单选题A company has several legacy servers that upper management would like to move into a virtual environment. Which of the following is the FIRST step an administrator should take to evaluating whether the servers can be moved into the virtual environment?()A Compare the costs of maintenance between the physical and virtual servers.B Run SYSPREP on each legacy server.C Check the HCL on each legacy server.D Verify that all the latest OS service packs are installed on each server.
单选题
A company has several legacy servers that upper management would like to move into a virtual environment. Which of the following is the FIRST step an administrator should take to evaluating whether the servers can be moved into the virtual environment?()
A
Compare the costs of maintenance between the physical and virtual servers.
B
Run SYSPREP on each legacy server.
C
Check the HCL on each legacy server.
D
Verify that all the latest OS service packs are installed on each server.
参考解析
解析:
暂无解析
相关考题:
听力原文:Although the said company is a sun-rising firm, its accounting management should be improved before the loan is extended to it.(9)A.The company is a sun-rising firm so it is worthwhile to extend the loan.B.The company has some accounting problems, some improvement is needed.C.The company is short of funds because it is sun-rising.D.The company has some accounting problems because it is sun-rising.
The(74)has several major components, including the system kernel, a memory management system, the file system manager, device drivers, and the system libraries.A.applicationB.information systemC.networkD.operating system
The ______ has several major components, including the system kernel, a memory management system, the file system manager, device drivers, and the system libraries.A.applicationB.information systemC.networkD.operating system
ABC Company has 1500 managed devices and 15,000 end users on a campus network. LAN Management Solution (LMS) is being deployed as the network management application. What is the recommended number of network management server(s)?()A.1B.2C.3D.4
Mr. Jones has been accused of distributing several important __________ memorandums to persons outside the company.A.integralB.independentC.incapableD.internal
ABC Company has 1500 managed devices and 15,000 end users on a campus network. LAN Management Solution (LMS) is being deployed as the network management application. What is the recommended number of network management server(s)?()A、1B、2C、3D、4
The company has two thousand servers located around the globe. Which of the following is the BEST method of patch management and deployment?()A、Set all servers to automatically download patches from the manufacturer’s website.B、Install an internal patch management system and deploy from the system.C、Install the patches on each server from a deployment disk.D、RDP into each server, manually download and install the patches.
A company is deploying a new file server to consolidate shares from several legacy servers. Which of the following is the BEST method to ensure that the new file shares are being used?()A、 Setup the new file server and shut down the legacy servers.B、 Remove all the DNS entries for the legacy servers.C、 Create a logon script to remap the old file shares to the new file shares.D、 Go to each users computer, remove all shares and setup the new shares.
You work as the Exchange administrator at Company.com.The Company.com network contains an Exchange Server 2010 Organization.Company.com has its headquarters in Athens where you are located.the Company.com network contains a database availability group that host two mailbox servers named -ex01 and -ex02.during routine monitoring you discover that a mailbox database named kingdata is in a failed and suspended state on -ex02.you receive an instruction from management to reseed kingdata to -ex02 with the least amount of administrative effort. What should you do?()A、This can be accomplished by running the Update-MailboxDatabaseCopy cmdlet from the Exchange Management Shell.B、This can be accomplished by running the Add Mailbox Database Copy wizard from the Exchange Management Console.C、This can be accomplished by running the Restore-DatabaseAvailabilityGroup cmdlet from the Exchange Management Shell.D、This can be accomplished by restarting the Microsoft Exchange Replication Service from the Services console.
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.the Company.com contains an exchange server 2010 mailbox server named -ex20 that contains a mailbox database.a Company.com manager wants the see the last logon time of the employees at Company.com. What should you do?()A、The best option is to run the Get-MailboxDatabase from the Exchange Management Shell.B、The best option is to run the Get-MailboxStatistics from the Exchange Management Shell.C、The best option is to create and export a filter from the Exchange Management Console.D、The best option is to run the Remote Connectivity Analyzer from the Exchange Management Console.
Your company has four DNS servers that run Windows Server 2008. Each server has a static IP address. You need to prevent DHCP from assigning the addresses of the DNS servers to DHCP clients. What should you do? ()A、 Create a new scope for the DNS servers.B、 Create a reservation for the DHCP serverC、 Configure the 005 Name Servers scope optionD、 Configure an exclusion that contains the IP addresses of the four DNS servers
You have an Exchange Server 2010 organization. Your company has a relationship with another company. The partner company has an Exchange Server 2010 organization. You need to recommend a security solution to meet the following requirements: .Ensure that all e-mail delivery between your servers and the partner companys servers is encrypted .Ensure that all communication between your servers and the partner companys servers is authenticated What should you include in the solution?()A、Active Directory Rights Management Services (AD RMS)B、Domain SecurityC、Forms-based AuthenticationD、Secure/Multipurpose Internet Mail Extensions (S/MIME)
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com has merged with another company named Courseware Publishers.The users at Courseware Publishers complained that they cannot automatically locate the Client Access servers at Company.com.The users need to locate the Client Access servers at Company.com.What should you do?()A、The best option is to use an A record for FederatedSharing.Company.com.B、The best option is to use an SRV record for _autodiscover._TCP._msdcs.Company.com.C、The best option is to use an A record for autodiscover.Company.com.D、The best option is to use an SRV record for _FederatedSharing._UDP._msdcs.Company.com.
Your company has four DNS servers that run Windows Server 2008 R2. Each server has a static IP address.You need to prevent DHCP from assigning the addresses of the DNS servers to DHCP clients.What should you do?()A、Create a new scope for the DNS servers.B、Create a reservation for the DHCP server.C、Configure the 005 Name Servers scope option.D、Configure an exclusion that contains the IP addresses of the four DNS servers.
You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a single Active Directory domain in your company. The domaincontains a server that runs Windows Server 2008. The server has Windows SharePoint Services (WSS)installed. Now you receive an order from the company management. According to the company requirement, you should allow users to create distribution lists from a SharePoint site. What action should you perform on the WSS server?()A、The site should be configured to use the default Rights Management server in Active Directory DomainServices.B、The outgoing mail character set should be set to 1200(Unicode).C、The SharePoint Directory Management Service should be enabled.D、The site should be configured to accept messages from authenticated users only.
单选题Your company has an Active Directory forest. The company has servers that run Windows Server 2008 amd client computers that run Windows Vista. The domain uses a set of GPO administrative templates that have been approved to support regulatory compliance requirements. Your partner company has an Active Directory forest that contains a single domain, The company has servers that run Windows Server 2008 and client computers that run Windows Vista. You need to configure your partner company’s domain to use the approved set of administrative templates. What should you do()AUse the Group Policy Management Console (GPMC) utility to back up the GPO to a file. In each site, import the GPO to the default domain policy.BCopy the ADMX files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PDC emulatorCCopy the ADML files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PDC emulatorDDownload the conf.adm, system.adm, wuau.adm, and inetres.adm files from the Microsoft Updates Web site. Copy the ADM files to the PolicyDefinitions folder on thr partner company’s emulator.
单选题An Organization has Exchange 2010 with 50 Hub Transport Servers.Minimize amount of disk space used on Hub Transport Servers to store shadow copies of messages.What should you do?()AFrom the Exchange Management Shell, run set-transportconfig cmdletBFrom the Exchange Management Shell, run set-transportservers cmdletCFrom the Exchange Management Console (EMC), modify transport settingsDFrom the Exchange Management Console (EMC), modify properties of Hub Transport Servers
单选题A company is deploying a new file server to consolidate shares from several legacy servers. Which of the following is the BEST method to ensure that the new file shares are being used?()A Setup the new file server and shut down the legacy servers.B Remove all the DNS entries for the legacy servers.C Create a logon script to remap the old file shares to the new file shares.D Go to each users computer, remove all shares and setup the new shares.
多选题You are the systems engineer for your company. The company has a main office in Los Angeles and two branch offices, one in Chicago and one in New York. The offices are connected to one another by dedicated T1 lines. Each office has its own local IT department and administrative staff. The company network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional. All servers support firmware-based console redirection by means of the serial port. The server hardware does not support any other method of console redirection and cannot be upgraded to do so. The company is currently being reorganized. The IT departments from each branch office are being relocated to a new central data center in the Los Angeles office. Several servers from each branch office are also being relocated to the Los Angeles data center. Each branch office will retain 10 servers. A new written security policy includes the following requirements: • All servers must be remotely administered for all administrative tasks. • All servers must be administered from the Los Angeles office. • All remote administration connections must be authenticated and encrypted. Your current network configuration already adheres to the new written security policy for day-to-day server administration tasks performed on the servers. You need to plan a configuration for out-of-band management tasks for each office that meets the new security requirements. Which three actions should you take?()AConnect each server’s serial port to a terminal concentrator. Connect the terminal concentrator to the network.BConnect a second network adapter to each server. Connect the second network adapter in each server to a separate network switch. Connect the management port on the switch to a WAN port on the office router. Enable IPSec on the router.CEnable Routing and Remote Access on a server in each branch office, and configure it as an L2TP/IPSec VPN server. Configure a remote access policy to allow only authorized administrative staff to make a VPN connection.DOn each server, enable the Telnet service with a startup parameter of Automatic. Configure Telnet on each server to use only NTLM authentication. Apply the Server (Request Security) IPSec policy to all servers.EOn each server, enable Emergency Management Services console redirection and the Emergency Management Services Special Administration Console (SAC).
单选题Your company has an Active Directory domain. You have a server named KMS1 that runs Windows Server 2008. You install and configure Key Management Service (KMS) on KMS1. You plan to deploy Windows Server 2008 on 10 new servers. You install the first two servers. The servers fail to activate by using KMS1. You need to activate the new servers by using the KMS server. What should you do?()AComplete the installation of the remaining eight servers.BConfigure Windows Management Instrumentation (WMI) exceptions in Windows Firewall on the new servers.CInstall Volume Activation Management Tool (VAMT) on the KMS server and configure Multiple Activation Key (MAK) Proxy Activation.DInstall Volume Activation Management Tool (VAMT) on the KMS server and configure Multiple Activation Key (MAK) Independent Activation.
单选题You are employed as the Exchange administrator at Company.com.The Company.com network contains an Exchange 2010 Organization.You are responsible for managing the Exchange network for Company.com.The Company.com network contains four Mailbox servers as well as four Client Access servers.The Mailbox servers are all configured to make use of Outlook Anywhere.During the course of the day you receive an instruction from the CIO to create a Client Access server array.To ensure productivity you need to make sure that all tesking.com employees are able to make a connection to the Client Access server array.What should you do?()AYou should consider running the Set-MailboxDatabase cmdlet from the Exchange Management Shell.BYou should consider changing the properties of every mailbox database from the Exchange Management Console (EMC).CYou should consider changing the properties of every Client Access server object from the Exchange Management Console (EMC).DYou should consider running the Set-Mailbox cmdlet from the Exchange Management Shell.
单选题You work as the exchange administrator at company.com.the company.com network contains an exchange server 2010 organization.company.com has its headquarters in london where you are located.during the course of the day you receive notification from management to view the number of mailboxes on the servers that exceeds 1 gb in size.what should you do?()Ayou should consider having the properties of the mailbox database viewed using the exchange management console (emc).Byou should consider running the get-mailbox cmdlet using the exchange management shell.Cyou should consider running the get-mail box statistics cmdlet using the exchange management shell.Dyou should consider having a send- and a recipient filter created using the exchange management console (emc).
单选题Your company has an Active Directory forest. The company has servers that run Windows Server 2008 R2 and client computers that run Windows 7. The domain uses a set of GPO administrative templates that have been approved to support regulatory compliance requirements. Your partner company has an Active Directory forest that contains a single domain. The company has servers that run Windows Server 2008 R2 and client computers that run Windows 7. You need to configure your partner company’s domain to use the approved set of administrative templates. What should you do()AUse the Group Policy Management Console (GPMC) utility to back up the GPO to a file. In each site, import the GPBCopy the ADMX files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PDCCCopy the ADML files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PDC DDownload the conf.adm, system.adm, wuau.adm, and inetres.adm files from the Microsoft Updates Web site.
单选题Your company has four DNS servers that run Windows Server 2008. Each server has a static IP address. You need to prevent DHCP from assigning the addresses of the DNS servers to DHCP clients. What should you do? ()A Create a new scope for the DNS servers.B Create a reservation for the DHCP serverC Configure the 005 Name Servers scope optionD Configure an exclusion that contains the IP addresses of the four DNS servers
单选题An administrator is in charge of several remote servers in Japan. Users call and complain they cannot connect to the company’s resources located on those servers. Which of the following commands would allow the administrator to verify the servers are running?()ApingBnetstatCnbtstatDtelnet
单选题You work as the Exchange administrator at Company.com.The Company.com network contains an Exchange Server 2010 Organization.Company.com has its headquarters in London where you are located.During the course of the day you receive notification from management to view the a number of mailbox on the servers that is bigger than 1 GB.What should you do?()AYou should consider having the properties of the mailbox database viewed from the Exchange Management Console (EMC).BYou should consider running the Get-Mailbox cmdlet from the Exchange Management Shell.CYou should consider running the Get-MailboxStatistics cmdlet from the Exchange Management Shell.DYou should consider having a recipient filter created from the Exchange Management Console (EMC).