Your network contains a Windows Server Update Services (WSUS) server. All computers on the network are configured to download and install updates once a week.You need to deploy a critical update to a WSUS client as soon as possible. Which command should you run?()A、dism.exe /online /check-apppatchB、gpupdate.exe /forceC、secedit.exe /refreshpolicyD、wuauclt.exe /detectnow
Your network contains a Windows Server Update Services (WSUS) server. All computers on the network are configured to download and install updates once a week.You need to deploy a critical update to a WSUS client as soon as possible. Which command should you run?()
- A、dism.exe /online /check-apppatch
- B、gpupdate.exe /force
- C、secedit.exe /refreshpolicy
- D、wuauclt.exe /detectnow
相关考题:
Your network contains 100 servers that run Windows Server 2008 R2.A server named Server1 is deployed on the network. Server1 will be used to collect events from the Security event logs of the other servers on the network.You need to define the Custom Event Delivery Optimization settings on Server1.Which tool should you use?()A、Event ViewerB、Task SchedulerC、WecutilD、Wevtutil
You are a network administrator for your company. All domain controllers run Windows Server 2003. The network contains 50 Windows 98 client computers, 300 Windows 2000 Professional computers, and 150 Windows XP Professional computers. According to the network design specification, the Kerberos version 5 authentication protocol must be used for all client computers on the internal network. You need to ensure that Kerberos version 5 authentication is used for all client computers on the internal network. What should you do? ()A、 On each domain controller, disable Server Message Block (SMB) signing and encryption of the secure channel traffic.B、 Replace all Windows 98 computers with new Windows XP Professional computers.C、 Install the Active Directory Client Extensions software on the Windows 98 computers.D、 Upgrade all Windows 98 computers to Windows NT Workstation 4.0.
Your network contains a server that runs Windows Server 2008 R2.You plan to create a custom script.You need to ensure that each time the script runs, an entry is added to the Application event log.Which tool should you use?()A、EventcreateB、EventvwrC、WecutilD、Wevtutil
Your network contains an Active Directory domain that contains five domain controllers. You have a management computer that runs Windows 7. From the Windows 7 computer, you need to view all account logon failures that occur in the domain. The information must be consolidated on one list. Which command should you run on each domain controller()A、Wecutil.exe qcB、Wevtutil.exe gliC、Winrm.exe quickconfigD、Winrshost.exe
Your network contains a server that runs Windows Server 2008 R2.You need to enable access-based enumeration (ABE) on a shared folder.Which console should you use?()A、Disk ManagementB、File Server Resource ManagerC、Share and Storage ManagementD、Storage Explorer
You are the network administrator for ExamSheet.net. You install Windows 2000 Professional on your portable computer. You use a docking station for your portable computer when you are in the office. You install a ISA-based network adapter in your docking station. You insert your computer into the docking station and start the computer. The network adapter is not detected during the startup process. You obtain a disk that contains the supported driver from the network adapter manufacturer. You want to allow Windows 2000 Professional to use the network adapter. What should you do?()A、Restart the computer in the docking station.B、Run the Add/Remove Hardware wizard.C、Use Device Manager to scan for hardware changes.D、Copy the network adapter driver to the Winnt/Driver Cache/i386 folder.E、Install the new network adapter driver.
You have a computer that runs Windows 7. Your network contains a VPN server that runs Windows Server2008. You need to authenticate to the VPN server by using a smart card. Which authentication settingshould you choose?()A、CHAPB、EAPC、MS-CHAP v2D、P.AP
Your network contains a computer named Computer1 that runs Windows 7.You need to verify if Computer1 has active DirectAccess connections to the network.What should you do?()A、From Network Connections, right-click the active network connection, and then click Status.B、From Network Connections, select the active network connection, and then click Diagnose this connection.C、From Windows Firewall with Advanced Security, click Monitoring, and then click Connection Security Rules.D、From Windows Firewall with Advanced Security, click Monitoring, click Security Associations, and then click Main Mode.
Your network contains two servers that run the Server Core installation of Windows Server 2008 R2. The two servers are part of a Network Load Balancing cluster. The cluster hosts a Web site. Administrators use client computers that run Windows 7. You need to recommend a strategy that allows the administrators to remotely manage the Network Load Balancing cluster. Your strategy must support automation. What should you recommend?()A、On the servers, enable Windows Remote Management (WinRM).B、On the servers, add the administrators to the Remote Desktop Users group.C、On the Windows 7 client computers,enable Windows Remote Management (WinRM).D、On the Windows 7 client computers,add the administrators to the Remote Desktop Users group.
Your network contains a DNS server named DNS1 that runs Windows Server 2008 R2.You need to ensure that DNS1 only responds to DNS queries from computers that are located in the same subnet.What should you configure?()A、Interfaces from DNS ManagerB、Security from DNS ManagerC、Trust AnchorsD、Windows Firewall
Your network contains a server that runs Windows Server 2008 R2.You need to create a script to identify known configuration issues. What should you include in the script?() A、the Get-BPAModel cmdletB、the Invoke-BPAModel cmdletC、the Mrinfo toolD、the Systeminfo tool
Your network contains 200 servers that run Windows Server 2008 R2. You need to archive the Security log for each server on a daily basis. Which tool should you use?()A、NetshB、SeceditC、WecutilD、Wevtutil
Your network contains two Hyper-V hosts that run Windows Server 2012 R2. The Hyper-V hosts contains several virtual machines that run Windows Server 2012 R2. You install the Network Load Balancing feature on the virtual machines. You need to configure the virtual machines to support Network Load Balancing (NLB). Which virtual machine settings should you configure?()A、Port mirroringB、DHCP guardC、Router guardD、MAC address
Your network consists of a single Active Directory domain. The network contains 20 file servers that run Windows Server 2008 R2. Each file server contains two volumes. One volume contains the operating system. The other volume contains all data files. You need to plan a recovery strategy that meets the following requirements: èAllows the operating system to be restored èAllows the data files to be restored èEnsures business continuity èMinimizes the amount of time to restore the server What should you include in your plan?()A、Windows Deployment Services (WDS)B、Windows Automated Installation Kit (Windows AIK) and folder redirectionC、the Multipath I/O feature and Volume Shadow CopiesD、the Windows Server Backup feature and System Image Recovery
单选题Your network contains a domain controller that runs Windows Server 2008 R2. You need to change the location of the Active Directory log files. Which tool should you use()ADsamainBDsmgmtCDsmoveDNtdsutil
单选题Your network consists of a single Active Directory domain. The network contains 20 file servers that run Windows Server 2008 R2. Each file server contains two volumes. One volume contains the operating system. The other volume contains all data files. You need to plan a recovery strategy that meets the following requirements: èAllows the operating system to be restored èAllows the data files to be restored èEnsures business continuity èMinimizes the amount of time to restore the server What should you include in your plan?()AWindows Deployment Services (WDS)BWindows Automated Installation Kit (Windows AIK) and folder redirectionCthe Multipath I/O feature and Volume Shadow CopiesDthe Windows Server Backup feature and System Image Recovery
单选题You are the network administrator for The network contains a Windows Server 2003 computer named Print1 that functions as a print server. Print1 contains a printer named MarketingPrinter. Users report that print jobs they submit to the MarketingPrinter take a long time to print. You immediately examine Print1 and conclude that the server is performing at acceptable levels. You need to identify the problem. What should your next step be?()AUse Task Manager to monitor processor and memory performance.BUse Windows Explorer to monitor the size of the Windows/System32/Spool/prtprocs folder.CUse System Monitor to view the Print Queue/Jobs counter.DUse System Monitor to view the Print Queue/Enumerate Network Printer Calls couner.
单选题You are the network administrator for . The network consists of a single Active Directory domain. All domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. TestKing acquires a subsidiary. You receive a comma delimited file that contains the names of all user accounts at the subsidiary. You need to import these accounts into your domain. Which command should you use?()AldifdeBcsvdeCntdsutil with the authoritative restore optionDdsadd user
单选题You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()AUse Windows Explorer to receive the offline filesBUsing the Windows Explorer, disable the cache for the reports on the network shareCUse the Windows NT explorer to grant the special access for the reports on the network shareDUse the synchronization manager to configure synchronization not to occur when users are connected to the LAN connection.
单选题You are a network administrator for your company. The network contains a Windows Server 2003 computer named Print1 that functions as a print server. Print1 contains a printer named MarketingPrinter. Users report that print jobs they submit to the MarketingPrinter take a long time to print. You immediately examine Print1 and conclude that the server is performing at acceptable levels. You need to identify the problem. What should your next step be? ()AUse Task Manager to monitor processor and memory performance.BUse Windows Explorer to monitor the size of the Windows/System32/Spool/prtprocs folder.CUse System Monitor to view the Print Queue/Jobs counter.DUse System Monitor to view the Print Queue/Enumerate Network Printer Calls counter.
单选题Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. You create a new inbound rule by using Windows Firewall with Advanced Security. You need to configure the rule to allow Server1 to accept unsolicited inbound packets that are received through a network address translation (NAT) device on the network. Which setting in the rule should you configure?()AEdge traversalBAuthorized computersCInterface typesDRemote IP address