A. Very High
B. High
C. Moderate
D. Low
E. Very Low
您可能感兴趣的试卷
你可能感兴趣的试题
Rate your level of proficiency with managing and maintaining physical and logical devices, including
managing basic and dynamic disks; monitoring server hardware; optimizing server disk performance; and installing, configuring, and troubleshooting server hardware devices. ()
A. Very High
B. High
C. Moderate
D. Low
E. Very Low
How many years of experience do you have using any version of Windows Server? ()
A. I have not done this yet.
B. Less than 6 months
C. More than 6 months but less than 1 year
D. 1-2 years
E. 2-3 years
F. More than 3 years
A. I have not done this yet.
B. Less than 6 months
C. More than 6 months but less than 1 year
D. 1-2 years
E. 2-3 years
F. More than 3 years
You are the network administrator for your company. All network servers run Windows Server 2003.
One of your servers contains a RAID-5 volume. Routine monitoring reveals a failed disk in the set. The
server is running and users are connecting to shared folders on the RAID-5 volume.
You shut down the server and replace the failed disk.
Now you need to ensure that the RAID-5 volume is redundant.
What should you do? ()
A. Initialize the new disk. Select the failed region and then select the Repair Volume option.
B. Import the foreign disk. Select the failed region and then select the Repair Volume option.
C. Initialize the new disk. Select the failed region and then select the Reactivate Disk option.
D. Import the foreign disk. Select the failed region and then select the Reactivate Disk option.
A. Name the new server File2. Create a new mirrored volume by using two 72-GB disks. Connect File2 to the network and copy the data from File1. When copying is complete, shut down the old File1.
B. Name the new server File1. Move both disks from the old File1 to the new File1. Scan the disks for changes. Import the disks. Connect the new File1 to the network.
C. Name the new server File1. Break the mirror on the old File1. Move one of the disks from the old File1 to the new File1. Scan the disk for changes. Initialize the disk. Select the spare disk and create the mirror. Connect the new File1 to the network.
D. Name the new server File1. Remove one of the disks in the mirror from the old File1. Move the disk to the new File1. Scan the disk for changes. Import the disk. Shut down the old File1 and connect the new File1 to the network.
You are the network administrator for your company. Your network consists of a single Active Directory
domain. All network servers run Windows Server 2003.
You successfully install a new server named Server9. Immediately afterward, you perform the first backup
of the server. The date is January 25, 2003.
Next, you add a user named Anne to the local Backup Operators group. You direct Anne to perform
nightly backups of Server9.
One week later, you try to review the backup logs for Server9. The Backup utility displays the information
shown in the exhibit. (Click the Exhibit button.)
You verify that Anne is performing nightly backups.
You need to be able to review the backup logs for the previous week.
What should you do?()
A. Add your user account to the local Backup Operators group.
B. Direct Anne to use her user account to log on and open the Backup utility.
C. In the Backup utility, select the Verify data after the backup completes check box.
D. Open %windir%\system32\LogFiles. Create a new subfolder named BackupLogs.
You are the network administrator for your company. The network consists of a single Active Directory
domain. All network servers run Windows Server 2003, and all client computers run Windows XP
Professional.
A user named Peter uses a client computer named Client1. This computer has a locally attached tape
device.
You grant Peter the necessary permissions to perform backups of a member server named Server1. Peter runs the Backup utility on Client1 to back up the files located on Server1.
You need use your client computer to view the most recent backup logs for Server1.
What should you do? ()
A. Use Notepad to view the contents of the backup report located on Server1.
B. Use Notepad to view the contents of the backup report located on Client1.
C. Use Event Viewer to view the contents of the application log located on Server1.
D. Use Event Viewer to view the contents of the application log located on Client1.
You are the network administrator for your company. All network servers run Windows Server 2003.
A member server named Server1 is configured to run shadow copies without a storage limit. Server1 has
the disk configuration shown in the following table.
You need to create additional free space on DATA1. You also need to improve the performance of Server1
and ensure that it has sufficient space for shadow copies in the future.
Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two.)
A. Delete the shadow copies on DATA1.
B. Delete Backup.bkf on DATA3.
C. In the properties of DATA1, relocate the shadow copies to DATA2.
D. In the properties of DATA1, relocate the shadow copies to DATA3.
E. Delete DATA3 and extend the DATA1 partition to include the space on DATA3.
You are the network administrator for your company. The network originally consists of a single
Windows NT 4.0 domain.
You upgrade the domain to a single Active Directory domain. All network servers now run Windows Server2003, and all client computers run Windows XP Professional.
Your staff provides technical support to the network. They frequently establish Remote Desktop
connections with a domain controller named DC1.
You hire 25 new support specialists for your staff. You use Csvde.exe to create Active Directory user
accounts for all 25.
A new support specialist named Paul reports that he cannot establish a Remote Desktop connection with
DC1. He receives the message shown in the Logon Message exhibit. (Click the Exhibit button.)
You open Gpedit.msc on DC1. You see the display shown in the Security Policy exhibit. (Click the Exhibitbutton.)
You need to ensure that Paul can establish Remote Desktop connections with DC1.
What should you do? ()
A. Direct Paul to establish a VPN connection with DC1 before he starts Remote Desktop Connection.
B. Direct Paul to set a password for his user account before he starts Remote Desktop Connection.
C. In the local security policy of DC1, disable the Require strong (Windows 2000 or later) session key setting.
D. In the local security policy of DC1, enable the Disable machine account password changes setting.
You are the network administrator for your company. The network consists of a single Active Directory
domain. All network servers run Windows Server 2003, and all are members of the domain. All client
computers run Windows XP Professional.
Five Web servers host the content for the internal network. Each one runs IIS and has Remote Desktop
connections enabled. Web developers are frequently required to update content on the Web servers.
You need to ensure that the Web developers can use Remote Desktop Connection to transfer Web
documents from their client computers to the five Web servers.
What should you do?()
A. Install the Terminal Server option on all five Web servers. Use Terminal Services Configuration Manager to modify the session directory setting.
B. Install the Terminal Server option on all five Web servers. Use Terminal Services Configuration Manager to create a new Microsoft RDP 5.2 connection.
C. On each Web developer's client computer, select the Disk Drives check box in the properties of Remote Desktop Connection.
D. On each Web developer's client computer, select the Allow users to connect remotely to this computer check box in the System Properties dialog box.
最新试题
You are the network administrator for The network consists of asingle Active Directory domain named All network servers runWindows Server 2003.Confidential files are stored on a member server named TK1. The computer objectfor TK1 resides in an organizational unit (OU) named Confidential. A Group Policyobject (GPO) named GPO1 is linked to the Confidential OU.To audit access to the confidential files, you enable auditing on all private folders onTK1.Several days later, you review the audit logs. You discover that auditing is notsuccessful.You need to ensure that auditing occurs successfully.What should you do?()
You are the network administrator for All network severs runWindows Server 2003. Business hours are 9:00 A.M. to 5:00 P.M., Monday throughFridayA file server named TestKingB is configured to create a shadow copy every morningat 1:00 A.M. TestKingB hosts several shared folders. One shared folder has theconfiguration shown in the following table.For several months, users frequently access both databases in TestKingOrders. OneMonday morning, a user tells you that she needs to edit Receivables.mdb as itexisted at 5:00 P.M. on the previous Thursday.You need to modify TestKingB to enable the appropriate editing. You must ensurethat other users can continue to access current data without interruption.First, you map a drive to \\TestKingB\TestKingOrders.Which two additional actions should you perform? ()(Each correct answer presentspart of the solution. Choose two)
You are the network administrator for TestKing. The network contains a WindowsServer 2003 computer named testking1, which hosts a critical business applicationnamed Salesapp. Testking1 has one disk that contains a single NTFS volume.Five days ago, the System State of testking1 was backed up, and an AutomatedSystem Recovery (ASR) backup was created. No additional backups wereperformed. Subsequently, many changes were made to the Salesapp data files.You apply an update to the application, which requires you to restart testking1.Windows startup terminates with a Stop error. You restart the computer and bootto a floppy disk. A utility on this disk gives you read-only access to the NTFS filesystem. You discover that one of the .dll files for the Salesapp application iscorrupted. The corrupted file is stored in the C.\Windows\System32 folder.You need to restore the corrupted file. You need to avoid losing any changes madeto the data files on testking1.What should you do onTestKing1?()
You are the network administrator for TestKing. The network consists of a singleActive Directory domain. All servers run Windows Server 2003.The domain contains two domain controllers named Testking1 and Testking2. Youuse a Windows XP Professional client computer named Client1.In Active Directory, the domain administrator creates two new user accountsnamed NetAdmin1 and AdminUser1. The NetAdmin1 account is a member of theDomain Admins global group. The AdminUser1 account is a member of only theUsers local group. You assign the AdminUser1 logon account the Allow log onlocally user right in the Default Domain Controller Group Policy object (GPO).A new written security policy states that user accounts that are member of theDomain Admins global group should not be used to log on to the console of adomain controller. It also states that administrative tasks should be performed byusing the Secondary Logon service.You need to create a new computer account in Active Directory, and you mustcomply with the new company security policy.What should you do?()
You are the network administrator for TestKing. You manage a Windows Server2003 computer named TestKing4 that functions as an application server.TestKing4 will be used for development during the next 30 days. You need to backup all data on TestKing4 every day for the next 30 days.You need to automate the backups of TestKing4 to meet these businessrequirements. You want to achieve this goal by using the minimum amount ofadministrative effort.What should you do?()
You are the network administrator in the New York office of TestKing.The company network consists of a single Active Directory domain The New York office currently contains one Windows Server 2003 file server named TestKingA.All file servers in the New York office are in an organizational unit (OU) namedNew York Servers. You have been assigned the Allow - Change permission for aGroup Policy object (GPO) named NYServersGPO, which is linked to the NewYork Servers OU.The written company security policy states that all new servers must be configuredwith specified predefined security settings when the servers join the domain. Thesesettings differ slightly for the various company offices.You plan to install Windows Sever 2003, on 15 new computers, which all functionsas file servers. You will need to configure the specified security settings on the newfile servers.TestKingA currently has the specified security settings configured in its localsecurity policy. You need to ensure that the security configuration of the new fileservers is identical to that of TestKingA. You export a copy of TestKingA's localsecurity policy settings to a template file.You need to configure the security settings of the new servers, and you want to usethe minimum amount of administrative effort.What should you do?()
You are the network administrator for your company. All network servers runWindows Server 2003. All client computers run Windows XP Professional.A member server named Server1 is located at a branch office that does not permitthe use of Remote Desktop Protocol. Another administrator uses the Backup utilityto create a scheduled backup job on Server1. The backup job performs a normalbackup of an application server.The application server is removed from the network.You need to use a client computer to remove the backup job from Server1. Youcannot travel to the branch office.What should you do?()
You are the network administrator for You administer a Windows Server 2003 computer named TestKing2. User profiles are stored on TestKing2.A user named Sandra reports that she accidentally deleted a folder namedTestKingStuff from her user profile. She needs to have her TestKingStuff folderrestored. Other users are accessing TestKing2, and you do not want to negativelyaffect their work. You locate the latest backup that contains the files that you needto restore.You need to restore Sandra's TestKingStuff folder. You want to achieve this goal byusing the minimum amount of administrative effort.What should you do?()
You are the network administrator for the Beijing office of TestKing. A branchoffice is located in Cairo. The DNS servers in both locations run Windows Server2003.The network uses two DNS namespaces internally. They are namedpublishing.testking.com and testking.com. The locations of the primary nameservers are shown in the following table.The Beijing office contains some servers that are registered in the testking.com zoneand other that are registered in the publishing.testking.com zone. All computers inthe Beijing office are configured to use the local DNS server as their preferred DNSserver. The two offices are connected only by using a VPN through the Internet.Various network problems occasionally result in loss of connectivity between thetwo offices.Firewalls prevent the DNS servers in both offices from receiving queries from theInternet.You need to configure the DNS server in the Beijing office to allow successfulresolution of all queries from the Beijing office for names in thepublishing.testking.com namespace, even when the VPN link between the Beijingand Cairo offices fails.What should you configure on the DNS server in the Beijing office?()
You are the domain administrator for TestKing's Active Directory domain. Thedomain consists of four domain controllers named TestkingDC1, TestkingDC2,TestkingDC3, and TestkingDC4. TestkingDC1 and TestkingDC2 run Windows 2000Server and have the latest service pack installed. TestkingDC3 and TestkingDC4run Windows Server 2003. All client computers run Windows XP Professional andhave the latest service pack installed.You have a new client computer that you plan to use to perform domainadministration functions.You need to be able to manage Active Directory users and computers remotely.What should you do?()