单选题A company has acquired another company and is consolidating data centers. During the consolidation, half of the users of a business critical application lost access. The users who maintained access experienced slow performance.  What is the first action the SAN/storage administrator should take to determine the source of the problem()Areview SAN configuration, connectivity, and zoningBreview application parameters for contention or tuning problemsCuse internal disk monitoring tools to determine the problem sourceDcheck the disk parameters in the OS setup on the systems

单选题
A company has acquired another company and is consolidating data centers. During the consolidation, half of the users of a business critical application lost access. The users who maintained access experienced slow performance.  What is the first action the SAN/storage administrator should take to determine the source of the problem()
A

review SAN configuration, connectivity, and zoning

B

review application parameters for contention or tuning problems

C

use internal disk monitoring tools to determine the problem source

D

check the disk parameters in the OS setup on the systems


参考解析

解析: 暂无解析

相关考题:

A company may use the Windows XP Professional MUI Pack because the company:()A、has offices where users who speak different languages share computers.B、wants to maintain multiple operating systems.C、has users who work remotely at home offices.D、wants to deploy and maintain a single operating system standard.

A company has acquired another company and is consolidating data centers. During the consolidation, half of the users of a business-critical application lost access. The users who maintained access experienced slow performance.  What is the first action the SAN/storage administrator should take to determine the source of the problem()A、review SAN configuration, connectivity, and zoningB、review application parameters for contention or tuning problemsC、use internal disk monitoring tools to determine the problem sourceD、check the disk parameters in the OS setup on the systems

A company has acquired another company and is consolidating data centers. During the consolidation, half of the users of a business critical application lost access. The users who maintained access experienced slow performance.  What is the first action the SAN/storage administrator should take to determine the source of the problem()A、review SAN configuration, connectivity, and zoningB、review application parameters for contention or tuning problemsC、use internal disk monitoring tools to determine the problem sourceD、check the disk parameters in the OS setup on the systems

You are a database administrator for your company. The company uses a SQL Server 2005 application. Each night, data is imported into a database, and the database is then set to be read-only. During business hours, users run predefined and ad hoc queries. You need to monitor the servers performance during the day. What are two possible ways to achieve this goal?()A、Use the Lock Waits/sec performance counter.B、Use the Number of Deadlocks/sec performance counter.C、Use the Transactions/sec performance counter.D、Use the Full Scans/sec performance counter.E、Use the Batches/sec performance counter.

You are the network administrator for your company. The network consists of a single Active Directory domain. All client computers run Windows XP Professional. The company has a large number of sales representatives who need access to the company network when they travel. A Windows 2000 Server computer is configured to allow users to access the network by using a dial-up connection. Several of the sales representatives occasionally travel to rural locations that have telephone lines that use outdated technology. The sales representatives report that when they attempt to establish a dial-up connection in these locations, they receive the following error message: "The server is not responding." They cannot connect to the remote access server or to the company network. Users who travel to urban areas do not report this problem. You investigate and find out that the server is running properly, but the problem persists. The sales representatives need to be able to use the dial-up connection to access the company network. What should you do?()A、Change the flow control option in the modem properties to Xon / Xoff.B、Disable error correction in the modem's default data connection preferences.C、Adjust the modem's default connection speed to a lower rate. D、Disable the first-in, first-out (FIFO) receive and transmit buffers on the modem.

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You manage a server that runs Windows Server 2008. The server hasTerminal Service Web Access (TS Web Access) installed. Several line-of-business applications areavailable on the server by using TS Web Access. You have a new application installed on the server. Youhave to make the application available through TS Web Access. In order to achieve this,What action should you perform?()A、In order to make the application available through TS Web Access, the data source for TS Web Accessshould be specified from the TS Web Access Web site.B、In order to make the application available through TS Web Access, the application should be added to the RemoteApp Programs list from TS RemoteApp Manager.C、In order to make the application available through TS Web Access, the users should be added to the TS Web Access Computers group from the Local Users and Groups snap-in.D、In order to make the application available through TS Web Access, the mstsc.exe command should be run and specify the /v parameter should be specified from the command prompt.

You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com has merged with another company named Courseware Publishers.The users at Courseware Publishers complained that they cannot automatically locate the Client Access servers at Company.com.The users need to locate the Client Access servers at Company.com.What should you do?()A、The best option is to use an A record for FederatedSharing.Company.com.B、The best option is to use an SRV record for _autodiscover._TCP._msdcs.Company.com.C、The best option is to use an A record for autodiscover.Company.com.D、The best option is to use an SRV record for _FederatedSharing._UDP._msdcs.Company.com.

Your network contains an Active Directory domain named contoso.com. The domain contains a   server named Server1. The Active Directory Federation Services (AD FS) role is installed on Server1. Contoso.com is defined as an account store.   A partner company has a Web-based application that uses AD FS authentication. The partner company  plans to provide users from contoso.com access to the Web application.   You need to configure AD FS on contoso.com to allow contoso.com users to be authenticated by the   partner company.   What should you create on Server1()A、a new applicationB、a resource partnerC、an account partnerD、an organization claim

You are a desktop administrator for your company. You are responsible for deploying a new application. The application is packaged in an .msi file. You need to deploy the application to only three users in the company. The .msi file contains all of the information necessary to correctly install the application. You need to install the application so that users see information about the installation progress, but no other user interface is displayed during the installation. What should you do?()A、Use the Msiexec.exe program to perform a quiet installation of the application.B、Use the Msiexec.exe program to perform a passive installation of the application. C、Create a Group Policy object (GPO) that assigns the application. Link the GPO to the site containing the users who will use the application. D、Create a Group Policy object (GPO) that advertises the application. Link the GPO to the domain.

You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains an application server running Windows Server 2003.   Users report intermittent slow performance when they access the application server throughout the day. You find out that the network interface on the application server is being heavily used during the periods of slow performance. You suspect that a single computer is causing the problem.You need to create a plan to identify the problem computer.   What should you do?()A、 Monitor the performance monitor counters on the application server by using System Monitor.  B、 Monitor the network traffic on the application server by using Network Monitor.C、 Monitor network statistics on the application server by using Task Manager.D、 Run network diagnostics on the application server by using Network Diagnostics.

You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com has merged with another company.The users at Company.com have complained that they are not able to share contacts with the users in the merge company.However, they can share free/busy information.The users at Company.com need to share contacts.What should you do?()A、You should consider changing the EWS virtual directory.B、You should consider changing the Federation Trust.C、You should consider changing the Organizational Relationship.D、You should consider changing the default sharing policy.

You are the network administrator for your company. The network consists of a single Active Directory domain.  The company has remote users in the sales department who work from home. The remote users’ client computers run Windows XP Professional, and they are not members of the domain. The remote users’ client computers have local Internet access through an ISP.   The company is deploying a Windows Server 2003 computer named Server1 that has Routing and Remote Access installed. Server1 will function as a VPN server, and the remote users will use it to connect to the company network. Confidential research data will be transmitted from the remote users’ client computers. Security is critical to the company and Server1 must protect the remote users’ data transmissions to the main office. The remote client computers will use L2TP/IPSec to connect to the VPN server.  You need to choose a secure authentication method.   What should you do? ()A、 Use the authentication method of the default IPSec policies.B、 Create a custom IPSec policy and use the Kerberos version 5 authentication protocol.C、 Create a custom IPSec policy and use certificate-based authentication.D、 Create a custom IPSec policy and use preshared key authentication.E、 Use the authentication method of the Routing and Remote Access custom IPSec policy for L2TP connection.

单选题A new company has been given one public IP address. The company employs 200 users requiring Internet access from the headquarters. Which of the following can be implemented to provide Internet access for all the employees?()AMulticastingBProxy serverCNATDSubnetting

单选题You work as a network exchange administrator at Company.com.the Company.com network currently consists of a single active directory forest containing a single domain named Company.com.the Company.com organization makes use of microsoft exchange server 2010 as their messaging  solution.Company.com has recently configured an exchange server named ex01 with a single mailbox database.Company.com is aware that the network users user microsoft office outlook and outlook web app.During your routine maintenance you discover that the network users are unable to restore e-mail messages from the Recover Deleted Items folder. During the course of the business week you receive instruction from Company.com to ensure that the network users are able to restore e-mail messages from the Recover Deleted Items folder. What should you do?()AYou should consider having a management role created and assigned to all users from the Exchange Management Shell.BYou should consider having a retention policy created and assigned to all users from the Exchange Management Shell.CYou should consider having the properties of the mailbox database modified from the Exchange Management Console (EMC).DYou should consider having the properties of the Mailbox server object modified from the Exchange Management Console (EMC).

单选题You work as a network exchange administrator at company.com.the company.com network currently consists of a single active directory forest containing a single domain named company.com.the company.com organization makes use of microsoft exchange server 2010 as their messaging solution.company.com has recently acquired a new internet domain name from the internet service provider (isp).during the course of the business week you receive instruction from company.com to ensure that all the network users are able to send and receive e-mail messages sent to the newly acquired domain name. What should you do?()Ayou should consider having an accepted domain and an e-mail address policy created.Byou should consider having the properties of the default receive connector modified.Cyou should consider having an accepted domain and a sharing policy created.Dyou should consider having a remote domain and an e-mail address policy created.

多选题You are a database administrator for your company. The company uses a SQL Server 2005 application. Each night, data is imported into a database, and the database is then set to be read-only. During business hours, users run predefined and ad hoc queries. You need to monitor the servers performance during the day. What are two possible ways to achieve this goal?()AUse the Lock Waits/sec performance counter.BUse the Number of Deadlocks/sec performance counter.CUse the Transactions/sec performance counter.DUse the Full Scans/sec performance counter.EUse the Batches/sec performance counter.

单选题You are the administrator of a SQL Server 2005 computer named SQL1. All servers run Microsoft Windows Server 2003 and belong to a Microsoft Active Directory domain. The companys written security policy mandates strong passwords for all domain, local, and application accounts. The appropriate domain password policy has been deployed through the use of a Group Policy object (GPO). Many of the company’s computers run MS-DOS-based or UNIX-based operating systems. These computers require varying levels of access to a database named Services on SQL1. You need to ensure that these computers can access the Services database without violating the company’s written security policy.  What should you do?()ACreate a domain account for each of the company’s users. Provide each domain account with access to SQL1 and the Services database.BCreate a local logon account on SQL1 for each of the company’s users. Provide each logon account with access to SQL1 and the Services database.CCreate a SQL Server logon account for each of the company’s users. Enable the Enforce password policy option for each logon account. Provide each logon account with access to the Services database.DConfigure a virtual directory through Internet Information Services (IIS) for access to SQL1. Direct users to the virtual directory for data access.ECreate one SQL Server logon account for all of the company’s computers running MS-DOS or UNIX-based operating systems. Enable the Enforce password policy option for users’ accounts. Provide the logon accounts with access to the Services database.

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All client computers run Windows XP Professional. The company has a large number of sales representatives who need access to the company network when they travel. A Windows 2000 Server computer is configured to allow users to access the network by using a dial-up connection. Several of the sales representatives occasionally travel to rural locations that have telephone lines that use outdated technology. The sales representatives report that when they attempt to establish a dial-up connection in these locations, they receive the following error message: "The server is not responding." They cannot connect to the remote access server or to the company network. Users who travel to urban areas do not report this problem. You investigate and find out that the server is running properly, but the problem persists. The sales representatives need to be able to use the dial-up connection to access the company network. What should you do?()AChange the flow control option in the modem properties to Xon / Xoff.BDisable error correction in the modem's default data connection preferences.CAdjust the modem's default connection speed to a lower rate. DDisable the first-in, first-out (FIFO) receive and transmit buffers on the modem.

单选题A company has acquired another company and is consolidating data centers. During the consolidation, half of the users of a business-critical application lost access. The users who maintained access experienced slow performance.  What is the first action the SAN/storage administrator should take to determine the source of the problem()Areview SAN configuration, connectivity, and zoningBreview application parameters for contention or tuning problemsCuse internal disk monitoring tools to determine the problem sourceDcheck the disk parameters in the OS setup on the systems

单选题You are a desktop administrator for your company. You are responsible for deploying a new application. The application is packaged in an .msi file. You need to deploy the application to only three users in the company. The .msi file contains all of the information necessary to correctly install the application. You need to install the application so that users see information about the installation progress, but no other user interface is displayed during the installation. What should you do?()AUse the Msiexec.exe program to perform a quiet installation of the application.BUse the Msiexec.exe program to perform a passive installation of the application. CCreate a Group Policy object (GPO) that assigns the application. Link the GPO to the site containing the users who will use the application. DCreate a Group Policy object (GPO) that advertises the application. Link the GPO to the domain.

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains an application server running Windows Server 2003.   Users report intermittent slow performance when they access the application server throughout the day. You find out that the network interface on the application server is being heavily used during the periods of slow performance. You suspect that a single computer is causing the problem.You need to create a plan to identify the problem computer.   What should you do?()A Monitor the performance monitor counters on the application server by using System Monitor.  B Monitor the network traffic on the application server by using Network Monitor.C Monitor network statistics on the application server by using Task Manager.D Run network diagnostics on the application server by using Network Diagnostics.

单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You manage a server that runs Windows Server 2008. The server hasTerminal Service Web Access (TS Web Access) installed. Several line-of-business applications areavailable on the server by using TS Web Access. You have a new application installed on the server. Youhave to make the application available through TS Web Access. In order to achieve this,What action should you perform?()AIn order to make the application available through TS Web Access, the data source for TS Web Accessshould be specified from the TS Web Access Web site.BIn order to make the application available through TS Web Access, the application should be added to the RemoteApp Programs list from TS RemoteApp Manager.CIn order to make the application available through TS Web Access, the users should be added to the TS Web Access Computers group from the Local Users and Groups snap-in.DIn order to make the application available through TS Web Access, the mstsc.exe command should be run and specify the /v parameter should be specified from the command prompt.

单选题Your network contains an Active Directory domain named contoso.com. The domain contains a   server named Server1. The Active Directory Federation Services (AD FS) role is installed on Server1. Contoso.com is defined as an account store.   A partner company has a Web-based application that uses AD FS authentication. The partner company  plans to provide users from contoso.com access to the Web application.   You need to configure AD FS on contoso.com to allow contoso.com users to be authenticated by the   partner company.   What should you create on Server1()Aa new applicationBa resource partnerCan account partnerDan organization claim

单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com has merged with another company named Courseware Publishers.The users at Courseware Publishers complained that they cannot automatically locate the Client Access servers at Company.com.The users need to locate the Client Access servers at Company.com.What should you do?()AThe best option is to use an A record for FederatedSharing.Company.com.BThe best option is to use an SRV record for _autodiscover._TCP._msdcs.Company.com.CThe best option is to use an A record for autodiscover.Company.com.DThe best option is to use an SRV record for _FederatedSharing._UDP._msdcs.Company.com.

单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com has merged with another company.The users at Company.com have complained that they are not able to share contacts with the users in the merge company.However, they can share free/busy information.The users at Company.com need to share contacts.What should you do?()AYou should consider changing the EWS virtual directory.BYou should consider changing the Federation Trust.CYou should consider changing the Organizational Relationship.DYou should consider changing the default sharing policy.

单选题You are the network administrator for your company. All network servers run Windows Server 2003. Business hours are 8 A.M. to 5 P.M. You provide network assistance during business hours only. A server named Server1 stores personal files for all network users. Mobile users access Server1 by using the company's VPN. They must have 24-hour access to the files on Server1. You need to be able to identify the source of the recurring slowdowns in VPN access. First, you log on to Server1. What should you do next?()AUse Task Manager to review network utilization of the VPN adapter.BUse the Performance console to create a log of network utilization outside of business hours.CUse System Monitor to review network utilization of the VPN connection.DUse Task Manager to select Bytes Sent as the Network Adapter History setting.

单选题You are the network administrator for your company. The network consists of a single Active Directory domain.  The company has remote users in the sales department who work from home. The remote users’ client computers run Windows XP Professional, and they are not members of the domain. The remote users’ client computers have local Internet access through an ISP.   The company is deploying a Windows Server 2003 computer named Server1 that has Routing and Remote Access installed. Server1 will function as a VPN server, and the remote users will use it to connect to the company network. Confidential research data will be transmitted from the remote users’ client computers. Security is critical to the company and Server1 must protect the remote users’ data transmissions to the main office. The remote client computers will use L2TP/IPSec to connect to the VPN server.  You need to choose a secure authentication method.   What should you do? ()A Use the authentication method of the default IPSec policies.B Create a custom IPSec policy and use the Kerberos version 5 authentication protocol.C Create a custom IPSec policy and use certificate-based authentication.D Create a custom IPSec policy and use preshared key authentication.E Use the authentication method of the Routing and Remote Access custom IPSec policy for L2TP connection.