网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You are one of the network administrators for All network servers run Windows Server 2003. TestKing operates a total of four offices. The office where you work has 15 servers. You are responsible for supporting and maintaining all of these servers. You need to design a monitoring plan that will achieve the following goals: 1. Track all performance changes on the servers. 2. Record performance data to anticipate the need for future upgrades. What should you do?()
A

On each server in your office, use Performance Logs and Alerts to create a baseline log. Configure the log to collect data every five minutes for one day. Use the same counters for each server to create a log file. Schedule the log to run weekly.

B

From a monitoring computer, use Performance Logs and Alerts to create a baseline log for each server in your office. Configure the log to collect data every five minutes for one day. Use the same counters for each server to create a log file. Schedule the log to run weekly.

C

On each server in your office, use Performance Logs and Alerts to create threshold-based alerts. Configure the alerts to send a message to your monitoring computer when they are triggered. Set each alert to start a new scan when the alert finishes.

D

From a monitoring computer use Performance Logs and Alerts to create a new counter set in System Monitor. Configure the counters to run continuously.


参考答案

参考解析
解析: 暂无解析
更多 “单选题You are one of the network administrators for All network servers run Windows Server 2003. TestKing operates a total of four offices. The office where you work has 15 servers. You are responsible for supporting and maintaining all of these servers. You need to design a monitoring plan that will achieve the following goals: 1. Track all performance changes on the servers. 2. Record performance data to anticipate the need for future upgrades. What should you do?()A On each server in your office, use Performance Logs and Alerts to create a baseline log. Configure the log to collect data every five minutes for one day. Use the same counters for each server to create a log file. Schedule the log to run weekly.B From a monitoring computer, use Performance Logs and Alerts to create a baseline log for each server in your office. Configure the log to collect data every five minutes for one day. Use the same counters for each server to create a log file. Schedule the log to run weekly.C On each server in your office, use Performance Logs and Alerts to create threshold-based alerts. Configure the alerts to send a message to your monitoring computer when they are triggered. Set each alert to start a new scan when the alert finishes.D From a monitoring computer use Performance Logs and Alerts to create a new counter set in System Monitor. Configure the counters to run continuously.” 相关考题
考题 When you are(71)a home or small office network, it is recommended that you use the Network Setup Wizard in Windows XP Home Edition to enable Internet Connection Sharing. The Network Setup Wizard automatically provides all of the network settings you need to(72)one Internet connection with all the computers in your network.After ICS is enabled, and you make sure that all of your computers can(73)with each other and they have Internet(74), you can use programs such as Internet Explorer and Outlook Express as if they were(75)connected to the Internet service provider(ISP). When a request to the Internet is made, the ICS host computer connects to the ISP and creates the connection so that other computers can reach a specified Web address or download E-mail.A.creatingB.reachC.going forD.setting up

考题 Certkiller .com has asked you to develop an application that displays the properties for all Certkiller.com‘s network drives.The information generated by this application will be utilized by Certkiller .com‘s network administrators to verify client setups.You need to ensure that these requirements are fully satisfied.What should you do?()A.B.C.D.

考题 You work as a senior administrator at ABC.com.The ABC.com network consists of a single domain named ABC.com.All servers on the ABC.com network have Windows Server 2012 R2 installed.You are running a training exercise for junior administrators. You are currently discussing storage pools.Which of the following are TRUE with regards to storage pools?()A、It allows you to group physical disks into one or more containers.B、It prevents you from grouping physical disks into one or more containers.C、It allows you to easily add storage without impacting users.D、It allows you to easily add storage with minor impact on users.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain. The domain contains a Windows Server 2003 computer named Server1.   You are planning a public key infrastructure (PKI) for the company. You want to deploy a certification authority (CA) on Server1.   You create a new global security group named Cert Administrators. You need to delegate the tasks to issue, approve, and revoke certificates to members of the Cert Administrators group.   What should you do?()A、 Add the Cert Administrators group to the Cert Publishers group in the domain.B、 Configure the Certificates Templates container in the Active Directory configuration naming context to assign the Cert Administrators group the Allow - Write permission.C、 Configure the CertSrv virtual directory on Server1 to assign the Cert Administrators group the Allow - Modify permission.D、 Assign the Certificate Managers role to the Cert Administrators group.

考题 You are a security administrator for your company. The company has one main office and five branch offices. Network administrators work in the main office and each branch office.    Network administrators in the main office frequently create scripts that automate common  administrative tasks. You review each script to ensure it does not introduce security vulnerabilities. Scripts that do not introduce security vulnerabilities are considered approved. Occasionally, branch office administrators modify these scripts and distribute the modified scripts to other  branch office administrators. Branch office administrators often report that they accidentally run a modified version of a script.    You need to ensure that branch office administrators can verify which scripts are approved scripts.  What should you do?()A、 Maintain a list of the dates that the approved scripts were last modified. lnstruct branch office administrators to verifB、 Digitally sign All approved scripts. Instruct branch office administrators to verify the signature before using a script.C、 Distribute all approved scripts to branch office administrators in an e-mail message.D、 Place all approved scripts on a file server in the main office. Assign All branch office administrators only the Allow -the approved scripts. Instruct administrators to copy scripts from this file server.

考题 You are subneting in the network, out of network address,what’s feature can add one more address?

考题 Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest. The forest contains a single domain.  You plan to deploy 10 Edge Transport servers on the perimeter network.  You need to recommend a solution for the Edge Transport server deployment. The solution must meet the following requirements: .Allow administrators to apply a single security policy to all Edge Transport servers .Reduce the administrative overhead that is required to manage servers .Minimize the attack surface of the internal network What should you recommend?()A、Implement Network Policy and Access Services (NPAS).B、Implement Active Directory Federation Services (AD FS).C、Create a new Active Directory domain in the internal forest, and then join all Edge Transport servers to the new domain.D、Create an Active Directory forest in the perimeter network, and then join all Edge Transport servers to the new domain.

考题 You are the administrator of your company’s network. You run the English (US) edition of Windows 2000 Professional on all computers in your network. As your company continues to grow, and the number of computers is continually expanding, you decide that another domain is needed. Management asks you about what is required to accommodate this new domain. What should you answer the Management in this regard? ()A、WINS, DHCP and DNSB、At least one domain controller and one DNS server.C、At least one domain controller, Active Directory and DNS server.D、Nothing more is needed.E、Nothing more is needed, we can just subnet the network.

考题 You work as a network administrator at ABC.com.The ABC.com network consists of a single domain named ABC.com.All servers on the ABC.com network have Windows Server 2012 R2 installed. The ABC.com network contains a network attached printer named HPNet01.Only members of a group named ABCUsers and members of the Administrators group will be allowed to use HPNet01.You publish the HPNet01 in Active Directory and share it from a domain controller named ABC_DC02. You then assign the deny Print permissions to HPNet01 for the Everyone group. What else should you do to meet the requirements for HPNet01?()A、You should disable Branch Office Direct PrintingB、You should grant the Print permission to the ABCUsers group.C、You should configure the Printer defaults.D、You should grant the Print permission to the Administrators group.E、You should grant the Print permission to the ABCUsers group and the Administrators group.

考题 You are designing a Windows Server 2008 R2 Hyper-V virtualization environment. Your host servers must have the following elements:  A dedicated management network adapter.A dedicated virtual network for child iSCSI network traffic.A dedicated virtual network for child network traffic with VLAN tagging. You need to choose adapters that minimize the host server processing.  Which adapters should you choose?()A、three network adapters that support 802.1pB、two network adapters that support 802.1q, and one iSCSI host bus adapterC、two network adapters that support 802.1p, and one network adapter that supports TCP ChimneyD、two network adapters that support 802.1q, and one network adapter that supports Jumbo frames

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a four-node Network Load Balancing cluster. All nodes run Windows Server 2003. The cluster has converged successfully. You use Network Load Balancing Manager on the default host to configure all nodes of the cluster.   The nodes have a single network adapter and are connected to the same switching hub device.   Administrators of non-cluster servers that are connected to the same switching hub device report that their servers receive traffic that is destined for the cluster nodes. Receiving this additional network traffic impairs the network performance of the non-cluster servers.   You need to ensure that traffic destined for only the cluster nodes is not sent to all ports of the switching hub device.  You do not want to move the cluster to another switching hub device.   What should you do? ()A、 On one node, run the nlb.exe reload command.B、 On each node, run the wlbs.exe drainstop command.C、 Use Network Load Balancing Manager to enable Internet Group Management Protocol (IGMP) support on the cluster.D、 Use Network Load Balancing Manager to add a second cluster IP address.

考题 You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003. All client computers run Windows XP Professional. You are required to accommodate for five new support engineers. The five support engineers will have have the following responsibilities: 1. Stop and start printers, clear print jobs from the printer queues, and set permissions on printers. 2. Back up and restore all files on the servers. 3. Make changes to TCP/IP settings. 4. Create and delete shared resources You need to assign the support engineers the appropriate permissions to perform the required tasks on the 20 member servers. Of which group should you makie the Support Engineers group a member?()A、the Administrators local group on one of the domain controllers.B、the Administrators local group on each of the servers.C、the Server Operators local group on one of the domain controllers.D、the Power Users local group on one of the servers.E、the Backup Operators local group on one of the domain controllers.F、the Backup Operators local group on each of the servers.

考题 You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.You are running a training exercise for junior administrators. You are currently discussing what happens when you run the Remove-NetLbfoTeam Windows PowerShell cmdlet.Which of the following describes the results of running this cmdlet?()A、It removes one or more network adapters from a specified NIC team.B、It removes a team interface from a NIC team.C、It removes a specified NIC team from the host.D、It removes a network adapter member from a switch team.

考题 You are an administrator of a small business network. You have one dial-up account at an ISP and want all computers on your network connect to the Internet. What should you do? ()A、Enable Internet Connection SharingB、Enable on-demand dialingC、Enable sharing a modem on one computer on the networkD、Configure a DHCP ServerE、Disable Internet Connection SharingF、Configure all the other computers to be DHCP enabled.

考题 You are planning to deploy Windows 7 to all client computers in your network.    You need to ensure that domain administrators can manage domain Group Policy objects (GPOs) from their Windows 7 computers.   What should you provide to the domain administrators?()A、Administration Tools PackB、GPOAccelerator ToolC、Local Group Policy EditorD、Remote Server Administration Tools

考题 Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest. The forest contains a single domain.  You plan to deploy 10 Edge Transport servers on the perimeter network.  You need to recommend a solution for the Edge Transport server deployment. The solution must meet the following requirements: .Allow administrators to apply a single security policy to all Edge Transport servers .Reduce the administrative overhead that is required to manage servers .Minimize the attack surface of the internal network  What should you recommend?()A、Implement Network Policy and Access Services (NPAS).B、Implement Active Directory Federation Services (AD FS).C、Create a new Active Directory domain in the internal forest, and then join all EdgeTransport servers to the new domain.D、Create an Active Directory forest in the perimeter network, and then join all Edge Transport servers to the new domain.

考题 You are the network administrator for TestKing. The network consists of a single Active Directory domain named testking.com. All domain controller run Windows Server 2003. employes three database administrators who administer seven databases servers that run Windows Server 2003. The database administrators occasionally restore a database server after a disaster. To restore a server, database administrators need the rights required to perform the following tasks: 1. Back up files and folders 2. Restore files and folders. 3. Restore the System State data. You need to assign the database administrators the rights that they require to perform the specified tasks. For security reasons, you must not assign the administrators more rights than they require to perform the tasks. What should you do?()A、Add the database administrators' user accounts to the Administrators group on each of the database servers.B、Add the database administrators' user accounts to the Power Users group on each of the database servers.C、Add the database administrators' user accounts to the Backup Operators group on each of the database servers.D、Add the database administrators' user accounts to the Backup Operators group on one of the domain controllers.E、Add the database administrators' user accounts to the Server Operators group on one of the domain controllers.

考题 单选题You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory forest with one domain. The internal network of TestKing.com contains a perimeter network. You have received instructions fromthe CIO to install 15 Edge Transport servers on the perimeter network with the following criteria: * The Edge Transport servers should have a security policy, applied by the administrators. * The minimization of the administrative overhead towards the servers. * The minimization the attack surface of the perimeter network. What should you do?()A The best option is to set up a new Active Directory domain in the internal forest and then join all EdgeTransport servers to the new domain.B The best option is to make use of Active Directory Federation Services (AD FS).C The best option is to make use of Network Policy and Access Services (NPAS).D The best option is to set up a new Active Directory domain in the perimeter network and then join all Edge Transport Servers to the new domain.

考题 多选题You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.  You are running a training exercise for junior administrators. You are currently discussing the Windows Firewall with Advanced Security feature.  Which of the following is TRUE with regards to Windows Firewall with Advanced Security?()AIt provides host-based,two-way network traffic filtering for a computer.BIt provides host-based,one-way network traffic filtering for a computer.CIt blocks unauthorized network traffic flowing into or out of the local computer.DIt only blocks unauthorized network traffic flowing into the local computer.EIt only blocks unauthorized network traffic flowing out of the local computer.

考题 单选题You are a security administrator for your company. The company has one main office and five branch offices. Network administrators work in the main office and each branch office.    Network administrators in the main office frequently create scripts that automate common  administrative tasks. You review each script to ensure it does not introduce security vulnerabilities. Scripts that do not introduce security vulnerabilities are considered approved. Occasionally, branch office administrators modify these scripts and distribute the modified scripts to other  branch office administrators. Branch office administrators often report that they accidentally run a modified version of a script.    You need to ensure that branch office administrators can verify which scripts are approved scripts.  What should you do?()A  Maintain a list of the dates that the approved scripts were last modified. lnstruct branch office administrators to verifB  Digitally sign All approved scripts. Instruct branch office administrators to verify the signature before using a script.C  Distribute all approved scripts to branch office administrators in an e-mail message.D  Place all approved scripts on a file server in the main office. Assign All branch office administrators only the Allow -the approved scripts. Instruct administrators to copy scripts from this file server.

考题 多选题Your network consists of three Active Directory forests. Forest trust relationships exist between all forests. Each forest contains one domain. All domain controllers run Windows Server 2008 R2. Your company has three network administrators. Each network administrator manages a forest and the Group Policy objects (GPOs) within that forest.   You need to create standard GPOs that the network administrators in each forest will use. The GPOs must meet the following requirements:   èThe GPOs must only contain settings for either user configurations or computer configurations. èThe number of GPOs must be minimized.   Which two actions should you perform?()AExport the new GPOs to .cab files. Ensure that the .cab files are available to the network administrator  in each forest.BCreate two new GPOs. Configure both GPOs to use the required user configurations and the required  computer configurations.CCreate two new GPOs. Configure one GPO to use the required user configuration. Configure the other GPO to use the required computer configuration.DBack up the Sysvol folder that is located on the domain controller where the new GPOs were created. Provide the backup to the network administrator in each forest.

考题 单选题Policy-based routing allows network administrators to implement routing policies to allow or deny paths based on all of these factors except which one?()A End systemB ProtocolC ApplicationD Throughput

考题 多选题You are the systems engineer for your company. The network consists of three physical networks connected by hardware-based routers. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.   Each physical network contains at least one domain controller and at least one DNS server. One physical network contains a Microsoft Internet Security and Acceleration (ISA) Server array that provides Internet access for the entire company. The network also contains a certificate server.   Company management wants to ensure that all data is encrypted on the network and that all computers transmitting data on the network are authenticated.   You decide to implement IPSec on all computers on the network. You edit the Default Domain Policy Group Policy object (GPO) to apply the Secure Server (Require Security) IPSec policy.   Users immediately report that they cannot access resources located in remote networks. You investigate and discover that all packets are being dropped by the routers. You also discover that Active Directory replication is not functioning between domain controllers in different networks.   You need to revise your design and implementation to allow computers to communicate across the entire network. You also need to ensure that the authentication keys are stored encrypted.   Which two actions should you take?()AConfigure the routers to use IPSec and a preshared key for authentication.BConfigure the routers to use IPSec and a certificate for authentication.CConfigure the routers to use IPSec and Kerberos for authenticationDReconfigure the GPOs to require a preshared key for IPSec authentication.EReconfigure the GPOs to require a certificate for IPSec authentication.

考题 多选题You are an administrator of a small business network. You have one dial-up account at an ISP and want all computers on your network connect to the Internet. What should you do? ()AEnable Internet Connection SharingBEnable on-demand dialingCEnable sharing a modem on one computer on the networkDConfigure a DHCP ServerEDisable Internet Connection SharingFConfigure all the other computers to be DHCP enabled.

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain. The domain contains a Windows Server 2003 computer named Server1.   You are planning a public key infrastructure (PKI) for the company. You want to deploy a certification authority (CA) on Server1.   You create a new global security group named Cert Administrators. You need to delegate the tasks to issue, approve, and revoke certificates to members of the Cert Administrators group.   What should you do?()A  Add the Cert Administrators group to the Cert Publishers group in the domain.B  Configure the Certificates Templates container in the Active Directory configuration naming context to assign the Cert Administrators group the Allow - Write permission.C  Configure the CertSrv virtual directory on Server1 to assign the Cert Administrators group the Allow - Modify permission.D  Assign the Certificate Managers role to the Cert Administrators group.

考题 单选题You are an administrator of a small business network. You have one dial-up account at an ISP and want all computers on your network connect to the Internet. What should you do? ()A Enable Internet Connection SharingB Enable on-demand dialingC Enable sharing a modem on one computer on the networkD Configure a DHCP ServerE Disable Internet Connection Sharing

考题 多选题You work as a senior administrator at ABC.com.The ABC.com network consists of a single domain named ABC.com.All servers on the ABC.com network have Windows Server 2012 R2 installed.You are running a training exercise for junior administrators. You are currently discussing storage pools.Which of the following are TRUE with regards to storage pools?()AIt allows you to group physical disks into one or more containers.BIt prevents you from grouping physical disks into one or more containers.CIt allows you to easily add storage without impacting users.DIt allows you to easily add storage with minor impact on users.

考题 单选题You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003. All client computers run Windows XP Professional. You are required to accommodate for five new support engineers. The five support engineers will have have the following responsibilities: 1. Stop and start printers, clear print jobs from the printer queues, and set permissions on printers. 2. Back up and restore all files on the servers. 3. Make changes to TCP/IP settings. 4. Create and delete shared resources You need to assign the support engineers the appropriate permissions to perform the required tasks on the 20 member servers. Of which group should you makie the Support Engineers group a member?()A the Administrators local group on one of the domain controllers.B the Administrators local group on each of the servers.C the Server Operators local group on one of the domain controllers.D the Power Users local group on one of the servers.E the Backup Operators local group on one of the domain controllers.F the Backup Operators local group on each of the servers.