Your network contains a database server that runs Windows Server 2003 Standard Edition Service Pack 2 (SP2). The server has 1 GB of RAM and a single hard disk. Queries against the databases on the server are very slow. You discover that the hard disk on the server is very active. You are evaluating whether to add RAM to the server. You need to use System Monitor to find out whether adding RAM will decrease disk activity. Which performance counter should you monitor? ()A、LogicalDisk : % Free SpaceB、Memory : Pages Faults/secC、Memory : Free System Page Table EntriesD、Server Work Queues : Queue Length
Your network contains a database server that runs Windows Server 2003 Standard Edition Service Pack 2 (SP2). The server has 1 GB of RAM and a single hard disk. Queries against the databases on the server are very slow. You discover that the hard disk on the server is very active. You are evaluating whether to add RAM to the server. You need to use System Monitor to find out whether adding RAM will decrease disk activity. Which performance counter should you monitor? ()
- A、LogicalDisk : % Free Space
- B、Memory : Pages Faults/sec
- C、Memory : Free System Page Table Entries
- D、Server Work Queues : Queue Length
相关考题:
Your network contains a Network Policy Server (NPS) named Server1.NPS1 provides authentication for all of the VPN servers on the network.You need to track the usage information of all VPN connections.Which RADIUS attribute should you log?()A. Acct-Session-IdB. Acct-Status-TypeC. ClassD. NAS-Identifier
Your network contains an Active Directory forest. The forest schema contains a custom attribute for user objects. You need to give the human resources department a file that contains the last logon time and the custom attribute values for each user in the forest. Which should you use()A、the Dsquery toolB、the Export-CSV cmdletC、the Get-ADUser cmdletD、the Net.exe user command
Your network contains an internal network and a perimeter network that are separated by a firewall. The perimeter network contains an Exchange Server 2010 Edge Transport server. You plan to deploy an internal Exchange Server 2010 organization that meets the following requirements:.Support EdgeSync synchronization .Support encrypted delivery of outbound e-mail messages to the Edge Transport server .Minimize the attack surface of the internal network Which TCP ports should you allow from the internal network to the perimeter network?()A、3389 and 25B、3389 and 636C、50636 and 25D、50636 and 135
Your network contains an Active Directory forest. The forest contains a single domain. You want to access resources in a domain that is located in another forest. You need to configure a trust between the domain in your forest and the domain in the other forest. What should you create()A、an incoming external trustB、an incoming realm trustC、an outgoing external trustD、an outgoing realm trust
Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest. The forest contains a single domain. You plan to deploy 10 Edge Transport servers on the perimeter network. You need to recommend a solution for the Edge Transport server deployment. The solution must meet the following requirements: .Allow administrators to apply a single security policy to all Edge Transport servers .Reduce the administrative overhead that is required to manage servers .Minimize the attack surface of the internal network What should you recommend?()A、Implement Network Policy and Access Services (NPAS).B、Implement Active Directory Federation Services (AD FS).C、Create a new Active Directory domain in the internal forest, and then join all Edge Transport servers to the new domain.D、Create an Active Directory forest in the perimeter network, and then join all Edge Transport servers to the new domain.
Your network contains a single Active Directory domain named contoso.com.The domain contains a DNS server named Server1 that hosts the contoso.com zone.The network is connected to the network of a partner company. The partner companys network contains a DNS server that hosts a zone named nwtraders.com.You need to ensure that computers in contoso.com can resolve the names of computers in nwtraders.com.The solution must not require any changes to the zone configuration of nwtraders.com.What should you configure on Server1?()A、a conditional forwarderB、a GlobalNames zoneC、a secondary zoneD、a zone delegation
Your network contains an Active Directory domain that has two sites. You need to identify whether logon scripts are replicated to all domain controllers. Which folder should you verify()A、GroupPolicyB、NTDSC、SoftwareDistributionD、SYSVOL
Your network contains an Active Directory forest. The forest schema contains a custom attribute for user objects. You need to modify the custom attribute value of 500 user accounts. Which tool should you use()A、CsvdeB、DsmodC、DsrmD、Ldifde
You are the network administrator for ExamSheet.net. You install Windows 2000 Professional on your portable computer. You use a docking station for your portable computer when you are in the office. You install a ISA-based network adapter in your docking station. You insert your computer into the docking station and start the computer. The network adapter is not detected during the startup process. You obtain a disk that contains the supported driver from the network adapter manufacturer. You want to allow Windows 2000 Professional to use the network adapter. What should you do?()A、Restart the computer in the docking station.B、Run the Add/Remove Hardware wizard.C、Use Device Manager to scan for hardware changes.D、Copy the network adapter driver to the Winnt/Driver Cache/i386 folder.E、Install the new network adapter driver.
Your network contains a Network Policy Server (NPS) named Server1.NPS1 provides authentication for all of the VPN servers on the network.You need to track the usage information of all VPN connections.Which RADIUS attribute should you log?()A、Acct-Session-IdB、Acct-Status-TypeC、ClassD、NAS-Identifier
You work as the Exchange administrator at Company.com.The Company.com network contains an Exchange Server 2010 Organization.You are responsible for managing the Exchange network for Company.com.The network contains numerous Mailbox servers.During the course of the week you receive an instruction from the CIO to determine the message latency between the Mailbox servers in the organization.What should you do?()A、Your best option would be to increase the MSExchangeMailSubmission diagnostic logging level to Expert.B、Your best option would be to run the Test-Mailflow cmdlet.C、Your best option would be to increase the MSExchangeTransport diagnostic logging level to Expert.D、Your best option would be to run the Test-OutlookConnectivity cmdlet.
Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest. The forest contains a single domain. You plan to deploy 10 Edge Transport servers on the perimeter network. You need to recommend a solution for the Edge Transport server deployment. The solution must meet the following requirements: .Allow administrators to apply a single security policy to all Edge Transport servers .Reduce the administrative overhead that is required to manage servers .Minimize the attack surface of the internal network What should you recommend?()A、Implement Network Policy and Access Services (NPAS).B、Implement Active Directory Federation Services (AD FS).C、Create a new Active Directory domain in the internal forest, and then join all EdgeTransport servers to the new domain.D、Create an Active Directory forest in the perimeter network, and then join all Edge Transport servers to the new domain.
Your network contains two Hyper-V hosts that run Windows Server 2012 R2. The Hyper-V hosts contains several virtual machines that run Windows Server 2012 R2. You install the Network Load Balancing feature on the virtual machines. You need to configure the virtual machines to support Network Load Balancing (NLB). Which virtual machine settings should you configure?()A、Port mirroringB、DHCP guardC、Router guardD、MAC address
单选题Your network consists of a single Active Directory domain. The network contains 20 file servers that run Windows Server 2008 R2. Each file server contains two volumes. One volume contains the operating system. The other volume contains all data files. You need to plan a recovery strategy that meets the following requirements: èAllows the operating system to be restored èAllows the data files to be restored èEnsures business continuity èMinimizes the amount of time to restore the server What should you include in your plan?()AWindows Deployment Services (WDS)BWindows Automated Installation Kit (Windows AIK) and folder redirectionCthe Multipath I/O feature and Volume Shadow CopiesDthe Windows Server Backup feature and System Image Recovery
单选题Your network contains an Active Directory forest. The forest contains a single domain. You want to access resources in a domain that is located in another forest. You need to configure a trust between the domain in your forest and the domain in the other forest. What should you create()Aan incoming external trustBan incoming realm trustCan outgoing external trustDan outgoing realm trust
单选题Your network contains an internal network and a perimeter network that are separated by a firewall. The perimeter network contains an Exchange Server 2010 Edge Transport server. You plan to deploy an internal Exchange Server 2010 organization that meets the following requirements:.Support EdgeSync synchronization .Support encrypted delivery of outbound e-mail messages to the Edge Transport server .Minimize the attack surface of the internal network Which TCP ports should you allow from the internal network to the perimeter network?()A3389 and 25B3389 and 636C50636 and 25D50636 and 135
单选题Your network contains a Network Policy Server (NPS) named Server1.NPS1 provides authentication for all of the VPN servers on the network.You need to track the usage information of all VPN connections.Which RADIUS attribute should you log?()AAcct-Session-IdBAcct-Status-TypeCClassDNAS-Identifier
单选题You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()AUse Windows Explorer to receive the offline filesBUsing the Windows Explorer, disable the cache for the reports on the network shareCUse the Windows NT explorer to grant the special access for the reports on the network shareDUse the synchronization manager to configure synchronization not to occur when users are connected to the LAN connection.
单选题Your network contains a server that has the SNMP Service installed.You need to configure the SNMP security settings on the server.Which tool should you use?()ALocal Security PolicyBScwCSeceditDServices console
单选题Your network contains a single Active Directory domain named contoso.com.The domain contains a DNS server named Server1 that hosts the contoso.com zone.The network is connected to the network of a partner company. The partner companys network contains a DNS server that hosts a zone named nwtraders.com.You need to ensure that computers in contoso.com can resolve the names of computers in nwtraders.com.The solution must not require any changes to the zone configuration of nwtraders.com.What should you configure on Server1?()Aa conditional forwarderBa GlobalNames zoneCa secondary zoneDa zone delegation
单选题Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. You create a new inbound rule by using Windows Firewall with Advanced Security. You need to configure the rule to allow Server1 to accept unsolicited inbound packets that are received through a network address translation (NAT) device on the network. Which setting in the rule should you configure?()AEdge traversalBAuthorized computersCInterface typesDRemote IP address