单选题You are the network administrator for All network servers run Windows Server 2003. A server named PrintTK1 has a print device directly connected to the parallel port. The print device is shared for use by all users. Peter is the IT manager. Peter reports that his documents are often printed after documents submitted by other users. You need to ensure that Peter's documents take precedence over documents submitted for printing by other users. However, if a document is already printing, the printing must not be interrupted. What should you do?()AConfigure the printer permissions to assign the Allow - Take Ownership permission to Peter. Restart the Print Spooler service on PrintTK1.BMake Peter's user account the owner of the printer. Restart the Print Spooler service on PrintTK1.CCreate a new printer on PrintTK1 and configure it to print to the print device. In the Advanced tab of the new printer properties, select the Print directly to the printer option. Configure Peter's computer to print to the new printer.DCreate a new printer PrintTK1 and configure it to print to the print device. Modify the priority of the new printer. Configure Peter's computer to print to the new printer.
单选题
You are the network administrator for All network servers run Windows Server 2003. A server named PrintTK1 has a print device directly connected to the parallel port. The print device is shared for use by all users. Peter is the IT manager. Peter reports that his documents are often printed after documents submitted by other users. You need to ensure that Peter's documents take precedence over documents submitted for printing by other users. However, if a document is already printing, the printing must not be interrupted. What should you do?()
A
Configure the printer permissions to assign the Allow - Take Ownership permission to Peter. Restart the Print Spooler service on PrintTK1.
B
Make Peter's user account the owner of the printer. Restart the Print Spooler service on PrintTK1.
C
Create a new printer on PrintTK1 and configure it to print to the print device. In the Advanced tab of the new printer properties, select the Print directly to the printer option. Configure Peter's computer to print to the new printer.
D
Create a new printer PrintTK1 and configure it to print to the print device. Modify the priority of the new printer. Configure Peter's computer to print to the new printer.
参考解析
解析:
暂无解析
相关考题:
You are designing a strategy to upgrade the DHCP servers after the new Active Directory structure is in place. Who can authorize the DHCP servers?()A、 Chief information officerB、 IT support staff in BostonC、 IT support staff in New YorkD、 Network administrator in ChicagoE、 Network administrator in New York
You work as a network administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.The network as a server named ABC_SR05 that provides DHCP services.You need to create the DHCP scopes to support a subnet that has 800 hosts.You want to minimize the number of unused IP addresses on each subnet. How would you configure DHCP to support these subnets?()A、You should assign the network 172.16.0.0/16.B、You should assign the network 172.16.0.0/17.C、You should assign the network 172.16.0.0/18.D、You should assign the network 172.16.0.0/19.E、You should assign the network 172.16.0.0/20.F、You should assign the network 172.16.0.0/22.
ou are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.Two of the servers on the network contain highly confidential documents. The company’s written security policy states that all network connections with these servers must be encrypted by using an IPSec policy.You place the two servers in an organizational unit (OU) named SecureServers. You configure a Group Policy object (GPO) that requires encryption for all connections. You assign the GPO to the SecureServers OU. You need to verify that users are connecting to the two servers by using encrypted connections. What should you do?()A、Run the net view command.B、Run the gpresult command.C、Use the IP Security Monitor console.D、Use the IPSec Policy Management console.
You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. The TestKing.com network contains the following: * Exchange 2000 Server Service Pack 3 (SP3) servers. * Exchange Server 2003 Service Pack 2 (SP2) servers. * Exchange Server 2007 Service Pack 1 (SP1) servers. You need to install Exchange Server 2010 to the TestKing.com network; however, you need to changes tothe existing servers for the installation of the Exchange Server 2010 servers. What should you do?()A、You should consider removing all Exchange 2000 Server servers.Thereafter all Exchange Server 2007 servers should be upgraded to SP2.B、You should consider removing all Exchange Server 2007 SP1 servers.C、You should consider removing all Exchange Server 2003 servers.Thereafter all Exchange Server 2007 servers should be upgraded to SP2.D、You should consider removing all Exchange 2000 Server as well as all Exchange Server 2003 servers.
Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest. The forest contains a single domain. You plan to deploy 10 Edge Transport servers on the perimeter network. You need to recommend a solution for the Edge Transport server deployment. The solution must meet the following requirements: .Allow administrators to apply a single security policy to all Edge Transport servers .Reduce the administrative overhead that is required to manage servers .Minimize the attack surface of the internal network What should you recommend?()A、Implement Network Policy and Access Services (NPAS).B、Implement Active Directory Federation Services (AD FS).C、Create a new Active Directory domain in the internal forest, and then join all Edge Transport servers to the new domain.D、Create an Active Directory forest in the perimeter network, and then join all Edge Transport servers to the new domain.
You are the network administrator for The network consists of an internal network and a perimeter network. The internal network is protected by a firewall. The perimeter network is exposed to the Internet. You are deploying 10 Windows Server 2003 computers as Web servers. The servers will be located in the perimeter network. The servers will host only publicly available Web pages. You want to reduce the possibility that users can gain unauthorized access to the servers. You are concerned that a user will probe the Web servers and find ports or services to attack. What should you do?()A、Disable File and Printer Sharing on the servers.B、Disable the IIS Admin service on the servers.C、Enable Server Message Block (SMB) signing on the servers.D、Assign the Secure Server (Require Security) IPSec policy to the servers.
You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster. The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template. You need to implement protective measures against the cluster’s most significant security vulnerability. What should you do? ()A、 Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.B、 Use packet filtering on all inbound traffic to the cluster.C、 Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.D、 Use intrusion detection on the perimeter network.
You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain. All servers run Windows Server 2003 and all client computers run Windows XP Professional. You are planning a security update infrastructure. You need to find out which computers are exposed to known vulnerabilities. You need to collect the information on existing vulnerabilities for each computer every night. You want this process to occur automatically. What should you do? ()A、 Schedule the secedit command to run every night.B、 Schedule the mbsacli.exe command to run every night.C、 Install Microsoft Baseline Security Analyzer (MBSA) on one of the servers. Configure Automatic Updates on all other computers to use that server.D、 Install Software Update Services (SUS) on one of the servers. Configure the SUS server to update every night.
You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain. You administer a four-node Network Load Balancing cluster. All nodes run Windows Server 2003. The cluster has converged successfully. You use Network Load Balancing Manager on the default host to configure all nodes of the cluster. The nodes have a single network adapter and are connected to the same switching hub device. Administrators of non-cluster servers that are connected to the same switching hub device report that their servers receive traffic that is destined for the cluster nodes. Receiving this additional network traffic impairs the network performance of the non-cluster servers. You need to ensure that traffic destined for only the cluster nodes is not sent to all ports of the switching hub device. You do not want to move the cluster to another switching hub device. What should you do? ()A、 On one node, run the nlb.exe reload command.B、 On each node, run the wlbs.exe drainstop command.C、 Use Network Load Balancing Manager to enable Internet Group Management Protocol (IGMP) support on the cluster.D、 Use Network Load Balancing Manager to add a second cluster IP address.
You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.You install Windows Server Update Services (WSUS) on a network server named Server1. When you attempt to synchronize Server1 with the Windows Update servers, you receive an error message. You open Internet Explorer and verify that you can communicate with an external Web site by using the proxy server. You need to ensure that Server1 can communicate with the Windows Update servers. What should you do on Server1?()A、Restart the IIS administration tool.B、Configure the Internet Explorer settings to bypass the proxy server.C、In the WSUS options, configure authentication to the proxy server.D、Install the ISA Firewall Client.
You are the network administrator for Testking.com. The TestKing network contains seven application servers. Each application server runs a database application named TestKingApp. Requirements for TestKingApp state that when you add a new user, you must add the user to the server that has the most available disk space. You need to ensure that you meet the requirements when you add new users to TestKingApp. What should you do?()A、Use Event Viewer to review the application logs on each of the seven servers.B、Use Performance Logs and Alerts to record the PhysicalDisk object on all seven servers.C、Use Task Manager to view the performance data on each of the seven servers.D、Use System Monitor to generate a histogram view of the LogicalDisk object on all seven servers.
You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. You need to update six high-visibility servers with critical updates by using Windows Server Update Services (WSUS). You approve all of the updates.You need to ensure that the updates are applied within one hour. What should you do?()A、On the WSUS server, type the gpupdate /force command at the command prompt.B、On the WSUS server, type the wuauclt /detectnow command at the command prompt.C、On each of the six servers, type the gpupdate /force command at the command prompt.D、On each of the six servers, type the wuauclt /detectnow command at the command prompt.
Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest. The forest contains a single domain. You plan to deploy 10 Edge Transport servers on the perimeter network. You need to recommend a solution for the Edge Transport server deployment. The solution must meet the following requirements: .Allow administrators to apply a single security policy to all Edge Transport servers .Reduce the administrative overhead that is required to manage servers .Minimize the attack surface of the internal network What should you recommend?()A、Implement Network Policy and Access Services (NPAS).B、Implement Active Directory Federation Services (AD FS).C、Create a new Active Directory domain in the internal forest, and then join all EdgeTransport servers to the new domain.D、Create an Active Directory forest in the perimeter network, and then join all Edge Transport servers to the new domain.
多选题You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003. All client computers run Windows XP Professional. The company has offices in Berlin, Dortmund, and Frankfurt. Each office is configured as a separate IP subnet. DNS is the only method of name resolution on the network. You need to implement a software update infrastructure on the network. You install Software Update Services (SUS) on a computer named TestKing3 in the Berlin office. You install on TestKing3 with all default settings. You have no plans to install additional SUS servers. You configure all client computers appropriately. You must ensure that client computers can successfully connect to the SUS server. What should you do?()AConfigure the Internet browser home page on all client computers to point to http://windowsupdate.microsoft.com.BIn the SUS Administrator, configure the Server Name property to be the server's fully qualified domain name (FQDN).COpen IIS Manager and enable HTTP over SSL.DEnable communication over port 135 between all client computers and the SUS server.
单选题You are the network administrator for The network consists of a single Active Directory domain named All 40 network servers run Windows Server 2003, and all 1,500 client computers run Windows XP Professional. The servers are located in seven different buildings. All are configured to allow Remote Desktop connections. A new administrator named Tess King is hired to help you configure applications and perform disk defragmentation on all 40 servers. You need to enable Tess King to manage the servers remotely by using Remote Desktop for Administration. What should you do?()AAdd Tess King to the Administrators group.BAdd Tess King to the Power Users group.CAdd Tess King to the Remote Desktop Users group.DDelegate control of the Domain Controllers organizational unit (OU) to Tess King.EDelegate control of the Computers organizational unit (OU) to Tess King.
单选题You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory forest with one domain. The internal network of TestKing.com contains a perimeter network. You have received instructions fromthe CIO to install 15 Edge Transport servers on the perimeter network with the following criteria: * The Edge Transport servers should have a security policy, applied by the administrators. * The minimization of the administrative overhead towards the servers. * The minimization the attack surface of the perimeter network. What should you do?()AThe best option is to set up a new Active Directory domain in the internal forest and then join all EdgeTransport servers to the new domain.BThe best option is to make use of Active Directory Federation Services (AD FS).CThe best option is to make use of Network Policy and Access Services (NPAS).DThe best option is to set up a new Active Directory domain in the perimeter network and then join all Edge Transport Servers to the new domain.
单选题You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. You are responsible for defining the procedures for backing up and restoring all servers. TestKing uses the Backup utility. To enhance security, The IT department deploys certificates to all network users. Smart cards will be required to log on to the domain. A domain controller named TestKingDC1 is configured as the certificate server. You need to create a backup plan for TestKingDC1. The backup must include only the minimum amount of data needed to restore Active Directory and the certificate server. Which action or actions should you perform? ()(Choose all that apply)ABack up the System State data.BBack up C:/windows/ntds.CBack up C:/windows/sysvol.DBack up C:/windows/system32/certsrv.
单选题You are an enterprise administrator for Cer-tech .com. All the servers on the network run Windows Server2008. The network consists of a server called Server01 that runs Microsoft Hyper-V and hosts three virtualmachines. To fulfill a network requirement, you need to configure all of the virtual machines to connect toeach other. However, the company policy states that the virtual machines must not connect to the companynetwork. Which of the following options would you choose to ensure that all the virtual machines connect to eachother and you meet the company policy also?()AEnable the Enable virtual LAN identification option for each virtual machineBEnable the Enable virtual LAN identification option for each virtual machine and then set the connection to Host for the network interface cardCSet the Connection to None for the network interface cardDSelect the Not connected option for each virtual machine.
单选题You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. Three member servers are configured as terminal servers. All three host confidential data. Currently, all network users are full-time employees, and all network users are allowed to log on to the terminal servers. TestKing hires 25 temporary employees. You create a user account for each one. You need to ensure that only full-time employees are allowed to log on to the terminal servers. What should you do?()AModify the Default Domain Group Policy object (GPO).Configure a computer-level policy to prevent the temporary employees from connecting to the terminal servers.BModify the Default Domain Group Policy object (GPO). Enable the user-level Terminal Server setting Sets rules for remote control of Terminal Services user sessions.COn the Terminal Services Profile tab of the user properties for each account, disable the option to log on to terminal servers.DIn the security policy for domain controllers, disable the computer-level Terminal Server setting Allow users to connect remotely using the terminal server.
单选题You are designing a strategy to upgrade the DHCP servers after the new Active Directory structure is in place. Who can authorize the DHCP servers?()A Chief information officerB IT support staff in BostonC IT support staff in New YorkD Network administrator in ChicagoE Network administrator in New York
单选题You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster. The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template. You need to implement protective measures against the cluster’s most significant security vulnerability. What should you do? ()A Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.B Use packet filtering on all inbound traffic to the cluster.C Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.D Use intrusion detection on the perimeter network.
单选题Your network contains a Network Policy Server (NPS) named Server1.NPS1 provides authentication for all of the VPN servers on the network.You need to track the usage information of all VPN connections.Which RADIUS attribute should you log?()AAcct-Session-IdBAcct-Status-TypeCClassDNAS-Identifier
多选题You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all client computers run Windows XP Professional. You are required to implement a backup strategy for all five servers on the network. You use the Backup Utility to schedule nightly backup jobs. You create a domain user account named BackupSvc, and add it to the local Backup Operators group on all file servers. The scheduled backup jobs will use BackupSvc to log on to the network Nightly backups occur successfully for six weeks. Then, nightly backups fail on all servers. When you examine the event log of one server, you discover that the password for BackupSvc is expired. You reset the password and select the Password never expires option for BackupSvc. The next day, you discover that the previous night's backup failed on all file servers. You need to ensure that the next night's backup is successful. Which two actions should you perform? (Each correct answer presents part of the solution.() Choose two)AStop and restart every file server.BStop and restart the backup application on every file server.CChange the password for the backup job on every file server.DIn Active Directory Users and Computers, increase the value of the Account lockout threshold option.EUnlock the BackupSvc account.
单选题You are the network administrator for The network is distributed across five countries in Europe, namely Spain, Italy, Hungary, Austria, and Germany. All network servers run Windows Server 2003. Each location has three print servers. You need to monitor usage of print queues on all print servers on the network. You plan to enable monitoring for each print server in the same way. Monitoring data must be stored in a central location and archived for five years to enable data comparison. What should you do?()ACreate a counter log and specify SQL Database as the log file type.BCreate a trace log and specify Circular Trace File as the log file type.CCreate a counter log and specify Binary Circular File as the log file type.DCreate a trace log and specify Sequential Trace File as the log file type.
单选题You are the network administrator for The network consists of a single Active Directory domain The functional level of the domain is Windows 2000 native. All network servers run Windows Server 2003, and all client computers run Windows XP Professional. The network includes a shared folder named TestKingInfo. Your boss Dr. King reports that he is often unable to access this folder. You discover that the problem occurs whenever more than 10 users try to connect to the folder. You need to ensure that all appropriate users can access TestKingInfo. What should you do?()ADecrease the default user quota limit.BRaise the functional level of the domain to Windows Server 2003.CPurchase additional client access licenses.DMove TestKingInfo to one of the servers.