网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A company has acquired another company and is consolidating data centers. During the consolidation, half of the users of a business-critical application lost access. The users who maintained access experienced slow performance.  What is the first action the SAN/storage administrator should take to determine the source of the problem()
A

review SAN configuration, connectivity, and zoning

B

review application parameters for contention or tuning problems

C

use internal disk monitoring tools to determine the problem source

D

check the disk parameters in the OS setup on the systems


参考答案

参考解析
解析: 暂无解析
更多 “单选题A company has acquired another company and is consolidating data centers. During the consolidation, half of the users of a business-critical application lost access. The users who maintained access experienced slow performance.  What is the first action the SAN/storage administrator should take to determine the source of the problem()A review SAN configuration, connectivity, and zoningB review application parameters for contention or tuning problemsC use internal disk monitoring tools to determine the problem sourceD check the disk parameters in the OS setup on the systems” 相关考题
考题 Network Access Protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The company policy required confidentiality of data when the data is in transmit between the portable computers and the servers. You need to ensure taht users can access network resources only from computers that comply with the company policy. What should you do? ()A、 Create an IPsec Enforcement Network policyB、 Create an 802.1X enforcement network policyC、 Create a wired network (IEEE 802.3) Group PolicyD、 Create an Extensible Authentication Portocol (EAP) Enforcement Network Policy

考题 A new company has been given one public IP address. The company employs 200 users requiring Internet access from the headquarters. Which of the following can be implemented to provide Internet access for all the employees?()A、MulticastingB、Proxy serverC、NATD、Subnetting

考题 A company may use the Windows XP Professional MUI Pack because the company:()A、has offices where users who speak different languages share computers.B、wants to maintain multiple operating systems.C、has users who work remotely at home offices.D、wants to deploy and maintain a single operating system standard.

考题 A company has acquired another company and is consolidating data centers. During the consolidation, half of the users of a business-critical application lost access. The users who maintained access experienced slow performance.  What is the first action the SAN/storage administrator should take to determine the source of the problem()A、review SAN configuration, connectivity, and zoningB、review application parameters for contention or tuning problemsC、use internal disk monitoring tools to determine the problem sourceD、check the disk parameters in the OS setup on the systems

考题 A company has acquired another company and is consolidating data centers. During the consolidation, half of the users of a business critical application lost access. The users who maintained access experienced slow performance.  What is the first action the SAN/storage administrator should take to determine the source of the problem()A、review SAN configuration, connectivity, and zoningB、review application parameters for contention or tuning problemsC、use internal disk monitoring tools to determine the problem sourceD、check the disk parameters in the OS setup on the systems

考题 You are the administrator of a SQL Server 2005 computer named SQL1. All servers run Microsoft Windows Server 2003 and belong to a Microsoft Active Directory domain. The companys written security policy mandates strong passwords for all domain, local, and application accounts. The appropriate domain password policy has been deployed through the use of a Group Policy object (GPO). Many of the company’s computers run MS-DOS-based or UNIX-based operating systems. These computers require varying levels of access to a database named Services on SQL1. You need to ensure that these computers can access the Services database without violating the company’s written security policy.  What should you do?()A、Create a domain account for each of the company’s users. Provide each domain account with access to SQL1 and the Services database.B、Create a local logon account on SQL1 for each of the company’s users. Provide each logon account with access to SQL1 and the Services database.C、Create a SQL Server logon account for each of the company’s users. Enable the Enforce password policy option for each logon account. Provide each logon account with access to the Services database.D、Configure a virtual directory through Internet Information Services (IIS) for access to SQL1. Direct users to the virtual directory for data access.E、Create one SQL Server logon account for all of the company’s computers running MS-DOS or UNIX-based operating systems. Enable the Enforce password policy option for users’ accounts. Provide the logon accounts with access to the Services database.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All client computers run Windows XP Professional. The company has a large number of sales representatives who need access to the company network when they travel. A Windows 2000 Server computer is configured to allow users to access the network by using a dial-up connection. Several of the sales representatives occasionally travel to rural locations that have telephone lines that use outdated technology. The sales representatives report that when they attempt to establish a dial-up connection in these locations, they receive the following error message: "The server is not responding." They cannot connect to the remote access server or to the company network. Users who travel to urban areas do not report this problem. You investigate and find out that the server is running properly, but the problem persists. The sales representatives need to be able to use the dial-up connection to access the company network. What should you do?()A、Change the flow control option in the modem properties to Xon / Xoff.B、Disable error correction in the modem's default data connection preferences.C、Adjust the modem's default connection speed to a lower rate. D、Disable the first-in, first-out (FIFO) receive and transmit buffers on the modem. 

考题 You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com has merged with another company named Courseware Publishers.The users at Courseware Publishers complained that they cannot automatically locate the Client Access servers at Company.com.The users need to locate the Client Access servers at Company.com.What should you do?()A、The best option is to use an A record for FederatedSharing.Company.com.B、The best option is to use an SRV record for _autodiscover._TCP._msdcs.Company.com.C、The best option is to use an A record for autodiscover.Company.com.D、The best option is to use an SRV record for _FederatedSharing._UDP._msdcs.Company.com.

考题 Your network contains an Active Directory domain named contoso.com. The domain contains a   server named Server1. The Active Directory Federation Services (AD FS) role is installed on Server1. Contoso.com is defined as an account store.   A partner company has a Web-based application that uses AD FS authentication. The partner company  plans to provide users from contoso.com access to the Web application.   You need to configure AD FS on contoso.com to allow contoso.com users to be authenticated by the   partner company.   What should you create on Server1()A、a new applicationB、a resource partnerC、an account partnerD、an organization claim

考题 You are a desktop administrator for your company. You are responsible for deploying a new application. The application is packaged in an .msi file. You need to deploy the application to only three users in the company. The .msi file contains all of the information necessary to correctly install the application. You need to install the application so that users see information about the installation progress, but no other user interface is displayed during the installation. What should you do?()A、Use the Msiexec.exe program to perform a quiet installation of the application.B、Use the Msiexec.exe program to perform a passive installation of the application. C、Create a Group Policy object (GPO) that assigns the application. Link the GPO to the site containing the users who will use the application. D、Create a Group Policy object (GPO) that advertises the application. Link the GPO to the domain. 

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains an application server running Windows Server 2003.   Users report intermittent slow performance when they access the application server throughout the day. You find out that the network interface on the application server is being heavily used during the periods of slow performance. You suspect that a single computer is causing the problem.You need to create a plan to identify the problem computer.   What should you do?()A、 Monitor the performance monitor counters on the application server by using System Monitor.  B、 Monitor the network traffic on the application server by using Network Monitor.C、 Monitor network statistics on the application server by using Task Manager.D、 Run network diagnostics on the application server by using Network Diagnostics.

考题 You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com has merged with another company.The users at Company.com have complained that they are not able to share contacts with the users in the merge company.However, they can share free/busy information.The users at Company.com need to share contacts.What should you do?()A、You should consider changing the EWS virtual directory.B、You should consider changing the Federation Trust.C、You should consider changing the Organizational Relationship.D、You should consider changing the default sharing policy.

考题 You are a network administrator for your company. The network contains a Windows Server 2003 computer named Server1. Server1 has a single CPU, 512 MB of RAM, and a single 100-Mb network adapter.   All network users’ home folders are stored on Server1. Users access their home folders by using a mapped network drive that connects to a shared folder on Server1.   After several weeks, users report that accessing home folders on Server1 is extremely slow at certain times during the day.   You need to identify the resource bottleneck that is causing the poor performance.   What should you do?  ()A、 Capture a counter log by using LogicalDisk, PhysicalDisk, Processor, Memory, and Network Interface performance objects, and view the log data information that is captured during periods of poor performance.B、 Configure Alerts on Server1 to log entries in the event logs for the LogicalDisk, PhysicalDisk, Processor, Memory, and Network Interface performance objects when the value of any object is more than 90.C、 Capture a trace log that captures Page faults, File details, Network TCP/IP, and Process creations/deletions events.D、 Implement auditing on the folder that contains the users’ home folders. Configure Network Monitor on Server1.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain.  The company has remote users in the sales department who work from home. The remote users’ client computers run Windows XP Professional, and they are not members of the domain. The remote users’ client computers have local Internet access through an ISP.   The company is deploying a Windows Server 2003 computer named Server1 that has Routing and Remote Access installed. Server1 will function as a VPN server, and the remote users will use it to connect to the company network. Confidential research data will be transmitted from the remote users’ client computers. Security is critical to the company and Server1 must protect the remote users’ data transmissions to the main office. The remote client computers will use L2TP/IPSec to connect to the VPN server.  You need to choose a secure authentication method.   What should you do? ()A、 Use the authentication method of the default IPSec policies.B、 Create a custom IPSec policy and use the Kerberos version 5 authentication protocol.C、 Create a custom IPSec policy and use certificate-based authentication.D、 Create a custom IPSec policy and use preshared key authentication.E、 Use the authentication method of the Routing and Remote Access custom IPSec policy for L2TP connection.

考题 单选题A new company has been given one public IP address. The company employs 200 users requiring Internet access from the headquarters. Which of the following can be implemented to provide Internet access for all the employees?()A MulticastingB Proxy serverC NATD Subnetting

考题 单选题A company has acquired another company and is consolidating data centers. During the consolidation, half of the users of a business critical application lost access. The users who maintained access experienced slow performance.  What is the first action the SAN/storage administrator should take to determine the source of the problem()A review SAN configuration, connectivity, and zoningB review application parameters for contention or tuning problemsC use internal disk monitoring tools to determine the problem sourceD check the disk parameters in the OS setup on the systems

考题 单选题You are the administrator of a SQL Server 2005 computer named SQL1. All servers run Microsoft Windows Server 2003 and belong to a Microsoft Active Directory domain. The companys written security policy mandates strong passwords for all domain, local, and application accounts. The appropriate domain password policy has been deployed through the use of a Group Policy object (GPO). Many of the company’s computers run MS-DOS-based or UNIX-based operating systems. These computers require varying levels of access to a database named Services on SQL1. You need to ensure that these computers can access the Services database without violating the company’s written security policy.  What should you do?()A Create a domain account for each of the company’s users. Provide each domain account with access to SQL1 and the Services database.B Create a local logon account on SQL1 for each of the company’s users. Provide each logon account with access to SQL1 and the Services database.C Create a SQL Server logon account for each of the company’s users. Enable the Enforce password policy option for each logon account. Provide each logon account with access to the Services database.D Configure a virtual directory through Internet Information Services (IIS) for access to SQL1. Direct users to the virtual directory for data access.E Create one SQL Server logon account for all of the company’s computers running MS-DOS or UNIX-based operating systems. Enable the Enforce password policy option for users’ accounts. Provide the logon accounts with access to the Services database.

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All client computers run Windows XP Professional. The company has a large number of sales representatives who need access to the company network when they travel. A Windows 2000 Server computer is configured to allow users to access the network by using a dial-up connection. Several of the sales representatives occasionally travel to rural locations that have telephone lines that use outdated technology. The sales representatives report that when they attempt to establish a dial-up connection in these locations, they receive the following error message: "The server is not responding." They cannot connect to the remote access server or to the company network. Users who travel to urban areas do not report this problem. You investigate and find out that the server is running properly, but the problem persists. The sales representatives need to be able to use the dial-up connection to access the company network. What should you do?()A Change the flow control option in the modem properties to Xon / Xoff.B Disable error correction in the modem's default data connection preferences.C Adjust the modem's default connection speed to a lower rate. D Disable the first-in, first-out (FIFO) receive and transmit buffers on the modem. 

考题 单选题Your network contains an Active Directory domain named contoso.com. The domain contains a  server named Server1. The Active Directory Federation Services (AD FS) role is installed on  Server1.     Contoso.com is defined as an account store.  A partner company has a Web-based application that uses AD FS authentication. The partner  company plans to provide users from contoso.com access to the Web application. You need to  configure AD FS on contoso.com to allow contoso.com users to be authenticated by the partner  company.     What should you create on Server1()A a new applicationB a resource partnerC an account partnerD an organization claim

考题 单选题A company has acquired another company and is consolidating data centers. During the consolidation, half of the users of a business-critical application lost access. The users who maintained access experienced slow performance.  What is the first action the SAN/storage administrator should take to determine the source of the problem()A review SAN configuration, connectivity, and zoningB review application parameters for contention or tuning problemsC use internal disk monitoring tools to determine the problem sourceD check the disk parameters in the OS setup on the systems

考题 单选题You are a desktop administrator for your company. You are responsible for deploying a new application. The application is packaged in an .msi file. You need to deploy the application to only three users in the company. The .msi file contains all of the information necessary to correctly install the application. You need to install the application so that users see information about the installation progress, but no other user interface is displayed during the installation. What should you do?()A Use the Msiexec.exe program to perform a quiet installation of the application.B Use the Msiexec.exe program to perform a passive installation of the application. C Create a Group Policy object (GPO) that assigns the application. Link the GPO to the site containing the users who will use the application. D Create a Group Policy object (GPO) that advertises the application. Link the GPO to the domain. 

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains an application server running Windows Server 2003.   Users report intermittent slow performance when they access the application server throughout the day. You find out that the network interface on the application server is being heavily used during the periods of slow performance. You suspect that a single computer is causing the problem.You need to create a plan to identify the problem computer.   What should you do?()A  Monitor the performance monitor counters on the application server by using System Monitor.  B  Monitor the network traffic on the application server by using Network Monitor.C  Monitor network statistics on the application server by using Task Manager.D  Run network diagnostics on the application server by using Network Diagnostics.

考题 单选题Network Access Protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The company policy required confidentiality of data when the data is in transmit between the portable computers and the servers. You need to ensure taht users can access network resources only from computers that comply with the company policy. What should you do? ()A  Create an IPsec Enforcement Network policyB  Create an 802.1X enforcement network policyC  Create a wired network (IEEE 802.3) Group PolicyD  Create an Extensible Authentication Portocol (EAP) Enforcement Network Policy

考题 单选题Your network contains an Active Directory domain named contoso.com. The domain contains a   server named Server1. The Active Directory Federation Services (AD FS) role is installed on Server1. Contoso.com is defined as an account store.   A partner company has a Web-based application that uses AD FS authentication. The partner company  plans to provide users from contoso.com access to the Web application.   You need to configure AD FS on contoso.com to allow contoso.com users to be authenticated by the   partner company.   What should you create on Server1()A a new applicationB a resource partnerC an account partnerD an organization claim

考题 单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com policy prohibits the users from changing their password by using Outlook Web App (OWA). What should you do?()A The best option is to set up an Outlook Web App Mailbox policy so that the users comply with the Company.com policy.B The best option is to set up a Group Policy Object so that the users comply with the Company.com policy.C The best option is to change the authentication settings of the OWA virtual directory so that the users comply with the Company.com policy.D The best option is to change the authentication settings of the IISADMPWD virtual directory so that the users comply with the Company.com policy.

考题 单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com has merged with another company named Courseware Publishers.The users at Courseware Publishers complained that they cannot automatically locate the Client Access servers at Company.com.The users need to locate the Client Access servers at Company.com.What should you do?()A The best option is to use an A record for FederatedSharing.Company.com.B The best option is to use an SRV record for _autodiscover._TCP._msdcs.Company.com.C The best option is to use an A record for autodiscover.Company.com.D The best option is to use an SRV record for _FederatedSharing._UDP._msdcs.Company.com.

考题 单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com has merged with another company.The users at Company.com have complained that they are not able to share contacts with the users in the merge company.However, they can share free/busy information.The users at Company.com need to share contacts.What should you do?()A You should consider changing the EWS virtual directory.B You should consider changing the Federation Trust.C You should consider changing the Organizational Relationship.D You should consider changing the default sharing policy.

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain.  The company has remote users in the sales department who work from home. The remote users’ client computers run Windows XP Professional, and they are not members of the domain. The remote users’ client computers have local Internet access through an ISP.   The company is deploying a Windows Server 2003 computer named Server1 that has Routing and Remote Access installed. Server1 will function as a VPN server, and the remote users will use it to connect to the company network. Confidential research data will be transmitted from the remote users’ client computers. Security is critical to the company and Server1 must protect the remote users’ data transmissions to the main office. The remote client computers will use L2TP/IPSec to connect to the VPN server.  You need to choose a secure authentication method.   What should you do? ()A  Use the authentication method of the default IPSec policies.B  Create a custom IPSec policy and use the Kerberos version 5 authentication protocol.C  Create a custom IPSec policy and use certificate-based authentication.D  Create a custom IPSec policy and use preshared key authentication.E  Use the authentication method of the Routing and Remote Access custom IPSec policy for L2TP connection.