单选题You are the network administrator for the Berlin office of The company network consists of a single Active Directory domain named The Berlin office contains 15 file servers that contain confidential files. All the file servers run either Windows Server 2003 or Windows 2000 Server. All the file servers are in the BerlinFilePrint organizational unit (OU). TestKing's security department sets a rule that specifies the size and retention settings for the Security event log of all file servers. The rule also specified that local administrators on servers cannot override the changes you make to the settings for the Security event log. You need to define a method to modify the Security event log settings on each file server in the Berlin office in order to meet the states requirements. What should you do?()AModify the local security policy on each file server.Define the size and retention settings for the Security event log.BCreate a security template on one of the file servers by using the Security Configuration and Analysis tool. Define the size and retention settings for the Security event log in the template. Import the security template into the local security policy of the other 14 file servers.CUse Event Viewer to modify the event log properties on each file server. Define the size and retention settings for the Security event log.DCreate a new Group Policy object (GPO) and link it to the BerlinFilePrint OU. In the GPO, define the size and retention settings for the Security event log.
单选题
You are the network administrator for the Berlin office of The company network consists of a single Active Directory domain named The Berlin office contains 15 file servers that contain confidential files. All the file servers run either Windows Server 2003 or Windows 2000 Server. All the file servers are in the BerlinFilePrint organizational unit (OU). TestKing's security department sets a rule that specifies the size and retention settings for the Security event log of all file servers. The rule also specified that local administrators on servers cannot override the changes you make to the settings for the Security event log. You need to define a method to modify the Security event log settings on each file server in the Berlin office in order to meet the states requirements. What should you do?()
A
Modify the local security policy on each file server.Define the size and retention settings for the Security event log.
B
Create a security template on one of the file servers by using the Security Configuration and Analysis tool. Define the size and retention settings for the Security event log in the template. Import the security template into the local security policy of the other 14 file servers.
C
Use Event Viewer to modify the event log properties on each file server. Define the size and retention settings for the Security event log.
D
Create a new Group Policy object (GPO) and link it to the BerlinFilePrint OU. In the GPO, define the size and retention settings for the Security event log.
参考解析
解析:
暂无解析
相关考题:
You are the network administrator setting up the IP network for a new branch office. You need at least 5 networks with 25 hosts each. You have been allocated a /24 network.Which prefix length will satisfy the given requirements?()A./24B./26C./27D./28
A network administrator needs to configure a serial link between the main office and a remote location. The router at the remote office is a non-Cisco router.How should the network administrator configure the serial interface of the main office router to make the connection?()A.B.C.D.
You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()A、RepeaterB、Wireless routerC、HubD、Wireless network adapter
You are the network administrator setting up the IP network for a new branch office. You need at least 5 networks with 25 hosts each. You have been allocated a /24 network.Which prefix length will satisfy the given requirements?()A、/24B、/26C、/27D、/28
Certkiller .com has a main office and a branch office. Certkiller .com’s network consists of a single Active Directory forest. Some of the servers in the network run Windows Server 2008 and the rest run Windows server 2003. You are the administrator at Certkiller .com. You have installed Active Directory Domain Services (AD DS) on a computer that runs Windows Server 2008. The branch office is located in a physically insecure place. It has not IT personnel onsite and there are no administrators over there. You need to setup a Read-Only Domain Controller (RODC) on the Server Core installation computer in the branch office. What should you do to setup RODC on the computer in branch office()A、Execute an attended installation of AD DSB、Execute an unattended installation of AD DSC、Execute RODC through AD DSD、Execute AD DS by using deploying the image of AD DSE、none of the above
You are the desktop administrator for one of your company's branch offices. The network in the branch office consists of a single network segment, which contains a domain controller, a DHCP server, 10 Windows 2000 Server computers, and 50 Windows 2000 Professional computers. All servers and client computers are members of the company's Active Directory domain. You purchase 50 new client computers for the branch office. Each new client computer contains a built-in PXE-compliant network adapter. You install and configure RIS on one of the Windows 2000 Server computers that is on the network in the branch office. You create a Windows XP Professional RIS image on the Windows 2000 Server computer. You connect the new client computers to the network in the office, and you turn on each computer. Each computer displays a message stating that it cannot contact a PXE boot server. You verify that the RIS server is connected to the network. You need to ensure that the new client computers can connect to the RIS server and can begin installing Windows XP Professional. What should you do?()A、Ask a domain administrator to authorize the RIS server. B、Grant the Everyone group Allow - Read NTFS permission on the RIS image.C、Install RIS on the domain controller. Copy the RIS image to the domain controller.D、Add a reservation for the RIS server to the DHCP server.
You are the network administrator for The company contains of a main office and five branch offices. Network servers are installed in each office. All servers run 2003 The technical support stuff is located in the main office. Users in the branch office do not have the "Log on locally" right on local servers. Servers in the branch office collect auditing information. You need the ability to review the ability to review the auditing information located on each branch office server while you are working at the main office. You also need to save the auditing information on each branch office server on the local hard drive. Which two actions should you perform?() (Each correct answer presents part of the solution. Choose two.)A、From the Security Configuration and Analysis snap-in save the appropriate .inf file on the local hard drive.B、Solicit Remote Assistance from each branch office server.C、From Computer Management open Event Viewer, save the appropriate .evt file on the local hard driveD、Run secedit.exe, specify the appropriate parameterE、Establish a Remote Desktop client session with each branch office server
You are a network administrator for your company. The network consists of a single Active Directory forest that contains three domains. The functional level of the forest and of all three domains is Window Server 2003. The company has a main office and 30 branch offices. Each branch office is connected to the main office by a 56-Kbps WAN connection. You configure the main office and each branch office as a separate Active Directory site. You deploy a Windows Server 2003 domain controller at the main office and at each branch office. Each domain controller is configured as a DNS server. You can log on to the network from client computers in the branch offices at any time. However, users in the branch offices report that they cannot log on to the network during peak hours. You need to allow users to log on to the network from branch office computers. You do not want to affect the performance of the branch office domain controllers. You need to minimize Active Directory replication traffic across the WAN connections. What should you do? ()A、 Use Active Directory Sites and Services to enable universal group membership caching for each branch office site.B、 Use the DNS console to configure the branch office DNS servers to forward requests to a DNS server in the main office.C、 Use Active Directory Sites and Services to configure each branch office domain controller as a global catalog server.D、 Use the DNS console to configure the branch office DNS servers to use an Active Directory-integrated zone.
You are the network administrator for ExamSheet.net. You install Windows 2000 Professional on your portable computer. You use a docking station for your portable computer when you are in the office. You install a ISA-based network adapter in your docking station. You insert your computer into the docking station and start the computer. The network adapter is not detected during the startup process. You obtain a disk that contains the supported driver from the network adapter manufacturer. You want to allow Windows 2000 Professional to use the network adapter. What should you do?()A、Restart the computer in the docking station.B、Run the Add/Remove Hardware wizard.C、Use Device Manager to scan for hardware changes.D、Copy the network adapter driver to the Winnt/Driver Cache/i386 folder.E、Install the new network adapter driver.
Your company has four regional offices. You install the Windows Deployment Services (WDS) role on the network. Your company creates three images for each office. There are a total of 12 images for the company. The images will be used as standard images for workstations. You deploy the images by using WDS. You need to ensure that each administrator can view only the images for his or her regional office. What should you do?()A、Create a global group for each regional office and place the computers in the appropriate global group.B、Create an organizational unit (OU) for each regional office and place the computers in the appropriate OU.C、Place all images into a single image group on the WDS server. Grant each administrator permissions to the image group.D、Place each regional office into a separate image group on the WDS server. Grant each administrator permissions to his or her regional offices image group.
You are the network administrator for the Paris branch office of Fourth Coffee.The Paris office has a Windows Server 2003 DNS server named Server10. Server10 hosts a DNS primary zone named fourthcoffee.com. All computers in the Paris office are configured to use Server10 as their preferred DNS server. The Berlin branch office of Fourth Coffee has a UNIX DNS server named Server11. Server11 hosts a primary zone named engineering.fourthcoffee.com. The refresh interval of the engineering.fourthcoffee.com zone is set to 24 hours. In the Berlin office, a firewall filters all incoming network traffic from other offices. A rule on this firewall prevents all computers from the Paris office network, except Server10, from performing DNS lookups against Server11.There is a business requirement that no delay should occur between the time that a new record is created in the engineering.fourthcoffee.com zone and the time that the record can be resolved from any computers in the Paris office. All computers in the Paris office must be able to resolve names in the engineering.fourthcoffee.com namespace.You need to configure DNS on Server10 to meet the requirements. What should you do?()A、Set up a stub zone named engineering.fourthcoffee.com.B、Set up conditional forwarding to Server11 for the engineering.fourthcoffee.com namespace.C、In the fourthcoffee.com zone, set up a delegation to the engineering.fourthcoffee.com zone on Server11.D、Set up a secondary zone named engineering.fourthcoffee.com that has Server11 as master.
You are a network administrator for your company. The company has a main office and a branch office. The branch office has a cable modem connection to the Internet and uses a virtual private network (VPN) connection to access resources on the main office network. The cable modem is connected to a Windows XP Professional computer named Pro1. You configure Internet Connection Sharing (ICS) on Pro1 to allow users in the branch office to use the VPN connection. ICS sets the network adapter to use the IP address 192.168.0.1. Several sales representatives in the branch office use wireless network adapters to share files between their client computers. They need access to the VPN connection to upload sales reports to the main office. You install a wireless network adapter in Pro1 and configure it with the appropriate settings for the wireless LAN. The sales representatives who use the wireless LAN report that they cannot access the VPN connection. However, they are able to connect to resources in the branch office. Users on the wired network do not report any connectivity problems. The sales representatives need to be able to access the VPN. What should you do?() A、Configure the wireless network connection on Pro1 so that it has an IP address of 192. 168. 0. 2.B、Disable and then re-enable Internet Connection Sharing (ICS) on Pro1.C、Create a network bridge between the wired and wireless connections on Pro1. D、Clear the Allow other network users to control or disable the shared Internet connection check box in the advanced properties of the VPN connection.
You are the administrator of your company’s network. A user named Peter runs Windows 2000 Professional on his portable computer. Peter wants to be able to work at home on files that were created in the office on the company network. Prior to logging off the network and leaving the office, Peter enables Offline Files. Peter calls you from home and reports that copies of his folders and files on the network are not available on his portable computer. What should you instruct Peter to do? ()A、 Enable file and print sharing. Peter will be able to access his files at home immediately. B、 Synchronize all offline files. Peter will be able to access his files at home immediately. C、 At the office, make the files available offline. Peter will be able to access his files the next time he logs off the network. D、 At the office, create a shortcut to the Offline Files folder. Peter will be able to access his files the next time he logs off the network.
You are a systems engineer for your company. Your company has 20,000 users in a large campus environment located in Los Angeles. Each department in the company is located in its own building. Each department has its own IT staff, which is responsible for all network administration within the building. The company’s network is divided into several IP subnets that are connected to one another by using dedicated routers. Each building on the company’s main campus contains at least one subnet, and possibly up to five subnets. Each building has at least one router. All routers use RIP version 2 (RIPv2) broadcasts. The company acquires a new business unit located in Denver. The Denver office has 25 users. The network in the Denver office is connected to the network at the main campus by using a leased frame relay connection. The network administrator at the Denver office installs a Windows Server 2003 computer and configures Routing and Remote Access on this server. The network administrator at the Denver office configures this server as a router and implements RIPv2 in Routing and Remote Access. Later, the Denver administrator reports that his router is not receiving routing table updates from the routers on the main campus network. He must manually add routing entries to the routing table to enable connectivity between the locations. You investigate and discover that the RIPv2 broadcasts are not being received at the Denver office. You also discover that no routing table announcements from the Denver office are being received on the main campus network. You need to ensure that the network in the Denver office can communicate with the main campus network and can send and receive automatic routing table updates as network conditions change. What should you do on the router in the Denver office?()A、 Configure the router to use RIPv1 broadcasts.B、 Configure the router to use auto-static update mode.C、 Add the IP address ranges of the main campus network to the router’s Accept list and Announce list.D、 Add the IP addresses of the main campus routers to the router’s Neighbors list.
多选题You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003. All client computers run Windows XP Professional. The company has offices in Berlin, Dortmund, and Frankfurt. Each office is configured as a separate IP subnet. DNS is the only method of name resolution on the network. You need to implement a software update infrastructure on the network. You install Software Update Services (SUS) on a computer named TestKing3 in the Berlin office. You install on TestKing3 with all default settings. You have no plans to install additional SUS servers. You configure all client computers appropriately. You must ensure that client computers can successfully connect to the SUS server. What should you do?()AConfigure the Internet browser home page on all client computers to point to http://windowsupdate.microsoft.com.BIn the SUS Administrator, configure the Server Name property to be the server's fully qualified domain name (FQDN).COpen IIS Manager and enable HTTP over SSL.DEnable communication over port 135 between all client computers and the SUS server.
单选题You are the network administrator setting up the IP network for a new branch office. You need at least 5 networks with 25 hosts each. You have been allocated a /24 network.Which prefix length will satisfy the given requirements?()A/24B/26C/27D/28
单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The company has a main office in San Francisco and branch offices in Paris and Bogota. Each branch office contains a Windows Server 2003 domain controller. All client computers run Windows XP Professional. Users in the Bogota office report intermittent problems authenticating to the domain. You suspect that a specific client computer is causing the problem. You need to capture the authentication event details on the domain controller in the Bogota office so that you can find out the IP address of the client computer that is the source of the problem. What should you do? ()A Configure System Monitor to monitor the authentication events.B Configure Performance Logs and Alerts with a counter log to record the authentication events.C Configure Network Monitor to record the authentication events.D Configure Performance Logs and Alerts with an alert to trigger on authentication events.
单选题Your company has a main office and a branch office. The network consists of a single Active Directory domain. All network servers run Windows Server 2003 ServicePack 2 (SP2). You deploy a server in the branch office that runs Windows Server 2003 SP2. You need to enable a user in the branch office to restore files on the branch office server. The solution must provide the minimum level of administrative permissions required for this task. What should you do?()AModify the user rights assignments in the default domain security policy.BModify the user rights assignments in the local security policy on the branch office server.CAdd the branch office administrator to the domain Backup Operators group.DAdd the branch office administrator to the local Backup Operators group on the branch office server.
单选题You are the network administrator for your company. The Denver office is currently connected to the corporate WAN by using a Windows Server 2003 computer named Server23.Server23 is configured as a dial-up router. Server23 has two network adapters. One network adapter connects to the Ethernet LAN. The other network adapter is a broadband networking device.The company plans to increase the number of employees in the Denver office by at least 25 percent. You need to confirm that the current network bandwidth of the broadband connection will be sufficient for the future expansion of the Denver office.You want to use System Monitor on Server23 to find out the current utilization of the broadband network connection. What should you do?()AMonitor the Bytes Total/sec counter on the Network Interface object.BMonitor the Bytes Total/sec counter on the Server object.CMonitor the Server//Packets/sec counter on the Server object.DMonitor the Current Bandwidth counter on the Network Interface object.
单选题You are the network administrator for Tailspin Toys. The company has a main office and two branch offices. The network in the main office contains 10 servers and 100 client computers. Each branch office contains 5 servers and 50 client computers. Each branch office is connected to the main office by a direct T1 line. The network design requires that company IP addresses must be assigned from a single classful private IP address range. The network is assigned a class C private IP address range to allocate IP addresses for servers and client computers. Tailspin Toys acquires a company named Wingtip Toys. The acquisition will increase the number of servers to 20 and the number of client computers to 200 in the main office. The acquisition is expected to increase the number of servers to 20 and the number of client computers to 200 in the branch offices. The acquisition will also add 10 more branch offices. After the acquisition, all branch offices will be the same size. Each branch office will be connected to the main office by a direct T1 line. The new company will follow the Tailspin Toys network design requirements. You need to plan the IP addressing for the new company. You need to comply with the network design requirement. What should you do?()A Assign the main office and each branch office a new class A private IP address range. B Assign the main office and each branch office a new class B private IP address range.C Assign the main office and each branch office a subnet from a new class B private IP address range.D Assign the main office and each branch office a subnet from the current class C private IP address range.
单选题You are the network administrator for Your network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all client computers run Windows XP Professional. TestKing has 16 different office locations. Each office is a separate Active Directory site. You work in the main office. A user named Anne works in a branch office. Every morning for one week, Anne reports that her user account is locked out. Each time, you are obliged to unlock her account. You suspect that Anne's account is being misused or attacked outside of regular business hours. You need to investigate the cause of the account lockout. Where should you search for security events?()AOnly in the event log of a domain controller in your site.BOnly in the event logs of the domain controllers in Anne's site.CIn the event logs of all domain controllers in all sites.DOnly in the event log of Anne's computer.
单选题You are a network administrator for your company. The company has a main office and one branch office. The network consists of a single Active Directory domain. All servers run Windows Server 2003. The company needs to connect the main office network and the branch office network by using Routing and Remote Access servers at each office. The networks will be connected by a VPN connection over the Internet. The company’s written security policy includes the following requirements for VPN connections over the Internet: All data must be encrypted with end-to-end encryption. VPN connection authentication must be at the computer level. Credential information must not be transmitted over the Internet as part of the authentication process. You need to configure security for VPN connection between the main office and the branch office. You need to comply with the written security policy. What should you do? ()A Use a PPTP connection with EAP-TLS authentication.B Use a PPTP connection with MS-CHAP v2 authentication.C Use an L2TP connection with EAP-TLS authentication.D Use an L2TP connection with MS-CHAP v2 authentication.
单选题You are the network administrator for your company. All network servers run Windows Server 2003. All client computers run Windows XP Professional. A member server named Server1 is located at a branch office that does not permit the use of Remote Desktop Protocol. Another administrator uses the Backup utility to create a scheduled backup job on Server1. The backup job performs a normal backup of an application server. The application server is removed from the network. You need to use a client computer to remove the backup job from Server1. You cannot travel to the branch office. What should you do? ()AUse the RUNAS feature to run the at /delete command as the Server1/Administrator account.BLog on by using your Administrator account and run the ntbackup /D command.CLog on by using your Administrator account and run the schtasks /delete command.DUse the RUNAS feature to run the taskkill command as the Server1/Administrator account.
单选题You are the network administrator for your company. All network servers run Windows Server 2003. All client computers run Windows XP Professional. A member server named Server1 is located at a branch office that does not permit the use of Remote Desktop Protocol. Another administrator uses the Backup utility to create a scheduled backup job on Server1. The backup job performs a normal backup of an application server. The application server is removed from the network. You need to use a client computer to remove the backup job from Server1. You cannot travel to the branch office. What should you do?()AUse the RUNAS feature to run the at /delete command as the Server1/Administrator account.BLog on by using your Administrator account and run the ntbackup /D command.CLog on by using your Administrator account and run the schtasks /delete command.DUse the RUNAS feature to run the taskkill command as the Server1/Administrator account.