You are the administrator of a Windows Server 2003 computer named Server1. User profiles are stored on
Server1.
A user named Peter reports that he accidentally deleted a folder named WorkProduct from his user profile. He needs to have his WorkProduct folder restored. Other users are accessing Server1, and you do not want to negatively affect their work. You locate the latest backup that contains the files that you need to restore.
You need to restore Peter’s WorkProduct folder. You want to achieve this goal by using the minimum amount of administrative effort.
What should you do? ()
A. Restore Peter's WorkProduct folder, and clear the Restore junction points, but not the folders and the file data they reference check box.
B. Restore the Documents and Settings folder that contains the WorkProduct folder.
C. Restore Peter’s WorkProduct folder, and choose an alternate location for the restoration.
D. Restore Peter’s WorkProduct folder, and choose the original location for the restoration.
您可能感兴趣的试卷
你可能感兴趣的试题
You are a network administrator for your company. All servers run Windows Server 2003.
You manage a server that functions as a file server. The data volume on the server is mirrored. Each physical disk is on a separate controller. One of the hard disks that contains the data volume fails. You discover that the failure was caused by a faulty SCSI controller. You replace the SCSI controller.
You need to restore the data volume to its previous state. You need to achieve this goal by using the minimum
amount of administrative effort.
What should you do?()
A. Run the diskpart active command to activate the failed volume.
B. Convert both disks to basic disks, and then restore the data.
C. Break the mirror, and then re-create the mirror.
D. Select a disk in the mirror, and then reactivate the volume.
You are a network administrator for your company. All servers run Windows Server 2003.
A network server named Server1 functions as the main file server. Server1 is backed up each night by using the Backup utility. You perform a test restoration of Server1 by using the Backup utility. You discover that files that are open during the backup process are not being backed up.
You need to ensure that open files are backed up successfully.
What should you do? ()
A. Enable volume shadow copies on the partitions that are being backed up.
B. Disable volume shadow copies on the partitions that are being backed up.
C. Select the Verify data after backup check box in the Advanced backup options of the backup job.
D. Clear the Disable volume shadow copy check box in the Advanced backup options of the backup job.
A. Assign drive E to Userfiles. Enable Shadow Copies on the Userfiles volume.
B. Convert the disk that contains the Data volume to a dynamic disk.
C. Convert the disk that contains the Userfiles volume to a dynamic disk.
D. Instruct users to connect to \\Server1\Data when they attempt to access previous versions of files in the D:\Userfiles folder.
E. Instruct users to connect to \\Server1\D$ when they attempt to access previous versions of files on the Data volume.
Server1 contains a folder named D:\Salesdata, which contains important company data. The
hardware-monitoring software reports that the disk that contains volume D is in danger of imminent disk failure.
You order a replacement disk, but you must wait at least one day for the disk to be delivered. You discover that you do not have a backup of the D:\Salesdata folder because a recent backup was configured incorrectly.
You need to back up the D:\Salesdata folder so that you can restore the data if the disk fails. You need to achieve this goal as quickly as possible.
What should you do? ()
A. Perform a normal backup of the D:\Salesdata folder.
B. Perform an incremental backup of the D:\Salesdata folder.
C. Perform a differential backup of the D:\Salesdata folder.
D. Perform a daily backup of the D:\Salesdata folder.
E. Enable Shadow Copies on volume D:\Configure the shadow copy location as C:\.
A. Create a new Web site named Tsweb.
B. Create a new virtual directory named Tsweb.
C. Install IIS.
D. Install the Remote Administration IIS subcomponent.
E. Install the Remote Desktop Web Connection IIS subcomponent.
You are a network administrator for your company. All servers run Windows Server 2003.
A server named Server1 functions as an application server. Server1 runs several applications. Server1 is located on the company's perimeter network. You allow communication to Server1 only over port 80.
Users report that applications on Server1 perform poorly during periods of peak activity. You monitor Server1.
The results are shown in the exhibit. (Click the Exhibit button.)
You need to identify which process is causing Server1 to perform poorly.
Which two tools can you use to achieve this goal? ()(Each correct answer presents a complete solution. Choose two.)
A. Event Viewer
B. Task Manager
C. Network Monitor
D. System Monitor
You are a network administrator for your company. All servers run Windows Server 2003. A server named
Server3 functions as an application server. The disks in Server3 are configured as shown in the following table.
You purchase four additional 20-GB hard disks for Server3. You plan to install an inventory database on Server3.
You estimate that you need a total of 60 GB of disk space to hold all the inventory data. You need to protect the data against the failure of any disk that contains either operating system data or inventory database data.
You need to create a new disk configuration on Server3.
Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two.)
A. Use one additional disk to create a mirror for drive
B. Use two additional disks to create a striped set for drive
C. Use three additional disks to create a RAID-5 volume for drive
D. Use two additional disks to create a RAID-5 volume for drive
You are a network administrator for your company. The network contains a Windows Server 2003 computer
named Server4, which functions as a file server.
Server4 contains several applications. One application is named App1. Another application is named App2. Users report that App2 is performing poorly. You examine Server4 and discover that App1 was started by using the start app1 /realtime command.
You need to ensure that no other application was started by using the /realtime switch.
What should you do? ()
A. Use Performance Monitor to create a trace log. Trace Process creations/deletions.
B. Use Performance Monitor to create a trace log. Trace Thread creations/deletions.
C. Use Task Manager to view processes. View the Base Priority column.
D. Use Task Manager to view performance. On the View menu, select Show Kernel Times.
You are a network administrator for your company. All servers run Windows Server 2003.
You manage a file server named Server8. You need to create a performance baseline for Server8 by using
Performance Logs and Alerts. You need to store the performance data in an existing Microsoft SQL Server
database on another computer.
You create a new counter log, and you select SQL Database as the log file format. When you attempt to save your changes, you receive an error message stating that you must select a data source name. You examine the configuration of the SQL Logs, as shown in the following dialog box.
You need to configure the counter log to use a SQL database.
What should you do? ()
A. Use the relog command-line utility to configure a connection to your SQL database.
B. Use Add or Remove programs to install Connection Point Services. Configure a connection to your SQL database.
C. Use the logman command-line utility with the create switch to configure a connection to your SQL database.
D. Use Data Sources (ODBC) to configure a connection to your SQL database.
You are a network administrator for your company. The network contains a Windows Server 2003 computernamed Server3. Server3 functions as a file server.
Six users in the accounting department use an accounting software application to open files that are stored in a shared folder on Server3. The users keep these files open for an extended period of time.
You need to restart Server3. You need to find out if any files on Server3 are open before you restart the computer.
What should you do? ()
A. Use Computer Management to view existing connections.
B. Use the netsend command to send a message to all domain members.
C. Use Task Manager to monitor processes started by all users.
D. Use System Monitor to monitor the Server object in Report view.
最新试题
You are the network administrator for the Beijing office of TestKing. A branchoffice is located in Cairo. The DNS servers in both locations run Windows Server2003.The network uses two DNS namespaces internally. They are namedpublishing.testking.com and testking.com. The locations of the primary nameservers are shown in the following table.The Beijing office contains some servers that are registered in the testking.com zoneand other that are registered in the publishing.testking.com zone. All computers inthe Beijing office are configured to use the local DNS server as their preferred DNSserver. The two offices are connected only by using a VPN through the Internet.Various network problems occasionally result in loss of connectivity between thetwo offices.Firewalls prevent the DNS servers in both offices from receiving queries from theInternet.You need to configure the DNS server in the Beijing office to allow successfulresolution of all queries from the Beijing office for names in thepublishing.testking.com namespace, even when the VPN link between the Beijingand Cairo offices fails.What should you configure on the DNS server in the Beijing office?()
You are the network administrator for TestKing. You manage a Windows Server2003 computer named TestKing4 that functions as an application server.TestKing4 will be used for development during the next 30 days. You need to backup all data on TestKing4 every day for the next 30 days.You need to automate the backups of TestKing4 to meet these businessrequirements. You want to achieve this goal by using the minimum amount ofadministrative effort.What should you do?()
You are the network administrator for The network consists of asingle DNS domain named.You replace a UNIX server with a Windows Server 2003 computer namedTestKing1.TestKing1 is the DNS server and start authority (SOA) for testking.com. A UNIXserver named TestKing2 is the mail server for testking.com.You receive reports that Internet users cannot send e-mail to the testking.comdomain. The host addresses are shown in the following window.You need to ensure that Internet users can send e-mail to the testking.com domain.What should you do?()
You are the network administrator for TestKing. The network consists of a singleActive Directory domain. All servers run Windows Server 2003.The domain contains two domain controllers named Testking1 and Testking2. Youuse a Windows XP Professional client computer named Client1.In Active Directory, the domain administrator creates two new user accountsnamed NetAdmin1 and AdminUser1. The NetAdmin1 account is a member of theDomain Admins global group. The AdminUser1 account is a member of only theUsers local group. You assign the AdminUser1 logon account the Allow log onlocally user right in the Default Domain Controller Group Policy object (GPO).A new written security policy states that user accounts that are member of theDomain Admins global group should not be used to log on to the console of adomain controller. It also states that administrative tasks should be performed byusing the Secondary Logon service.You need to create a new computer account in Active Directory, and you mustcomply with the new company security policy.What should you do?()
You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all client computers run Windows XP Professional.You are required to implement a backup strategy for all five servers on the network. You use the Backup Utility to schedule nightly backup jobs. You create a domain user account named BackupSvc, and add it to the local Backup Operators group on all file servers. The scheduled backup jobs will use BackupSvc to log on to the network Nightly backups occur successfully for six weeks. Then, nightly backups fail on all servers. When you examine the event log of one server, you discover that thepassword for BackupSvc is expired. You reset the password and select the Password never expires option for BackupSvc.The next day, you discover that the previous night's backup failed on all file servers.You need to ensure that the next night's backup is successful.Which two actions should you perform? (Each correct answer presents part of thesolution.() Choose two)
You are the network administrator for The network consists of asingle Active Directory domain named All domain controllers runWindows Server 2003, and all client computers run Windows XP Professional. Eachdomain server has a locally attached tape device.You need to back up each domain controller. Your backup process must fulfil thefollowing requirements:a. System recovery must be possible in the event of server failure.b. The system configuration and all current dynamic disk configurations must bebacked up.c. Other data partitions do not need to be backed up.What should you do?()
You are the network administrator for TestKing. The network contains a WindowsServer 2003 computer named testking1, which hosts a critical business applicationnamed Salesapp. Testking1 has one disk that contains a single NTFS volume.Five days ago, the System State of testking1 was backed up, and an AutomatedSystem Recovery (ASR) backup was created. No additional backups wereperformed. Subsequently, many changes were made to the Salesapp data files.You apply an update to the application, which requires you to restart testking1.Windows startup terminates with a Stop error. You restart the computer and bootto a floppy disk. A utility on this disk gives you read-only access to the NTFS filesystem. You discover that one of the .dll files for the Salesapp application iscorrupted. The corrupted file is stored in the C.\Windows\System32 folder.You need to restore the corrupted file. You need to avoid losing any changes madeto the data files on testking1.What should you do onTestKing1?()
You are the domain administrator for TestKing's Active Directory domain. Thedomain consists of four domain controllers named TestkingDC1, TestkingDC2,TestkingDC3, and TestkingDC4. TestkingDC1 and TestkingDC2 run Windows 2000Server and have the latest service pack installed. TestkingDC3 and TestkingDC4run Windows Server 2003. All client computers run Windows XP Professional andhave the latest service pack installed.You have a new client computer that you plan to use to perform domainadministration functions.You need to be able to manage Active Directory users and computers remotely.What should you do?()
You are the network administrator for All network severs runWindows Server 2003. Business hours are 9:00 A.M. to 5:00 P.M., Monday throughFridayA file server named TestKingB is configured to create a shadow copy every morningat 1:00 A.M. TestKingB hosts several shared folders. One shared folder has theconfiguration shown in the following table.For several months, users frequently access both databases in TestKingOrders. OneMonday morning, a user tells you that she needs to edit Receivables.mdb as itexisted at 5:00 P.M. on the previous Thursday.You need to modify TestKingB to enable the appropriate editing. You must ensurethat other users can continue to access current data without interruption.First, you map a drive to \\TestKingB\TestKingOrders.Which two additional actions should you perform? ()(Each correct answer presentspart of the solution. Choose two)
You are the network administrator for TestKing. The network consists of a singleActive Directory domain. All network servers run Windows Server 2003.A member server named TestkingA has a locally attached tape device. TestkingAcontains several folders and files that are encrypted by using Encrypting FileSystem (EFS).You create a new user account for a new employee named Victoria. Victoria's useraccount is member of the Users group only.You need to ensure that Victoria can back up the encrypted folders and files onTestkingA. Victoria must be assigned the minimum administrative privilegesneeded to complete this task.What should you do?()