You are the administrator of a Windows Server 2003 computer named Server1. Newly hired employees recently started storing files on Server1. Now users report that Server1 is responding much slower than it did before the additional users were added. You suspect the disk subsystem needs to be upgraded to accommodate the additional user load. You need to confirm whether the disk subsystem on Server1 needs to be upgraded. What should you do?()A、Configure a Performance Logs and Alerts alert on the %Free Space counter.B、Use Device Manager to populate volume settings and examine the properties of the disk drives on Server1C、Use Event Viewer to examine the system logs and search the system logs for events generated by the disk event source.D、Use System Monitor to monitor counters based on the PhysicalDisk object.

You are the administrator of a Windows Server 2003 computer named Server1. Newly hired employees recently started storing files on Server1. Now users report that Server1 is responding much slower than it did before the additional users were added. You suspect the disk subsystem needs to be upgraded to accommodate the additional user load. You need to confirm whether the disk subsystem on Server1 needs to be upgraded. What should you do?()

  • A、Configure a Performance Logs and Alerts alert on the %Free Space counter.
  • B、Use Device Manager to populate volume settings and examine the properties of the disk drives on Server1
  • C、Use Event Viewer to examine the system logs and search the system logs for events generated by the disk event source.
  • D、Use System Monitor to monitor counters based on the PhysicalDisk object.

相关考题:

You are an administrator of Ezonexam.com's network. You want to perform. routine upgrades on your Windows 2000 Server computer. You use your non-administrator user account in the domain to logon to the server.You want to upgrade all of the critical system files and patches on the server in the shortest possible time.What should you do?A.Use Windows Update.B.Run System File Checker.C.Log on as administrator and run Windows Update.D.Log on as administrator and run System File Checker.

You install Windows Vista on a new computer by using the default settings. You create an administrator account and a standard user account.You log on to the computer as the standard user and attempt to install a new application. You are prompted for user credentials to complete the installation.You need to install the application on the computer.What should you do?()A.AB.BC.CD.D

You use two user accounts for your computer: standard user and administrator. You log on to your computer as standard user but are unable to make advanced configuration changes. You need to make advanced configuration changes while you are logged on as a standard user.What should you do?()A.AB.BC.CD.D

You have a stand-alone server that runs Windows Server 2003 Service Pack 2 (SP2).You attempt to log on to the server by using the Administrator account and receive the following error message.You need to log on to the server by using the Administrator account.What should you do first? ()A. Restart the server in Safe mode.B. Restart the server by using the Last Known Good Configuration option.C. Log on to another stand-alone server as an Administrator.D. Log on to the server by using an account that is a member of the Power Users group.

You are the network administrator at TestKing. You need to perform password recovery on Router TK1. What must you modify in the password recovery process?() A. Configuration registerB. NVRAMC. Boot flashD. CMOSE. Flash

You are the network administrator at TestKing. You need to perform password recovery on Router TK1. What must you modify in the password recovery process?()A、Configuration registerB、NVRAMC、Boot flashD、CMOSE、Flash

You are working as an administrator at TestKing, and you need to set the bandwidth of your routers serial port to 56K. Which of the following commands would you use?()A、Bandwidth 56000B、Bandwidth 56000000C、Bandwidth 56D、Bandwidth 56kbps

You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()A、RepeaterB、Wireless routerC、HubD、Wireless network adapter

Your network contains a single Active Directory domain. All servers on the network are members of the domain. You have a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). Server1 has two NTFS partitions. You create and share a folder named Data in the root of a partition on Server1. You log on to your computer by using the domain Administrator account and discover that you cannot modify files in the Data share. You need to ensure that the Administrator can modify files in the Data share. The solution must use the minimum amount of permissions. What should you do? ()A、Modify the NTFS permissions on the Data folder.B、Modify the share permissions on the Data share.C、Add the domain administrator to the local Administrator’s group on Server1.D、Move the Data folder to a new file allocation table (FAT) partition. Share the folder by using the default permissions.

You are the Exchange administrator for the Xxx Corporation’s Exchange 2010 organization.You want to test connectivity for Outlook Anywhere through the Autodiscover service.What should you use to test it?()A、Mail Flow TroubleshooterB、The Test-OutlookConnectivity cmdletC、Message TrackingD、Performance Troubleshooter

You deploy a Microsoft Exchange mobile messaging solution that uses Microsoft Windows Mobile 5.0 with Microsoft Messaging and Security Feature Pack.   The messaging infrastructure is configured to support the remote wipe feature.   When an administrator attempts to perform a remote wipe of a Windows Mobilebased device, the administrator receives a 401 error message.   You need to ensure that the administrator is authorized to perform remote wipes only.   What should you do?()A、Grant the administrator membership in the Domain Administrators group.B、Grant the administrator membership in the Exchange Administrators group.C、Add the new administrator account to the Discretionary Access Control List (DACL) of the Microsoft Exchange ActiveSync Administration folder.D、Select the Directory Security tab of the Exchange Server administration Web site, and then configure Read, Write, and Directory Browsing permissions.

You have an Exchange Server 2010 organization.  You plan to delegate Exchange administrative rights to some users in the organization.  You need to recommend a solution that tracks all changes made to the Exchange organization.  What should you include in the solution?()A、administrator audit loggingB、circular loggingC、diagnostic loggingD、Windows Security Auditing

You are a network administrator of an organization. Maria and John are your network assistant. You have grant then the rights to modify the user properties in the computer management. You want to audit the modification in user accounts. What should you do?()A、Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.B、Turn on auditing for objects in the Local Security Policy and Select 'Object Access'. C、Use Windows Explorer to turn on auditing for the specific files.D、Have the administrator for domains log you on as an administrator and enable auditing for a  specific file.E、Turn on auditing for objects in the Local Security Policy and Select 'Account Management'.F、Allow only one account at a time to log on to your shared folder. Check the event viewer to  see who logged on.

You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution. The Xxx contains an Exchange Server 2010 Mailbox server named XXX- EX02.What actions must you take to check when last employees logged on to XXX- EX02?()A、You must configure real time block lists (RBLs).B、You must use the Exchange Server User Monitor (ExMon).C、You must use the Get-MailboxStatistics.D、You must use the administrator audit logging.

You are developing a Web application. The Web application restricts access to an administrative page. The Web application uses the following code segment to protect the page.if (Page.User.Identity.Name != @"CONTOSO/Administrator") { the page, you are redirected to Login.aspx. You discover that the User.Identity.Name property is not being correctly populated. You need to ensure that you can access the page when you are logged on as Administrator. Which two actions should you perform? ()A、In the Web.config file, enable impersonation.B、In IIS, enable anonymous access.C、In IIS, disable anonymous access.D、In the Web.config file, set the authentication mode to Windows.

You are a network administrator for ExamSheet.net's Windows 2000 network.  You use a user account named User1 to log on tot a Windows 2000 Professional computer. The computer is used by different students in a classroom. User1 does not have administrative rights. However, you prefer to use this account for your daily activities. Using the Task Scheduler you schedule a task to run a command file named AddUsers.cmd that automatically adds six more student user accounts. You configure the task to run as the administrator account.  After the task was scheduled to have run you open the Task Scheduler and discover a status of "Could not start" for the task. You also discover account logon failure audit events in the computer's Security log.You want the scheduled task to successfully run AddUsers.cmd. You want to accomplish this with the least amount of administrative effort.  What should you do?()A、Schedule the task using theATcommand.B、Reenter the password for the administrator account using the Task Scheduler.C、Log on with an administrative account and reschedule the task.D、Log on by using the local Administrator account. Then schedule the task to run under User1.

You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .What actions must you take to use administrative delegation on a series of cmdlets?()A、You must implement log transactionsB、You must set up new management roleC、You must implement Mailbox journalingD、You must set up a Role Based Access Control (RBAC) role

You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as a database administrator for your company. You utilize the SP:Recompile event class to run SQL Server Profiler. You find that a great amount of recompiles occurring. The possible causes of the large number of recompiles should be identified.  From the flowing four options, which one is the most possible cause of the problem?()A、The sp_executesql batches are not being recovered from the procedure cache.B、A database administrator executed UPDATE STATISTICS statements on all tables, and the most common stored procedures reference all the tables.C、One new stored procedure is created by a database administrator.D、Ad hoc batches are not being recovered from the procedure cache.

多选题You are the network administrator at TestKing. You need to perform password recovery on Router TK1. What must you modify in the password recovery process?()AConfiguration registerBNVRAMCBoot flashDCMOSEFlash

单选题While selecting files during an interactive restore with ufsrestore, you are interrupted by a junior  administrator before you can complete the file selection process and start the restore. After answering the administrator’s question, you realize that you have forgotten which files you had already selected for the restore.  How can you determine which files are already marked for extraction and restore? ()A You can use the ls subcommand of ufsrestore.B You can use the add subcommand of ufsrestore.C You can use the select subcommand of ufsrestore.D You can view the selected files as they are marked with a plus sign (+) in the list that is permanently displayed in the upper half of the interactive ufsrestore screen view.

单选题You set up scheduled tasks to run and notify you of any failures. 3 days later you see that none of the tasks ran and you received no notifications. What should you do?()ASet the schedule service to run under the administrator account.BSet the scheduled tasks to run under the administrator account.CEnable the messenger serviceDSet the schedule service to run under the local system account and set it to start automatically.

多选题You are developing a Web application. The Web application restricts access to an administrative page. The Web application uses the following code segment to protect the page.If Page.User.Identity.Name "CONTOSO/Administrator" Then Response.Redirect("login.aspx")End IfYou are logged on as Administrator. When you display the page, you are redirected to Login.aspx. You discover that the User.Identity.Name property is not being correctly populated. You need to ensure that you can access the page when you are logged on as Administrator. Which two actions should you perform? ()AIn the Web.config file, enable impersonation.BIn IIS, enable anonymous access.CIn IIS, disable anonymous access.DIn the Web.config file, set the authentication mode to Windows.

单选题You are the administrator of your company’s network. Using Windows Installer packages, you want to install customized versions of Microsoft Excel on different departments in the company. Which type of file should you apply to the installation database?()AmsiBmstCzapDzip

单选题You are the administrator of a Windows 2000 Professional computer.  You schedule a task to run after 15 minutes. One hour later, the task still has not run. Using the Task Scheduler you check the status of the task. The status says "Could not start". You also notice that your Event Viewer Security Log has a logon failure event. You want to run the scheduled task.  What should you do?()ARestart the RunAs service.BVerify the account and password information for the task.CSet the Task Scheduler service to allow the service to interact with the desktop.DSet the Task Scheduler service to log on as the local Administrator account.

单选题You are developing an application that runs by using the credentials of the end user. Only users who are members of the Administrator group get permission to run the application. You write the following security code to protect sensitive data within the application.bool isAdmin=false;  WindowsBuiltInRole role=WindowsBuiltInRole.Administrator; ......  if(!isAdmin)          throw new Exception("User not permitted");   You need to add a code segment to this security code to ensure that the application throws an exception if a user is not a member of the Administrator group. Which code segment should you use?()A AB BC CD D

单选题You are the network administrator for Company. You have been assigned the task to create and deploy a standard Windows 2000 Professional image to all 2,500 client computers that today are installed with Windows 98. You log on to a client computer called Company by using a local administrative account called SetupUser and install three Windows 2000 professional compatible software packages on Company. You create an image using third party software. You deploy the image to a test client computer and join the client computer to a domain. You want to create shortcuts on all users' desktops for the software packages you installed. You also want users to have the option to delete the icons.  Which profile must you edit?()AThe SetupUser profileBThe Default User profileCThe Administrator profileDThe System profileEThe All Users profile

单选题You are the network administrator for your company. All network servers run Windows Server 2003. All client computers run Windows XP Professional. A member server named Server1 is located at a branch office that does not permit the use of Remote Desktop Protocol. Another administrator uses the Backup utility to create a scheduled backup job on Server1. The backup job performs a normal backup of an application server. The application server is removed from the network. You need to use a client computer to remove the backup job from Server1. You cannot travel to the branch office. What should you do? ()AUse the RUNAS feature to run the at /delete command as the Server1/Administrator account.BLog on by using your Administrator account and run the ntbackup /D command.CLog on by using your Administrator account and run the schtasks /delete command.DUse the RUNAS feature to run the taskkill command as the Server1/Administrator account.

单选题You are the network administrator for your company. All network servers run Windows Server 2003. All client computers run Windows XP Professional. A member server named Server1 is located at a branch office that does not permit the use of Remote Desktop Protocol. Another administrator uses the Backup utility to create a scheduled backup job on Server1. The backup job performs a normal backup of an application server. The application server is removed from the network. You need to use a client computer to remove the backup job from Server1. You cannot travel to the branch office. What should you do?()AUse the RUNAS feature to run the at /delete command as the Server1/Administrator account.BLog on by using your Administrator account and run the ntbackup /D command.CLog on by using your Administrator account and run the schtasks /delete command.DUse the RUNAS feature to run the taskkill command as the Server1/Administrator account.