You are the network administrator for The network contains a Windows Server 2003 computer named TestKing7.TestKing7 contains two NTFS volumes named Data and TestKingFiles. Thevolumes are located on separate hard disks. The Data volume is allocated the driveletter D. The Data volume is shared as \\TestKing7\Data. The TestKingfiles volumeis mounted on the Data volume as volume mount point. The TestKingFiles volume isdisplayed as the D:\TestKingFiles folder when you view the local disk drives byusing Windows Explorer on TestKing7. The D:\TestKingfiles folders is shared as\\TestKing7\TestKingfilesThe files on the TestKingFiles volume change every day. Users frequently ask you toprovide them with previous versions of files. You enable and configure ShadowCopies of the Data volume. You schedule shadow copies to be created once a day.Users report that they cannot recover previous versions of the files on theTestKingFiles volume.What should you do?()

You are the network administrator for The network contains a Windows Server 2003 computer named TestKing7.

TestKing7 contains two NTFS volumes named Data and TestKingFiles. The

volumes are located on separate hard disks. The Data volume is allocated the drive

letter D. The Data volume is shared as \\TestKing7\Data. The TestKingfiles volume

is mounted on the Data volume as volume mount point. The TestKingFiles volume is

displayed as the D:\TestKingFiles folder when you view the local disk drives by

using Windows Explorer on TestKing7. The D:\TestKingfiles folders is shared as

\\TestKing7\TestKingfiles

The files on the TestKingFiles volume change every day. Users frequently ask you to

provide them with previous versions of files. You enable and configure Shadow

Copies of the Data volume. You schedule shadow copies to be created once a day.

Users report that they cannot recover previous versions of the files on the

TestKingFiles volume.

What should you do?()


相关考题:

You are the administrator of your company's network. The network is configured as shown in the exhibit.You want to install Windows 2000 Professional on 10 non-PXE-compliant computers that are on the marketing segment of your network. You start one of the computers by using a RIS boot disk. However, you cannot connect to the RIS server.You verify that the existing client computers on the network can connect to network servers, including the RIS server. The network router does not support BOOTP, so existing client computers use manually configured TCP/IP addresses. You want to enable the computers to connect to the RIS server.What should you do?A.Add a computer running DHCP Relay Agent to the marketing segment.B.Add a computer running the network monitor driver to the marketing segment.C.Move the Windows 2000 Server computer running WINS to the marketing segment.D.Move the Windows 2000 Server computer running Active Directory to the marketing segment.

You are the administrator of a network that consists of a single Windows NT 4.0 domain. The network contains five Windows NT Server domain controllers and 1,000 Windows NT Workstation client computers.You want to install Windows 2000 Server on a new computer. You want the new computer to act as domain controller in the existing domain.What should you do?A.On the new computer, install Windows NT Server 4.0 and designate the computer as a BDC in the existing domain. Promote the computer to the PDC of the domain. Upgrade the computer to Windows 2000 Server.B.On the new computer, install Windows NT Server 4.0 and designate the computer as a PDC in a new domain that has the same NetBIOS name as the existing Windows NT domain. Upgrade the computer to Windows 2000 Server. Use the Active Directory sites and services to force synchronization of the domain controllers.C.Shut down the PDC of the existing Windows NT domain from the network. On the new computer, install Windows 2000 Server, and then run the Active Directory installation wizard to install Active Directory, specifying the same NetBIOS name for the Windows 2000 domain as the existing Windows NT domain. Restart the Windows NT PDC on the network and demote it to a BDC.D.Shut down the PDC of the existing Windows NT domain from the network. On the new computer, install Windows 2000 Server, and then run the Active Directory installation wizard to install Active Directory as a replica in the existing Windows NT domain. Promote the new computer to the PDC of the domain. Restart Windows NT PDC on the network and demote it to a BDC.

You are the administrator for your company's network. The network is configured as shown in the exhibit.You want to install Windows 2000 Professional on 20 new PXE-compliant computers on the marketing segment of your network. The new computers do not have operating systems installed.You create a RIS image. You load the image onto the RIS server. You then start the new computers.You find that the new computers cannot connect to the RIS server. You verify that the new computers cannot connect to the RIS server. You verify that the existing client computers in the network can connect to the network servers, including the RIS server. You want to enable the new computers to connect to the RIS server.What should you do?A.Add a Windows 2000 Server computer running WINS to the network.B.Add a Windows 2000 Server computer running DHCP to the network.C.Add the domain Everyone group to the RIS OS image security settings.D.Place the new computers on the same segment as the RIS server.

You are preparing to install Windows 2000 Server on a new computer. The computer is connected to a network that includes Windows 98 computers and Windows 2000 Server computers.You want to install Windows 2000 Server from source files that are located on a server on the network.What should you do?A.Start the new computer by using a Windows 98 network boot disk. Connect to the network server. Run Winnt32.exe.B.Start the new computer by using Windows 98 network boot disk. Connect to the network server. Run Winnt.exe.C.On a Windows 2000 Server computer, use Makebt32.exe to create installation startup disk. Start the new computer by using the first disk.D.On a Windows 2000 computer, format a floppy disk. Copy NTLDR, boot.ini, Ntdetect.com, Ntbootdd.sys to this disk. Start the new computer by using the disk.

You are the network administrator for Active Directory.Another system administrator installs Software Update Services (SUS) on a production Windows Server 2003 computer. You are assigned to manage the SUS computer. You need to ensure that you can recover SUS if the server fails.You need to back up all components that are required to restore SUS to its current configuration. Because of limited space, you must not back up unnecessary data.What action or actions should you perform? Select all that apply.()A. Back up the SUS folder that contains synchronized content.B. Back up the folder in which the SYSAdmin site was created.C. Back up the System State data fro the Windows Server 2003 computer.D. Back up the IIS metabase

You are the network administrator for Active Directory. Another system administrator installs Software Update Services (SUS) on a production Windows Server 2003 computer. You are assigned to manage the SUS computer. You need to ensure that you can recover SUS if the server fails. You need to back up all components that are required to restore SUS to its current configuration. Because of limited space, you must not back up unnecessary data. What action or actions should you perform? Select all that apply.()A、Back up the SUS folder that contains synchronized content.B、Back up the folder in which the SYSAdmin site was created.C、Back up the System State data fro the Windows Server 2003 computer.D、Back up the IIS metabase

You are the desktop administrator for one of your company's branch offices. The network in the branch office consists of a single network segment, which contains a domain controller, a DHCP server, 10 Windows 2000 Server computers, and 50 Windows 2000 Professional computers. All servers and client computers are members of the company's Active Directory domain. You purchase 50 new client computers for the branch office. Each new client computer contains a built-in PXE-compliant network adapter. You install and configure RIS on one of the Windows 2000 Server computers that is on the network in the branch office. You create a Windows XP Professional RIS image on the Windows 2000 Server computer. You connect the new client computers to the network in the office, and you turn on each computer. Each computer displays a message stating that it cannot contact a PXE boot server. You verify that the RIS server is connected to the network. You need to ensure that the new client computers can connect to the RIS server and can begin installing Windows XP Professional. What should you do?()A、Ask a domain administrator to authorize the RIS server. B、Grant the Everyone group Allow - Read NTFS permission on the RIS image.C、Install RIS on the domain controller. Copy the RIS image to the domain controller.D、Add a reservation for the RIS server to the DHCP server.

You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains 35 Windows Server 2003 computers; 3,000 Windows XP Professional computers; and 2,000 Windows 2000 Professional computers.Windows Server Update Services (WSUS) is installed on a server named Server1. The necessary Group Policy object (GPO)is configured.You need to confirm whether all computers in the domain have received all approved updates from Server1.  What should you do on Server1?()A、Install and configure Urlscan.exe.B、At the command prompt, type gpresult /scope COMPUTER.C、Open the WSUS console. Run the Status of Computers report.D、Open the WSUS console. Run the Synchronization Results report.

You are a network administrator for your company. The network consists of a single Active Directory domain. The domain contains three Windows Server 2003 domain controllers, 20 Windows Server 2003 member servers, and 750 Windows XP Professional computers. The domain is configured to use only Kerberos authentication for all server connections.A user reports that she receives an "Access denied" error message when she attempts to connect to one of the member servers. You want to test the functionality of Kerberos authentication on the user’s client computer.  Which command should you run from the command prompt on the user’s computer?()A、netshB、netdiagC、ktpassD、ksetup

You are the network administrator for ExamSheet.net.  You install Windows 2000 Professional on your portable computer. You use a docking station for your portable computer when you are in the office. You install a ISA-based network adapter in your docking station. You insert your computer into the docking station and start the computer. The network adapter is not detected during the startup process. You obtain a disk that contains the supported driver from the network adapter manufacturer. You want to allow Windows 2000 Professional to use the network adapter. What should you do?()A、Restart the computer in the docking station.B、Run the Add/Remove Hardware wizard.C、Use Device Manager to scan for hardware changes.D、Copy the network adapter driver to the Winnt/Driver Cache/i386 folder.E、Install the new network adapter driver.

You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains an application server running Windows Server 2003.   Users report intermittent slow performance when they access the application server throughout the day. You find out that the network interface on the application server is being heavily used during the periods of slow performance. You suspect that a single computer is causing the problem.You need to create a plan to identify the problem computer.   What should you do?()A、 Monitor the performance monitor counters on the application server by using System Monitor.  B、 Monitor the network traffic on the application server by using Network Monitor.C、 Monitor network statistics on the application server by using Task Manager.D、 Run network diagnostics on the application server by using Network Diagnostics.

You have a computer that runs Windows 7. Your network contains a VPN server that runs Windows Server2008. You need to authenticate to the VPN server by using a smart card.  Which authentication settingshould you choose?()A、CHAPB、EAPC、MS-CHAP v2D、P.AP

You are the network administrator for All network servers run Windows Server 2003. A member server named TestKingA contains two volumes. You need to perform a complete backup of the data on TestKingA. You must ensure that TestKingA can be completely restored in case of hardware failure. Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two)A、Create an Automated System Recovery (ASR) backup.B、Create a backup of user data.C、Create a Windows Server 2003 bootable floppy disk.D、Create a DOS bootable floppy disk.E、Copy all Windows Server 2003 boot files to the Windows Server 2003 bootable floppy disk.F、Copy only Boot.ini to the Windows Server 2003 bootable floppy disk

You are a network administrator for your company.A Windows Server 2003 computer named Server1 is exhibiting connectivity problems. You monitor Server1 by using System Monitor and Network Monitor. While monitoring, you notice that Server1 has approximately 4 MB of available memory, and the average CPU utilization is running at 95 percent. When you investigate the Network Monitor capture, you notice that some network packets sent to Server1 during the capture have not been captured. You need to ensure that the impact of monitoring on Server1 is reduced and that all packets sent to the computer are captured.   What should you do?()A、From a command prompt, run the diskperf command.B、Run Network Monitor in dedicated capture mode.C、Configure a Network Monitor capture filter.D、Increase the buffer size in Network Monitor.

You are a network administrator for your company. The network contains a Windows Server 2003 computer named Server1. Server1 has a single CPU, 512 MB of RAM, and a single 100-Mb network adapter.   All network users’ home folders are stored on Server1. Users access their home folders by using a mapped network drive that connects to a shared folder on Server1.   After several weeks, users report that accessing home folders on Server1 is extremely slow at certain times during the day.   You need to identify the resource bottleneck that is causing the poor performance.   What should you do?  ()A、 Capture a counter log by using LogicalDisk, PhysicalDisk, Processor, Memory, and Network Interface performance objects, and view the log data information that is captured during periods of poor performance.B、 Configure Alerts on Server1 to log entries in the event logs for the LogicalDisk, PhysicalDisk, Processor, Memory, and Network Interface performance objects when the value of any object is more than 90.C、 Capture a trace log that captures Page faults, File details, Network TCP/IP, and Process creations/deletions events.D、 Implement auditing on the folder that contains the users’ home folders. Configure Network Monitor on Server1.

多选题You are the administrator of a Windows Server 2003 computer named Server1. The hardware vendor for Server1 notifies you that a critical hotfix is available. This hotfix is required for all models of this computer that have a certain network interface card. You need to find out if the network interface card that requires the hotfix is installed in Server1. What are two possible ways to achieve this goal? ()(Each correct answer presents a complete solution. Choose two.)AOpen Network Connections, and then examine the properties of each connection that is listed.BOpen the Component Services snap-in, expand Computers, expand My Computer, and then examine the list.CRun the netsh interface command, and then examine the list.DOpen Device Manager, expand Network adapters, and then examine the list

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains Windows Server 2003 computers and Windows XP Professional computers.  You configure a server named Server1 to be a file server. The written company security policy states that you must analyze network traffic that is sent to and from all file servers.You need to capture file-transfer network traffic that is being sent to and from Server1. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on a server named Server2, which is on the same network segment as Server1.You run Network Monitor on Server2. However, Network Monitor captures only network traffic that is sent to and from Server2. You need to capture all network traffic that is sent to and from Server1.  What should you do?()AInstall the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.BOpen Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.CInstall Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.DOpen Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.

单选题You are the network administrator for The network contains a Windows Server 2003 computer named Print1 that functions as a print server. Print1 contains a printer named MarketingPrinter. Users report that print jobs they submit to the MarketingPrinter take a long time to print. You immediately examine Print1 and conclude that the server is performing at acceptable levels. You need to identify the problem. What should your next step be?()AUse Task Manager to monitor processor and memory performance.BUse Windows Explorer to monitor the size of the Windows/System32/Spool/prtprocs folder.CUse System Monitor to view the Print Queue/Jobs counter.DUse System Monitor to view the Print Queue/Enumerate Network Printer Calls couner.

单选题You are the network administrator for The network contains Windows Server 2003 computers and Windows XP Professional computers. You install Software Update Services (SUS) on a server named TestKingSrv. You scan the client computers to find out if any current hotfixes are installed. You notice that no client computers have been updated during the past seven days. You are unable to access the synchronization logs on TestKingSrv. You need to ensure that SUS is functioning properly. What should you do on TestKingSrv?()ADelete the History_Approve.xml file and restart the computer.BDelete the Aucatalog.cab file and restart the computer.CRestart the Background Intelligent Transfer Service (BITS).DRestart all IIS-related services.

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains 25 Windows Server 2003 computers and 6,000 Windows XP Professional computers.The written company security policy states that network traffic to Web servers must be audited on a regular basis. A server named Server1 is configured as a Web server on the company’s intranet. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on Server1.You run Network Monitor on Server1 for three hours. When you stop the network capture, you see that Network Monitor captured over 40,000 frames. As you look at the captured frames, you notice that an extremely large number of TCP connection requests have all come from the 131.107.0.1 IP address.In Network Monitor, you need to view only the frames for network traffic that are captured between Server1 and the 131.107.0.1 IP address.  What should you do?()ACreate an Address Capture filter for all network traffic between Server1 and the 131.107.0.1 IP address.BCreate a Find Frame Expression filter for network traffic captured between Server1 and the 131.107.0.1 IP address.CCreate an Address Display filter for all network traffic captured between Server1 and the 131.107.0.1 IP address.DCreate a Pattern Match capture trigger for the 131.107.0.1 IP address.

单选题Your network contains a server named Server1.contoso.com. Server1 is located on the internal network. You have a client computer named Computer1 that runs Windows 7. Computer1 is located on a public network that is connected to the Internet. Computer1 is enabled for DirectAccess. You need to verify whether Computer1 can resolve Server1 by using DirectAccess. Which command should you run on Computer1?()Anbtstat.exe a server1.contoso.comBnetsh.exe dnsclient show stateCnslookup.exe server1.contoso.comDping.exe server1.contoso.com

单选题You are the network administrator for . The network consists of a single Active Directory domain. All domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. TestKing acquires a subsidiary. You receive a comma delimited file that contains the names of all user accounts at the subsidiary. You need to import these accounts into your domain. Which command should you use?()AldifdeBcsvdeCntdsutil with the authoritative restore optionDdsadd user

单选题You are a network administrator for your company. The network contains a Windows Server 2003 computernamed Server3. Server3 functions as a file server. Six users in the accounting department use an accounting software application to open files that are stored in a shared folder on Server3. The users keep these files open for an extended period of time. You need to restart Server3. You need to find out if any files on Server3 are open before you restart the computer. What should you do? ()AUse Computer Management to view existing connections.BUse the netsend command to send a message to all domain members.CUse Task Manager to monitor processes started by all users.DUse System Monitor to monitor the Server object in Report view.

单选题You are the administrator of a Windows Server 2003 computer named Server1. The network contains another Windows Server 2003 computer named Server2 that has the DNS and WINS services installed. Two hundred Windows 2000 Professional computers regularly connect to Server1 to access file and print resourcesAdministrators report that network traffic has increased and that response times for requests for network resources on Server1 have increased.   You need to identify whether Server1 is receiving requests for resources through NetBIOS broadcasts. What should you do?()AUse Network Monitor to capture traffic between Server1 and all client computers.BUse Network Monitor to capture traffic between Server1 and Server2.CMonitor Event Viewer for Net Logon error or warning events.DRun the tracert command on Server1.

单选题You need to design a method to automate the deployment of critical updates and security patches that are supplied by Microsoft as these updates and security patches are released. Your solution must meet technical requirements. What should you do?()ADeploy a Windows Server 2003 computer running SUS in the test network. Deploy SUS servers in each child domain to download administrator-approved updates from the test network SUS serverBDeploy a Windows Server 2003 computer running SUS in the test network Use autoupdate policies in each child domain to download and deploy updates from the test network SUS serverCInstall MBSA on a Windows Server 2003 computer in the network network. Deploy MBSA as a Windows Installer package to all computers in the child domains, and configure MBSA to scan for updates from the server in the test networkDInstall IIS on a Windows Server 2003 computer in the test network. Create a Web site named Updates on this server. Configure an autoupdate policy in each child domain to download and deploy updates from the Updates Web site

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers.   You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized.  You need to configure Server1 to log the details of access attempts by VPN users.   What should you do?  ()A Configure the system event log to Do not overwrite.B In IAS, in Remote Access Logging, enable the Authentication requests setting.C Configure the Remote Access server to Log all events.D Create a custom remote access policy and configure it for Authentication-Type.

单选题You have a computer that runs Windows XP Professional. The computer is a member of an Active Directory domain. A server administrator installs and shares a new printer on a server that runs Windows Server 2003. You need to configure the computer to print to the new printer. What should you do?()AFrom the computer, install a local printer.BFrom the computer, install a network printer. CFrom the Active Directory domain, add the computer account for the Windows XP Professional computer to the Print Operators group. DFrom the Windows Server 2003 server, add the computer account for the Windows XP Professional computer to the Print Operators group.

单选题You are the network administrator for your company. All network servers run Windows Server 2003. All client computers run Windows XP Professional. A member server named Server1 is located at a branch office that does not permit the use of Remote Desktop Protocol. Another administrator uses the Backup utility to create a scheduled backup job on Server1. The backup job performs a normal backup of an application server. The application server is removed from the network. You need to use a client computer to remove the backup job from Server1. You cannot travel to the branch office. What should you do? ()AUse the RUNAS feature to run the at /delete command as the Server1/Administrator account.BLog on by using your Administrator account and run the ntbackup /D command.CLog on by using your Administrator account and run the schtasks /delete command.DUse the RUNAS feature to run the taskkill command as the Server1/Administrator account.