网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You are a system administrator at Company. The network includes 100 Windows 2000 Professional computers. A user named Peter wants to share a local printing device directly connected to his computer. Peter needs to share this device among three groups:  Engineering, Accounting, and Operations. Peter wants to delegate printer administration to one print administrator from each group. Each print administrator must be able to delete print jobs generated by their own group on the print device. They should not be able to delete print jobs from other groups. You want to configure Peter’s client computer to support these requirements.  What should you do? ()
A

 Create a single shared printer to be used by all three groups.Allow each print administrator Manage Documents permission. 

B

 Create a separate shared printer for each group. For each shared printer, allow the respective      print administrator Manage Documents permission. 

C

 Create a single shared printer to be used by all three groups. Add the print administrator’s user      account from each group to the Power Users group on Peter’s client computer. 

D

 Create a separate shared printer for each group. Add the print administrator’s user account  from each group to the Power Users group on Peter’s client computer. 


参考答案

参考解析
解析: We need a printer for each group. We then only grant Manage Document permission to the singleappropriate printer for each print administrator.
更多 “单选题You are a system administrator at Company. The network includes 100 Windows 2000 Professional computers. A user named Peter wants to share a local printing device directly connected to his computer. Peter needs to share this device among three groups:  Engineering, Accounting, and Operations. Peter wants to delegate printer administration to one print administrator from each group. Each print administrator must be able to delete print jobs generated by their own group on the print device. They should not be able to delete print jobs from other groups. You want to configure Peter’s client computer to support these requirements.  What should you do? ()A  Create a single shared printer to be used by all three groups.Allow each print administrator Manage Documents permission. B  Create a separate shared printer for each group. For each shared printer, allow the respective      print administrator Manage Documents permission. C  Create a single shared printer to be used by all three groups. Add the print administrator’s user      account from each group to the Power Users group on Peter’s client computer. D  Create a separate shared printer for each group. Add the print administrator’s user account  from each group to the Power Users group on Peter’s client computer. ” 相关考题
考题 You are a network administrator for your company. You currently automate backups of the System State data on the servers in your network by using NTBackup. Your manager instructs you to document the procedure for restoring a server from a backup of the System State data.You need to select the correct method for performing a restoration of a backup of the System State data.What should you do?()A. Run the following command: ntbackup.exe backup /F {FileName}B. Run the following command: ntbackup.exe backup systemstate /F {FileName}C. In Control Panel, open System, and configure the Startup and Recovery settings on the Advanced tab.D. Use NTBackup interactively.

考题 You are a network administrator for your company. All servers run Windows Server 2003. A server namedServer34 runs an application named App1.Users report that App1 is performing slowly. You suspect that an unauthorized application is installed on Server34.You run the netstat command and examine the output, as shown in the exhibit. (Click the Exhibit button.)You need to identify the unauthorized application by using the output from the netstat command.Which tool should you use to identify the application? ()A. Performance consoleB. System MonitorC. Network MonitorD. Task Manager

考题 You are an administrator of Ezonexam.com's network. You want to perform. routine upgrades on your Windows 2000 Server computer. You use your non-administrator user account in the domain to logon to the server.You want to upgrade all of the critical system files and patches on the server in the shortest possible time.What should you do?A.Use Windows Update.B.Run System File Checker.C.Log on as administrator and run Windows Update.D.Log on as administrator and run System File Checker.

考题 You are a network administrator for Ezonexam.com's Windows 2000 network.Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers.Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Jack Bauer leaves the company. You grant her manager the Full Control NTFS permission to Jack's home folder. When the manager attempts to open any of the files, she receives the following error message: "Access is denied."What should you do?A.Use System File Checker (SFC) to decrypt the file.B.Log on the network as the Recovery Agent. Decrypt the files for the manager.C.Log on the network as the administrator. Use the cipher command to decrypt the files.D.Log on the network as a member of the Backup Operators group. Decrypt the files for the manager.

考题 You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet.Which PIN architecture is applicable in those environments?()A.CampusB.TeleworkerC.BranchD.Data center

考题 You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()A、RepeaterB、Wireless routerC、HubD、Wireless network adapter

考题 You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()A、CampusB、TeleworkerC、BranchD、Data center

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a three-node Network Load Balancing cluster. Each cluster node runs Windows Server 2003 and has a single network adapter. The cluster has converged successfully.   You notice that the nodes in the cluster run at almost full capacity most of the time. You want to add a fourth node to the cluster. You enable and configure Network Load Balancing on the fourth node.   However, the cluster does not converge to a four-node cluster. In the System log on the existing three nodes, you find the exact same TCP/IP error event. The event has the following description: "The system detected an address conflict for IP address 10.50.8.70 with the system having network hardware address 02:BF://0A:32:08:46."   In the System log on the new fourth node, you find a similar TCP/error event with the following description: "The system detected an address conflict for IP address 10.50.8.70 with the system having network hardware address 03:BF://0A:32:08:46." Only the hardware address is different in the two descriptions.  You verify that IP address 10.50.8.70 is configured as the cluster IP address on all four nodes.  You want to configure a four-node Network Load Balancing cluster.   What should you do?  ()A、 Configure the fourth node to use multicast mode.B、 Remove 10.50.8.70 from the Network Connections Properties of the fourth node.C、 On the fourth node, run the nlb.exe resume command.D、 On the fourth node, run the wlbs.exe reload command.

考题 You are the network administrator for your company. Your network consists of a single Active Directory domain named All network servers run Windows Server 2003. A total of three servers are configured as domain controllers. You need to restore a failed domain controller named DC3. The last backup for any domain controller on the network occurred one week ago. First, you reinstall Windows Server 2003 on DC3. What should you do next?()A、Start DC3 and select Directory Services Restore Mode. Perform a nonauthoriative restoration.B、Start DC3 and select the Recovery Console. Perform a nonauthoriative restoration.C、Run Ntbackup.exe on DC3 to restore the System State data.D、Run the Active Directory Installation Wizard on DC3.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains an application server running Windows Server 2003.   Users report intermittent slow performance when they access the application server throughout the day. You find out that the network interface on the application server is being heavily used during the periods of slow performance. You suspect that a single computer is causing the problem.You need to create a plan to identify the problem computer.   What should you do?()A、 Monitor the performance monitor counters on the application server by using System Monitor.  B、 Monitor the network traffic on the application server by using Network Monitor.C、 Monitor network statistics on the application server by using Task Manager.D、 Run network diagnostics on the application server by using Network Diagnostics.

考题 You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm.   Immediately send a notification to a network administrator that the infected computer needs to be repaired.  What should you do?()A、Configure a WMI event trigger.B、Configure a Network Monitor capture filter.C、Configure a Network Monitor trigger.D、Configure a System Monitor alert.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All domain controllers run Windows Server 2003, and each one has a locally attached tape device. You need to back up each domain controller. Your backup process must fulfill the following requirements: System recovery must be possible in the event of server failure. The system configuration and all current dynamic disk configurations must be backed up. Other data partitions do not need to be backed up. What should you do?()A、Use the Backup utility to back up the system files and to create an Automated System Recovery (ASR) disk.B、Use the Backup utility to back up the contents of all mounted drives.C、Use the Backup utility to back up only the System State data.D、Use the Copy command to copy C:/windows and its subfolders to a shared folder on the network.E、Use the Xcopy command to copy C:/windows and its subfolders to a shared folder on the network.

考题 You are a network administrator for your company. You currently automate backups of the System State data on the servers in your network by using NTBackup. Your manager instructs you to document the procedure for restoring a server from a backup of the System State data.You need to select the correct method for performing a restoration of a backup of the System State data.What should you do?()A、Run the following command: ntbackup.exe backup /F {"FileName"}B、Run the following command: ntbackup.exe backup systemstate /F {"FileName"}C、In Control Panel, open System, and configure the Startup and Recovery settings on the Advanced tab.D、Use NTBackup interactively.

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All network servers run Windows Server 2003. The domain contains three domain controllers: DC1, DC2, and DC3. Each one hosts user data. DC1 experiences hard disk failure. You need to temporarily restore the user data to DC2. Which type of restoration should you perform? ()A Automated System Recovery (ASR)B normalC primaryD authoritative

考题 单选题You are the network administrator for You currently automate backups of the System State data on the servers in your network by using NTBackup. Your manager instructs you to document the procedure for restoring a server from a backup of the System State data. You need to select the correct method for performing a restoration of a backup of the System State data. What should you do?()A Run the following command: ntbackup.exe backup /F {FileName}B Run the following command: ntbackup.exe backup systemstate /F {FileName}C In Control Panel, open System, and configure the Startup and Recovery settings on the Advanced tab.D Use NTBackup interactively.

考题 单选题You are the network administrator for your company. All network servers run Windows Server 2003. Business hours are 8 A.M. to 5 P.M. You provide network assistance during business hours only. A server named Server1 stores personal files for all network users. Mobile users access Server1 by using the company's VPN. They must have 24-hour access to the files on Server1. You need to be able to identify the source of the recurring slowdowns in VPN access. First, you log on to Server1. What should you do next?()A Use Task Manager to review network utilization of the VPN adapter.B Use the Performance console to create a log of network utilization outside of business hours.C Use System Monitor to review network utilization of the VPN connection.D Use Task Manager to select Bytes Sent as the Network Adapter History setting.

考题 单选题You are the administrator of your company's network. You are preparing to deploy 20 new Windows 2000 Professional computers on your network. You want to be able to recover from disk failures and corrupt system files on the new computers. You want to configure the computers to automatically update their system configuration and emergency repair files on a scheduled bases.   What should you do?()A Use the at command to schedule a weekly job to back up the boot partition.B Use the at command to schedule a weekly job to run the system file checker.C Use Windows backup to schedule a backup of the System State Data.D Use Windows backup to schedule a backup of the system partition and the boot partition.

考题 单选题You are the network administrator for your company. The network contains a Windows Server 2003 Web server named WebServer1. WebServer1 is connected to the Internet by means of a dedicated link. You are responsible for monitoring the bandwidth utilization of WebServer1. You run a System Monitor log on WebServer1, which monitors the Bytes Total/sec counter on the Network Interface object. The sample rate for the counter is set to 15 seconds. The log is archived once each day.The size of the System Monitor log is becoming too large for the available disk space. You need to reconfigure the System Monitor log settings to reduce the amount of data that is captured.  What should you do?()A Retain the current counter, but set the sample rate to 5 seconds.B Retain the current counter, but set the sample rate to 60 seconds.C Change the counter to Total Bytes, and set the sample rate to 15 seconds.D Change the counter to Current Bandwidth, and set the sample rate to 60 seconds.

考题 单选题You are the administrator of your company’s network. Using Windows Installer packages, you want to install customized versions of Microsoft Excel on different departments in the company. Which type of file should you apply to the installation database?()A msiB mstC zapD zip

考题 单选题You are a network administrator for The network contains a Windows Server 2003 computer named Testking1. You need to install an application on Testking1. The installation will cause several changes to the registry. You plan to use the Backup utility to create a backup that will enable you to restore the registry. TestKing requirements for network management state that all backups must be performed during an eight-hour period at night. Because of this time constraint, you need to ensure that the backup can be recovered as quickly as possible. You need to create a backup that meets the requirements. What should you do?()A Create a backup of the system partition.B Create a backup of the boot partition.C Create a backup of the System State.D Create an Automated System Recovery (ASR) backup.E Create a backup of the Systemroot/System32/Config folder.

考题 单选题You are the network administrator for . You are the administrator of a Windows Server 2003 computer named TestKing8. You log on to TestKing8 and attempt to access the network. You discover that the server is not communicationg on the network. You discover that a service pack and an updated network adapter driver were installed on TestKing8 the previous night. A complete backup, including the System State data, was performed before the service pack and the driver were installed. You need to restore network communications. What should you do first?()A Use Roll Back Driver to reinstall the previous driver for the network adapter.B Use the Backp or Restore Wizard to restore the backup from the previous night.C Restart TestKing8 by using Last Known Good Configuration option.D Use the Registry Editor to delete the registry settings for the network adapter driver.

考题 多选题You are the network administrator for Company. Your computer is installed with Windows 2000 Professional. After installing a new application you restart the computer and receive the following error message:  "NTLDR is missing - Press any key to restart." You want your computer to start properly. You want to do this with the least amount of administrative effort.  What should you do?()AReinstall the operating system.BStart the computer by using the Windows 2000 Professional CD-ROM.CStart the recovery Console and select the option to verify system files.DInsert the Emergency Repair Disk.ECopy Ntdetect.com from the /i386 folder on the CD-ROM to the root folder on the boot partition.

考题 单选题You are the network administrator for your company. The Denver office is currently connected to the corporate WAN by using a Windows Server 2003 computer named Server23.Server23 is configured as a dial-up router. Server23 has two network adapters. One network adapter connects to the Ethernet LAN. The other network adapter is a broadband networking device.The company plans to increase the number of employees in the Denver office by at least 25 percent. You need to confirm that the current network bandwidth of the broadband connection will be sufficient for the future expansion of the Denver office.You want to use System Monitor on Server23 to find out the current utilization of the broadband network connection.  What should you do?()A Monitor the Bytes Total/sec counter on the Network Interface object.B Monitor the Bytes Total/sec counter on the Server object.C Monitor the Server//Packets/sec counter on the Server object.D Monitor the Current Bandwidth counter on the Network Interface object.

考题 单选题Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers. Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Tess King leaves the company. You grant her manager the Full Control NTFS permission to Tess's home folder. When the manager attempts to open any of the files, she receives the follo wing error message: "Access is denied." What should you do?()A Use System File Checker (SFC) to decrypt the file.B Log on the network as the Recovery Agent. Decrypt the files for the manager.C Log on the network as the administrator. Use theciphercommand to decrypt the files.D Log on the network as a member of the Backup Operators group. Decrypt the files for the manager.

考题 单选题You are a network administrator for your company. The network contains a Windows Server 2003 computer named Print1 that functions as a print server. Print1 contains a printer named MarketingPrinter. Users report that print jobs they submit to the MarketingPrinter take a long time to print. You immediately examine Print1 and conclude that the server is performing at acceptable levels. You need to identify the problem. What should your next step be? ()A Use Task Manager to monitor processor and memory performance.B Use Windows Explorer to monitor the size of the Windows/System32/Spool/prtprocs folder.C Use System Monitor to view the Print Queue/Jobs counter.D Use System Monitor to view the Print Queue/Enumerate Network Printer Calls counter.

考题 单选题You are the network administrator for Company. You have been assigned the task to create and deploy a standard Windows 2000 Professional image to all 2,500 client computers that today are installed with Windows 98. You log on to a client computer called Company by using a local administrative account called SetupUser and install three Windows 2000 professional compatible software packages on Company. You create an image using third party software. You deploy the image to a test client computer and join the client computer to a domain. You want to create shortcuts on all users' desktops for the software packages you installed. You also want users to have the option to delete the icons.  Which profile must you edit?()A The SetupUser profileB The Default User profileC The Administrator profileD The System profileE The All Users profile

考题 单选题You are the network administrator for your company. All network servers run Windows Server 2003. All client computers run Windows XP Professional. A member server named Server1 is located at a branch office that does not permit the use of Remote Desktop Protocol. Another administrator uses the Backup utility to create a scheduled backup job on Server1. The backup job performs a normal backup of an application server. The application server is removed from the network. You need to use a client computer to remove the backup job from Server1. You cannot travel to the branch office. What should you do? ()A Use the RUNAS feature to run the at /delete command as the Server1/Administrator account.B Log on by using your Administrator account and run the ntbackup /D command.C Log on by using your Administrator account and run the schtasks /delete command.D Use the RUNAS feature to run the taskkill command as the Server1/Administrator account.

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All network servers run Windows Server 2003. The domain contains three domain controllers: DC1, DC2, and DC3. Each one hosts user data. DC1 experiences hard disk failure. You need to temporarily restore the user data to DC2. Which type of restoration should you perform? ()A Automated System Recovery (ASR)B normalC primaryD authoritative