You are a network administrator for your company. All servers run Windows Server 2003.
A network server named Server1 functions as the main file server. Server1 is backed up each night by using the Backup utility. You perform a test restoration of Server1 by using the Backup utility. You discover that files that are open during the backup process are not being backed up.
You need to ensure that open files are backed up successfully.
What should you do? ()
A. Enable volume shadow copies on the partitions that are being backed up.
B. Disable volume shadow copies on the partitions that are being backed up.
C. Select the Verify data after backup check box in the Advanced backup options of the backup job.
D. Clear the Disable volume shadow copy check box in the Advanced backup options of the backup job.
您可能感兴趣的试卷
你可能感兴趣的试题
A. Assign drive E to Userfiles. Enable Shadow Copies on the Userfiles volume.
B. Convert the disk that contains the Data volume to a dynamic disk.
C. Convert the disk that contains the Userfiles volume to a dynamic disk.
D. Instruct users to connect to \\Server1\Data when they attempt to access previous versions of files in the D:\Userfiles folder.
E. Instruct users to connect to \\Server1\D$ when they attempt to access previous versions of files on the Data volume.
Server1 contains a folder named D:\Salesdata, which contains important company data. The
hardware-monitoring software reports that the disk that contains volume D is in danger of imminent disk failure.
You order a replacement disk, but you must wait at least one day for the disk to be delivered. You discover that you do not have a backup of the D:\Salesdata folder because a recent backup was configured incorrectly.
You need to back up the D:\Salesdata folder so that you can restore the data if the disk fails. You need to achieve this goal as quickly as possible.
What should you do? ()
A. Perform a normal backup of the D:\Salesdata folder.
B. Perform an incremental backup of the D:\Salesdata folder.
C. Perform a differential backup of the D:\Salesdata folder.
D. Perform a daily backup of the D:\Salesdata folder.
E. Enable Shadow Copies on volume D:\Configure the shadow copy location as C:\.
A. Create a new Web site named Tsweb.
B. Create a new virtual directory named Tsweb.
C. Install IIS.
D. Install the Remote Administration IIS subcomponent.
E. Install the Remote Desktop Web Connection IIS subcomponent.
You are a network administrator for your company. All servers run Windows Server 2003.
A server named Server1 functions as an application server. Server1 runs several applications. Server1 is located on the company's perimeter network. You allow communication to Server1 only over port 80.
Users report that applications on Server1 perform poorly during periods of peak activity. You monitor Server1.
The results are shown in the exhibit. (Click the Exhibit button.)
You need to identify which process is causing Server1 to perform poorly.
Which two tools can you use to achieve this goal? ()(Each correct answer presents a complete solution. Choose two.)
A. Event Viewer
B. Task Manager
C. Network Monitor
D. System Monitor
You are a network administrator for your company. All servers run Windows Server 2003. A server named
Server3 functions as an application server. The disks in Server3 are configured as shown in the following table.
You purchase four additional 20-GB hard disks for Server3. You plan to install an inventory database on Server3.
You estimate that you need a total of 60 GB of disk space to hold all the inventory data. You need to protect the data against the failure of any disk that contains either operating system data or inventory database data.
You need to create a new disk configuration on Server3.
Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two.)
A. Use one additional disk to create a mirror for drive
B. Use two additional disks to create a striped set for drive
C. Use three additional disks to create a RAID-5 volume for drive
D. Use two additional disks to create a RAID-5 volume for drive
You are a network administrator for your company. The network contains a Windows Server 2003 computer
named Server4, which functions as a file server.
Server4 contains several applications. One application is named App1. Another application is named App2. Users report that App2 is performing poorly. You examine Server4 and discover that App1 was started by using the start app1 /realtime command.
You need to ensure that no other application was started by using the /realtime switch.
What should you do? ()
A. Use Performance Monitor to create a trace log. Trace Process creations/deletions.
B. Use Performance Monitor to create a trace log. Trace Thread creations/deletions.
C. Use Task Manager to view processes. View the Base Priority column.
D. Use Task Manager to view performance. On the View menu, select Show Kernel Times.
You are a network administrator for your company. All servers run Windows Server 2003.
You manage a file server named Server8. You need to create a performance baseline for Server8 by using
Performance Logs and Alerts. You need to store the performance data in an existing Microsoft SQL Server
database on another computer.
You create a new counter log, and you select SQL Database as the log file format. When you attempt to save your changes, you receive an error message stating that you must select a data source name. You examine the configuration of the SQL Logs, as shown in the following dialog box.
You need to configure the counter log to use a SQL database.
What should you do? ()
A. Use the relog command-line utility to configure a connection to your SQL database.
B. Use Add or Remove programs to install Connection Point Services. Configure a connection to your SQL database.
C. Use the logman command-line utility with the create switch to configure a connection to your SQL database.
D. Use Data Sources (ODBC) to configure a connection to your SQL database.
You are a network administrator for your company. The network contains a Windows Server 2003 computernamed Server3. Server3 functions as a file server.
Six users in the accounting department use an accounting software application to open files that are stored in a shared folder on Server3. The users keep these files open for an extended period of time.
You need to restart Server3. You need to find out if any files on Server3 are open before you restart the computer.
What should you do? ()
A. Use Computer Management to view existing connections.
B. Use the netsend command to send a message to all domain members.
C. Use Task Manager to monitor processes started by all users.
D. Use System Monitor to monitor the Server object in Report view.
You are a network administrator for your company. The network contains a Windows Server 2003 computer
named Print1 that functions as a print server.
Print1 contains a printer named MarketingPrinter. Users report that print jobs they submit to the MarketingPrinter take a long time to print. You immediately examine Print1 and conclude that the server is performing at acceptable levels.
You need to identify the problem.
What should your next step be? ()
A. Use Task Manager to monitor processor and memory performance.
B. Use Windows Explorer to monitor the size of the Windows\System32\Spool\prtprocs folder.
C. Use System Monitor to view the Print Queue\Jobs counter.
D. Use System Monitor to view the Print Queue\Enumerate Network Printer Calls counter.
You are a network administrator for your company. All servers run Windows Server 2003. A server named
Server34 runs an application named App1.
Users report that App1 is performing slowly. You suspect that an unauthorized application is installed on Server34.
You run the netstat command and examine the output, as shown in the exhibit. (Click the Exhibit button.)
You need to identify the unauthorized application by using the output from the netstat command.
Which tool should you use to identify the application? ()
A. Performance console
B. System Monitor
C. Network Monitor
D. Task Manager
最新试题
You are the network administrator for Active Directory domain. Thedomain includes Windows Server 2003 domain controllers and Windows XPProfessional client computers.A new administrator named Sandra is hired to assist you in deploying Windows XPProfessional to 100 new computers. Sandra installs the operating system on a newcomputer named TestKing11.However, when Sandra tries to log on to the domain from TestKing11, she isunsuccessful. The logon dialog box does now allow her to view and select the domainname.You need to ensure that Sandra can log on to the domain from TestKing11.What should you do?()
You are the administrator of a Windows Server 2003 computer named Testking1.An application on Testking1 gradually uses more and more memory until it causesTestking1 to stop responding. If you restart the application before it uses theavailable memory, there is no interruption of user services.You need to configure Testking1 to notify you when it encounters a low-memorycondition.What should you do?()
You are the network administrator for All network severs runWindows Server 2003. Business hours are 9:00 A.M. to 5:00 P.M., Monday throughFridayA file server named TestKingB is configured to create a shadow copy every morningat 1:00 A.M. TestKingB hosts several shared folders. One shared folder has theconfiguration shown in the following table.For several months, users frequently access both databases in TestKingOrders. OneMonday morning, a user tells you that she needs to edit Receivables.mdb as itexisted at 5:00 P.M. on the previous Thursday.You need to modify TestKingB to enable the appropriate editing. You must ensurethat other users can continue to access current data without interruption.First, you map a drive to \\TestKingB\TestKingOrders.Which two additional actions should you perform? ()(Each correct answer presentspart of the solution. Choose two)
You are the network administrator for Test King. The network consists of a singleActive Directory domain named The domain contains WindowsServer 2003 computers and Windows XP Professional computers.The Default Domain Policy has been modified by importing a security template file,which contain several security settings.A server named TestKing1 cannot run a program that us functioning on othersimilarly configured servers. You need to find out whether additional securitysettings have been added to the local security policy on TestKing1.To troubleshoot, you want to use a tool to compare the current security settings onTestKing1 against the security template file in order to automatically identify anysettings that might have been added to the local security policy.Which tool should you run on TestKing1?()
You are the network administrator for TestKing. The network consists of a singleActive Directory domain. All network servers run Windows Server 2003 and allclient computers run Windows XP Professional.Terminal Services is installed on a member server named Testking1. Currently, 30active terminal server sessions are connected to Testking1. An unforeseen hardwareupgrade will require shutting down the server.You need to provide a two-minute warning about the shutdown to all activeterminal sessions.First, you log on to Testking1 as an administrator.What should you do next?()
You are the network administrator for The network consists of asingle Active Directory domain named All network servers runWindows Server 2003. Three thousand client computers run Windows 2000Professional, and 1,500 client computers run Windows XP Professional.A new employee named Dr King is hired to assist you in installing Windows XPProfessional on 150 new client computers.You need to ensure that Dr King has only the minimum permissions required to addnew computer accounts to the domain and to own the accounts that he creates. DrKing must not be able to delete computer accounts.What should you do?()
You are the domain administrator for TestKing's Active Directory domain. Allservers run Windows Server 2003. All client computers run Windows XPProfessional.A newly installed server was added to your domain. You need to administer thisserver remotely from your client computer.You need to configure the new server to ensure that it can be administeredremotely.What should you do?()
You are the network administrator for the Beijing office of TestKing. A branchoffice is located in Cairo. The DNS servers in both locations run Windows Server2003.The network uses two DNS namespaces internally. They are namedpublishing.testking.com and testking.com. The locations of the primary nameservers are shown in the following table.The Beijing office contains some servers that are registered in the testking.com zoneand other that are registered in the publishing.testking.com zone. All computers inthe Beijing office are configured to use the local DNS server as their preferred DNSserver. The two offices are connected only by using a VPN through the Internet.Various network problems occasionally result in loss of connectivity between thetwo offices.Firewalls prevent the DNS servers in both offices from receiving queries from theInternet.You need to configure the DNS server in the Beijing office to allow successfulresolution of all queries from the Beijing office for names in thepublishing.testking.com namespace, even when the VPN link between the Beijingand Cairo offices fails.What should you configure on the DNS server in the Beijing office?()
You are the network administrator in the New York office of TestKing.The company network consists of a single Active Directory domain The New York office currently contains one Windows Server 2003 file server named TestKingA.All file servers in the New York office are in an organizational unit (OU) namedNew York Servers. You have been assigned the Allow - Change permission for aGroup Policy object (GPO) named NYServersGPO, which is linked to the NewYork Servers OU.The written company security policy states that all new servers must be configuredwith specified predefined security settings when the servers join the domain. Thesesettings differ slightly for the various company offices.You plan to install Windows Sever 2003, on 15 new computers, which all functionsas file servers. You will need to configure the specified security settings on the newfile servers.TestKingA currently has the specified security settings configured in its localsecurity policy. You need to ensure that the security configuration of the new fileservers is identical to that of TestKingA. You export a copy of TestKingA's localsecurity policy settings to a template file.You need to configure the security settings of the new servers, and you want to usethe minimum amount of administrative effort.What should you do?()
You are the network administrator for your company. All network servers runWindows Server 2003.You install and configure Software Update Services (SUS) on a server namedServer1. You configure the following settings:1. Do not use a proxy server for Internet access.2. Synchronize directly from the Microsoft Windows Update servers.3. Automatically approve new versions of previously approved updates.4. Save updates in a local folder.You back up the SUS configuration and schedule a daily synchronization procedurefor Server1.Later the same day, Server1 fails. You use the original names and locations torestore Windows Server 2003, IIS 6.0, and SUS.Now you need to fully restore the SUS configuration, without overwriting any otherdata.What should you do?()