多选题You are the network administrator for The company contains of a main office and five branch offices. Network servers are installed in each office. All servers run 2003 The technical support stuff is located in the main office. Users in the branch office do not have the "Log on locally" right on local servers. Servers in the branch office collect auditing information. You need the ability to review the ability to review the auditing information located on each branch office server while you are working at the main office. You also need to save the auditing information on each branch office server on the local hard drive. Which two actions should you perform?() (Each correct answer presents part of the solution. Choose two.)AFrom the Security Configuration and Analysis snap-in save the appropriate .inf file on the local hard drive.BSolicit Remote Assistance from each branch office server.CFrom Computer Management open Event Viewer, save the appropriate .evt file on the local hard driveDRun secedit.exe, specify the appropriate parameterEEstablish a Remote Desktop client session with each branch office server
多选题
You are the network administrator for The company contains of a main office and five branch offices. Network servers are installed in each office. All servers run 2003 The technical support stuff is located in the main office. Users in the branch office do not have the "Log on locally" right on local servers. Servers in the branch office collect auditing information. You need the ability to review the ability to review the auditing information located on each branch office server while you are working at the main office. You also need to save the auditing information on each branch office server on the local hard drive. Which two actions should you perform?() (Each correct answer presents part of the solution. Choose two.)
A
From the Security Configuration and Analysis snap-in save the appropriate .inf file on the local hard drive.
B
Solicit Remote Assistance from each branch office server.
C
From Computer Management open Event Viewer, save the appropriate .evt file on the local hard drive
D
Run secedit.exe, specify the appropriate parameter
E
Establish a Remote Desktop client session with each branch office server
参考解析
解析:
暂无解析
相关考题:
You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet.Which PIN architecture is applicable in those environments?()A.CampusB.TeleworkerC.BranchD.Data center
You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()A、CampusB、TeleworkerC、BranchD、Data center
You work as the exchange administrator at Company.com.the Company.com network contains an exchange server 2010 organization.Company.com has its headquarters in stockholm where you are located.you are responsible for an exchange 2010 edge transport server named -ex01.during the course of the week you receive an instruction from the cio to make sure that e-mail messages sent to unknown addresses in the organization is rejected automatically.What should you do?()A、You should consider configuring recipient filtering.B、You should consider configuring sender reputation.C、You should consider configuring content filtering.D、You should consider configuring sender filtering.
You work as the Exchange administrator at Company.com.The Company.com network contains an Exchange Server 2010 Organization.Company.com has its headquarters in Stockholm where you are located.The Marketing department contains 5,000 employees that are members of a group named TKPRODUCTS.You receive an instruction from management to make sure that an informative message is shown when employees add TKPRODUCTS to the recipient list of e-mail messages.What should you do?()A、You should consider having a transport rule created.B、You should consider having a Send connector created.C、You should consider having a MailTip configured.D、You should consider having an expansion server configured.
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.The Company.com organization currently makes use of a computer named -ex01 which hosts a mailbox database named kingdatabase which contains 25 user mailboxes.during the course of the business week you receive instruction from Company.com to create a new public folder database named kingpublic whilst ensuring you configure kingpublic as the default public folder database for each mailbox on -ex01.What should you do?()A、you should consider having the properties of -ex01 modified.B、You should consider having the properties of KingPublic modified.C、You should consider having the properties of every mailbox modified.D、You should consider having the properties of KingDatabase modified.
You work as the Exchange administrator at Company.com.The Company.com network contains an Exchange Server 2010 Organization.Company.com has its headquarters in London where you are located.During the course of the day you receive notification from management to view the a number of mailbox on the servers that is bigger than 1 GB.What should you do?()A、You should consider having the properties of the mailbox database viewed from the Exchange Management Console (EMC).B、You should consider running the Get-Mailbox cmdlet from the Exchange Management Shell.C、You should consider running the Get-MailboxStatistics cmdlet from the Exchange Management Shell.D、You should consider having a recipient filter created from the Exchange Management Console (EMC).
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com contains an exchange server 2010 server named -sr15 that has the following roles installed: client access, hub transport, and mailbox server.the Company.com also has a windows server 2008 r2 certification authority (ca).Company.com has merged with another company named Courseware Publishers that contains an internal root C A.You have received instructions from the CIO to install a certificate to create the federated trust as well as to reduce the cost. What should you do?()A、You need to set up a computer certificate request on -sr15; thereafter you should submit the request to a third-party trusted caB、You need to use -sr15 and generate a self-signed certificateC、You need to use request a computer certificate from the Company.com.com ca from -sr15D、You need to set up a computer certificate request on -sr15; thereafter you should submit the request to courseware publishers ca
You are the desktop administrator for one of your company's branch offices. The network in the branch office consists of a single network segment, which contains a domain controller, a DHCP server, 10 Windows 2000 Server computers, and 50 Windows 2000 Professional computers. All servers and client computers are members of the company's Active Directory domain. You purchase 50 new client computers for the branch office. Each new client computer contains a built-in PXE-compliant network adapter. You install and configure RIS on one of the Windows 2000 Server computers that is on the network in the branch office. You create a Windows XP Professional RIS image on the Windows 2000 Server computer. You connect the new client computers to the network in the office, and you turn on each computer. Each computer displays a message stating that it cannot contact a PXE boot server. You verify that the RIS server is connected to the network. You need to ensure that the new client computers can connect to the RIS server and can begin installing Windows XP Professional. What should you do?()A、Ask a domain administrator to authorize the RIS server. B、Grant the Everyone group Allow - Read NTFS permission on the RIS image.C、Install RIS on the domain controller. Copy the RIS image to the domain controller.D、Add a reservation for the RIS server to the DHCP server.
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.the Company.com contains an exchange server 2010 mailbox server named -ex20 that contains a mailbox database.a Company.com manager wants the see the last logon time of the employees at Company.com. What should you do?()A、The best option is to run the Get-MailboxDatabase from the Exchange Management Shell.B、The best option is to run the Get-MailboxStatistics from the Exchange Management Shell.C、The best option is to create and export a filter from the Exchange Management Console.D、The best option is to run the Remote Connectivity Analyzer from the Exchange Management Console.
You work as the Exchange administrator at Company.com.The Company.com network contains an Exchange Server 2010 Organization.Company.com has its headquarters in Stockholm where you are located.The Company.com network contains a hub transport serer named -ex02.-ex02 is used to receive all incoming email messages from the internet.you decide to install anti-spam agents on -ex02.during the day you receive an instruction from management to make sure that only e-mail messages sent to the e-mail addresses in the active directory is accepted by -ex02. What should you do?()A、This can be accomplished by having the properties of the default Receive Connector modified.B、This can be accomplished by having the properties of the Sender Filtering agent modified.C、This can be accomplished by having the properties of the Recipient Filtering agent modified.D、This can be accomplished by having the properties of the default Accepted Domain modified.
You are a security administrator for your company. The network consists of three Active Directory domains. All Active Directory domains are running at a Windows Server 2003 mode functionality level. Employees in the editorial department of your company need access to resources on file servers that are in each of the Active Directory domains. Each Active Directory domain in the company contains at least one editorial department employee user account. You need to create a single group named Company Editors that contains all editorial department employee user accounts and that has access to the resources on file server computers. What should you do?()A、 Create a global distribution group in the forest root domain and name it Company Editors.B、 Create a global security group in the forest root domain and name it Company Editors.C、 Create a universal distribution group in the forest root domain and name it Company Editors. D、 Create a universal security group in the forest root domain and name it Company Editors.
Company.com has employed you as their Exchange administrator.The Company.com network contains an Exchange Server 2010 Organization.You are responsible for managing the Company.com network.You receive an instruction from management to reject e-mail messages that have a spam confidence level (SCL) of 5.You thus decide to configure the organization to accomplish this task. What should you do?()A、You should consider configuring the sender reputation.B、You should consider configuring the sender filtering.C、You should consider configuring the content filtering.D、You should consider configuring the recipient filtering.
You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains an application server running Windows Server 2003. Users report intermittent slow performance when they access the application server throughout the day. You find out that the network interface on the application server is being heavily used during the periods of slow performance. You suspect that a single computer is causing the problem.You need to create a plan to identify the problem computer. What should you do?()A、 Monitor the performance monitor counters on the application server by using System Monitor. B、 Monitor the network traffic on the application server by using Network Monitor.C、 Monitor network statistics on the application server by using Task Manager.D、 Run network diagnostics on the application server by using Network Diagnostics.
You are the network administrator for Company.Company has just upgraded its network switches from 10 Mbps to 100 Mbps. After the upgrade, you findthat the 100 Windows 2000 Professional computers on the network are still communicating at only 10Mbps. Company uses NWLink as the only network protocol.You want to enable the computers to communicate at 100 Mbps.What should you do?()A、Replace the network adapters with 10/100 Mbps network adapters. B、Enable TCP/IP on all of the computers on the network.C、Configure the NWLink frame type of the network adapters to be Ethernet II. D、Configure the NWLink frame type of the network adapters to be Ethernet 802.3.
You work as the Exchange administrator at Company.com.The Company.com network contains an Exchange Server 2010 Organization.You are responsible for managing the Exchange network for Company.com.The network contains numerous Mailbox servers.During the course of the week you receive an instruction from the CIO to determine the message latency between the Mailbox servers in the organization.What should you do?()A、Your best option would be to increase the MSExchangeMailSubmission diagnostic logging level to Expert.B、Your best option would be to run the Test-Mailflow cmdlet.C、Your best option would be to increase the MSExchangeTransport diagnostic logging level to Expert.D、Your best option would be to run the Test-OutlookConnectivity cmdlet.
You are employed as the exchange administrator at Company.com.the Company.com network contains an exchange 2010 organization.Company.com has its headquarters in stockholm where you are located.you are responsible for managing a mailbox server named -ex02.all users within the organization make use of microsoft office outlook 2010 to connect to the exchange organization.you receive an instruction to determine the latency of user connections to-ex02. What should you do?()A、You should consider running the Test-OutlookConnectivity cmdlet.B、You should consider running the Exchange Best Practices Analyzer.C、You should consider running the Test-OutlookWebServices cmdlet.D、You should consider running the Message Tracking Performance tool.
You are the network administrator for Company.You need to connect to Company’s network from your Windows 2000 Professional computer at home.You have a DSL line that is used for Internet connectivity. You create an L2TP virtual private network(VPN) connection and are able to connect successfully to Company’s network. While connected toCompany’s network, you are unable to access the Internet.You want to be able to access the Internet while connected to Company’s network.How should you configure the connection properties?()A、Configure the DSL connection to use PPTP instead of L2TP. B、Enable Internet Connection Sharing for the DSL connection properties. C、CLEAR THE Use default gateway on remote network check box. D、Clear the Require data encryption check box.
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.the Company.com contains an exchange server 2010 server named -sr14.-sr14 is configured to with outlook anywhere.you have received instructions from the cio to make sure that the users can connect to -sr14, using outlook anywhere. What should you do?()A、You should consider using the Exchange Remote Connectivity Analyzer.B、You should consider checking the properties of the WEB Outlook Provider.C、You should consider using the Mail Flow Troubleshooter.D、You should consider using the Test-OwaConnectivity cmdlet.
单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All network servers run Windows Server 2003. The domain contains three domain controllers: DC1, DC2, and DC3. Each one hosts user data. DC1 experiences hard disk failure. You need to temporarily restore the user data to DC2. Which type of restoration should you perform? ()AAutomated System Recovery (ASR)BnormalCprimaryDauthoritative
单选题You work as the Exchange administrator at Company.com.The Company.com network contains an Exchange Server 2010 Organization.Company.com has its headquarters in Stockholm where you are located.The Marketing department contains 5,000 employees that are members of a group named TKPRODUCTS.You receive an instruction from management to make sure that an informative message is shown when employees add TKPRODUCTS to the recipient list of e-mail messages.What should you do?()AYou should consider having a transport rule created.BYou should consider having a Send connector created.CYou should consider having a MailTip configured.DYou should consider having an expansion server configured.
单选题You work as the exchange administrator at Company.com.the Company.com network contains an exchange server 2010 organization.Company.com has its headquarters in stockholm where you are located.you are responsible for an exchange 2010 edge transport server named -ex01.during the course of the week you receive an instruction from the cio to make sure that e-mail messages sent to unknown addresses in the organization is rejected automatically.What should you do?()AYou should consider configuring recipient filtering.BYou should consider configuring sender reputation.CYou should consider configuring content filtering.DYou should consider configuring sender filtering.
单选题You are employed as the exchange administrator at Company.com.the Company.com network contains an exchange 2010 organization that contains a single mailbox server named -ex01.Company.com has its headquarters in stockholm where you are located.-ex01 in turn contains two mailbox databases named kingdatabase1 and kingdatabase2.you receive an instruction from the cio to restore a backup of kingdatabase1.to ensure productivity you need to make sure that all examways users can connect to the mailboxes on kingdatabase1 whilst you doing the restore. What should you do?()AYour first step should be to create a Client Access server array.BYour first step should be to create a database availability group (DAG).CYour first step should be to create a recovery storage group.DYour first step should be to create a Recovery Mailbox database.
单选题You work as an Exchange Administrator for Xxx .The company has a Windows 2008 Active Directory-based network.The network contains an Exchange Server 2010 organization.An employee named John has recently left the company.You need to delete the mailbox and the user account for John.You also need to remove the mailbox from the Exchange database.Which of the following commands will you enter in the Exchange Management Shell to accomplish the task?()ADelete-Mailbox -Identity john@TK.comBRemove-Mailbox -Identity john@TK.com -Permanent $trueCRemove-Mailbox -Identity john@TK.comDDisable-Mailbox john@TK.com
单选题You are the administrator of your company’s network. Using Windows Installer packages, you want to install customized versions of Microsoft Excel on different departments in the company. Which type of file should you apply to the installation database?()AmsiBmstCzapDzip
单选题You are employed as the Exchange administrator at Company.com.The Company.com network contains an Exchange 2010 Organization.You are responsible for managing the Exchange network for Company.com.The Company.com network contains four Mailbox servers as well as four Client Access servers.The Mailbox servers are all configured to make use of Outlook Anywhere.During the course of the day you receive an instruction from the CIO to create a Client Access server array.To ensure productivity you need to make sure that all tesking.com employees are able to make a connection to the Client Access server array.What should you do?()AYou should consider running the Set-MailboxDatabase cmdlet from the Exchange Management Shell.BYou should consider changing the properties of every mailbox database from the Exchange Management Console (EMC).CYou should consider changing the properties of every Client Access server object from the Exchange Management Console (EMC).DYou should consider running the Set-Mailbox cmdlet from the Exchange Management Shell.
单选题You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()AUse Windows Explorer to receive the offline filesBUsing the Windows Explorer, disable the cache for the reports on the network shareCUse the Windows NT explorer to grant the special access for the reports on the network shareDUse the synchronization manager to configure synchronization not to occur when users are connected to the LAN connection.
单选题Company.com has employed you as their Exchange administrator.The Company.com network contains an Exchange Server 2010 Organization.You are responsible for managing the Company.com network.You receive an instruction from management to reject e-mail messages that have a spam confidence level (SCL) of 5.You thus decide to configure the organization to accomplish this task. What should you do?()AYou should consider configuring the sender reputation.BYou should consider configuring the sender filtering.CYou should consider configuring the content filtering.DYou should consider configuring the recipient filtering.
单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All network servers run Windows Server 2003. The domain contains three domain controllers: DC1, DC2, and DC3. Each one hosts user data. DC1 experiences hard disk failure. You need to temporarily restore the user data to DC2. Which type of restoration should you perform? ()AAutomated System Recovery (ASR)BnormalCprimaryDauthoritative