单项选择题

You are a network administrator for your company. The network contains a Windows Server 2003 computer
named Print1 that functions as a print server.
Print1 contains a printer named MarketingPrinter. Users report that print jobs they submit to the MarketingPrinter take a long time to print. You immediately examine Print1 and conclude that the server is performing at acceptable levels.
You need to identify the problem.
What should your next step be? ()

A. Use Task Manager to monitor processor and memory performance.
B. Use Windows Explorer to monitor the size of the Windows\System32\Spool\prtprocs folder.
C. Use System Monitor to view the Print Queue\Jobs counter.
D. Use System Monitor to view the Print Queue\Enumerate Network Printer Calls counter.


您可能感兴趣的试卷

你可能感兴趣的试题

4.单项选择题

You are the domain administrator for your company's Active Directory domain. All client computers run
Windows 2000 Professional.
You recently deployed 10 new servers that run Windows Server 2003. You placed the servers in a new
organizational unit (OU) named W2K3Servers.
Anne is another network administrator.
You need to configure the appropriate permissions to allow Anne to manage the new servers by using Terminal Services from her client computer. You need to assign Anne only the permissions she needs to perform her job.
What should you do? ()

A. Add Anne's user account to the local Power Users group on each server that runs Windows Server 2003.
B. Add Anne's user account to the Remote Desktop Users group on each server that runs Windows Server 2003.
C. Assign Anne's user account the Allow - Read and the Allow - Write permissions for the W2K3Servers OU.
D. Configure the Managed By property for the W2K3Servers OU to Anne's user account.

5.单项选择题

You are a network administrator for your company. The network consists of a single Active Directory domain.
A user named Mary works in the information technology (IT) security department. Mary is a member of the ITSecurity global group.
Mary reports that no one in the ITSecurity global group can access the security log from the console of a computer named Server1.
You need to grant the ITSecurity global group the minimum rights necessary to view the security log on Server1.
How should you modify the local security policy?()

A. Assign the Generate security audits user right to the ITSecurity global group.
B. Assign the Manage auditing and security logs user right to the ITSecurity global group.
C. Assign the Allow logon through Terminal Services user right to the ITSecurity global group.
D. Assign the Act as part of the operating system user right to the ITSecurity global group.

6.单项选择题

You are the network administrator for Testking.com. The TestKing network contains seven application servers. Each application server runs a database application named TestKingApp.
Requirements for TestKingApp state that when you add a new user, you must add the user to the server that has the most available disk space.
You need to ensure that you meet the requirements when you add new users to TestKingApp.
What should you do?()


A. Use Event Viewer to review the application logs on each of the seven servers.
B. Use Performance Logs and Alerts to record the PhysicalDisk object on all seven servers.
C. Use Task Manager to view the performance data on each of the seven servers.
D. Use System Monitor to generate a histogram view of the LogicalDisk object on all seven servers.

10.单项选择题

You are the network administrator for your company. The network consists of a single Active Directory domain.
All servers run Windows Server 2003.
An administrator named Misty Shock attempts to perform troubleshooting tasks on a file server. However, when she attempts to open the security event log, she receives the error message shown in the exhibit. (Click the Exhibitbutton.)

You need to ensure that Misty can complete her troubleshooting tasks.
What should you do?()

A. Add Misty's user account to the Server Operators domain group.
B. Add Misty's user account to the local Administrators group on the file server.
C. Configure Misty's client computer to enable the IPSec Server (Request Security) policy.
D. Assign Misty's user account the Allow logon through Terminal Services user right for the file server.

最新试题

You are the network administrator in the New York office of TestKing.The company network consists of a single Active Directory domain The New York office currently contains one Windows Server 2003 file server named TestKingA.All file servers in the New York office are in an organizational unit (OU) namedNew York Servers. You have been assigned the Allow - Change permission for aGroup Policy object (GPO) named NYServersGPO, which is linked to the NewYork Servers OU.The written company security policy states that all new servers must be configuredwith specified predefined security settings when the servers join the domain. Thesesettings differ slightly for the various company offices.You plan to install Windows Sever 2003, on 15 new computers, which all functionsas file servers. You will need to configure the specified security settings on the newfile servers.TestKingA currently has the specified security settings configured in its localsecurity policy. You need to ensure that the security configuration of the new fileservers is identical to that of TestKingA. You export a copy of TestKingA's localsecurity policy settings to a template file.You need to configure the security settings of the new servers, and you want to usethe minimum amount of administrative effort.What should you do?()

题型:单项选择题

You are the network administrator for TestKing. The network consists of a singleActive Directory domain. All network servers run Windows Server 2003 and allclient computers run Windows XP Professional.Terminal Services is installed on a member server named Testking1. Currently, 30active terminal server sessions are connected to Testking1. An unforeseen hardwareupgrade will require shutting down the server.You need to provide a two-minute warning about the shutdown to all activeterminal sessions.First, you log on to Testking1 as an administrator.What should you do next?()

题型:单项选择题

You are the network administrator for Test King. The network consists of a singleActive Directory domain named The domain contains WindowsServer 2003 computers and Windows XP Professional computers.The Default Domain Policy has been modified by importing a security template file,which contain several security settings.A server named TestKing1 cannot run a program that us functioning on othersimilarly configured servers. You need to find out whether additional securitysettings have been added to the local security policy on TestKing1.To troubleshoot, you want to use a tool to compare the current security settings onTestKing1 against the security template file in order to automatically identify anysettings that might have been added to the local security policy.Which tool should you run on TestKing1?()

题型:单项选择题

You are the network administrator for the Beijing office of TestKing. A branchoffice is located in Cairo. The DNS servers in both locations run Windows Server2003.The network uses two DNS namespaces internally. They are namedpublishing.testking.com and testking.com. The locations of the primary nameservers are shown in the following table.The Beijing office contains some servers that are registered in the testking.com zoneand other that are registered in the publishing.testking.com zone. All computers inthe Beijing office are configured to use the local DNS server as their preferred DNSserver. The two offices are connected only by using a VPN through the Internet.Various network problems occasionally result in loss of connectivity between thetwo offices.Firewalls prevent the DNS servers in both offices from receiving queries from theInternet.You need to configure the DNS server in the Beijing office to allow successfulresolution of all queries from the Beijing office for names in thepublishing.testking.com namespace, even when the VPN link between the Beijingand Cairo offices fails.What should you configure on the DNS server in the Beijing office?()

题型:单项选择题

You are the network administrator for The network consists of a single Active Directory domain named.You configure a new Windows Server 2003 file server named TestKingSrv1.You restore user files from a tape backup, and you create a logon script that maps driveletters to shared files on TestKingSrv1.Users report that they cannot access TestKingSrv1 through the drive mappings youcreated. Users also report that TestKingSrv1 does not appear in My NetworkPlaces.You log on to TestKingSrv1 and confirm that the files are present and that theNTFS permissions and share permissions are correct. You cannot access anynetwork resources. You run the ipconfig command and see the following output.You need to configure the TCP/IP properties on TestKingSrv1 to resolve theproblem.What should you do?()

题型:单项选择题

You are the network administrator for The network consists of asingle DNS domain named.You replace a UNIX server with a Windows Server 2003 computer namedTestKing1.TestKing1 is the DNS server and start authority (SOA) for testking.com. A UNIXserver named TestKing2 is the mail server for testking.com.You receive reports that Internet users cannot send e-mail to the testking.comdomain. The host addresses are shown in the following window.You need to ensure that Internet users can send e-mail to the testking.com domain.What should you do?()

题型:单项选择题

You are the network administrator for The network consists of asingle Active Directory domain named The domain contains WindowsServer 2003 computers and Windows XP Professional computers.All confidential company files are stored on a file server named TestKing1. Thewritten company security states that all confidential data must be stored andtransmitted in a secure manner. To comply with the security policy, you enableEncrypting File System (EFS) on the confidential files. You also add EFScertificates to the data decryption field (DDF) of the confidential files for the userswho need to access them.While performing network monitoring, you notice that the confidential files that arestored on TestKing1 are being transmitted over the network without encryption.You must ensure that encryption is always used when the confidential files onTestKing1 are stored and transmitted over the network.What are two possible ways to accomplish this goal?() (Each correct answer presentsa complete solution. Choose two)

题型:多项选择题

You are the network administrator for your company. All network servers runWindows Server 2003.You install and configure Software Update Services (SUS) on a server namedServer1. You configure the following settings:1. Do not use a proxy server for Internet access.2. Synchronize directly from the Microsoft Windows Update servers.3. Automatically approve new versions of previously approved updates.4. Save updates in a local folder.You back up the SUS configuration and schedule a daily synchronization procedurefor Server1.Later the same day, Server1 fails. You use the original names and locations torestore Windows Server 2003, IIS 6.0, and SUS.Now you need to fully restore the SUS configuration, without overwriting any otherdata.What should you do?()

题型:单项选择题

You are the domain administrator for TestKing's Active Directory domain. Thedomain consists of four domain controllers named TestkingDC1, TestkingDC2,TestkingDC3, and TestkingDC4. TestkingDC1 and TestkingDC2 run Windows 2000Server and have the latest service pack installed. TestkingDC3 and TestkingDC4run Windows Server 2003. All client computers run Windows XP Professional andhave the latest service pack installed.You have a new client computer that you plan to use to perform domainadministration functions.You need to be able to manage Active Directory users and computers remotely.What should you do?()

题型:单项选择题

You are the network administrator for The network consists of asingle Active Directory domain named All network servers runWindows Server 2003, and all client computers run Windows XP Professional.You use the Backup utility to schedule a full backup of TESTKINGDC1 everynight. You ensure that the Active Directory configuration is also backed up.One week later, TESTKINGDC1 stops accepting logon requests. On investigation,you discover that the Active Directory configuration is corrupt.You need to restore TESTKINGDC1 as a functioning domain controller.Which two actions should you perform? ()(Each correct answer presents part of thesolution. Choose two)

题型:多项选择题