You are a network administrator for your company. The network contains a Windows Server 2003 computer
named Server4, which functions as a file server.
Server4 contains several applications. One application is named App1. Another application is named App2. Users report that App2 is performing poorly. You examine Server4 and discover that App1 was started by using the start app1 /realtime command.
You need to ensure that no other application was started by using the /realtime switch.
What should you do? ()
A. Use Performance Monitor to create a trace log. Trace Process creations/deletions.
B. Use Performance Monitor to create a trace log. Trace Thread creations/deletions.
C. Use Task Manager to view processes. View the Base Priority column.
D. Use Task Manager to view performance. On the View menu, select Show Kernel Times.
您可能感兴趣的试卷
你可能感兴趣的试题
You are a network administrator for your company. All servers run Windows Server 2003.
You manage a file server named Server8. You need to create a performance baseline for Server8 by using
Performance Logs and Alerts. You need to store the performance data in an existing Microsoft SQL Server
database on another computer.
You create a new counter log, and you select SQL Database as the log file format. When you attempt to save your changes, you receive an error message stating that you must select a data source name. You examine the configuration of the SQL Logs, as shown in the following dialog box.
You need to configure the counter log to use a SQL database.
What should you do? ()
A. Use the relog command-line utility to configure a connection to your SQL database.
B. Use Add or Remove programs to install Connection Point Services. Configure a connection to your SQL database.
C. Use the logman command-line utility with the create switch to configure a connection to your SQL database.
D. Use Data Sources (ODBC) to configure a connection to your SQL database.
You are a network administrator for your company. The network contains a Windows Server 2003 computernamed Server3. Server3 functions as a file server.
Six users in the accounting department use an accounting software application to open files that are stored in a shared folder on Server3. The users keep these files open for an extended period of time.
You need to restart Server3. You need to find out if any files on Server3 are open before you restart the computer.
What should you do? ()
A. Use Computer Management to view existing connections.
B. Use the netsend command to send a message to all domain members.
C. Use Task Manager to monitor processes started by all users.
D. Use System Monitor to monitor the Server object in Report view.
You are a network administrator for your company. The network contains a Windows Server 2003 computer
named Print1 that functions as a print server.
Print1 contains a printer named MarketingPrinter. Users report that print jobs they submit to the MarketingPrinter take a long time to print. You immediately examine Print1 and conclude that the server is performing at acceptable levels.
You need to identify the problem.
What should your next step be? ()
A. Use Task Manager to monitor processor and memory performance.
B. Use Windows Explorer to monitor the size of the Windows\System32\Spool\prtprocs folder.
C. Use System Monitor to view the Print Queue\Jobs counter.
D. Use System Monitor to view the Print Queue\Enumerate Network Printer Calls counter.
You are a network administrator for your company. All servers run Windows Server 2003. A server named
Server34 runs an application named App1.
Users report that App1 is performing slowly. You suspect that an unauthorized application is installed on Server34.
You run the netstat command and examine the output, as shown in the exhibit. (Click the Exhibit button.)
You need to identify the unauthorized application by using the output from the netstat command.
Which tool should you use to identify the application? ()
A. Performance console
B. System Monitor
C. Network Monitor
D. Task Manager
You are a network administrator for your company. All servers run Windows Server 2003. A server named
Server2 functions as a print server.
Users in the sales department print large reports and sales documents on several printers that are attached to
Server2. Users report that during periods of peak activity, Server2 becomes unresponsive and is slow to print
documents. You use System Monitor to view the performance of Server2 during a period of peak activity. The
results are shown in the exhibit. (Click the Exhibit button.)
You need to improve the performance of Server2 when documents are printed during periods of peak activity.
What should you do? ()
A. Configure a printer pool on Server2 by using an additional print device.
B. Install an additional hard disk in Server2. Move the spool directory to the new hard disk.
C. Increase the amount of physical RAM that is installed in Server2.
D. Upgrade the processor in Server2.
You are a network administrator for your company. All servers run Windows Server 2003. A server named
Server2 functions as a print server on the network.
A high-speed color print device is attached to Server2. You configure a printer named ColorPrinter on Server2.
Several other printers are also configured on Server2. The configuration of ColorPrinter is shown in the exhibit.(Click the Exhibit button.)
Users in the marketing department report that when they print large files that contain multiple graphics, the
documents print very slowly, pausing for several seconds between each page.
You need to minimize the impact that large print jobs have on the performance of the printer. You need to achieve this goal by using the least administrative effort.
What should you do?()
A. Create a printer pool that includes an additional printer of the same type as ColorPrinter.
B. Add a second printer to Server2 that prints to the same print device as ColorPrinter. Instruct marketing users to submit large print jobs to one device and smaller print jobs to the other.
C. Configure ColorPrinter to start printing after the last page is spooled.
D. Increase the priority of ColorPrinter so that it is higher than all other printers.
You are the domain administrator for your company's Active Directory domain. All client computers run
Windows 2000 Professional.
You recently deployed 10 new servers that run Windows Server 2003. You placed the servers in a new
organizational unit (OU) named W2K3Servers.
Anne is another network administrator.
You need to configure the appropriate permissions to allow Anne to manage the new servers by using Terminal Services from her client computer. You need to assign Anne only the permissions she needs to perform her job.
What should you do? ()
A. Add Anne's user account to the local Power Users group on each server that runs Windows Server 2003.
B. Add Anne's user account to the Remote Desktop Users group on each server that runs Windows Server 2003.
C. Assign Anne's user account the Allow - Read and the Allow - Write permissions for the W2K3Servers OU.
D. Configure the Managed By property for the W2K3Servers OU to Anne's user account.
You are a network administrator for your company. The network consists of a single Active Directory domain.
A user named Mary works in the information technology (IT) security department. Mary is a member of the ITSecurity global group.
Mary reports that no one in the ITSecurity global group can access the security log from the console of a computer named Server1.
You need to grant the ITSecurity global group the minimum rights necessary to view the security log on Server1.
How should you modify the local security policy?()
A. Assign the Generate security audits user right to the ITSecurity global group.
B. Assign the Manage auditing and security logs user right to the ITSecurity global group.
C. Assign the Allow logon through Terminal Services user right to the ITSecurity global group.
D. Assign the Act as part of the operating system user right to the ITSecurity global group.
You are the network administrator for Testking.com. The TestKing network contains seven application servers. Each application server runs a database application named TestKingApp.
Requirements for TestKingApp state that when you add a new user, you must add the user to the server that has the most available disk space.
You need to ensure that you meet the requirements when you add new users to TestKingApp.
What should you do?()
A. Use Event Viewer to review the application logs on each of the seven servers.
B. Use Performance Logs and Alerts to record the PhysicalDisk object on all seven servers.
C. Use Task Manager to view the performance data on each of the seven servers.
D. Use System Monitor to generate a histogram view of the LogicalDisk object on all seven servers.
You are the network administrator for your company. The network consists of a single Active Directory
domain. The Active Directory domain contains two domain controllers named DC1 and DC2.
During routine monitoring of the domain controllers, you observe numerous errors in the system log.
The errors are similar to the one shown in the following dialog box.
You need to resolve these errors on your domain controllers as quickly as possible.
What are two possible ways to achieve this goal? ()(Each correct answer presents a complete solution. Choose two.)
A. Install the appropriate printer drivers on DC1 and DC2.
B. Modify the Default domain controller Group Policy object (GPO). Enable the Do not allow client printer redirection policy.
C. Add the Domain Admins group to the built-in Print Operators group.
D. Add the Domain Users group to the built-in Print Operators group.
最新试题
You are the network administrator for The network consists of asingle Active Directory domain named All network servers runWindows Server 2003, and all client computers run Windows XP Professional.You use the Backup utility to schedule a full backup of TESTKINGDC1 everynight. You ensure that the Active Directory configuration is also backed up.One week later, TESTKINGDC1 stops accepting logon requests. On investigation,you discover that the Active Directory configuration is corrupt.You need to restore TESTKINGDC1 as a functioning domain controller.Which two actions should you perform? ()(Each correct answer presents part of thesolution. Choose two)
You are the network administrator for The network consists of asingle Active Directory domain named The domain contains WindowsServer 2003 computers and Windows XP Professional computers.All confidential company files are stored on a file server named TestKing1. Thewritten company security states that all confidential data must be stored andtransmitted in a secure manner. To comply with the security policy, you enableEncrypting File System (EFS) on the confidential files. You also add EFScertificates to the data decryption field (DDF) of the confidential files for the userswho need to access them.While performing network monitoring, you notice that the confidential files that arestored on TestKing1 are being transmitted over the network without encryption.You must ensure that encryption is always used when the confidential files onTestKing1 are stored and transmitted over the network.What are two possible ways to accomplish this goal?() (Each correct answer presentsa complete solution. Choose two)
You are the network administrator for the Beijing office of TestKing. A branchoffice is located in Cairo. The DNS servers in both locations run Windows Server2003.The network uses two DNS namespaces internally. They are namedpublishing.testking.com and testking.com. The locations of the primary nameservers are shown in the following table.The Beijing office contains some servers that are registered in the testking.com zoneand other that are registered in the publishing.testking.com zone. All computers inthe Beijing office are configured to use the local DNS server as their preferred DNSserver. The two offices are connected only by using a VPN through the Internet.Various network problems occasionally result in loss of connectivity between thetwo offices.Firewalls prevent the DNS servers in both offices from receiving queries from theInternet.You need to configure the DNS server in the Beijing office to allow successfulresolution of all queries from the Beijing office for names in thepublishing.testking.com namespace, even when the VPN link between the Beijingand Cairo offices fails.What should you configure on the DNS server in the Beijing office?()
You are the network administrator for Active Directory domain. Thedomain includes Windows Server 2003 domain controllers and Windows XPProfessional client computers.A new administrator named Sandra is hired to assist you in deploying Windows XPProfessional to 100 new computers. Sandra installs the operating system on a newcomputer named TestKing11.However, when Sandra tries to log on to the domain from TestKing11, she isunsuccessful. The logon dialog box does now allow her to view and select the domainname.You need to ensure that Sandra can log on to the domain from TestKing11.What should you do?()
You are the network administrator for TestKing. The network consists of a singleActive Directory domain. All network servers run Windows Server 2003.A member server named TestkingA has a locally attached tape device. TestkingAcontains several folders and files that are encrypted by using Encrypting FileSystem (EFS).You create a new user account for a new employee named Victoria. Victoria's useraccount is member of the Users group only.You need to ensure that Victoria can back up the encrypted folders and files onTestkingA. Victoria must be assigned the minimum administrative privilegesneeded to complete this task.What should you do?()
You are the domain administrator for TestKing's Active Directory domain. Thedomain consists of four domain controllers named TestkingDC1, TestkingDC2,TestkingDC3, and TestkingDC4. TestkingDC1 and TestkingDC2 run Windows 2000Server and have the latest service pack installed. TestkingDC3 and TestkingDC4run Windows Server 2003. All client computers run Windows XP Professional andhave the latest service pack installed.You have a new client computer that you plan to use to perform domainadministration functions.You need to be able to manage Active Directory users and computers remotely.What should you do?()
You are the network administrator for The network consists of asingle Active Directory domain named All network servers runWindows Server 2003.Confidential files are stored on a member server named TK1. The computer objectfor TK1 resides in an organizational unit (OU) named Confidential. A Group Policyobject (GPO) named GPO1 is linked to the Confidential OU.To audit access to the confidential files, you enable auditing on all private folders onTK1.Several days later, you review the audit logs. You discover that auditing is notsuccessful.You need to ensure that auditing occurs successfully.What should you do?()
You are the network administrator for TestKing. The network consists of a singleActive Directory domain. All network servers run Windows Server 2003. Half of theclient computers run Windows XP Professional, and the other half run WindowsNT 4.0 Workstation.You install Terminal Services on three member servers named Testking1,Testking2, and Testking3. Each server has a single Pentium III 600-Mhz CPU with512 MB of RAM and a single-channel EIDE disk subsystem. You place all threeterminal servers in an organizational unit (OU) named Terminal Server. You link aGroup Policy Object (GPO) to the Terminal Server OU.Several days after the installation, users report that the performance of all threeterminal servers is unacceptably slow. You discover that each server has at least 50active sessions at once.You need to improve the performance of all three terminal servers. You mustachieve this goal by using the minimum amount of administrative effort, withoutupgrading any hardware.What should you do?()
You are the network administrator for All network servers run Windows Server 2003.A member server named TESTKING1 hosts several hundred folders, which residein various locations on the server. TESTKING1 is configured to run a normalbackup of the folder every Saturday at 1:00 A.M.You discover that users edit the contents of the folders on Saturday and Sunday.You need to use the Backup utility to reschedule the backup job so that it runs everyMonday at 1:00 A.M. instead of every Saturday at 1:00 A.M. You must achieve thisgoal by using the minimum amount of administrative effort.What should you do?()
You are the network administrator for TestKing. Your network consists of a singleActive Directory domain. You manage a Terminal Server farm that includes fiveterminal servers and a Terminal Services Licensing server named testking9. Allservers run Windows 2000 Server. There are 2,500 users who log on to the terminalservers to access a custom human resource (HR) application.You install Windows Server 2003 on a new server named testking10. Testking10 isconfigured with all default settings enabled. You install Terminal Services and theHR application on testking10. You instruct some users to access the HR applicationon testking10.Four months later, users report that they can no longer establish Terminal Servicessessions to testking10. You verify that users can connect to the other terminalservers in your Terminal Server farm.You need to ensure that users can run the HR application on all terminal servers onthe network.What should you do?()