Your network contains a file server named Server1 that runs Windows Server 2008 R2.You have a folder named Folder1.You need to ensure that files in Folder1 that are older than 365 days are automatically moved to an archive folder. What should you create from the File Server Resource Manager console?()A、a file groupB、a file management taskC、a file screenD、a quota

Your network contains a file server named Server1 that runs Windows Server 2008 R2.You have a folder named Folder1.You need to ensure that files in Folder1 that are older than 365 days are automatically moved to an archive folder. What should you create from the File Server Resource Manager console?()

  • A、a file group
  • B、a file management task
  • C、a file screen
  • D、a quota

相关考题:

Your network contains an application server named Server1 that runs Windows Server 2003 Service Pack(SP2).You open the Performance tab in Task Manager as shown in the exhibit. (Click the Exhibit button.)You need to improve the performance of Server1.What should you do? ()A. Install additional RAM.B. Install a second processor.C. Decrease the size of the paging file.D. Add the /PAE switch to the Boot.ini file.

Your network contains a Distributed File System (DFS) target folder named Folder1 that contains 100 GB of data. You plan to create a new DFS replica of Folder1 on a server named Server2. You need to prestage the data in Folder1 on Server2. The solution must ensure that the amount of initial DFS replication traffic is minimized.Which tool should you use to prestage the Folder1 data?()A. DfscmdB. DfsrmigC. DfsutilD. Wbadmin

Your network contains the servers shown in the following table.Server name Server role Server location Server shareServer1 File server Office1 Data1Server2 File server Office2 Data2Office1 and Office2 connect to each other by using a WAN link. Users in Office2 frequently access the same set of files stored in Data1. You need to reduce the amount of file transfer traffic across the WAN link.What should you add to Server1?()A. the Background Intelligent Transfer Service (BITS) featureB. the BranchCache featureC. the BranchCache for network files role serviceD. the Distributed File System (DFS) role service

Your network contains a server that runs Windows Server 2008 R2.You need to enable access-based enumeration (ABE) on a shared folder.Which console should you use?() A. Disk ManagementB. File Server Resource ManagerC. Share and Storage ManagementD. Storage Explorer

You are a network administrator for Ezonexam.com's Windows 2000 network.Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers.Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Jack Bauer leaves the company. You grant her manager the Full Control NTFS permission to Jack's home folder. When the manager attempts to open any of the files, she receives the following error message: "Access is denied."What should you do?A.Use System File Checker (SFC) to decrypt the file.B.Log on the network as the Recovery Agent. Decrypt the files for the manager.C.Log on the network as the administrator. Use the cipher command to decrypt the files.D.Log on the network as a member of the Backup Operators group. Decrypt the files for the manager.

Your network contains an Active Directory forest. The forest schema contains a custom attribute  for user objects.     You need to give the human resources department a file that contains the last logon time and the  custom attribute values for each user in the forest.     Which should you use()A、the Dsquery toolB、the Export-CSV cmdletC、the Get-ADUser cmdletD、the Net.exe user command

As the administrator of your company’s network, you have implemented encryption for extra security of data on your network. A user moves an encrypted file from an NTFS partition on her Windows 2000 Workstation to an NTFS folder on a remote Windows 2000 Server. What effect will this have on the encrypted file?()A、The encrypted file will automatically be decrypted.B、Encrypted files and folders cannot be moved or copied, decrypt it first then move or copy thefile or folder.C、The encrypted file will remain encrypted in the Windows 2000 folder.D、The encrypted file will inherit the encryption state of the remote NTFS folder.

Your company has a main office and a branch office. Your network contains a single Active Directory domain. You install 25 Windows Server 2008 R2 member servers in the branch office. You need to  recommend a storage solution that meets the following requirements: èEncrypts all data on the hard disks   èAllows the operating system to start only when the authorized user is present What should you recommend?()A、Encrypting File System (EFS)B、File Server Resource Manager (FSRM)C、Windows BitLocker Drive Encryption (BitLocker)D、Windows System Resource Manager (WSRM)

Your network consists of a single Active Directory domain. The network contains a file server that runs Windows Server 2008 R2. All servers use internal storage only. You plan to deploy a client/server application.   You need to deploy the application so that it is available if a single server fails. You must achieve this goal  while minimizing costs. What should you do?()A、Deploy RemoteApp.B、Deploy a failover cluster that uses No Majority: Disk Only.C、Deploy a failover cluster that uses Node and File Share Disk Majority.D、Deploy Distributed File System (DFS) and configure replication.

Your network contains a server that runs Windows Server 2008 R2.You need to enable access-based enumeration (ABE) on a shared folder.Which console should you use?()A、Disk ManagementB、File Server Resource ManagerC、Share and Storage ManagementD、Storage Explorer

Your company has a main office and a branch office. Your network contains a single Active Directory domain. The functional level of the domain is Windows Server 2008 R2. An Active Directory site exists for each office. All servers run Windows Server 2008 R2. You plan to deploy file servers in each office.   You need to design a file sharing strategy to meet the following requirements: èUsers in bothoffices must be able to access the same files.   èUsers in both offices must use the same Universal Naming Convention (UNC) path to access files.   èThe design must reduce the amount of bandwidth used to access files. èUsers must be able to access files even if a server fails. What should you include in your design?()A、A stand-alone DFS namespace that uses replication.B、A domain-based DFS namespace that uses replication.C、A multi-site failover cluster that contains a server located in the main office and another server located in the branch office.D、A Network Load Balancing cluster that contains a server located in the main office and another server  located in the branch office.

Your network contains one Active Directory domain. All domain controllers run Windows Server 2003 Service Pack 2 (SP2). You have a comma delimited file that contains information for 2,000 new employees. You need to create 2,000 new user accounts by using the information in the file. You must achieve this goal by using the minimum amount of administrative effort. Which tool should you use? ()A、Csvde.exeB、Dsmod.exeC、ldifde.exeD、Ntdsutil.exe

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2. You need to create 3-TB virtual hard disk (VHD) on Server1. Which tool should you use?()A、File Server Resource Manager (FSRM)B、New-StoragePoolC、DiskpartD、Share and Storage Management

单选题Your network contains one Active Directory domain. All domain controllers run Windows Server 2003 Service Pack 2 (SP2). You have a comma delimited file that contains information for 2,000 new employees. You need to create 2,000 new user accounts by using the information in the file. You must achieve this goal by using the minimum amount of administrative effort. Which tool should you use? ()ACsvde.exeBDsmod.exeCldifde.exeDNtdsutil.exe

单选题Your network contains a file server named Server1 that runs Windows Server 2008 R2. Server1 has a volume named E.From the File Server Resource Manager console, you create a new quota for volume E. The quota is derived from the 100 MB limit quota template.You need to prevent users from storing audio and video files on volume E. What should you do?()ACreate a file screen.BCreate a file management task.CModify the properties of the quota.DModify the properties of the Audio and Video Files file group.

单选题Your network consists of a single Active Directory domain. The network contains 20 file servers that run Windows Server 2008 R2. Each file server contains two volumes. One volume contains the operating system. The other volume contains all data files.    You need to plan a recovery strategy that meets the following requirements: èAllows the operating system to be restored èAllows the data files to be restored èEnsures business continuity   èMinimizes the amount of time to restore the server What should you include in your plan?()AWindows Deployment Services (WDS)BWindows Automated Installation Kit (Windows AIK) and folder redirectionCthe Multipath I/O feature and Volume Shadow CopiesDthe Windows Server Backup feature and System Image Recovery

单选题Your network consists of a single Active Directory domain. The domain contains a file server named Server1 that runs Windows Server 2008 R2. The file server contains a shared folder named UserDocs.   Each user has a subfolder in UserDocs that they use to store personal data.You need to design a data management solution that meets the following requirements: èLimits the storage space that is available to each user in UserDocs   èSends a notification to the administrator if a users attempts to save multimedia files in UserDocs èMinimizes administrative effort   What should you include in your design?()AConfigure NTFS quotas on UserDocs. Configure a task in Event Viewer to send an e-mail notification.BConfigure NTFS quotas on UserDocs. Schedule a script to monitor the contents of UserDocs and send an e-mail notification if a multimedia file is found.CInstall the File Server Resource Manager (FSRM) role service on Server1. Configure event  subscriptions.DInstall the File Server Resource Manager (FSRM) role service on Server1. Configure hard quotas and  file screening.

单选题Your network contains a file server that runs Windows Server 2008 R2. The server has File Server Resource Manager (FSRM) installed.A file screen is created for a folder named Data. Data is located on the C drive. The file screen is configured to block files contained in the Audio and Video file group.You need to allow users in the sales department to upload video files to C:/Data/Sales. What should you do?()ACreate a file screen exception.BModify the Audio and Video file group.CImplement an active file screen on C:/Data/Sales.DImplement a passive file screen on C:/Data/Sales.

单选题You are the network administrator for . The network consists of a single Active Directory domain. All domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. TestKing acquires a subsidiary. You receive a comma delimited file that contains the names of all user accounts at the subsidiary. You need to import these accounts into your domain. Which command should you use?()AldifdeBcsvdeCntdsutil with the authoritative restore optionDdsadd user

单选题Your network contains an Active Directory forest. The forest schema contains a custom attribute for  user objects.   You need to give the human resources department a file that contains the last logon time and the custom  attribute values for each user in the forest.   What should you use()Athe Dsquery toolBthe Export-CSV cmdletCthe Get-ADUser cmdletDthe Net.exe user command

单选题You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()AUse Windows Explorer to receive the offline filesBUsing the Windows Explorer, disable the cache for the reports on the network shareCUse the Windows NT explorer to grant the special access for the reports on the network  shareDUse the synchronization manager to configure synchronization not to occur when users are  connected to the LAN connection.

单选题After a merger with another small business, your company has inherited a legacy WAR file but the originalsource files were lost. After reading the documentation of that web application,you discover that the WARfile contains a useful tag library that you want to reuse in your own webapp packaged as a WAR file. What do you need to do to reuse this tag library?()ASimply rename the legacy WAR file as a JAR file and place it in your webapp’s library directory.BUnpack the legacy WAR file, move the TLD file to the META-INF directory, repackage the whole thingas a JAR file, and place that JAR file in your webapp’s library directory.CUnpack the legacy WAR file, move the TLD file to the META-INF directory, move the class files to thetop-level directory, repackage the whole thing as a JAR file, and place that JAR file in your webapp’slibrary directory.DUnpack the legacy WAR file, move the TLD file to the META-INF directory, move the class files to thetop-level directory, repackage the WAR, and place that WAR file in your webapp’s WEB-INF directory.

单选题Your network contains a Distributed File System (DFS) target folder named Folder1 that contains 100 GB of data. You plan to create a new DFS replica of Folder1 on a server named Server2. You need to prestage the data in Folder1 on Server2. The solution must ensure that the amount of initial DFS replication traffic is minimized. Which tool should you use to prestage the Folder1 data?()ADfscmdBDfsrmigCDfsutilDWbadmin

单选题Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers. Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Tess King leaves the company. You grant her manager the Full Control NTFS permission to Tess's home folder. When the manager attempts to open any of the files, she receives the follo wing error message: "Access is denied." What should you do?()AUse System File Checker (SFC) to decrypt the file.BLog on the network as the Recovery Agent. Decrypt the files for the manager.CLog on the network as the administrator. Use theciphercommand to decrypt the files.DLog on the network as a member of the Backup Operators group. Decrypt the files for the manager.

单选题Your network contains an Active Directory domain. The domain contains 1000 user accounts.  You have a list that contains the mobile phone number of each user  You need to add the mobile number of each user to Active Directory.     What should you do()ACreate a file that contains the mobile phone numbers, and then run ldifde.exeBCreate a fila that contains the mobile phone numbers, and then run csvde.exeCFrom Adsiedit, select the CN=Users container, and then mofify the properties of the container.DFrom Active Directory Users and Computers, select all of the users, and then modify the properties of the users.

单选题Your network contains a file server named Server1 that runs Windows Server 2008 R2.You have a folder named Folder1.You need to ensure that files in Folder1 that are older than 365 days are automatically moved to an archive folder. What should you create from the File Server Resource Manager console?()Aa file groupBa file management taskCa file screenDa quota

单选题You are the network administrator for your company. All network servers run Windows Server 2003.The network includes a file server named File1. File1 contains a single disk for system files and two SCSIhard disks that comprise a 72-GB mirrored volume with 65 GB of read-only data. Users connect to thisdata by using shortcuts on their desktops.File1 is scheduled for replacement. You have a scheduled maintenance window to complete this task.Before the maintenance window, you build a new server.You need to bring the new server online with current data and re-establish redundancy as quickly aspossible. You must also ensure that the desktop shortcuts will continue to function.What should you do? ()AName the new server File2. Create a new mirrored volume by using two 72-GB disks. Connect File2 to the network and copy the data from File1. When copying is complete, shut down the old File1.BName the new server File1. Move both disks from the old File1 to the new File1. Scan the disks for changes. Import the disks. Connect the new File1 to the network.CName the new server File1. Break the mirror on the old File1. Move one of the disks from the old File1 to the new File1. Scan the disk for changes. Initialize the disk. Select the spare disk and create the mirror. Connect the new File1 to the network.DName the new server File1. Remove one of the disks in the mirror from the old File1. Move the disk to the new File1. Scan the disk for changes. Import the disk. Shut down the old File1 and connect the new File1 to the network.