网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You administer Company's network that consists of 100 Windows 2000 Professional computers and nine Windows 2000 Server computers. All users at Company save their work files in home folders on a network server. The network server is configured with two NTFS volumes. One of the NTFS volumes contains the home folders for the users at Company and the other NTFS volume contains a shared folder named PROGRESS, which is used for users to save temporary work files in. Disk quotas and Encrypting File System (EFS) is enabled on the NTFS volume with the home folders. All users have a default limit of 100 MB and the option to deny space to users who exceed their limit has been enabled.  A user reports that he cannot save any files to his home folder. He also cannot update files in his home folder. The user currently has no data stored in the PROGRESS folder. When he attempts to save files to his home folder, he receives the following error message: "Insufficient disk space." Other users are not experiencing this problem with their home folders. You want to allow the user to save files on the network server.  What should you do?()
A

 Use Windows Backup to archive and remove old files on the server.

B

 Compress the files in the user’s home folder to allow additional files to be saved.

C

 Move some of the files from the user’s home folder to the PROGRESS share folder.

D

 Log on the network as a Recovery Agent. Decrypt all of the user’s files in his home folder. 

E

 Lon on to the network by using the domain Administrator account. Grant the user Full Control permission to his home folder.


参考答案

参考解析
解析: 暂无解析
更多 “单选题You administer Company's network that consists of 100 Windows 2000 Professional computers and nine Windows 2000 Server computers. All users at Company save their work files in home folders on a network server. The network server is configured with two NTFS volumes. One of the NTFS volumes contains the home folders for the users at Company and the other NTFS volume contains a shared folder named PROGRESS, which is used for users to save temporary work files in. Disk quotas and Encrypting File System (EFS) is enabled on the NTFS volume with the home folders. All users have a default limit of 100 MB and the option to deny space to users who exceed their limit has been enabled.  A user reports that he cannot save any files to his home folder. He also cannot update files in his home folder. The user currently has no data stored in the PROGRESS folder. When he attempts to save files to his home folder, he receives the following error message: "Insufficient disk space." Other users are not experiencing this problem with their home folders. You want to allow the user to save files on the network server.  What should you do?()A  Use Windows Backup to archive and remove old files on the server.B  Compress the files in the user’s home folder to allow additional files to be saved.C  Move some of the files from the user’s home folder to the PROGRESS share folder.D  Log on the network as a Recovery Agent. Decrypt all of the user’s files in his home folder. E  Lon on to the network by using the domain Administrator account. Grant the user Full Control permission to his home folder.” 相关考题
考题 You administer your company‘s network. All client computers run Microsoft Windows Vista. A standard user reports that they are unable to install an application. You need to install the applicatin.What should you do?()A.AB.BC.CD.D

考题 You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()A.AB.BC.CD.D

考题 You connect your computer to a wireless network. You discover that this new connection fails to show in the Connect to a network window.You need to view this connection in the Connect to a network window.What should you do?()A.AB.BC.CD.D

考题 You work as a network Exchange administrator at Company.com.The Company.com network currently consists of an internal network and perimeter network.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently deployed a new server to the perimeter network which runs Microsoft Windows Server 2008 R2.During the course of the business week you receive instruction from Company.com to install the Microsoft Exchange Server Edge Transport server role on the server in the perimeter network. What should you do?()A、You should consider having the ImportEdgeConfig.ps1 script run on the existing Exchange Server 2010 server.B、You should consider having TCP port 88 and TCP port 3268 opened on the firewall between the perimeter network and the internal network.C、You should consider having the new server joined to an Active Directory domain.D、You should consider having the Active Directory Lightweight Directory Services installed on the new server in the perimeter network.

考题 You are the network administrator for Company. Company’s network consists of 200 Windows 2000 Professional computers. CompanyW1 is a Windows 2000 Server computer that hosts Company’s intranet site. CompanyP1 is a computer running Microsoft Proxy Server that is used by all computers on the network to access the Internet. You discover that CompanyP1 is experiencing performance degradation due to large number of requests to authenticate with the proxy server. You want to minimize the number of authentication requests to the proxy server. What should you do on each computer?()A、Configure the proxy server settings to have a Secure proxy address of CompanyP1.B、Configure the proxy server settings to bypass the proxy server for local addresses.C、Add CompanyW1 to the Local intranet zone.D、Add the CompanyW1 to the list of trusted sites.

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a server named S01 that runs Windows Server 2008 and Hyper-V inyour company. Three virtual machines are hosted on S01. According to the requirement of company policy,the virtual machines must not connect to the company network. All of the virtual machines need to beconfigured to connect to each other. You must meet the company policy. Which should you do?()A、The Connection should be set to Host for the network interface card.B、The Connection should be set to None for the network interface card.C、You should choose the Not connected option for each virtual machine.D、The Enable virtual LAN identification option should be enabled for each virtual machine.

考题 You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently configured a user named Rory Allen as a Delegate for a user named Dean Austin.During the course of the business week you receive instruction from Company.com to ensurethat Rory Allen is able to add Dean Austin in the from field when sending messages whilst ensuring messages which contain Dean Austin in the From field should display Dean Austin s the message sender when the recipient receive the messages.  What should you do?()A、You should consider having a Sharing policy created.You should then have Rory Allen granted Modify permission to Dean Austin’s mailbox.B、You should consider having a Sharing policy created.You should then have Rory Allen granted Full Mailbox permission to Dean Austin’s mailbox.C、You should consider having Rory Allen removed as a delegate.You should then have Rory Allen granted Send As permission to Dean Austin’s Mailbox.D、You should consider having Rory Allen removed as a delegate.You should then have Rory Allen granted Send on Behalf permission to Dean Austin’s mailbox.

考题 You administer Company's network that consists of 20 Windows 2000 Professional computers configured with default networking settings. Company can not for the moment afford a permanent Internet connection for the network so you do have a single dial-up account to a local Internet Service Provider (ISP). A client computer named Company1 has a 56-Kbps modem installed. You configure a dial-up connection to the ISP on Company1. You want all of the computers to be able to access the Internet when Web resources are requested. What should you do? ()A、Configure the dial-up connection to enable Internet Connection Sharing and on-demand dialing.B、Configure the dial-up connection to enable Internet Connection Sharing and disable on-demand dialingC、Configure the dial-up connection to disable Internet Connection Sharing and enable on-demand dialing.D、Configure the dial-up connection to disable Internet Connection Sharing and on-demand dialing

考题 You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the day a network user named Mia Hamm reports that certain meetings are missing from her calendar.Company.com requested that you recover the missing calendar items for Mia Hamm whilst ensuring your solution recovers the missing items automatically.What should you do?()A、You should consider having the Set-MailboxCalendarConfiguration cmdlet run.B、You should consider having the schedule set for the Calendar Repair Assistant (CRA).C、You should consider having a Sharing policy created and configured.D、You should consider having the schedule set for the Managed Folder Assistant.

考题 You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to ensure that a newly created room mailbox automatically accepts meeting requests.What should you do?()A、You should consider having a managed folder mailbox policy assigned.B、You should consider having the resource booking attendant enabled.C、You should consider having the mailbox permissions modified.D、You should consider having the moderation for the mailbox enabled.

考题 You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently attempted the creation of a new address list based on the network user’s country attribute but discovered that the attribute is not available in the New Address List Wizard.During the course of the business week you receive instruction from Company.com to create a new address list based on the network user’s country. What should you do?()A、You should consider having a new dynamic distribution group created and run the New Address List wizard from the Exchange Management Console (EMC).B、You should consider having the properties of the All Users Address list modified and run the New Address List wizard from the Exchange Management Console (EMC).C、You should consider having the Set-AddressList cmdlet run from the Exchange Management Shell.D、You should consider having the New-AddressList cmdlet run from the Exchange Management Shell.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully.   To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster.   You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster.  You want to add the port rule to the nodes of the cluster.   What should you do?  ()A、 Use Network Load Balancing Manager on the Network Load Balancing default host to add the port rule.B、 Change the host priority of the second node to be the highest in the cluster, and then use Network Load Balancing Manager to add the port rule.C、 Run the nlb.exe drain command on each node, and then use Network Load Balancing Manager to add the port rule.D、 Add the port rule through Network Connections Properties on each node.

考题 You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.You receive a complaint from a Company.com employee named Mia Hamm stating that she is only able to access her mailbox using Outlook Web App.You need to make sure that she can access her Mailbox.What should you do?()A、You should consider enabling and set up Outlook Anywhere.B、You should consider setting up an Outlook Web App Mailbox policy.C、You should consider changing Mia Hamm’s mailbox features.D、You should consider removing Autodiscover record from the DNS zone.

考题 You work as a network Exchange administrator at Company.com.The Company.com network  currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.The Company.com network users have been configured by Company.com to have the @Company.com email address suffix.During the course of the business week you receive instruction from Company.com to configure a public folder named KingPublic for the Internet users to post content by sending e-mail to KingPublic@Company.com.  What should you do?()A、You should consider having a new mail contact created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.B、You should consider having a new mailbox created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.C、You should consider having mail enabled for KingPublic.D、You should consider having the author role assigned to Anonymous.

考题 You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to prevent the network user named Rory Allen from downloading attachments which are larger than 50 KB when making use of Exchange ActiveSync whilst ensuring your solution affects no other users. What should you do?()A、You should consider having the properties of Rory Allen’s mailbox modified.B、You should consider having the properties if the default Exchange ActiveSync Mailbox policy modified.C、You should consider having a new ActiveSynce Device Access rule created.D、You should consider having a new Exchange ActiveSync Mailbox policy created.

考题 You work as a network Exchange administrator at Company.com.The Company.com network  currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently added a distribution group named KingDistribute.During the course of the business week you receive instruction from Company.com to ensure that a user named Dean Austin is able to add and remove members from KingDistribute whilst ensuring you prevent Dean Austin from modifying all other groups. What should you do?()A、You should consider having Dean Austin assigned the Distributions Groups management role.B、You should consider having Dean Austin assigned the MyDistributionsGroups management role.C、You should consider having Dean Austin added ti KingDistribute’s Managed by list.D、You should consider having Dean Austin assigned as a group moderator for KingDistribute.

考题 You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to ensure that all the network users are able to automatically schedule the use of a projector.What should you do?()A、You should consider having the schedule for the Managed Folder Assistant modified.B、You should consider having the properties of the Calendar managed default folder modified.C、You should consider having a new Sharing policy created.D、You should consider having an equipment mailbox created.

考题 You are the network administrator for Company.Company has just upgraded its network switches from 10 Mbps to 100 Mbps. After the upgrade, you findthat the 100 Windows 2000 Professional computers on the network are still communicating at only 10Mbps. Company uses NWLink as the only network protocol.You want to enable the computers to communicate at 100 Mbps.What should you do?()A、Replace the network adapters with 10/100 Mbps network adapters. B、Enable TCP/IP on all of the computers on the network.C、Configure the NWLink frame type of the network adapters to be Ethernet II. D、Configure the NWLink frame type of the network adapters to be Ethernet 802.3.

考题 You administer Company's network that consists of 100 Windows 2000 Professional computers and nine Windows 2000 Server computers. All users at Company save their work files in home folders on a network server. The network server is configured with two NTFS volumes. One of the NTFS volumes contains the home folders for the users at Company and the other NTFS volume contains a shared folder named PROGRESS, which is used for users to save temporary work files in. Disk quotas and Encrypting File System (EFS) is enabled on the NTFS volume with the home folders. All users have a default limit of 100 MB and the option to deny space to users who exceed their limit has been enabled.  A user reports that he cannot save any files to his home folder. He also cannot update files in his home folder. The user currently has no data stored in the PROGRESS folder. When he attempts to save files to his home folder, he receives the following error message: "Insufficient disk space." Other users are not experiencing this problem with their home folders. You want to allow the user to save files on the network server.  What should you do?()A、 Use Windows Backup to archive and remove old files on the server.B、 Compress the files in the user’s home folder to allow additional files to be saved.C、 Move some of the files from the user’s home folder to the PROGRESS share folder.D、 Log on the network as a Recovery Agent. Decrypt all of the user’s files in his home folder. E、 Lon on to the network by using the domain Administrator account. Grant the user Full Control permission to his home folder.

考题 You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to ensure that the network users are able to open a resource mailbox. What should you do?()A、You should consider having a new Sharing policy crated from the Exchange Management Console (EMC).B、You should consider having the Resource Delegated parameter set for the resource mailbox from the Exchange Management Shell.C、You should consider having the password for the account associated to the resource mailbox reset from Active Directory Users And Computers console.You should then have the password provided to the network users .D、You should consider having the properties of the resource mailbox modified from Microsoft Office Outlook.

考题 You are the network administrator for Company.You need to connect to Company’s network from your Windows 2000 Professional computer at home.You have a DSL line that is used for Internet connectivity. You create an L2TP virtual private network(VPN) connection and are able to connect successfully to Company’s network. While connected toCompany’s network, you are unable to access the Internet.You want to be able to access the Internet while connected to Company’s network.How should you configure the connection properties?()A、Configure the DSL connection to use PPTP instead of L2TP. B、Enable Internet Connection Sharing for the DSL connection properties. C、CLEAR THE Use default gateway on remote network check box. D、Clear the Require data encryption check box. 

考题 You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently created a distribution group for the network users.During the course of the business week you receive instruction from Company.com to ensure that the newly added users are able to add their mailboxes to the distribution group.What should you do?()A、You should consider having the security settings of the distribution group modified.B、You should consider having the authentication settings of the ECP virtual directory modified.C、You should consider having the group scope of the distribution group modified.D、You should consider having the approval mode of the distribution group modified.

考题 You are the administrator of Etechsol.com Enterprises. Your company consists of a small 20-user network. Management has decided to upgrade all computers to Windows 2000.   After having a closer examination of your company’s network, you realize that only half of the network interface cards are Net PC compliant. You decide to create Windows 2000 remote boot floppies.  What executable is used for creating RIS boot disks for non-PXE compliant clients?()A、RBFG*EXEB、RIPREP*EXEC、RIS*EXED、RISPXE*EXEE、RISBOO*EXE

考题 多选题You are the administrator of Company.com's Windows 2000 Network. The routed TCP/IP network that you administer consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. All computers are members of a single Windows 2000 domain named Company.com. TCP/IP is the only network protocol used at Company's office. You have recently installed 10 new Windows 2000 Professional computers and you want to enable the new computers to use host names to connect to shared resources on the network. You configure a TCP/IP address and a gateway address on each new computer. You want to complete the configuration to allow the computers to communicate on the network.  What should you do?()AConfigure a DNS suffix.BConfigure a subnet mask.CConfigure an LMHOSTS file.DConfigure an Interface metric.EConfigure at least one DNS address.

考题 单选题You are the administrator of your company’s network. Using Windows Installer packages, you want to install customized versions of Microsoft Excel on different departments in the company. Which type of file should you apply to the installation database?()A msiB mstC zapD zip

考题 单选题You connect your computer to a wireless network. You discover that this new connection fails to show in the Connect to a network window.  You need to view this connection in the Connect to a network window.  What should you do?()A Click the Diagnose and repair link.B Enable the Turn on notification of new networks option.C Configure the Connect to a network window to show all networks.D Disable the Connect automatically when this network is in range option, and then enable the Connect even if the network is not broadcasting option.

考题 多选题You are the administrator of Company.com’s Windows 2000 Network.  Your routed TCP/IP network consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. All computers are in the Company.com domain. Your network uses TCP/IP as the only network protocol. You are installing 10 new Windows 2000 Professional computers. You want to enable the new computers to use host names to connect to shared resources on the network. You configure a TCP/IP address, a gateway address and a subnet mask on each new computer.   You want to complete the configuration to allow the computers to communicate on the network.  What should you do?()AConfigure a HOSTS file.BConfigure a LMHOSTS file.CConfigure a WINS server database.DConfigure a DHCP server address.EConfigure at least one DNS address.

考题 单选题Your Company upgrades its network to 100 Mbps. You remove the old network adapter and install a new 10/100 Mbps network adapter into a Windows 2000 Professional computer. You configure the TCP/IP protocol settings to be the same as they were for the previously installed network adapter.   When you restart eh computer, however, you cannot access the network. You try to ping your network adapter’s TCP/IP address locally. You receive the following error message. “Request timed out.” Next, you try to ping 127.0.0.1 and receive the same error message.   What must you do?()A Configure a different TCP/IP addressB Enable DHCP in the TCP/IP propertiesC Enable DNS in the TCP/IP propertiesD Configure the network adapter to run at 100 Mbps onlyE Replace the network adapter.