网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You are a network administrator for your company. All servers run Windows Server 2003. A network server named Server1 functions as the main file server. Server1 is backed up each night by using the Backup utility. You perform a test restoration of Server1 by using the Backup utility. You discover that files that are open during the backup process are not being backed up. You need to ensure that open files are backed up successfully. What should you do? ()
A

Enable volume shadow copies on the partitions that are being backed up.

B

Disable volume shadow copies on the partitions that are being backed up.

C

Select the Verify data after backup check box in the Advanced backup options of the backup job.

D

Clear the Disable volume shadow copy check box in the Advanced backup options of the backup job.


参考答案

参考解析
解析: 暂无解析
更多 “单选题You are a network administrator for your company. All servers run Windows Server 2003. A network server named Server1 functions as the main file server. Server1 is backed up each night by using the Backup utility. You perform a test restoration of Server1 by using the Backup utility. You discover that files that are open during the backup process are not being backed up. You need to ensure that open files are backed up successfully. What should you do? ()A Enable volume shadow copies on the partitions that are being backed up.B Disable volume shadow copies on the partitions that are being backed up.C Select the Verify data after backup check box in the Advanced backup options of the backup job.D Clear the Disable volume shadow copy check box in the Advanced backup options of the backup job.” 相关考题
考题 You are a network administrator for your company. All servers run Windows Server 2003.A server named Server1 functions as an application server. Server1 runs several applications. Server1 is located on the company‘s perimeter network. You allow communication to Server1 only over port 80.Users report that applications on Server1 perform poorly during periods of peak activity. You monitor Server1.The results are shown in the exhibit. (Click the Exhibit button.)You need to identify which process is causing Server1 to perform poorly.Which two tools can you use to achieve this goal? ()(Each correct answer presents a complete solution. Choose two.)A. Event ViewerB. Task ManagerC. Network MonitorD. System Monitor

考题 You are a network administrator for your company. All servers run Windows Server 2003. A server namedServer34 runs an application named App1.Users report that App1 is performing slowly. You suspect that an unauthorized application is installed on Server34.You run the netstat command and examine the output, as shown in the exhibit. (Click the Exhibit button.)You need to identify the unauthorized application by using the output from the netstat command.Which tool should you use to identify the application? ()A. Performance consoleB. System MonitorC. Network MonitorD. Task Manager

考题 You are an administrator of Ezonexam.com's network. You want to perform. routine upgrades on your Windows 2000 Server computer. You use your non-administrator user account in the domain to logon to the server.You want to upgrade all of the critical system files and patches on the server in the shortest possible time.What should you do?A.Use Windows Update.B.Run System File Checker.C.Log on as administrator and run Windows Update.D.Log on as administrator and run System File Checker.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain. The domain contains a Windows Server 2003 computer named Server1.   You are planning a public key infrastructure (PKI) for the company. You want to deploy a certification authority (CA) on Server1.   You create a new global security group named Cert Administrators. You need to delegate the tasks to issue, approve, and revoke certificates to members of the Cert Administrators group.   What should you do?()A、 Add the Cert Administrators group to the Cert Publishers group in the domain.B、 Configure the Certificates Templates container in the Active Directory configuration naming context to assign the Cert Administrators group the Allow - Write permission.C、 Configure the CertSrv virtual directory on Server1 to assign the Cert Administrators group the Allow - Modify permission.D、 Assign the Certificate Managers role to the Cert Administrators group.

考题 You are a security administrator for your company. All servers run Windows Server 2003. All client computers run Windows XP Professional.    You install Software Update Services (SUS) on a server named Server1. The company’s written security policy states that all updates must be tested and approved before they are installed on network computers.    You need to ensure that SUS uses the minimum amount of disk space on Server1.  What should you do?()A、 Configure Server1 to redirect client computers to the Microsoft Windows Update servers.B、 Compress the folder in which the downloaded updates are stored.C、 Configure Server1 to store only the locales that are needed.D、 Download the updates, and then delete updates that are not approved for client computers.

考题 You are a network administrator for your company. All domain controllers run Windows Server 2003. The network contains 50 Windows 98 client computers, 300 Windows 2000 Professional computers, and 150 Windows XP Professional computers.   According to the network design specification, the Kerberos version 5 authentication protocol must be used for all client computers on the internal network.   You need to ensure that Kerberos version 5 authentication is used for all client computers on the internal network.   What should you do?  ()A、 On each domain controller, disable Server Message Block (SMB) signing and encryption of the secure channel traffic.B、 Replace all Windows 98 computers with new Windows XP Professional computers.C、 Install the Active Directory Client Extensions software on the Windows 98 computers.D、 Upgrade all Windows 98 computers to Windows NT Workstation 4.0.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain. All servers run Windows Server 2003 and all client computers run Windows XP Professional.  You are planning a security update infrastructure.   You need to find out which computers are exposed to known vulnerabilities. You need to collect the information on existing vulnerabilities for each computer every night. You want this process to occur automatically.  What should you do? ()A、 Schedule the secedit command to run every night.B、 Schedule the mbsacli.exe command to run every night.C、 Install Microsoft Baseline Security Analyzer (MBSA) on one of the servers. Configure Automatic Updates on all other computers to use that server.D、 Install Software Update Services (SUS) on one of the servers. Configure the SUS server to update every night.

考题 You are a network administrator for your company. The network consists of a single Active Directory domain. The domain contains three Windows Server 2003 domain controllers, 20 Windows Server 2003 member servers, and 750 Windows XP Professional computers. The domain is configured to use only Kerberos authentication for all server connections.A user reports that she receives an "Access denied" error message when she attempts to connect to one of the member servers. You want to test the functionality of Kerberos authentication on the user’s client computer.  Which command should you run from the command prompt on the user’s computer?()A、netshB、netdiagC、ktpassD、ksetup

考题 You are the network administrator for your company. All client computers run Windows XP Professional. All servers run Windows Server 2003.The company has offices in Los Angeles, San Francisco, and Seattle. Each office is configured as a separate IP subnet. DNS is the only method of name resolution used on the network.You need to implement a software update infrastructure on the network. You install Windows Server Update Services (WSUS) on a computer named Server1 in the Los Angeles office. You install WSUS on Server1 with all default settings. You create a Group Policy object (GPO) named WSUS. You have no plans to install additional WSUS servers.You need to ensure that client computers can successfully connect to the WSUS server.  What should you do?()A、Configure the Internet browser home page on all client computers to point to http: //windowsupdate.microsoft.com.B、In the WSUS GPO, specify the Server Name property to be the server’s fully qualified domain name (FQDN).C、On the WSUS server, configure the IIS Manager to require HTTP over SSL.D、Enable communication over port 443 between all client computers and the WSUS server.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All network servers run Windows Server 2003, and all client computers run Windows XP Professional. A user named Peter uses a client computer named Client1. This computer has a locally attached tape device. You grant Peter the necessary permissions to perform backups of a member server named Server1. Peter runs the Backup utility on Client1 to back up the files located on Server1. You need use your client computer to view the most recent backup logs for Server1. What should you do? ()A、Use Notepad to view the contents of the backup report located on Server1.B、Use Notepad to view the contents of the backup report located on Client1.C、Use Event Viewer to view the contents of the application log located on Server1.D、Use Event Viewer to view the contents of the application log located on Client1.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.You install Windows Server Update Services (WSUS) on a network server named Server1. When you attempt to synchronize Server1 with the Windows Update servers, you receive an error message. You open Internet Explorer and verify that you can communicate with an external Web site by using the proxy server. You need to ensure that Server1 can communicate with the Windows Update servers. What should you do on Server1?()A、Restart the IIS administration tool.B、Configure the Internet Explorer settings to bypass the proxy server.C、In the WSUS options, configure authentication to the proxy server.D、Install the ISA Firewall Client.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains an application server running Windows Server 2003.   Users report intermittent slow performance when they access the application server throughout the day. You find out that the network interface on the application server is being heavily used during the periods of slow performance. You suspect that a single computer is causing the problem.You need to create a plan to identify the problem computer.   What should you do?()A、 Monitor the performance monitor counters on the application server by using System Monitor.  B、 Monitor the network traffic on the application server by using Network Monitor.C、 Monitor network statistics on the application server by using Task Manager.D、 Run network diagnostics on the application server by using Network Diagnostics.

考题 You are the network administrator for your company. All network servers run Windows Server 2003. A member server named Server1 hosts several hundred folders, which are located on multiple volumes on the server. A backup job on Server1 is configured to run a normal backup of the folders every Saturday at 1:00 A.M. On Wednesday morning, you discover that you need to install a new application on Server1 before the close of business that day. You need to back up all folders on Server1 as quickly as possible so you can install the new application. What should you do? ()A、Create a new backup job that specifies the folders and runs once only.B、Run the existing backup job.C、Enable Volume Shadow Copy for the volumes that contain the folders.D、Create an Automated System Recovery (ASR) set.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. You need to update six high-visibility servers with critical updates by using Windows Server Update Services (WSUS). You approve all of the updates.You need to ensure that the updates are applied within one hour.  What should you do?()A、On the WSUS server, type the gpupdate /force command at the command prompt.B、On the WSUS server, type the wuauclt /detectnow command at the command prompt.C、On each of the six servers, type the gpupdate /force command at the command prompt.D、On each of the six servers, type the wuauclt /detectnow command at the command prompt.

考题 You are a database administrator for your company. You are configuring a new SQL Server 2005 computer named SQL1. SQL1 will run Reporting Services. It will also be configured to automatically perform database backups and other maintenance tasks. There are no other SQL Server computers in the network environment. All access to SQL1 will be made by using SQL1s DNS name. You need to disable any unnecessary services on SQL1. Which service or services should you disable?()A、Internet Information ServicesB、SQL Server BrowserC、SQL Server AgentD、Microsoft Distributed Transaction Coordinator

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All network servers run Windows Server 2003. The domain contains three domain controllers: DC1, DC2, and DC3. Each one hosts user data. DC1 experiences hard disk failure. You need to temporarily restore the user data to DC2. Which type of restoration should you perform? ()A Automated System Recovery (ASR)B normalC primaryD authoritative

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains Windows Server 2003 computers and Windows XP Professional computers.  You configure a server named Server1 to be a file server. The written company security policy states that you must analyze network traffic that is sent to and from all file servers.You need to capture file-transfer network traffic that is being sent to and from Server1. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on a server named Server2, which is on the same network segment as Server1.You run Network Monitor on Server2. However, Network Monitor captures only network traffic that is sent to and from Server2. You need to capture all network traffic that is sent to and from Server1.  What should you do?()A Install the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.B Open Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.C Install Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.D Open Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.

考题 单选题You are the network administrator for your company. All network servers run Windows Server 2003. Business hours are 8 A.M. to 5 P.M. You provide network assistance during business hours only. A server named Server1 stores personal files for all network users. Mobile users access Server1 by using the company's VPN. They must have 24-hour access to the files on Server1. You need to be able to identify the source of the recurring slowdowns in VPN access. First, you log on to Server1. What should you do next?()A Use Task Manager to review network utilization of the VPN adapter.B Use the Performance console to create a log of network utilization outside of business hours.C Use System Monitor to review network utilization of the VPN connection.D Use Task Manager to select Bytes Sent as the Network Adapter History setting.

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains 25 Windows Server 2003 computers and 6,000 Windows XP Professional computers.The written company security policy states that network traffic to Web servers must be audited on a regular basis. A server named Server1 is configured as a Web server on the company’s intranet. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on Server1.You run Network Monitor on Server1 for three hours. When you stop the network capture, you see that Network Monitor captured over 40,000 frames. As you look at the captured frames, you notice that an extremely large number of TCP connection requests have all come from the 131.107.0.1 IP address.In Network Monitor, you need to view only the frames for network traffic that are captured between Server1 and the 131.107.0.1 IP address.  What should you do?()A Create an Address Capture filter for all network traffic between Server1 and the 131.107.0.1 IP address.B Create a Find Frame Expression filter for network traffic captured between Server1 and the 131.107.0.1 IP address.C Create an Address Display filter for all network traffic captured between Server1 and the 131.107.0.1 IP address.D Create a Pattern Match capture trigger for the 131.107.0.1 IP address.

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. You need to update six high-visibility servers with critical updates by using Windows Server Update Services (WSUS). You approve all of the updates. You need to ensure that the updates are applied within one hour. What should you do?()A On the WSUS server, type the gpupdate /force command at the command prompt.B On the WSUS server, type the wuauclt /detectnow command at the command prompt.C On each of the six servers, type the gpupdate /force command at the command prompt.D On each of the six servers, type the wuauclt /detectnow command at the command prompt.

考题 单选题You are a network administrator for your company. The network contains a Windows Server 2003 computernamed Server3. Server3 functions as a file server. Six users in the accounting department use an accounting software application to open files that are stored in a shared folder on Server3. The users keep these files open for an extended period of time. You need to restart Server3. You need to find out if any files on Server3 are open before you restart the computer. What should you do? ()A Use Computer Management to view existing connections.B Use the netsend command to send a message to all domain members.C Use Task Manager to monitor processes started by all users.D Use System Monitor to monitor the Server object in Report view.

考题 多选题You are the network administrator for your company. Your network consists of a single Active Directory domain. All network servers run Windows Server 2003, and all client computers run Windows 2000 Professional. You install Windows Server 2003 with default settings on a new computer named Server1. You install and share several printers on Server1. You instruct all users to connect to these printers by using the address http://Server1/Printers. However, users report that they cannot connect to this address. You need to ensure that all users can connect to the printers by using HTTP. Which two actions should you perform?() (Each correct answer presents part of the solution. Choose two.)APublish all shared printers that are installed on Server1.BCreate a virtual directory named Printers on Server1.CInstall IIS with default settings on Server1.DReshare all printers on Server1.EInstall the Internet Printing component of IIS.FType Net Start W3SVC at a command prompt.

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. The network contains a Web server that runs IIS 6.0 and hosts a secure intranet site. All users are required to connect to the intranet site by authenticating and using HTTPS. However, because an automated Web application must connect to the Web site by using HTTP, you cannot configure the intranet site to require HTTPS.  You need to collect information about which users are connecting to the Web site by using HTTPS.   What should you do?()A Check the application log on the Web server.B Use Network Monitor to capture network traffic on the Web server.C Review the log files created by IIS on the Web server.D Configure a performance log to capture all Web service counters. Review the performance log data.

考题 多选题You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003.The network contains a Web server named Server1 that runs IIS 6.0 and hosts a secure Web site. The Web site is accessible from the intranet, as well as from the Internet. All users must authenticate when they connect to Server1. All users on the Internet must use a secure protocol to connect to the Web site. Users on the intranet do not need to use a secure protocol.You need verify that all users are using a secure protocol to connect to Server1 from the Internet.   What are two possible ways to achieve this goal?()AMonitor the events in the application log on Server1.BMonitor the events in the security log on Server1.CMonitor the Web server connections on Server1 by using a performance log.DMonitor network traffic to Server1 by using Network Monitor.EMonitor the IIS logs on Server1.

考题 单选题You are the network administrator for your company. All network servers run Windows Server 2003. All client computers run Windows XP Professional. A member server named Server1 is located at a branch office that does not permit the use of Remote Desktop Protocol. Another administrator uses the Backup utility to create a scheduled backup job on Server1. The backup job performs a normal backup of an application server. The application server is removed from the network. You need to use a client computer to remove the backup job from Server1. You cannot travel to the branch office. What should you do? ()A Use the RUNAS feature to run the at /delete command as the Server1/Administrator account.B Log on by using your Administrator account and run the ntbackup /D command.C Log on by using your Administrator account and run the schtasks /delete command.D Use the RUNAS feature to run the taskkill command as the Server1/Administrator account.

考题 单选题You are the network administrator for your company. All network servers run Windows Server 2003. All client computers run Windows XP Professional. A member server named Server1 is located at a branch office that does not permit the use of Remote Desktop Protocol. Another administrator uses the Backup utility to create a scheduled backup job on Server1. The backup job performs a normal backup of an application server. The application server is removed from the network. You need to use a client computer to remove the backup job from Server1. You cannot travel to the branch office. What should you do?()A Use the RUNAS feature to run the at /delete command as the Server1/Administrator account.B Log on by using your Administrator account and run the ntbackup /D command.C Log on by using your Administrator account and run the schtasks /delete command.D Use the RUNAS feature to run the taskkill command as the Server1/Administrator account.

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All network servers run Windows Server 2003. The domain contains three domain controllers: DC1, DC2, and DC3. Each one hosts user data. DC1 experiences hard disk failure. You need to temporarily restore the user data to DC2. Which type of restoration should you perform? ()A Automated System Recovery (ASR)B normalC primaryD authoritative