网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

On a Windows network, users are reporting that they cannot access any network resources. The users can ping the IP address and connect to the network resource using the IP address. Which of the following is the cause of the problem?()

  • A、The file server is offline.
  • B、The DNS server is not resolving correctly.
  • C、The DHCP server is not assigning correct IP addresses.
  • D、The domain controller is not responding.

参考答案

更多 “ On a Windows network, users are reporting that they cannot access any network resources. The users can ping the IP address and connect to the network resource using the IP address. Which of the following is the cause of the problem?()A、The file server is offline.B、The DNS server is not resolving correctly.C、The DHCP server is not assigning correct IP addresses.D、The domain controller is not responding.” 相关考题
考题 You are the network administrator for Ezonexam. The network consists of a single Active Directory domain Ezonexam.com. All network servers run Windows Server 2000.Your network includes a shared folder named EzonexamDocs. This folder must not be visible in a browse list.However, users report that they can see EzonexamDocs when they browse for shared folders.How should you solve this problem?A.Modify the share permissions to remove the All - Read permission on EzonexamDocs from the Users group.B.Modify the NTFS permissions to remove the Allow - Read permissions on EzonexamDocs from the Users group.C.Change the share name to EzonexamDocs #.D.Change the share name to EzonexamDocs $.

考题 The network consists of a single domain named Ezonexam.com that includes 20 Windows NT workstation 4.0 client computers. All other client computers are Windows 2000 Professional computers. You install Terminal Services on one of the Windows Server computers and Terminal Services Client on the 20 Windows NT Workstation 4.0 client computers. You create a system policy on the server that is configured as the terminal server. This system policy denies access to Network Neighborhood. You find that the users of the terminal server can still browse the network when they open My Network Places from Windows 2000 Professional computer or when they open Network Neighborhood from Windows NT Workstation 4.0 computers.You want to prevent all users from browsing the network.What should you do? (Each correct answer presents a complete solution. Choose two.)A.Create a Windows Group Policy that denies user access to My Network Places.B.Copy the Windows NT policy file to the 20 Windows NT Workstation 4.0 computers.C.Create a Windows NT 4.0 default user policy on the Windows 2000 Server computer that is configured as the PDC emulator.D.Modify the Windows NT policy template file so that you can restrict access to both My Network Places and Network Neighborhood. Save the policy file on the terminal server.E.Configure the terminal server to use Application server mode. Select the Permissions compatible with Terminal Server 4.0 Users option.

考题 Your network uses TCP/IP as the only network protocol. Devices on the network are configured to use IP addresses from the private 10.0.0.0 range. All the client computers on the network use Windows 2000 Professional. The network includes Windows 2000 Servers and UNIX Servers.Users' print jobs are sent to shared printers on a Windows 2000 Server computer named PrintServ that directs the print jobs to the print devices attached directly to the network.You have a high-capacity print device that is attached to one of the UNIX Servers. The UNIX computer uses the LPR printing protocol, and its IP address is 10.1.1.99. The name of the printer queue is GIANT.You want users to be able to connect to this printer from their computers.What should you do?A.Install Microsoft Print Services for UNIX on PrintServ. Create a network printer on the users' computers, and specify that the printer URL is LPR://10.1.1.99/GIANT.B.Install Microsoft Print Services for UNIX on the users' computers. Create a network printer on the users' computers, and specify that the printer URL is LPR://10.1.1.99/GIANT.C.Create a network printer on PrintServ and specify that the printer name is \\10.1.1.99\GIANT. Share this printer and connect to it from the users' computers.D.Create a local printer on PrintServ. Create a new TCP/IP port for an LPR server at address 10.1.1.99 with a queue name of GIANT. Share this printer and connect it from the users' computers.

考题 You are the administrator of a Windows 2000 Active Directory network. The network consists of a single domain. The domain includes 20 Windows NT Workstation 4.0 client computers. All other client computers are Windows 2000 Professional computers.You create a Windows NT 4.0 default user policy on the Windows 2000 Server computer that is configured as the PDC emulator. This default user policy denies access to Network Neighborhood. You then install Terminal Services on one of the servers and Terminal Services Client on the 20 Windows NT Workstation client computers.You find that the users of the Terminal Server can still browse the network when they open My Network Places. You want to prevent all users from browsing the network.What should you do?A.Modify the Windows NT policy template file so that you can restrict access to both My Network Places and Network Neighborhood. Save the policy file on the Terminal Server.B.Copy the Windows NT policy file to the 20 Windows NT Workstation computers.C.Create a Windows 2000 Group Policy that denies user access to My Network Places.D.Edit the local registry on the Windows NT Workstation computers to deny access to Entire Network in Network Neighborhood.

考题 You must configure access to the corporate network for employees using a client access method. Users require IPsec tunneling to protected resources and an 802.1X supplicant. Users will access the network using Windows platforms.Which two client access methods would support these requirements?()A. Junos PulseB. Java AgentC. Odyssey Access ClientD. Native 802.1X supplicant

考题 You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()A.AB.BC.CD.D

考题 You are the network administrator for .Your network consists of a single Active Directory domain named . The Default Domain Group Policy object (GPO) uses all default settings. The network contains five servers running Windows Server 2003 and 800 client computers. Half of the client computers are portable computers. The other half are desktop computers. Users of portable computers often work offline, but users of desktop computers do not. You install Windows XP Professional on all client computers with default settings. Then you configure user profiles and store them on the network. Some users of portable computers now report that they cannot log on to their computers. Other users of portable computers do not experience this problem. You need to ensure that all users of portable computers can log on successfully,whether they are working online or offline. What should you do?()A、Configure all portable computers to cache user credentials locally.B、Ensure that all users of portable computers log on to the network at least once before working offline.C、In all portable computers, rename Ntuser.dat to Ntuser.man.D、For all portable computers, configure the Loopback policy setting.

考题 You are the administrator of WXYZ.com Incorporation. Your company’s network consists of Windows 2000 Professional clients and Windows 2000 Servers. Users have started reporting that the network performance has degraded in recent times. Most of the Windows 2000 Professional clients on your network use the TCP/IP protocol to communicate with the Server. You want to increase network performance. Where do you change the binding order?()A、Windows 2000 Server  Network  Binding  Server  TCP/IP on the top.B、Windows 2000 Server  Network  Binding  Workstation  TCP/IP on the top.C、Windows 2000 Professional  Network  Binding  Server  TCP/IP on the top.D、Windows 2000 Professional  Network  Binding  Server  TCP/IP on the bottom.E、Windows 2000 Professional  Network  Binding  Workstation  TCP/IP on the top.F、Windows 2000 Professional  Network  Binding  Workstation  TCP/IP on thebottom.

考题 Your network contains a public computer that runs Windows 7. Multiple users log on to the computer byusing a local user account named User1. Users report that they can log on to some secure Web sites byusing credentials that were saved by other users. You need to prevent forms-based credentials from beingsaved on the computer.  What should you do?()A、Remove all generic credentials from Windows Vault.B、Remove all Windows credentials from Windows Vault.C、Modify the Windows Internet Explorer certificates settings.D、Modify the Windows Internet Explorer AutoComplete settings.

考题 You use a Windows 2000 Professional computer.You are responsible for maintaining Company’s client contact list. You want other users on the networkto be able to read the client contact list. You use Windows Explorer to share the client contact list folderon the network.You want users touse the most current available information when contacting clients. You want toprevent users from enabling offline access for the network share that contains the client contact list.What should you do?()A、Use Synchronization Manager to configure synchronization not to occur when users are connected to the LAN connection.B、Use Windows Explorer to grant users Special access for the reports on the network share.C、Use Windows Explorer to disable caching for the reports on the network share.D、Use Windows Explorer to disable Offline files.

考题 You are the administrator of Company.com’s network.  Your network has 100 Windows 2000 Professional computers and 10 Windows 2000 Server computers.  Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. In addition, the network servers is configured with disk quotas for the NTFS volume that contains the home folders. All users have a default limit of 100 MB, and the option to deny space to users who exceed their limit has been enabled. A user reports that he cannot save any files to his home folder. He also cannot update files in his home folder.   When he attempts to save files to the folder, he receives the following error message: “Insufficient disk space.” Other users are not experiencing this problem with their home folders.   You want to enable the user to save files in his home folder.  What should you do?()A、 Use Windows Backup to archive and remove old files on the server. B、 Increase the server’s disk quota entry for the user to accommodate the additional files. C、 Log on to the network as a Recovery Agent.Decrypt all of the user’s files in his home folder. D、 Log on to the network by using the domain Administrator account.Grant the user Full Control permission to his home folder.

考题 You are the network administrator for ExamSheet.  Computers on your network run Windows 2000 Professional, Windows NT Workstation 4.0 and Windows 98. Ten Windows 2000 Professional computers are located in the research department. These computers contain highly confidential information. You want the 10 Windows 2000 Professional computers to be able to communicate only with other Windows 2000 computers.  What should you do?()A、On the research computers use the Local Computer Policy to disable theAccess this computer  from the networkoption.B、Use Security Configuration and Analysis to apply the Highly Secure security template to the research computers.C、Add the users of the research computers to the Power Users group on each computer.D、On the research computers configure the security settings to prevent anonymous access.

考题 You are the network administrator for Testking.com. The network consists of a single Active Directory domain testking.com. The functional level of the domain is Windows 2000 native. Some network servers run Windows 2000 Server, and others run Windows Server 20003. All users in your accounting department are members of an existing global distribution group named Global-1. You create a new network share for the accounting users. You need to enable the members of Global-1 to access the file share. What should you do?()A、Raise the functional level of the domain to Windows Server 2003.B、Change the group type of Global-1 to security.C、Change the group scope of Global-1 to universal.D、Raise the functional level of the forest to Windows Server 2003.

考题 You are the network administrator for ExamSheet.net. You administer ExamSheet’s Windows 2000 network. Computers on the network run Windows 2000 Professional, Windows NT Workstation 4.0 and Windows 98. Ten Windows 2000 Professional computers are located in the research department. The users of the Windows 2000 Professional computers run legacy applications which are not certified for Windows 2000. These applications will not run for those users who only have User rights on the computers. You want to uniformly grant the users of these computers with the least possible administrative rights and still allow them to run the applications. What should you do? ()A、On the research computers user the Local Computer Policy to disable theAccess this computer  from the networkoption.B、Apply the Compatws.inf security template to the research computers.C、Apply the Hisecws.inf security template to the research computers.D、On the research computers configure the computer default security settings to prevent anonymous access.

考题 Your network contains a Windows Server 2008 R2 server that functions as a file server. All users have laptop computers that run Windows 7.   The network is not connected to the Internet. Users save files to a shared folder on the server. You need to design a data provisioning solution that meets the following requirements:   èUsers who are not connected to the corporate network must be able to access the files and the folders in the corporate network.    èUnauthorized users must not have access to the cached files and folders. What should you do?()A、Implement a certification authority (CA). Configure IPsec domain isolation.B、Implement a certification authority (CA). Configure Encrypting File System (EFS) for the drive that hosts the files.C、Implement Microsoft SharePoint Foundation 2010. Enable Secure Socket Layer (SSL) encryption.D、Configure caching on the shared folder. Configure offline files to use encryption.

考题 Your company network consists of a single Active Directory domain named testking.com. The functional level of the domain is Windows 2000 Native. The network contains 20 member servers running Windows 2000 and 5 domain controllers running Windows Server 2003. The user accounts for employees in the Finance department are members of a global distribution group named Finance_Users. You create a shared folder named Finance_Docs on a Windows 2000 member server. You need to enable the Finance users to access the Finance_Docs folder. What should you do?()A、Change Finance_Users to a security group.B、Change the scope of Finance_Users to Universal.C、Change the scope of Finance_Users to Domain Local.D、Raise the domain functional level to Windows Server 2003.

考题 You are the network administrator for The network consists of a single Active Directory domain named Some client computers run Windows NT 4.0 Workstation. Others run Windows 2000 Professional, and the rest run Windows XP Professional. Users in the accounting department require a shared folder for their own use only. The accounting users must be able to read, edit, and delete files in the shared folder. You create the shared folder and use default share permissions. You assign the Allow - Full Control NTFS permission to members of the Administrators group. You assign the Allow - Modify NTFS permission to the accounting users. However, accounting users report that they cannot access the shared folder. How should you solve this problem?()A、Change the type of setting on the folder to Documents (for any file types).B、Change the NTFS permissions on the folder to assign the Allow - Delete Sub-Folders and Files permission to the accounting users.C、Add the accounting users as owners of the folder.D、Change the share permissions to assign the Allow - Full Control permission to the accounting users.

考题 Your network contains two servers that run the Server Core installation of Windows Server 2008 R2.  The two servers are part of a Network Load Balancing cluster. The cluster hosts a Web site.  Administrators use client computers that run Windows 7.   You need to recommend a strategy that allows the administrators to remotely manage the Network Load  Balancing cluster. Your strategy must support automation.  What should you recommend?()A、On the servers, enable Windows Remote Management (WinRM).B、On the servers, add the administrators to the Remote Desktop Users group.C、On the Windows 7 client computers,enable Windows Remote Management (WinRM).D、On the Windows 7 client computers,add the administrators to the Remote Desktop Users group.

考题 You are the network administrator for The network consists of a single Active Directory domain All network servers run Windows Server 2003. Your network includes a shared folder named TestKingDocs. This folder must not be visible in a browse list. However, users report that they can see TestKingDocs when they browse for shared folders. How should you solve this problem?()A、Modify the share permissions to remove the All - Read permission on TestKingDocs from the Users group.B、Modify the NTFS permissions to remove the Allow - Read permissions on TestKingDocs from the Users group.C、Change the share name to TestKingDocs#.D、Change the share name to TestKingDocs$.

考题 All servers on your company’s network run Windows Server 2008 R2. All users have thin client computers. You need to recommend a virtualization solution that allows users to use applications that run only on Windows 7.   Which technology should you recommend?()A、Windows Virtual PCB、Microsoft Application Virtualization (App-V)C、Microsoft Virtual Desktop Infrastructure (VDI)D、Microsoft Enterprise Desktop Virtualization (MED-V)

考题 单选题You are the network administrator for your company. The network consists of a single Active Directorydomain. All domain controllers run Windows Server 2003. All client computers run Windows XP Professional with default settings. Some users have portable computers, and the rest have desktop computers.You need to ensure that all users are authenticated by a domain controller when they log on.How should you modify the local security policy? ()A Require authentication by a domain controller to unlock the client computer.B Cache zero interactive logons.C Cache 50 interactive logons.D Grant the Log on locally user right to the Users group.

考题 单选题You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()A Use Windows Explorer to receive the offline filesB Using the Windows Explorer, disable the cache for the reports on the network shareC Use the Windows NT explorer to grant the special access for the reports on the network  shareD Use the synchronization manager to configure synchronization not to occur when users are  connected to the LAN connection. 

考题 多选题You must configure access to the corporate network for employees using a client access method. Users require IPsec tunneling to protected resources and an 802.1X supplicant. Users will access the network using Windows platforms.Which two client access methods would support these requirements?()AJunos PulseBJava AgentCOdyssey Access ClientDNative 802.1X supplicant

考题 单选题Your network contains a wired network and a wireless network. Users report that they experience intermittent problems accessing network resources when they connect to the internal wireless network. You discover that an unsecured rogue wireless access point uses the same Service Set Identifier (SSID) as the internal wireless network. You need to ensure that the users only connect to the internal wireless network. What should you do?()A Configure a Windows Connect Now Group Policy.B Configure a Wireless Network (IEEE 802.11) Policy.C Delete the rogue network from the Network and Sharing Center on each computer.D Create a Connection Manager Administration Kit (CMAK) profile and deploy it to all users.

考题 单选题You use a Windows 2000 Professional desktop computer. The corporate product information is stored on this computer. You want other users on the network to be able to read the product information on your computer. You use Windows Explorer to share the product information folder on the network. You want Sales staff to be able to keep a copy of the product information on their portable computers when they travel. Other users should not be able to synchronize the product information.  What should you do?()A Use Synchronization manager to configure synchronization to occur when users are connected to the LAN connection.B Use Windows Explorer to grant Sales Staff Special access for the reports on the network share.C Use Windows Explorer to enable automatic caching for documents on the network share.D Create a new share for the Sales users only and enable caching on that share only.

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers.   You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized.  You need to configure Server1 to log the details of access attempts by VPN users.   What should you do?  ()A  Configure the system event log to Do not overwrite.B  In IAS, in Remote Access Logging, enable the Authentication requests setting.C  Configure the Remote Access server to Log all events.D  Create a custom remote access policy and configure it for Authentication-Type.

考题 单选题You manage 40 computers that run Microsoft Windows Vista.  You use Microsoft Windows Calendar to publish a calendar to a shared network location. You need to allow users to automatically view the most recent calendar updates.  What should you do? ()A Instruct all users to configure a calendar subscription that has an update interval of 15 minutes.B Instruct all users to perform calendar synchronization for all shared calendar subscriptions. C Instruct all users to map a network drive to the folder that holds the shared calendar. Import the .ics file for the shared calendar.D Use e-mail messages to deploy the .ics file for the shared calendar to each user. Instruct each user to import the .ics file that is attached to the e-mail message.

考题 单选题You are the network administrator for The network consists of a single Active Directory domain The functional level of the domain is Windows 2000 native. All network servers run Windows Server 2003, and all client computers run Windows XP Professional. The network includes a shared folder named TestKingInfo. Your boss Dr. King reports that he is often unable to access this folder. You discover that the problem occurs whenever more than 10 users try to connect to the folder. You need to ensure that all appropriate users can access TestKingInfo. What should you do?()A Decrease the default user quota limit.B Raise the functional level of the domain to Windows Server 2003.C Purchase additional client access licenses.D Move TestKingInfo to one of the servers.