Your network contains two servers that run the Server Core installation of Windows Server 2008 R2.  The two servers are part of a Network Load Balancing cluster. The cluster hosts a Web site.  Administrators use client computers that run Windows 7.   You need to recommend a strategy that allows the administrators to remotely manage the Network Load  Balancing cluster. Your strategy must support automation.  What should you recommend?()A、On the servers, enable Windows Remote Management (WinRM).B、On the servers, add the administrators to the Remote Desktop Users group.C、On the Windows 7 client computers,enable Windows Remote Management (WinRM).D、On the Windows 7 client computers,add the administrators to the Remote Desktop Users group.

Your network contains two servers that run the Server Core installation of Windows Server 2008 R2.  The two servers are part of a Network Load Balancing cluster. The cluster hosts a Web site.  Administrators use client computers that run Windows 7.   You need to recommend a strategy that allows the administrators to remotely manage the Network Load  Balancing cluster. Your strategy must support automation.  What should you recommend?()

  • A、On the servers, enable Windows Remote Management (WinRM).
  • B、On the servers, add the administrators to the Remote Desktop Users group.
  • C、On the Windows 7 client computers,enable Windows Remote Management (WinRM).
  • D、On the Windows 7 client computers,add the administrators to the Remote Desktop Users group.

相关考题:

Your network contains two servers named Server1 and Server2. Server1 and Server2 run the Server Core installation of Windows Server 2008 R2.You need to duplicate the Windows Firewall configurations from Server1 to Server2.What should you use?()A. the Get-Item and the Set-Item cmdletsB. the Get-Service and the Set-Service cmdletsC. the Netsh toolD. the Sconfig tool

Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. You use Microsoft Enterprise Desktop Virtualization (MED - V). You nee d to prepare the MED - V server for cluster mode. What should you do?()A、Copy the ConfigurationServer folder to a network share.B、Add the Failover Clustering feature to the MED - V server.C、Add the Network Load Balancing (NLB) feature to the MED - V server.D、M igrate the MED - V server to a highly available virtual machine (HAVM).

Your network contains two servers named Server1 and Server2. Server1 and Server2 run the Server Core installation of Windows Server 2008 R2.You need to duplicate the Windows Firewall configurations from Server1 to Server2.What should you use?()A、the Get-Item and the Set-Item cmdletsB、the Get-Service and the Set-Service cmdletsC、the Netsh toolD、the Sconfig tool

Your network contains a Web-based application that runs on Windows Server 2003. You plan to  migrate the Web-based application to Windows Server 2008 R2. You need to recommend a server  configuration to support the Web-based application. The server configuration must meet the following  requirements:   èEnsure that the application is available to all users if a single server?fails èSupport the installation of .NET applications èMinimize software costs  What should you recommend?() A、Install the Server Core installation of Windows Server 2008 R2 Standard on two servers. Configure the servers in a Network Load Balancing cluster.B、Install the full installation of Windows Server 2008 R2 Web on two servers. Configure the servers in a Network Load Balancing cluster.C、Install the full installation of Windows Server 2008 R2 Enterprise on two servers. Configure the servers in a failover cluster.D、Install the full installation of Windows Server 2008 R2 Datacenter on two servers. Configure the servers in a failover cluster.

Your company has 10 servers that run Windows Server 2008. The servers have Remote Desktop Protocol (RDP) enabled for server administration. RDP is configured to use default security settings. All administrators’ computers run Windows Vista. You need to ensure the RDP connections are as secure as possible.Which two actions should you perform? ()A、Set the security layer for each server to the RDP Security Layer.B、Configure the firewall on each server to block port 3389.C、Acquire user certificates from the internal certification authority.D、Configure each server to allow connections only to Remote Desktop client computers that use Network Level Authentication.

You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully.   To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster.   You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster.  You want to add the port rule to the nodes of the cluster.   What should you do?  ()A、 Use Network Load Balancing Manager on the Network Load Balancing default host to add the port rule.B、 Change the host priority of the second node to be the highest in the cluster, and then use Network Load Balancing Manager to add the port rule.C、 Run the nlb.exe drain command on each node, and then use Network Load Balancing Manager to add the port rule.D、 Add the port rule through Network Connections Properties on each node.

Your network consists of a single Active Directory domain. All servers run Windows Server 2008 R2.   You plan to publish a Web site on two Web servers.   You need to deploy an availability solution for your Web servers that meets the following requirements: èSupports the addition of more Web servers without interrupting client connections  èEnsures that the Web site is accessible even if a single server fails What should you do?()A、Configure a failover cluster.B、Configure a Web garden on each Web server.C、Create a Network Load Balancing cluster.D、Create two application pools on each Web server.

Your company plans to deploy eight file servers that run Windows Server 2008 R2. All file servers will connect to Ethernet switches.  You need to plan a data storage solution that meets the followingrequirements:   èAllocates storage to the servers as needed èUtilizes the existing network infrastructure  èMaximizes performance  èMaximizes fault tolerance   Which actions should you include in your plan?()A、Install Windows Server 2008 R2 Datacenter on each server. Deploy the servers in a failover cluster. deploy an iSCSI storage area network (SAN).B、Install Windows Server 2008 R2 Standard on each server. Deploy the servers in a Network Load balancing (NLB) cluster. Implement RAID?5 on each server.C、Install Windows Server 2008 R2 Enterprise on each server. Deploy the servers in a failover cluster. deploy a Fibre Channel (FC) storage area network (SAN).D、Install Windows Server 2008 R2 Enterprise on each server. Deploy the servers in a Network Load balancing (NLB) cluster. Map a network drive on each server to an external storage array.

Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. You use Microsoft Enterprise Desktop Virtualization (MED-V). You need to prepare the MED-V server for cluster mode. What should you do?()A、Copy the ConfigurationServer folder to a network share.B、Add the Failover Clustering feature to the MED-V server.C、Add the Network Load Balancing (NLB) feature to the MED-V server.D、Migrate the MED-V server to a highly available virtual machine (HAVM).

You have a Microsoft Internet Security and Accelerator (ISA) 2006 server that provides all Internet accessfor your company.  You have two Mailbox servers configured in a database availability group (DAG), two Client Accessservers, and two Hub Transport servers.  You need to recommend changes to the environment to ensure that users can access Outlook Web App(OWA) from the Internet if any single server fails.  What should you recommend?()A、Configure a Client Access server array.B、Deploy a second ISA server and create an ISA server array.C、Implement Windows Network Load Balancing for the Client Access servers.D、Deploy two Edge Transport servers that are configured to use EdgeSync synchronization.

Your network contains an Active Directory domain. The functional level of the domain is Windows Server 2008. The domain contains application servers that run either Windows Server 2003,Windows Server 2008, or Windows Server 2008 R2. The network contains 5,000 client computers that run Windows XP Service Pack 3 (SP3). Your company has a two-node failover cluster that runs Windows Server 2008 R2 Service Pack 1 (SP1). As part of a Virtual Desktop Infrastructure (VDI), the failover cluster hosts guest virtual machines (VMs) that run Windows 7. The company does not plan to purchase additional hardware for the existing servers. You need to recommend a solution to increase the number of VMs that can run on each host. What should you include in the recommendation?()A、Microsoft Software AssuranceB、RemoteFXC、mandatory profilesD、folder redirectionE、RemoteAppF、Microsoft System Center Configuration Manager 2007G、Dynamic MemoryH、Dynamic Host Configuration Protocol (DHCP)I、CPU Core ParkingJ、pass-through disksK、Microsoft System Center Virtual Machine Manager 2010L、Microsoft Application Virtualization (App-V)M、roaming profilesN、Microsoft Enterprise Desktop Virtualization (MED-V)

You need to design a Windows Server Update Services (WSUS) infrastructure that meets the  following requirements:   èThe updates must be distributed from a central location.   èAll computers must continue to receive updates in the event that a server fails. What should you include in your design?()A、Configure two WSUS servers in a Microsoft SQL Server 2008 failover cluster. Configure each WSUS  server to use a local database.B、Configure a single WSUS server to use multiple downstream servers. Configure each WSUS server touse a RAID 1 mirror and a local database.C、Configure a single WSUS server to use multiple downstream servers. Configure each WSUS server to  use a RAID 5 array and a local database.D、Configure a Microsoft SQL Server 2008 failover cluster. Configure two WSUS servers in a Network Load Balancing cluster. Configure WSUS to use the remote SQL Server 2008 database instance.

You need to recommend a Windows Server 2008 R2 server configuration that meets the following  requirements:   èSupports the installation of Microsoft SQL Server 2008   èProvides redundancy for SQL services if a single server fails What should you recommend?() A、Install a Server Core installation of Windows Server 2008 R2 Enterprise on two servers. Configure the servers in a failover cluster.B、Install a full installation of Windows Server 2008 R2 Standard on two servers. Configure Network Load Balancing on the two servers.C、Install a full installation of Windows Server 2008 R2 Enterprise on two servers. Configure Network Load Balancing on the two servers.D、Install a full installation of Windows Server 2008 R2 Enterprise on two servers. Configure the servers in a failover cluster.

You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a four-node Network Load Balancing cluster. All nodes run Windows Server 2003. The cluster has converged successfully. You use Network Load Balancing Manager on the default host to configure all nodes of the cluster.   The nodes have a single network adapter and are connected to the same switching hub device.   Administrators of non-cluster servers that are connected to the same switching hub device report that their servers receive traffic that is destined for the cluster nodes. Receiving this additional network traffic impairs the network performance of the non-cluster servers.   You need to ensure that traffic destined for only the cluster nodes is not sent to all ports of the switching hub device.  You do not want to move the cluster to another switching hub device.   What should you do? ()A、 On one node, run the nlb.exe reload command.B、 On each node, run the wlbs.exe drainstop command.C、 Use Network Load Balancing Manager to enable Internet Group Management Protocol (IGMP) support on the cluster.D、 Use Network Load Balancing Manager to add a second cluster IP address.

You have an Exchange Server 2010 organization.  The organization contains two servers named Server1 and Server2.  Server1 and Server2 have the Mailbox server role and the Hub Transport server role installed. Server 1 and Server2 are members of a database availability group (DAG).  You need to plan the deployment of Client Access servers to meet the following requirements: .Users must be able to access their mailboxes if a single server fails .Users must not attempt to connect to a failed server  What should you include in your plan?()A、On Server1 and Server2, install the Client Access server role. Implement failover clustering.B、On Server1 and Server2, install the Client Access server role. Configure network interface card (NIC) teaming on each server.C、Deploy two new Client Access servers. Implement load balancing by using DNS round robin.Create a Client Access server array.D、Deploy two new Client Access servers. Implement load balancing by using a Windows Network Load Balancing cluster. Create a Client Access server array.

Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. You use Microsoft Enterprise Desktop Virtualization (MED-V). You need to prepare the MED-V server for cluster mode. What should you do?()A、Copy the ConfigurationServer folder to a network share.B、Add the Failover Clustering feature to the MED-V server.C、Add the Network Load Balancing (NLB) feature to the MED-V server.D、Migrate the MED-V server to a highly available virtual machine (HAVM).

You are a network administrator for your company. The network consists of a single Active Directory domain. All domain controllers and member servers run Windows Server 2003, Enterprise Edition. All client computers run Windows XP Professional.   The company has one main office and one branch office. The two offices are connected by a T1 WAN connection. There is a hardware router at each end of the connection. The main office contains 10,000 client computers, and the branch office contains 5,000 client computers.   You need to use DHCP to provide IP addresses to the Windows XP Professional computers in both offices. You need to minimize network configuration traffic on the WAN connection. Your solution needs to prevent any component involved in the DHCP architecture from becoming a single point of failure.   What should you do?  ()A、 At the main office, configure two Windows Server 2003 computers as a DHCP server cluster. Configure the branch office router as a DHCP relay agent.B、 At the main office, configure two Windows Server 2003 computers as a DHCP server cluster. At the branch office, configure a Windows Server 2003 computer as a DHCP relay agent.C、 At the main office, configure two Windows Server 2003 computers as a DHCP server cluster. At the branch office, configure two Windows Server 2003 computers as a DHCP server cluster.D、 At the main office, configure two Windows Server 2003 computers as DHCP servers. Configure one DHCP server to handle 80 percent of the IP address scope and the other DHCP server to handle 20 percent. Configure the branch office router as a DHCP relay agent.

You are a network adminstrator for your company. You install an intranet application on three Windows Server 2003 computers. You configure the servers as a Network Load Balancing cluster. You configure each server with two network adapters. One network adapter provides client computers access to the servers. The second network adapter is for cluster communications. Cluster communications is on a separate network segment.   The network team wants to reduce the cluster’s vulnerability to attack. These servers need to be highly available. The network team decides that the Network Load Balancing cluster needs to filter IP ports. The team wants the cluster to allow only the ports that are required for the intranet application.   You need to implement filtering so that only the intranet application ports are available on the cluster. You need to achieve this goal by using the minimum amount of administrative effort.   What should you do?  ()A、 Use Network Load Balancing Manager to configure port rules. Allow only the intranet application ports on the cluster IP address.B、 Use TCP/IP filtering on each server. Configure only the intranet application ports on the network adapter that provides client computers access to the servers.C、 Use TCP/IP filtering on each server. Configure only the intranet application ports on both of the network adapters.D、 Configure Routing and Remote Access on each server. Use Routing and Remote Access input filters to allow only the intranet application ports on the network adapter that provides client computers access to the servers.

Your network includes 40 servers that run Windows Server 2008 R2. You plan to virtualize the servers by using Hyper-V in a failover cluster.  Your plan must allow for up to two offline host servers while still maintaining highly available virtual machines. You need to recommend the minimum number of Hyper-V host servers for the cluster.  How many servers should you recommend?()A、threeB、fourC、fiveD、six

Your company has 10 servers that run Windows Server 2008 R2. The servers have Remote Desktop Protocol (RDP) enabled for server administration. RDP is configured to use default security settings. All administrators' computers run Windows 7. You need to ensure the RDP connections are as secure as possible. Which two actions should you perform?()A、Set the security layer for each server to the RDP Security Layer.B、Configure the firewall on each server to block port 3389.C、Acquire user certificates from the internal certification authority.D、Configure each server to allow connections only to Remote Desktop client computers that use Network Level Authentication.

Your network contains 200 servers that run Windows Server 2008 R2. You need to archive the Security log for each server on a daily basis. Which tool should you use?()A、NetshB、SeceditC、WecutilD、Wevtutil

Your network contains two Hyper-V hosts that run Windows Server 2012 R2. The Hyper-V hosts contains several virtual machines that run Windows Server 2012 R2. You install the Network Load Balancing feature on the virtual machines. You need to configure the virtual machines to support Network Load Balancing (NLB). Which virtual machine settings should you configure?()A、Port mirroringB、DHCP guardC、Router guardD、MAC address

单选题Your network contains an Active Directory domain. The functional level of the domain is Windows Server 2008. The domain contains application servers that run either Windows Server 2003,Windows Server 2008, or Windows Server 2008 R2. The network contains 5,000 client computers that run Windows XP Service Pack 3 (SP3). Your company has a two-node failover cluster that runs Windows Server 2008 R2 Service Pack 1 (SP1). As part of a Virtual Desktop Infrastructure (VDI), the failover cluster hosts guest virtual machines (VMs) that run Windows 7. The company does not plan to purchase additional hardware for the existing servers. You need to recommend a solution to increase the number of VMs that can run on each host. What should you include in the recommendation?()AMicrosoft Software AssuranceBRemoteFXCmandatory profilesDfolder redirectionERemoteAppFMicrosoft System Center Configuration Manager 2007GDynamic MemoryHDynamic Host Configuration Protocol (DHCP)ICPU Core ParkingJpass-through disksKMicrosoft System Center Virtual Machine Manager 2010LMicrosoft Application Virtualization (App-V)Mroaming profilesNMicrosoft Enterprise Desktop Virtualization (MED-V)

单选题Your network includes 40 servers that run Windows Server 2008 R2. You plan to virtualize the servers by using Hyper-V in a failover cluster. Your plan must allow for up to two offline host servers while still maintaining highly available virtual machines. You need to recommend the minimum number of Hyper-V host servers for the cluster. How many servers should you recommend?()AFiveBThreeCFourDSix

单选题You are a network adminstrator for your company. You install an intranet application on three Windows Server 2003 computers. You configure the servers as a Network Load Balancing cluster. You configure each server with two network adapters. One network adapter provides client computers access to the servers. The second network adapter is for cluster communications. Cluster communications is on a separate network segment.   The network team wants to reduce the cluster’s vulnerability to attack. These servers need to be highly available. The network team decides that the Network Load Balancing cluster needs to filter IP ports. The team wants the cluster to allow only the ports that are required for the intranet application.   You need to implement filtering so that only the intranet application ports are available on the cluster. You need to achieve this goal by using the minimum amount of administrative effort.   What should you do?  ()A Use Network Load Balancing Manager to configure port rules. Allow only the intranet application ports on the cluster IP address.B Use TCP/IP filtering on each server. Configure only the intranet application ports on the network adapter that provides client computers access to the servers.C Use TCP/IP filtering on each server. Configure only the intranet application ports on both of the network adapters.D Configure Routing and Remote Access on each server. Use Routing and Remote Access input filters to allow only the intranet application ports on the network adapter that provides client computers access to the servers.