You configure a Windows Server 2008 R2 Hyper-V server with several virtual machines (VMs). A software vendor releases a software update for an application that runs on only one of the VMs. You need to plan a strategy that enables you to install and test the update without interrupting application availability and without corrupting data. What should you do first?()A、Create a snapshot of the affected VMB、Enable the Windows Volume Snapshot Service on the Hyper-V serverC、Export the VMD、Enable the Windows Volume Snapshot Service on the affected VM

You configure a Windows Server 2008 R2 Hyper-V server with several virtual machines (VMs). A software vendor releases a software update for an application that runs on only one of the VMs. You need to plan a strategy that enables you to install and test the update without interrupting application availability and without corrupting data. What should you do first?()

  • A、Create a snapshot of the affected VM
  • B、Enable the Windows Volume Snapshot Service on the Hyper-V server
  • C、Export the VM
  • D、Enable the Windows Volume Snapshot Service on the affected VM

相关考题:

You are the administrator responsible for security and user desktop settings on your network. You need to configure a custom registry entry for all users. You want to add the custom registry entry into a Group Policy object (GPO) with the least amount of administrative effort.What should you do?A.Configure an ADM template and add the template to the GPO.B.Configure an INF policy and add the policy to the GPO.C.Configure a Microsoft Windows installer package and add the package to the GPO.D.Configure RIS to include the registry entry.

You are the network administrator of a small Layer 2 network with 50 users. Lately, users have beencomplaining that the network is very slow. While troubleshooting, you notice that the CAM table of yourswitch is full, although it supports up to 12, 000 MAC addresses. How can you solve this issue and preventit from happening in the future?()A、Upgrade the switchesB、Configure BPDU guardC、Configure VLAN access listsD、Configure port securityE、Configure Dynamic ARP inspection

You are the administrator of Company.com's Windows 2000 Network. The routed TCP/IP network that you administer consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. All computers are members of a single Windows 2000 domain named Company.com. TCP/IP is the only network protocol used at Company's office. You have recently installed 10 new Windows 2000 Professional computers and you want to enable the new computers to use host names to connect to shared resources on the network. You configure a TCP/IP address and a gateway address on each new computer. You want to complete the configuration to allow the computers to communicate on the network.  What should you do?()A、Configure a DNS suffix.B、Configure a subnet mask.C、Configure an LMHOSTS file.D、Configure an Interface metric.E、Configure at least one DNS address.

You are the network administrator for Company.You install Windows 2000 Professional on your computer at home. Your computer contains threemodems, each connected to a separate phone line. You create a new dial-up connection to connect toCompany’s remote access server. You configure the connection to dial up all three devices. You start thedial-up connection and connect to the remote access server. You notice that only one of the modems isconnected to the remote access server.You want to use as many modems as possible to make a single connection to the remote access server.What should you do? ()A、Configure the dial-up connection to sue a SLIP connection.B、Configure all three modems to use the same phone line.C、Configure the remote access server to enable multi-link.D、Configure the dial-up connection to only dial two of the three modems.E、Configure the dial-up connection to Enable LCP extensions.

You are preparing to install an operating system on virtual machines (VMs) in a Hyper-V environment. You need to configure each VM so that you can perform a network-based operating system installation. What should you do for each VM?()A、Add a Network Adapter.B、Add a Legacy Network Adapter.C、Configure a static MAC address.D、Configure a dynamic MAC address.

You are performing a backup of your database across the network. While taking the backup, you want to save space on the storage media and reduce the network bandwidth. Which command will you issue to configure the required type of backup?()A、 CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO BACKUPSET;B、 CONFIGURE DEVICE TYPE TO disk BACKUP TYPE TO COPY;C、 CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO COMPRESSED BACKUPSET;D、 CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO COMPRESSED COPY;

You are managing an Oracle Database 11g database. You want to ensure the recovery of thedatabase to the point of failure.  Which configuration will you do to accomplish the task()A、Multiplex all database filesB、Configure the Flash Recovery Area.C、Configure the database instance for ARCHIVELOG mode.D、Configure the FAST_START_MTTR_TARGET initialization parameter.

You are the administrator of you company network. A user named Peter requests assistance in his Windows 2000 Professional portable computer. Peter is preparing for his test and wants to optimize the battery life for his portable computer. You want to configure Peter’s computer to save the contents of memory on hard disk and then shutdown when Peter presses the sleep button.  What should you do? ()A、Configure power settings to use the standard option. B、Configure power settings to use the power off option. C、Configure power settings to use the hibernate option. D、Configure power settings to use always on power scheme. E、Configure the computer to use the portable laptop power scheme.

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The server hasthe Web Server (IIS) server role installed. The server contains a Web site that is configured to use onlyWindows Authentication. You have a security group named Group1 that contains several user accounts.Now you receive an order from the company management. According to the company requirement, youhave to prevent the members of Group1 from accessing a Web site. But you are not allowed prevent otherusers from accessing the Web site. Which Web site feature should you configure?()A、You should configure SSL SettingsB、You should configure AuthenticationC、You should configure Authorization RulesD、You should configure IIS Manager Permissions

Your portable computer is in sleep mode. When you resume work on the portable computer, you are not prompted for a password.  You need to ensure that you are prompted for a password each time the portable computer recovers from sleep mode.  What should you do?()A、Configure the computer to hibernate when not in use.B、In the current power plan settings, configure the computer to require a password when recovering from sleep mode.C、Configure the computer to use the High Performance power plan.D、Configure the screen saver settings to require a password on resumption of work.

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. You intend to configure FILESTREAM data, enabling FILESTREAM for file I/O streaming access and allowing remote client computers to have streaming access to FILESTREAM data. You must make sure that FILESTREAM data is enabled. In the options below, which service should you configure? () A、You should configure Distributed File SystemB、You should configure SQL ServerC、You should configure SQL Server Full TextD、You should configure SQL Server VSS Writer

Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when traveling.  You need to configure the network adapter profile settings to ensure that other systems are allowed to discover your computer only when you are at home.  What are two possible ways to achieve this goal?()A、When you configure access to the wired network at home, set the wired network adapter location type to Private.B、When you configure access to the wired network at home, set the wired network adapter location type to Public.C、When you configure access to the public wireless access points, set the wireless network adapter location type to Private.D、When you configure access to the public wireless access points, set the wireless network adapter location type to Public.

You are the administrator of Company.com’s Windows 2000 Network.  Your routed TCP/IP network consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. All computers are in the Company.com domain. Your network uses TCP/IP as the only network protocol. You are installing 10 new Windows 2000 Professional computers. You want to enable the new computers to use host names to connect to shared resources on the network. You configure a TCP/IP address, a gateway address and a subnet mask on each new computer.   You want to complete the configuration to allow the computers to communicate on the network.  What should you do?()A、Configure a HOSTS file.B、Configure a LMHOSTS file.C、Configure a WINS server database.D、Configure a DHCP server address.E、Configure at least one DNS address.

You are designing a strategy to meet the security and financial requirements related to the Manifest application.  What should you do? ()A、 Configure a VPN server in Sydney.B、 Configure a VPN server in each branch office.C、 Configure a dial-up server in SydneyD、 Configure a dial-up server in each branch office.

You have an Exchange Server 2010 organization that contains three Mailbox servers named MBX1, MBX2, and MBX3.You configure a journaling mailbox on a server named MBX3.You configure journaling on several mailboxes located on MBX1 and MBX2.You need to ensure that journaling occurs if MBX3 fails.What should you do?()A、Configure an alternate journaling mailbox on MBX2.B、Configure a second e-mail address for the journaling mailbox.C、Configure the shadow redundancy settings in the organization.D、Create a retention tag and then assign it to a new retention policy.

You have two servers that run Windows Server 2008 named Server1 and Server2. You install WSUS on both servers. You need to configure WSUS on Server1 to receive updates from Server2. What should you do on Server1? ()A、 Configure a proxy serverB、 Configure a upstream serverC、 Create a new replica groupD、 Create a new computer group

You use Windows 2000 Professional on your desktop computer Company1. You use Company1 to runautomated reports and retrieve performance data from Windows 2000 Server computers.You configure Scheduled Tasks to notify you of failed tasks. Three days later, you notice that none ofyour tasks was started and you never received notification. You view the list of scheduled tasks as shownin the exhibit. You want to enable your tasks to start and then to receive notification of failed tasks. What should you do? ()A、Use Scheduled Tasks to configure the tasks to run under the security context of a local      Administrator account. B、Configure the Task Scheduler service account to use a local Administrator account and password.  C、Use Computer Management to start the Messenger service and to configure the Messenger service to start automatically. D、Use Computer Management to start the Task Scheduler service and to configure the Task Scheduler service to start automatically.

You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2 installed.The ABC.com network has a server named ABC_SR07 that hosts two virtual machines. You use Windows Server Backup to configure scheduled backups of ABC_SR07.  How would you ensure that all virtual machines will be saved before the backups begin?()A、You should configure the Router Guard settings.B、You should configure the Port Mirroring settings.C、You should configure the Integration Services settings.D、You should configure a system sate backup.E、You should configure the NIC Teaming settings.

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2002 instance. You upgrade this instance to SQL Server 2008. You configure the Agent service to use the LocalSystem account. There is a file named Orderdata on a remote network share. A job accesses this Orderdata file by using a CMDExec step. The job step fails to complete execution after the upgrade. You must make sure that the job can complete execution, so you have to configure the job step. What action should you perform? () A、You should configure a certificate B、You should configure the SQL Server Agent service to use the NetworkService account.C、You should configure the job step to use a proxy account D、You should configure the SQL Server Agent service to use a local Windows account

You are an administrator at Cer-tech .com. You have been instructed to install Web Server (IIS) on a newWindows Server 2008 server. After installing IIS, you install Microsoft .NET framework 1.0 application on awebsite hosted on the server. You also have to make sure that all applications must run on a minimum level of permission according to the company security policy. You should configure the website applicationto have permissions to execute without creating other content or accessing Windows Server 2008 system components. What should you do to achieve this task?()A、Configure the .NET Framework website trust level to lowB、Configure the .NET Framework website trust level to HighC、Configure the .NET Framework website trust level to FullD、Configure the .NET Framework website trust level to MediumE、Configure the .NET Framework website trust level to Optimal

You are attempting to connect to your ISP. You view the status change from Dialing to Verifying user name and password. After several seconds, the status changes to Disconnecting. You are then disconnected from the computer you dialed. You verify that your user name and password are entered correctly. You want to enable your Computer to connect to your ISP correctly. What should you do? ()A、Configure your connection to enable data encryption.B、Configure your connection to use the UNIX SLIP server.C、Configure your connection to allow unsecured passwords.D、Instruct your ISP to configure your account to support Multilink.

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. Now your company CIO assigns a task to you. The company CIO wants you to configure FILESTREAM data and the two requirements below must be met: you must enable FILESTREAM for file I/O streaming access; remote client computers must be able to have streaming access to FILESTREAM data. You must make sure that FILESTREAM data is enabled. Which service should you configure? () A、You should configure SQL Server VSS Writer B、You should configure Distributed File System C、You should configure SQL Server D、You should configure SQL Server Full Text

单选题You are performing a backup of your database across the network. While taking the backup, you want to save space on the storage media and reduce the network bandwidth. Which command will you issue to configure the required type of backup?()A CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO BACKUPSET;B CONFIGURE DEVICE TYPE TO disk BACKUP TYPE TO COPY;C CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO COMPRESSED BACKUPSET;D CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO COMPRESSED COPY;

单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. You intend to configure FILESTREAM data, enabling FILESTREAM for file I/O streaming access and allowing remote client computers to have streaming access to FILESTREAM data. You must make sure that FILESTREAM data is enabled. In the options below, which service should you configure? ()AYou should configure Distributed File SystemBYou should configure SQL ServerCYou should configure SQL Server Full TextDYou should configure SQL Server VSS Writer

单选题You are designing a strategy to meet the security and financial requirements related to the Manifest application.  What should you do? ()A Configure a VPN server in Sydney.B Configure a VPN server in each branch office.C Configure a dial-up server in SydneyD Configure a dial-up server in each branch office.

单选题You have an Exchange Server 2003 organization. You install an Exchange Server 2010 Service Pack 1 (SP1) Edge Transport server on the network. You need to ensure that the Edge Transport server can send and receive e-mail messages from the Internet for the organization. You configure the Exchange Server 2003 servers to send all e-mail for external recipients to the Edge Transport servers. What should you do on the Edge Transport servers?()ACreate and configure a Send connector.Create and configure a Receive connector.Create and configure an Accepted domain.BCreate an Edge Subscription file. Create and configure a Send connector.Create and configure a Receive connector.CCreate an Edge Subscription file. Create and configure a Send connector.Create and configure an Accepted domain.DCreate and configure a Send connector.Create and configure an Accepted domain.install the Exchange Server 2010 schema extensions.

多选题Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when you are traveling.  You need to configure the network adapter profile settings to ensure that the computer discovers other network devices only when you are at home.  Which two actions should you perform?()AWhen you configure access to the wired network at home, set the wired network adapter location type to Public.BWhen you configure access to the wired network at home, set the wired network adapter location type to Private.CWhen you configure access to the public wireless access points, set the wireless network adapter location type to Public.DWhen you configure access to the public wireless access points, set the wireless network adapter location type to Private.

单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. Now your company CIO assigns a task to you. The company CIO wants you to configure FILESTREAM data and the two requirements below must be met: you must enable FILESTREAM for file I/O streaming access; remote client computers must be able to have streaming access to FILESTREAM data. You must make sure that FILESTREAM data is enabled. Which service should you configure? ()AYou should configure SQL Server VSS Writer BYou should configure Distributed File System CYou should configure SQL Server DYou should configure SQL Server Full Text