You are a network administrator for your company. The network contains a Windows Server 2003 computer named Server1. Server1 has a single CPU, 512 MB of RAM, and a single 100-Mb network adapter.   All network users’ home folders are stored on Server1. Users access their home folders by using a mapped network drive that connects to a shared folder on Server1.   After several weeks, users report that accessing home folders on Server1 is extremely slow at certain times during the day.   You need to identify the resource bottleneck that is causing the poor performance.   What should you do?  ()A、 Capture a counter log by using LogicalDisk, PhysicalDisk, Processor, Memory, and Network Interface performance objects, and view the log data information that is captured during periods of poor performance.B、 Configure Alerts on Server1 to log entries in the event logs for the LogicalDisk, PhysicalDisk, Processor, Memory, and Network Interface performance objects when the value of any object is more than 90.C、 Capture a trace log that captures Page faults, File details, Network TCP/IP, and Process creations/deletions events.D、 Implement auditing on the folder that contains the users’ home folders. Configure Network Monitor on Server1.

You are a network administrator for your company. The network contains a Windows Server 2003 computer named Server1. Server1 has a single CPU, 512 MB of RAM, and a single 100-Mb network adapter.   All network users’ home folders are stored on Server1. Users access their home folders by using a mapped network drive that connects to a shared folder on Server1.   After several weeks, users report that accessing home folders on Server1 is extremely slow at certain times during the day.   You need to identify the resource bottleneck that is causing the poor performance.   What should you do?  ()

  • A、 Capture a counter log by using LogicalDisk, PhysicalDisk, Processor, Memory, and Network Interface performance objects, and view the log data information that is captured during periods of poor performance.
  • B、 Configure Alerts on Server1 to log entries in the event logs for the LogicalDisk, PhysicalDisk, Processor, Memory, and Network Interface performance objects when the value of any object is more than 90.
  • C、 Capture a trace log that captures Page faults, File details, Network TCP/IP, and Process creations/deletions events.
  • D、 Implement auditing on the folder that contains the users’ home folders. Configure Network Monitor on Server1.

相关考题:

You are a network administrator for Ezonexam.com's Windows 2000 network.Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers.Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Jack Bauer leaves the company. You grant her manager the Full Control NTFS permission to Jack's home folder. When the manager attempts to open any of the files, she receives the following error message: "Access is denied."What should you do?A.Use System File Checker (SFC) to decrypt the file.B.Log on the network as the Recovery Agent. Decrypt the files for the manager.C.Log on the network as the administrator. Use the cipher command to decrypt the files.D.Log on the network as a member of the Backup Operators group. Decrypt the files for the manager.

You are the network administrator for Test King. All network servers run Windows Server 2003. A server named TestKingSrv hosts applications for network users.TestKingSrv contains a motherboard that can support two CPUs. One CPU is currently installed. TestKingSrv has 512 MB of RAM and a single 36 - GB integrated device electronics (IDE) hard disk. It has a 10 MB Ethernet card connected to a 10/100 Mb switch.After TestKingSrv is in use for five months, network users report unacceptable response times on their applications.You open System Monitor on TestKingSrv and see the information shown in the following table.You need to improve the performance of Server 1.What should you do?()A. Add an additional CPU.B. Add an additional 512 MB of RAM.C. Replace the existing hard disk with a faster one.D. Replace the 10-Mb Ethernet card with a 100-Mb Ethernet card.

You are the network administrator for your company. All network servers run Windows Server 2003. All client computers run Windows XP Professional. A member server named Server1 is located at a branch office that does not permit the use of Remote Desktop Protocol. Another administrator uses the Backup utility to create a scheduled backup job on Server1. The backup job performs a normal backup of an application server. The application server is removed from the network. You need to use a client computer to remove the backup job from Server1. You cannot travel to the branch office. What should you do? ()A、Use the RUNAS feature to run the at /delete command as the Server1/Administrator account.B、Log on by using your Administrator account and run the ntbackup /D command.C、Log on by using your Administrator account and run the schtasks /delete command.D、Use the RUNAS feature to run the taskkill command as the Server1/Administrator account.

Your network consists of a single Active Directory domain named Contoso.com. The domain contains a member server named Server1.  Server1 runs Windows Server 2003 Service Pack 2 (SP2). Server1 has Windows Support Tools and Resource Kit Tools installed. You need to view the Kerberos tickets issued to Server1.  Which tool should you run?()A、KerbtrayB、Sc/query kdcC、Netdiag/test:KerberosD、Nltest/sc_query:Contoso.com

You are the network administrator for your company. All network servers run Windows Server 2003. All client computers run Windows XP Professional. A member server named Server1 is located at a branch office that does not permit the use of Remote Desktop Protocol. Another administrator uses the Backup utility to create a scheduled backup job on Server1. The backup job performs a normal backup of an application server. The application server is removed from the network. You need to use a client computer to remove the backup job from Server1. You cannot travel to the branch office. What should you do?()A、Use the RUNAS feature to run the at /delete command as the Server1/Administrator account.B、Log on by using your Administrator account and run the ntbackup /D command.C、Log on by using your Administrator account and run the schtasks /delete command.D、Use the RUNAS feature to run the taskkill command as the Server1/Administrator account.

You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains 35 Windows Server 2003 computers; 3,000 Windows XP Professional computers; and 2,000 Windows 2000 Professional computers. Windows Server Update Services (WSUS) is installed on a server named Server1. The necessary Group Policy object (GPO) is configured.You need to confirm whether all computers in the domain have received all approved updates from Server1. What should you do on Server1?()A、Install and configure Urlscan.exe.B、At the command prompt, type gpresult /scope COMPUTER.C、Open the WSUS console. Run the Status of Computers report.D、Open the WSUS console. Run the Synchronization Results report.

You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain. The domain contains a Windows Server 2003 computer named Server1. You are planning a public key infrastructure (PKI) for the company. You want to deploy a certification authority (CA) on Server1. You create a new global security group named Cert Administrators. You need to delegate the tasks to issue, approve, and revoke certificates to members of the Cert Administrators group.  What should you do?()A、 Add the Cert Administrators group to the Cert Publishers group in the domain.B、 Configure the Certificates Templates container in the Active Directory configuration naming context to assign the Cert Administrators group the Allow - Write permission.C、 Configure the CertSrv virtual directory on Server1 to assign the Cert Administrators group the Allow - Modify permission.D、 Assign the Certificate Managers role to the Cert Administrators group.

You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.You install Windows Server Update Services (WSUS) on a network server named Server1. When you attempt to synchronize Server1 with the Windows Update servers, you receive an error message. You open Internet Explorer and verify that you can communicate with an external Web site by using the proxy server. You need to ensure that Server1 can communicate with the Windows Update servers.  What should you do on Server1?()A、Restart the IIS administration tool.B、Configure the Internet Explorer settings to bypass the proxy server.C、In the WSUS options, configure authentication to the proxy server.D、Install the ISA Firewall Client.

You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers.   You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized.  You need to configure Server1 to log the details of access attempts by VPN users.   What should you do?  ()A、 Configure the system event log to Do not overwrite.B、 In IAS, in Remote Access Logging, enable the Authentication requests setting.C、 Configure the Remote Access server to Log all events.D、 Create a custom remote access policy and configure it for Authentication-Type.

You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains Windows Server 2003 computers and Windows XP Professional computers.  You configure a server named Server1 to be a file server. The written company security policy states that you must analyze network traffic that is sent to and from all file servers.You need to capture file-transfer network traffic that is being sent to and from Server1. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on a server named Server2, which is on the same network segment as Server1.You run Network Monitor on Server2. However, Network Monitor captures only network traffic that is sent to and from Server2. You need to capture all network traffic that is sent to and from Server1.  What should you do?()A、Install the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.B、Open Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.C、Install Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.D、Open Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.

You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains 35 Windows Server 2003 computers; 3,000 Windows XP Professional computers; and 2,000 Windows 2000 Professional computers.Windows Server Update Services (WSUS) is installed on a server named Server1. The necessary Group Policy object (GPO)is configured.You need to confirm whether all computers in the domain have received all approved updates from Server1.  What should you do on Server1?()A、Install and configure Urlscan.exe.B、At the command prompt, type gpresult /scope COMPUTER.C、Open the WSUS console. Run the Status of Computers report.D、Open the WSUS console. Run the Synchronization Results report.

You are the network administrator for your company. The network consists of a single Active Directory domain. All network servers run Windows Server 2003, and all client computers run Windows XP Professional. A user named Peter uses a client computer named Client1. This computer has a locally attached tape device. You grant Peter the necessary permissions to perform backups of a member server named Server1. Peter runs the Backup utility on Client1 to back up the files located on Server1. You need use your client computer to view the most recent backup logs for Server1. What should you do? ()A、Use Notepad to view the contents of the backup report located on Server1.B、Use Notepad to view the contents of the backup report located on Client1.C、Use Event Viewer to view the contents of the application log located on Server1.D、Use Event Viewer to view the contents of the application log located on Client1.

You are the administrator of an Active Directory domain. The network contains a Windows Server 2003 domain controller named Server1Users report that they experience intermittent delays when they log on to Server1. Administrators report that replication attempts between Server1 and other domain controllers are occasionally delayed.You need to verify the cause of the intermittent connection delays to Server1. You also need to find out whether the problem is related to a hardware deficiency on Server1. You need to track these delays over a period of one day.   What should you do first?()A、Run the netdiag /verbose command to perform a network diagnostic test on Server1.B、Run the replmon command to view the Active Directory replication status on Server1.C、Use Network Monitor to view the network traffic packet contents between Server1 and all other computers.D、Create a System Monitor counter to track the queue lengths on the network adapter on Server1.

You are the administrator of Company.com’s network.  Your network has 100 Windows 2000 Professional computers and 10 Windows 2000 Server computers.  Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. In addition, the network servers is configured with disk quotas for the NTFS volume that contains the home folders. All users have a default limit of 100 MB, and the option to deny space to users who exceed their limit has been enabled. A user reports that he cannot save any files to his home folder. He also cannot update files in his home folder.   When he attempts to save files to the folder, he receives the following error message: “Insufficient disk space.” Other users are not experiencing this problem with their home folders.   You want to enable the user to save files in his home folder.  What should you do?()A、 Use Windows Backup to archive and remove old files on the server. B、 Increase the server’s disk quota entry for the user to accommodate the additional files. C、 Log on to the network as a Recovery Agent.Decrypt all of the user’s files in his home folder. D、 Log on to the network by using the domain Administrator account.Grant the user Full Control permission to his home folder.

You are the network administrator for your company. The network consists of a single Active Directory domain named All network servers run Windows Server 2003. Terminal Server is installed on a member server named Server1, which is located in an organization unit (OU) named Servers. User of Server1 report unacceptable response times. To investigate, you start Task Manager on Server1. You discover that the average CPU usage is 80 percent. However, when you select the Processes tab, none of the processes show significant CPU usage. You need to identify the process that is responsible for the CPU usage. What should you do?()A、In Task Manager, select the Show processes from all users option.B、From a command prompt, run the query process command.C、Open the Terminal Services Manager. Select Server1 from the list of servers, and then select the Processes tab.D、Edit the Group policy object (GPO) for the Servers OU by adding your user account to the Profile a single process policy. Then use Task Manager to re-examine Server1.

You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains an application server running Windows Server 2003.   Users report intermittent slow performance when they access the application server throughout the day. You find out that the network interface on the application server is being heavily used during the periods of slow performance. You suspect that a single computer is causing the problem.You need to create a plan to identify the problem computer.   What should you do?()A、 Monitor the performance monitor counters on the application server by using System Monitor.  B、 Monitor the network traffic on the application server by using Network Monitor.C、 Monitor network statistics on the application server by using Task Manager.D、 Run network diagnostics on the application server by using Network Diagnostics.

Your network consists of a single Active Directory domain. The domain contains a server named Server1. Server1 runs Windows Server 2003 Service Pack 2 (SP2).  You install Windows Support Tools on Server1. You need to view the IPSec settings applied to Server1.  What command should you run on Server1?()A、Netstat–r IPB、Netdiag/test:ipsecC、Sc query policyagentD、Netsh ipsec static show all

You are the administrator of a Windows Server 2003 computer named Server1. The network contains another Windows Server 2003 computer named Server2 that has the DNS and WINS services installed. Two hundred Windows 2000 Professional computers regularly connect to Server1 to access file and print resourcesAdministrators report that network traffic has increased and that response times for requests for network resources on Server1 have increased.   You need to identify whether Server1 is receiving requests for resources through NetBIOS broadcasts. What should you do?()A、Use Network Monitor to capture traffic between Server1 and all client computers.B、Use Network Monitor to capture traffic between Server1 and Server2.C、Monitor Event Viewer for Net Logon error or warning events.D、Run the tracert command on Server1.

You are a security administrator for your company. The network consists of a single Active Directory domain. All client computers run Windows XP Professional. All servers run Windows Server 2003. All computers on the network are members of the domain.    Traffic on the network is encrypted by IPSec. The domain contains a custom IPSec policy named Lan Security that applies to all computers in the domain. The Lan Security policy does not allow unsecured communication with non-lPSec-aware computers. The company’s written security policy states that the configuration of the domain and the configuration of the Lan Security policy must not be changed. The domain contains a multihomed server named Server1. Server1 isconnected to the company network, and Server1 is also connected to a test network. Currently, the Lan Security IPSec policy applies to network traffic on both network adapters in Server1. You need to configure Server1 so that it communicates on the test network without IPSec security. Server1 must still use the Lan Security policy when it communicates on the company network.  How should you configure Server1?()A、 Configure a packet filter for the network adapter on the test network to block the Internet Key Exchange (IKE) port.B、 Configure the network adapter on the test network to disable IEEE 802.1x authentication.C、 Configure the network adapter on the test network to enable TCP/IP filtering, and then permit all traffic.D、 Use the netsh command to assign a persistent IPSec policy that permits all traffic on the network adapter on the test.E、 Assign an IPSec policy in the local computer policy that permits all traffic on the network adapter on the test.

You are the network administrator for your company. Your network consists of a single Active Directory domain. All network servers run Windows Server 2003, and all client computers run Windows 2000 Professional. You install Windows Server 2003 with default settings on a new computer named Server1. You install and share several printers on Server1. You instruct all users to connect to these printers by using the address http://Server1/Printers. However, users report that they cannot connect to this address. You need to ensure that all users can connect to the printers by using HTTP. Which two actions should you perform?() (Each correct answer presents part of the solution. Choose two.)A、Publish all shared printers that are installed on Server1.B、Create a virtual directory named Printers on Server1.C、Install IIS with default settings on Server1.D、Reshare all printers on Server1.E、Install the Internet Printing component of IIS.F、Type Net Start W3SVC at a command prompt.

You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003.The network contains a Web server named Server1 that runs IIS 6.0 and hosts a secure Web site. The Web site is accessible from the intranet, as well as from the Internet. All users must authenticate when they connect to Server1. All users on the Internet must use a secure protocol to connect to the Web site. Users on the intranet do not need to use a secure protocol.You need verify that all users are using a secure protocol to connect to Server1 from the Internet.   What are two possible ways to achieve this goal?()A、Monitor the events in the application log on Server1.B、Monitor the events in the security log on Server1.C、Monitor the Web server connections on Server1 by using a performance log.D、Monitor network traffic to Server1 by using Network Monitor.E、Monitor the IIS logs on Server1.

单选题You are a network administrator for your company. The network contains a Windows Server 2003 computer named Server1. Server1 has a single CPU, 512 MB of RAM, and a single 100-Mb network adapter.   All network users’ home folders are stored on Server1. Users access their home folders by using a mapped network drive that connects to a shared folder on Server1.   After several weeks, users report that accessing home folders on Server1 is extremely slow at certain times during the day.   You need to identify the resource bottleneck that is causing the poor performance.   What should you do?  ()A Capture a counter log by using LogicalDisk, PhysicalDisk, Processor, Memory, and Network Interface performance objects, and view the log data information that is captured during periods of poor performance.B Configure Alerts on Server1 to log entries in the event logs for the LogicalDisk, PhysicalDisk, Processor, Memory, and Network Interface performance objects when the value of any object is more than 90.C Capture a trace log that captures Page faults, File details, Network TCP/IP, and Process creations/deletions events.D Implement auditing on the folder that contains the users’ home folders. Configure Network Monitor on Server1.

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All network servers run Windows Server 2003, and all client computers run Windows XP Professional. A user named Peter uses a client computer named Client1. This computer has a locally attached tape device. You grant Peter the necessary permissions to perform backups of a member server named Server1. Peter runs the Backup utility on Client1 to back up the files located on Server1. You need use your client computer to view the most recent backup logs for Server1. What should you do? ()AUse Notepad to view the contents of the backup report located on Server1.BUse Notepad to view the contents of the backup report located on Client1.CUse Event Viewer to view the contents of the application log located on Server1.DUse Event Viewer to view the contents of the application log located on Client1.

单选题You are the administrator of a Windows Server 2003 computer named Server1. The network contains another Windows Server 2003 computer named Server2 that has the DNS and WINS services installed. Two hundred Windows 2000 Professional computers regularly connect to Server1 to access file and print resourcesAdministrators report that network traffic has increased and that response times for requests for network resources on Server1 have increased.   You need to identify whether Server1 is receiving requests for resources through NetBIOS broadcasts. What should you do?()AUse Network Monitor to capture traffic between Server1 and all client computers.BUse Network Monitor to capture traffic between Server1 and Server2.CMonitor Event Viewer for Net Logon error or warning events.DRun the tracert command on Server1.

单选题You are the network administrator for your company. All network servers run Windows Server 2003. All client computers run Windows XP Professional. A member server named Server1 is located at a branch office that does not permit the use of Remote Desktop Protocol. Another administrator uses the Backup utility to create a scheduled backup job on Server1. The backup job performs a normal backup of an application server. The application server is removed from the network. You need to use a client computer to remove the backup job from Server1. You cannot travel to the branch office. What should you do?()AUse the RUNAS feature to run the at /delete command as the Server1/Administrator account.BLog on by using your Administrator account and run the ntbackup /D command.CLog on by using your Administrator account and run the schtasks /delete command.DUse the RUNAS feature to run the taskkill command as the Server1/Administrator account.

单选题You are the network administrator for your company. The network consists of a single Active Directory domain.  The domain contains a Windows Server 2003 computer named Server1 that is located in an organizational unit (OU) named Servers. Server1 contains confidential data, and all network communications with Server1 must be encrypted by using IPSec.   The default Client (Respond Only) IPSec policy is enabled in the Default Domain Policy Group Policy object (GPO). You create a new GPO and link it to the Servers OU. You configure the new GPO by creating and enabling a custom IPSec policy. You monitor and discover that network communications with Server1 are not being encrypted.  You need to view all IPSec policies that are being applied to Server1.   What should you do?  ()A Use Local Security Policy to view the Security Options for Server1.B Use Resultant Set of Policy (RSoP) to run an RSoP logging mode query to view the IP Security Policies on Local Computer for Server1.C Use Resultant Set of Policy (RSoP) to run an RSoP planning mode query to view the Security Options for Server1.D Use IP Security Monitor to view the Active Policy for Server1.E Use IP Security Monitor to view the IKE Policies for Server1.

单选题You are the network administrator for your company. All network servers run Windows Server 2003. All client computers run Windows XP Professional. A member server named Server1 is located at a branch office that does not permit the use of Remote Desktop Protocol. Another administrator uses the Backup utility to create a scheduled backup job on Server1. The backup job performs a normal backup of an application server. The application server is removed from the network. You need to use a client computer to remove the backup job from Server1. You cannot travel to the branch office. What should you do? ()AUse the RUNAS feature to run the at /delete command as the Server1/Administrator account.BLog on by using your Administrator account and run the ntbackup /D command.CLog on by using your Administrator account and run the schtasks /delete command.DUse the RUNAS feature to run the taskkill command as the Server1/Administrator account.