Server1 contains a folder named D:\Salesdata, which contains important company data. The
hardware-monitoring software reports that the disk that contains volume D is in danger of imminent disk failure.
You order a replacement disk, but you must wait at least one day for the disk to be delivered. You discover that you do not have a backup of the D:\Salesdata folder because a recent backup was configured incorrectly.
You need to back up the D:\Salesdata folder so that you can restore the data if the disk fails. You need to achieve this goal as quickly as possible.
What should you do? ()
A. Perform a normal backup of the D:\Salesdata folder.
B. Perform an incremental backup of the D:\Salesdata folder.
C. Perform a differential backup of the D:\Salesdata folder.
D. Perform a daily backup of the D:\Salesdata folder.
E. Enable Shadow Copies on volume D:\Configure the shadow copy location as C:\.
您可能感兴趣的试卷
你可能感兴趣的试题
A. Create a new Web site named Tsweb.
B. Create a new virtual directory named Tsweb.
C. Install IIS.
D. Install the Remote Administration IIS subcomponent.
E. Install the Remote Desktop Web Connection IIS subcomponent.
You are a network administrator for your company. All servers run Windows Server 2003.
A server named Server1 functions as an application server. Server1 runs several applications. Server1 is located on the company's perimeter network. You allow communication to Server1 only over port 80.
Users report that applications on Server1 perform poorly during periods of peak activity. You monitor Server1.
The results are shown in the exhibit. (Click the Exhibit button.)
You need to identify which process is causing Server1 to perform poorly.
Which two tools can you use to achieve this goal? ()(Each correct answer presents a complete solution. Choose two.)
A. Event Viewer
B. Task Manager
C. Network Monitor
D. System Monitor
You are a network administrator for your company. All servers run Windows Server 2003. A server named
Server3 functions as an application server. The disks in Server3 are configured as shown in the following table.
You purchase four additional 20-GB hard disks for Server3. You plan to install an inventory database on Server3.
You estimate that you need a total of 60 GB of disk space to hold all the inventory data. You need to protect the data against the failure of any disk that contains either operating system data or inventory database data.
You need to create a new disk configuration on Server3.
Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two.)
A. Use one additional disk to create a mirror for drive
B. Use two additional disks to create a striped set for drive
C. Use three additional disks to create a RAID-5 volume for drive
D. Use two additional disks to create a RAID-5 volume for drive
You are a network administrator for your company. The network contains a Windows Server 2003 computer
named Server4, which functions as a file server.
Server4 contains several applications. One application is named App1. Another application is named App2. Users report that App2 is performing poorly. You examine Server4 and discover that App1 was started by using the start app1 /realtime command.
You need to ensure that no other application was started by using the /realtime switch.
What should you do? ()
A. Use Performance Monitor to create a trace log. Trace Process creations/deletions.
B. Use Performance Monitor to create a trace log. Trace Thread creations/deletions.
C. Use Task Manager to view processes. View the Base Priority column.
D. Use Task Manager to view performance. On the View menu, select Show Kernel Times.
You are a network administrator for your company. All servers run Windows Server 2003.
You manage a file server named Server8. You need to create a performance baseline for Server8 by using
Performance Logs and Alerts. You need to store the performance data in an existing Microsoft SQL Server
database on another computer.
You create a new counter log, and you select SQL Database as the log file format. When you attempt to save your changes, you receive an error message stating that you must select a data source name. You examine the configuration of the SQL Logs, as shown in the following dialog box.
You need to configure the counter log to use a SQL database.
What should you do? ()
A. Use the relog command-line utility to configure a connection to your SQL database.
B. Use Add or Remove programs to install Connection Point Services. Configure a connection to your SQL database.
C. Use the logman command-line utility with the create switch to configure a connection to your SQL database.
D. Use Data Sources (ODBC) to configure a connection to your SQL database.
You are a network administrator for your company. The network contains a Windows Server 2003 computernamed Server3. Server3 functions as a file server.
Six users in the accounting department use an accounting software application to open files that are stored in a shared folder on Server3. The users keep these files open for an extended period of time.
You need to restart Server3. You need to find out if any files on Server3 are open before you restart the computer.
What should you do? ()
A. Use Computer Management to view existing connections.
B. Use the netsend command to send a message to all domain members.
C. Use Task Manager to monitor processes started by all users.
D. Use System Monitor to monitor the Server object in Report view.
You are a network administrator for your company. The network contains a Windows Server 2003 computer
named Print1 that functions as a print server.
Print1 contains a printer named MarketingPrinter. Users report that print jobs they submit to the MarketingPrinter take a long time to print. You immediately examine Print1 and conclude that the server is performing at acceptable levels.
You need to identify the problem.
What should your next step be? ()
A. Use Task Manager to monitor processor and memory performance.
B. Use Windows Explorer to monitor the size of the Windows\System32\Spool\prtprocs folder.
C. Use System Monitor to view the Print Queue\Jobs counter.
D. Use System Monitor to view the Print Queue\Enumerate Network Printer Calls counter.
You are a network administrator for your company. All servers run Windows Server 2003. A server named
Server34 runs an application named App1.
Users report that App1 is performing slowly. You suspect that an unauthorized application is installed on Server34.
You run the netstat command and examine the output, as shown in the exhibit. (Click the Exhibit button.)
You need to identify the unauthorized application by using the output from the netstat command.
Which tool should you use to identify the application? ()
A. Performance console
B. System Monitor
C. Network Monitor
D. Task Manager
You are a network administrator for your company. All servers run Windows Server 2003. A server named
Server2 functions as a print server.
Users in the sales department print large reports and sales documents on several printers that are attached to
Server2. Users report that during periods of peak activity, Server2 becomes unresponsive and is slow to print
documents. You use System Monitor to view the performance of Server2 during a period of peak activity. The
results are shown in the exhibit. (Click the Exhibit button.)
You need to improve the performance of Server2 when documents are printed during periods of peak activity.
What should you do? ()
A. Configure a printer pool on Server2 by using an additional print device.
B. Install an additional hard disk in Server2. Move the spool directory to the new hard disk.
C. Increase the amount of physical RAM that is installed in Server2.
D. Upgrade the processor in Server2.
You are a network administrator for your company. All servers run Windows Server 2003. A server named
Server2 functions as a print server on the network.
A high-speed color print device is attached to Server2. You configure a printer named ColorPrinter on Server2.
Several other printers are also configured on Server2. The configuration of ColorPrinter is shown in the exhibit.(Click the Exhibit button.)
Users in the marketing department report that when they print large files that contain multiple graphics, the
documents print very slowly, pausing for several seconds between each page.
You need to minimize the impact that large print jobs have on the performance of the printer. You need to achieve this goal by using the least administrative effort.
What should you do?()
A. Create a printer pool that includes an additional printer of the same type as ColorPrinter.
B. Add a second printer to Server2 that prints to the same print device as ColorPrinter. Instruct marketing users to submit large print jobs to one device and smaller print jobs to the other.
C. Configure ColorPrinter to start printing after the last page is spooled.
D. Increase the priority of ColorPrinter so that it is higher than all other printers.
最新试题
You are the network administrator for TestKing. The network contains a WindowsServer 2003 computer named testking1, which hosts a critical business applicationnamed Salesapp. Testking1 has one disk that contains a single NTFS volume.Five days ago, the System State of testking1 was backed up, and an AutomatedSystem Recovery (ASR) backup was created. No additional backups wereperformed. Subsequently, many changes were made to the Salesapp data files.You apply an update to the application, which requires you to restart testking1.Windows startup terminates with a Stop error. You restart the computer and bootto a floppy disk. A utility on this disk gives you read-only access to the NTFS filesystem. You discover that one of the .dll files for the Salesapp application iscorrupted. The corrupted file is stored in the C.\Windows\System32 folder.You need to restore the corrupted file. You need to avoid losing any changes madeto the data files on testking1.What should you do onTestKing1?()
You are the network administrator for The network consists of asingle Active Directory domain named The domain contains WindowsServer 2003 computers and Windows XP Professional computers.All confidential company files are stored on a file server named TestKing1. Thewritten company security states that all confidential data must be stored andtransmitted in a secure manner. To comply with the security policy, you enableEncrypting File System (EFS) on the confidential files. You also add EFScertificates to the data decryption field (DDF) of the confidential files for the userswho need to access them.While performing network monitoring, you notice that the confidential files that arestored on TestKing1 are being transmitted over the network without encryption.You must ensure that encryption is always used when the confidential files onTestKing1 are stored and transmitted over the network.What are two possible ways to accomplish this goal?() (Each correct answer presentsa complete solution. Choose two)
You are the network administrator for The network consists of asingle Active Directory domain named All domain controllers runWindows Server 2003, and all client computers run Windows XP Professional. Eachdomain server has a locally attached tape device.You need to back up each domain controller. Your backup process must fulfil thefollowing requirements:a. System recovery must be possible in the event of server failure.b. The system configuration and all current dynamic disk configurations must bebacked up.c. Other data partitions do not need to be backed up.What should you do?()
You are the network administrator for The network consists of asingle DNS domain named.You replace a UNIX server with a Windows Server 2003 computer namedTestKing1.TestKing1 is the DNS server and start authority (SOA) for testking.com. A UNIXserver named TestKing2 is the mail server for testking.com.You receive reports that Internet users cannot send e-mail to the testking.comdomain. The host addresses are shown in the following window.You need to ensure that Internet users can send e-mail to the testking.com domain.What should you do?()
You are the network administrator for You administer a Windows Server 2003 computer named TestKing2. User profiles are stored on TestKing2.A user named Sandra reports that she accidentally deleted a folder namedTestKingStuff from her user profile. She needs to have her TestKingStuff folderrestored. Other users are accessing TestKing2, and you do not want to negativelyaffect their work. You locate the latest backup that contains the files that you needto restore.You need to restore Sandra's TestKingStuff folder. You want to achieve this goal byusing the minimum amount of administrative effort.What should you do?()
You are the network administrator for your company. All network servers runWindows Server 2003.You install and configure Software Update Services (SUS) on a server namedServer1. You configure the following settings:1. Do not use a proxy server for Internet access.2. Synchronize directly from the Microsoft Windows Update servers.3. Automatically approve new versions of previously approved updates.4. Save updates in a local folder.You back up the SUS configuration and schedule a daily synchronization procedurefor Server1.Later the same day, Server1 fails. You use the original names and locations torestore Windows Server 2003, IIS 6.0, and SUS.Now you need to fully restore the SUS configuration, without overwriting any otherdata.What should you do?()
You are the network administrator for All servers run Windows Server 2003.You are creating a backup schedule for the main file server.You need to create a schedule so that backup jobs are completed in the shortestamount of time possible.What should you do?()
You are the network administrator for TestKing. The network consists of a singleActive Directory domain. All network servers run Windows Server 2003. Half of theclient computers run Windows XP Professional, and the other half run WindowsNT 4.0 Workstation.You install Terminal Services on three member servers named Testking1,Testking2, and Testking3. Each server has a single Pentium III 600-Mhz CPU with512 MB of RAM and a single-channel EIDE disk subsystem. You place all threeterminal servers in an organizational unit (OU) named Terminal Server. You link aGroup Policy Object (GPO) to the Terminal Server OU.Several days after the installation, users report that the performance of all threeterminal servers is unacceptably slow. You discover that each server has at least 50active sessions at once.You need to improve the performance of all three terminal servers. You mustachieve this goal by using the minimum amount of administrative effort, withoutupgrading any hardware.What should you do?()
You are the network administrator for The network consists of a single Active Directory domain named.You configure a new Windows Server 2003 file server named TestKingSrv1.You restore user files from a tape backup, and you create a logon script that maps driveletters to shared files on TestKingSrv1.Users report that they cannot access TestKingSrv1 through the drive mappings youcreated. Users also report that TestKingSrv1 does not appear in My NetworkPlaces.You log on to TestKingSrv1 and confirm that the files are present and that theNTFS permissions and share permissions are correct. You cannot access anynetwork resources. You run the ipconfig command and see the following output.You need to configure the TCP/IP properties on TestKingSrv1 to resolve theproblem.What should you do?()
You are the network administrator for The network consists of asingle Active Directory domain named All network servers runWindows Server 2003.Confidential files are stored on a member server named TK1. The computer objectfor TK1 resides in an organizational unit (OU) named Confidential. A Group Policyobject (GPO) named GPO1 is linked to the Confidential OU.To audit access to the confidential files, you enable auditing on all private folders onTK1.Several days later, you review the audit logs. You discover that auditing is notsuccessful.You need to ensure that auditing occurs successfully.What should you do?()