnt32 /s:H:/i386/u:H:/acctanswer.text command. D Rename Acctanswer.txt to Unattend.txt, and then run the winnt32 /s:H:/i386 /u:H:/unattend.text command.

单选题
You are the system administrator for an electronics manufacturing company. The accounting department uses Windows 98 computers. The department has purchased a third-party spreadsheet application that only runs on Windows 2000 Professional. You need to upgrade the computers to Windows 2000 Professional and install the new application. You choose an unattended installation method for both the operating system and the application.  The Windows 2000 Professional installation files reside on a server named Companyrv in a shared folder name W2Ksource. You place the installation files for the spreadsheet application in //Companyrv/W2Ksource/i386/$OEMS$. You create an answer files named Acctanswer.txt and place in //Companyrv/W2Ksource. You map drive letter H: to //Companyrv/W2Ksource and begin the installation on a test computer by running the winnt32 /s:H:/i386/u:H:/acctanswer.text command. Windows 2000 Professional is installed successfully. However, the spreadsheet application is not installed. You want to ensure that the spreadsheet application is installed during the unattended installation.  What should you do? ()
A

 Run the winnt /s:H:/i386 /u:H:/acctanswer.txt command instead of the winnt32 /s:H:/i386/u:H:/acctanswer.text command. 

B

 Move the spreadsheet application installation files to //Companyrv/W2Ksource/i386, and thenrun the winnt /s:H:/i386 /u:H:/acctanswer.txt command. 

C

 Edit the [Unattended] section of the answer file to contain the parameter OemPreinstall = Yes, and then run the winnt32 /s:H:/i386/u:H:/acctanswer.text command. 

D

 Rename Acctanswer.txt to Unattend.txt, and then run the winnt32 /s:H:/i386 /u:H:/unattend.text command.


参考解析

解析: The OemPreinstall parameter determines whether an OEM pre-installation is being performed or not. When the value is Yes, other subdirectories may be copied if they exist. This is want we want in this scenario. We want the application to be installed through OEM pre-installation. Option A:  winnt has no benefits compared to winnt32 in this scenario.   Option B:   The application files are located in the correct directory: a subfolder of the I386 folder named $OEM$.   Option D://   The name of answer file is unimportant in scenario.

相关考题:

You are a network administrator for your company. You currently automate backups of the System State data on the servers in your network by using NTBackup. Your manager instructs you to document the procedure for restoring a server from a backup of the System State data.You need to select the correct method for performing a restoration of a backup of the System State data.What should you do?()A. Run the following command: ntbackup.exe backup /F {FileName}B. Run the following command: ntbackup.exe backup systemstate /F {FileName}C. In Control Panel, open System, and configure the Startup and Recovery settings on the Advanced tab.D. Use NTBackup interactively.

A Windows Communication Foundation (WCF) service is hosted in Microsoft Internet Information Services (IIS). You are preparing the configuration file for production deployment. You need to set up tracing so that an administrator can adjust the System.ServiceModel trace level without causing the ASP.NET host application domain to restart. You need to ensure that tracing is turned off by default.What should you do?()A.B.C.D.

An administrator account is granted the CREATE SESSION and SET CONTAINER system privileges.A multitenant container database (CDB) instant has the following parameter set:THREADED_EXECUTION = FALSEWhich four statements are true about this administrator establishing connections to root in a CDB that has been opened in read only mode?()A. You can conned as a common user by using the connect statement.B. You can connect as a local user by using the connect statement.C. You can connect by using easy connect.D. You can connect by using OS authentication.E. You can connect by using a Net Service name.F. You can connect as a local user by using the SET CONTAINER statement.

You are an administrator of Ezonexam.com's network. You want to perform. routine upgrades on your Windows 2000 Server computer. You use your non-administrator user account in the domain to logon to the server.You want to upgrade all of the critical system files and patches on the server in the shortest possible time.What should you do?A.Use Windows Update.B.Run System File Checker.C.Log on as administrator and run Windows Update.D.Log on as administrator and run System File Checker.

You are the network administrator for Active Directory.Another system administrator installs Software Update Services (SUS) on a production Windows Server 2003 computer. You are assigned to manage the SUS computer. You need to ensure that you can recover SUS if the server fails.You need to back up all components that are required to restore SUS to its current configuration. Because of limited space, you must not back up unnecessary data.What action or actions should you perform? Select all that apply.()A. Back up the SUS folder that contains synchronized content.B. Back up the folder in which the SYSAdmin site was created.C. Back up the System State data fro the Windows Server 2003 computer.D. Back up the IIS metabase

You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .Xxx currently makes use of Exchange 2000 Server and Exchange Server 2003 Service Pack 2 (SP2) in their messaging system.You receive instruction from Xxx to migrate the messaging system to Exchange Server 2010 with Client Access server, Mailbox server and Hub Transport servers. What actions must you take?()A、You should take away the Exchange 2000 Server servers in the environment.B、You should configure EdgeSync synchronization in the environment.C、You should run the setup /NewProvisionedServer in the environment.D、You should run the Migration Preparation Tool from the other servers in the environment.

What allows you to monitor the system performance of the Cisco CRS System (CPU, memory, etc.)?()A、Cisco Desktop Administrator  B、Cisco Supervisor Desktop  C、Microsoft Windows 2000 Performance Monitoring  D、CRS Application Administration  E、CRS Application Editor

You are the network administrator for Active Directory. Another system administrator installs Software Update Services (SUS) on a production Windows Server 2003 computer. You are assigned to manage the SUS computer. You need to ensure that you can recover SUS if the server fails. You need to back up all components that are required to restore SUS to its current configuration. Because of limited space, you must not back up unnecessary data. What action or actions should you perform? Select all that apply.()A、Back up the SUS folder that contains synchronized content.B、Back up the folder in which the SYSAdmin site was created.C、Back up the System State data fro the Windows Server 2003 computer.D、Back up the IIS metabase

An administrator has added a new device to a system and wants to determine if it has been correctly added to the ODM database. Which command would the system administrator use?()A、odmgetB、odmaddC、odmshowD、odmcreate

You have successfully sold and installed your customer’s System x solution. Sometimes, the overall succeed of a sale depends on how well you have trained your customer to support their new hardware. Please consider the following tools. Which one would be the best for protectively determining a server outage, and contacting the system administrator about the outage?()A、CDATB、Configuration and Options Guide (COG)C、Physical Alarm Sounding in Data CenterD、IBM Systems Director

A system administrator is monitoring a system that has recently shown a decrease in performance.The administrator suspects that the system may be low on memory and may be paging excessively.Which of the following commands is best to identify a possible paging problem?()A、iostatB、netstatC、psD、vmstat

You have been recently hired as a database administrator. Your senior manager asks you to study the production database server and submit a report on the settings done by the previous DBA.  While observing the server settings, you find that the following parameter has been set in the parameter file of the database:  REMOTE_OS_AUTHENT = TRUE  What could have been the reason to set this parameter as TRUE?()A、to enable operating system authentication for a remote clientB、to restrict the scope of administration to identical operating systemsC、to allow the start up and shut down of the database from a remote clientD、to enable the administration of the operating system from a remote clientE、to disable the administration of the operating system from a remote client

You work as a database administrator for Supportcenter.cn. You are using Recovery Manager (RMAN) for backup and recovery of your database. You executed the delete command in RMAN to delete a backup of a tablespace. Which statement is true in this scenario?()A、The backup status will be marked expired in RMAN recovery catalog.B、The backup status will be marked deleted in RMAN recovery catalog after you execute the crosscheck command.C、The backup will be deleted physically from the OS (Operating system)and the backup information is removed from the recovery cataloglD、The backup status will be marked deleted and you must delete the backup file manually from the OS (Operating system).E、The backup status will be marked deleted and you must delete the backup file manually from the OS (Operating system), if you are not using Oracle Managed Files (OMF).

对于IIS日志文件的访问权限,下列哪些设置是正确的?()A、SYSTEM(完全控制)Administrator(完全控制)Users(修改)B、SYSTEM(完全控制)Administrator(完全控制)Everyone(读取和运行)C、SYSTEM(完全控制)Administrator(完全控制)Inernet来宾账户(读取和运行)D、SYSTEM(完全控制)Administrator(完全控制)

You are a network administrator for The network contains a Windows Server 2003 computer named Testking1. You need to install an application on Testking1. The installation will cause several changes to the registry. You plan to use the Backup utility to create a backup that will enable you to restore the registry. TestKing requirements for network management state that all backups must be performed during an eight-hour period at night. Because of this time constraint, you need to ensure that the backup can be recovered as quickly as possible. You need to create a backup that meets the requirements. What should you do?()A、Create a backup of the system partition.B、Create a backup of the boot partition.C、Create a backup of the System State.D、Create an Automated System Recovery (ASR) backup.E、Create a backup of the Systemroot/System32/Config folder.

You are the administrator of your Windows 2000 Professional computer. You share severalfolders on your computer, which are accessible to all the users on your company’s network. You want to ensure that you have correctly assigned the appropriate permissions to all the shares.Where can you view all the shares in use on your computer, so as to verify the permissions as quickly as possible? ()A、Control Panel  Data Sources (ODBC).B、Control Panel  System Tools  Shared Folders.C、Computer Management  System Tools  System Information.D、Computer Management  System Tools  Shared Folders  Open Files.E、Computer Management  System Tools  Shared Folders  Sessions.F、Computer Management  System Tools  Shared Folders  Shares.

You are the administrator of an Active Directory domain named A user reports that he cannot log on to a Windows Server 2003 computer that contains a critical application. You discover that the organizational unit (OU) in which the server is located was deleted. You discover that the user rights for this server are controlled by Group Policy. You need to restore access to the server. You need to achieve this goal by using the minimum amount of administrative effort. What should you do?()A、Perform a normal restoration of the System State data for the domain controller. Force replication.B、Perform an authoritative restoration of the System State data for the domain controller. Mark the OU for replication.C、Re-create the OU that was deleted. Reapply Group Policy, and then add the computer account and any necessary users or groups.D、Perform an Automated System Recovery (ASR) restoration on the domain controller.

You work as the exchange administrator at TestKing.com. The TestKing.com network contains anExchange Server 2010 Organization. The Active Directory Rights Management Services (AD RMS) isinstalled within the organization. You receive an instruction from the CIO to recommend a messaging security solution that will make surethat a disclaimer is applied to all e-mail messages and that all e-mail messages from the Financedepartment is unable to be printed. What should you do?()A、You should recommend that Secure/Multipurpose Internet Mail Extensions (S/MIME) be included in the system.B、You should recommend that Transport Protection Rules be included in the system.C、You should recommend that Retention policies be included in the system.D、You should recommend that Journal Report Decryption be included in the system.

单选题You work as a database administrator for Supportcenter.cn. You are using Recovery Manager (RMAN) for backup and recovery of your database. You executed the delete command in RMAN to delete a backup of a tablespace. Which statement is true in this scenario?()AThe backup status will be marked expired in RMAN recovery catalog.BThe backup status will be marked deleted in RMAN recovery catalog after you execute the crosscheck command.CThe backup will be deleted physically from the OS (Operating system)and the backup information is removed from the recovery cataloglDThe backup status will be marked deleted and you must delete the backup file manually from the OS (Operating system).EThe backup status will be marked deleted and you must delete the backup file manually from the OS (Operating system), if you are not using Oracle Managed Files (OMF).

单选题You are the network administrator for You currently automate backups of the System State data on the servers in your network by using NTBackup. Your manager instructs you to document the procedure for restoring a server from a backup of the System State data. You need to select the correct method for performing a restoration of a backup of the System State data. What should you do?()ARun the following command: ntbackup.exe backup /F {FileName}BRun the following command: ntbackup.exe backup systemstate /F {FileName}CIn Control Panel, open System, and configure the Startup and Recovery settings on the Advanced tab.DUse NTBackup interactively.

单选题You set up scheduled tasks to run and notify you of any failures. 3 days later you see that none of the tasks ran and you received no notifications. What should you do?()ASet the schedule service to run under the administrator account.BSet the scheduled tasks to run under the administrator account.CEnable the messenger serviceDSet the schedule service to run under the local system account and set it to start automatically.

单选题You are the administrator of your Windows 2000 Professional computer. You share severalfolders on your computer, which are accessible to all the users on your company’s network. You want to ensure that you have correctly assigned the appropriate permissions to all the shares.Where can you view all the shares in use on your computer, so as to verify the permissions as quickly as possible? ()AControl Panel  Data Sources (ODBC).BControl Panel  System Tools  Shared Folders.CComputer Management  System Tools  System Information.DComputer Management  System Tools  Shared Folders  Open Files.EComputer Management  System Tools  Shared Folders  Sessions.FComputer Management  System Tools  Shared Folders  Shares.

多选题You are the administrator of Company's network.You install 50 new Windows 2000 Professional computers in the Web Development department. Twoweeks later, users report that five of the computers have stopped responding. You troubleshoot the fivecomputers. You find that users have attached devices and have installed device drivers that are notsupported by Windows 2000 Professional.You want to ensure that this does not happen again. You device to configure the computers to installdevice drivers only for devices that are included on the current Hardware Compatibility List (HCL).What should you do?()AConfigure the Administrator option to enable the Apply setting as system default option.BConfigure Windows 2000 Professional to enable driver signing verification.CUse NTFS permissions to restrict user access to the /Winnt/Driver Cache folder.DUse NTFS permissions to restrict user access to the /Winnt/System32/Drivers folder.EConfigure Windows 2000 Professional to trust the Microsoft Certificate Authority (CA).

单选题You are the administrator of your company's network. You are preparing to deploy 20 new Windows 2000 Professional computers on your network. You want to be able to recover from disk failures and corrupt system files on the new computers. You want to configure the computers to automatically update their system configuration and emergency repair files on a scheduled bases.   What should you do?()AUse the at command to schedule a weekly job to back up the boot partition.BUse the at command to schedule a weekly job to run the system file checker.CUse Windows backup to schedule a backup of the System State Data.DUse Windows backup to schedule a backup of the system partition and the boot partition.

单选题You are a network administrator for The network contains a Windows Server 2003 computer named Testking1. You need to install an application on Testking1. The installation will cause several changes to the registry. You plan to use the Backup utility to create a backup that will enable you to restore the registry. TestKing requirements for network management state that all backups must be performed during an eight-hour period at night. Because of this time constraint, you need to ensure that the backup can be recovered as quickly as possible. You need to create a backup that meets the requirements. What should you do?()ACreate a backup of the system partition.BCreate a backup of the boot partition.CCreate a backup of the System State.DCreate an Automated System Recovery (ASR) backup.ECreate a backup of the Systemroot/System32/Config folder.

单选题What allows you to monitor the system performance of the Cisco CRS System (CPU, memory, etc.)?()ACisco Desktop Administrator  BCisco Supervisor Desktop  CMicrosoft Windows 2000 Performance Monitoring  DCRS Application Administration  ECRS Application Editor

单选题Sandy works in Tron Electronics and uses a Windows 2000 Professional system to work on. Today she is visiting another department, and is using a Windows NT 4.0 system. She wants to print a document but is missing her printer. You want her to be able to print from any computer she logs in at. What can you do to insure that she has this ability?()A Configure the server properties of printer system folder to connect to the shared printer. BInstall a print driver for the print device on the Windows NT workstation computer. CCreate a roaming user profile for Sandy DUpgrade the Windows NT 4 computer to a Windows 2000 Professional computer and then  import the file settings for Sandy's user account.

单选题You are the network administrator for. You are the administrator of a Windows Server 2003 computer named TestKing3. Newly hired employees recently started storing files on TestKing3. Now users report that Testking3 is responding much slower than it did before the additional users were added. You suspect the disk subsystem needs to be upgraded to accommodate the additional user load. You need to confirm whether the disk subsystem on TestKing3 needs to be upgraded. What should you do?()AConfigure a Performance Logs and Alerts on the %Free space counter.BUse Device Manager to populate volume settings and examine the properties of the disk drives on TestKing3.CUse Event View to examine the system logs and search the system logs for event logs for events generated by the disk event source.DUse System Monitor to monitor counters based on the PhysicalDisk object