You are the network administrator for your company's Active Directory domain. The domain includes
Windows Server 2003 domain controllers and Windows XP Professional client computers.
A new administrator named Paul is hired to assist you in deploying Windows XP Professional to 100 new
computers. Paul installs the operating system on a new computer named Client1.
However, when Paul tries to log on to the domain from Client1, he is unsuccessful. The logon dialog box does not allow him to view and select the domain name.
You need to ensure that Paul can log on to the domain from Client1.
What should you do? ()
A. Enable the computer account for Client1.
B. Configure Client1 as a member of the domain.
C. Add Paul's user account to the Enterprise Admins group.
D. Add Paul's user account to the Server Operators group.
您可能感兴趣的试卷
你可能感兴趣的试题
You are the network administrator for your company. The network consists of a single Active Directory
domain. All five domain controllers run Windows Server 2003, and all client computers run Windows XP
Professional.
The domain's audit policy ensures that all account logon events are audited.
A temporary employee named Peter uses a client computer named Client1. When Peter's temporary assignment concludes, his employment is terminated.
Now you need to learn the times and dates when Peter logged on to the domain. You need to accomplish this goal by reviewing the minimum amount of information.
What should you do?()
A. Log on to Client1 as a local Administrator. Use Event Viewer to view the local security log. Use the Find option to list only the events for Peter's user account.
B. Log on to Client1 as a local Administrator. Use Event Viewer to view the local security log. Use the Find option to list only the events for the Client1 computer account. Use Event Viewer to view the security log on each domain controller. Use the Find option to list only the events for Peter's user account. Use Event Viewer to view the security log on each domain controller.
C. Set a filter to list only the events for Peter's user account. Use Event Viewer to view the security log on each domain controller.
D. Set a filter to list only the events for the Client1 computer account.
A. Require authentication by a domain controller to unlock the client computer.
B. Cache zero interactive logons.
C. Cache 50 interactive logons.
D. Grant the Log on locally user right to the Users group.
A. Export the query results to a comma-delimited file. Use a CSVDE script to modify the password property of each user account.
B. From the Results pane of the query, select all user accounts and modify their password properties simultaneously.
C. Export the query results to a comma-delimited file. Use an LDIFDE script to modify the password property of each user account.
D. From the Results pane of the query, select each user account and modify the password property, one by one.
A. Add Peter's user account to the Server Operators group.
B. Add Peter's user account to the Account Operators group.
C. Use the Delegation of Control Wizard to permit Peter's user account to create new computer objects in the Computers container.
D. Create a Group Policy object (GPO) and link it to the domain. Configure the GPO to permit Peter's user account to add client computers to the domain.
A. Select all user accounts in the Sales OU. Modify the account properties to specify \\File1\Profiles\%username% as the profile path.
B. Select all user accounts in the Sales OU. Modify the account properties to specify \\File1\Profiles as the profile path.
C. Create a Group Policy object (GPO) and link it to the Sales OU. In the User Configuration section of the GPO, configure Folder Redirection to use \\File1\Profiles.
D. Create a Group Policy object (GPO) and link it to the Domain Controllers OU. In the User Configuration section of the GPO, configure Folder Redirection to use \\File1\Profiles.
You are the network administrator for your company. The network consists of a single Active Directory
domain. All network servers run Windows Server 2003, and all client computers run Windows 2000 Professional.
You need to standardize the desktop environment for all client computers. Your solution must prevent domain users from permanently modifying their regional settings or the desktop background.
Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two.)
A. Specify the profile's network path in the user properties in Active Directory Users and Computers.
B. Specify the profile's local path in the user properties in Computer Management.
C. Specify the profile's network path in the user properties in Computer Management.
D. In the network share where profiles reside, rename Ntuser.dat to Ntuser.man.
E. In the local profile directory, rename Ntuser.dat to Ntuser.man.
F. In the network share where profiles reside, rename Ntuser.ini to Ntuser.man.
You are the network administrator for your company. All network servers run Windows Server 2003.
Your network includes one branch office in addition to the main office. A server named Server1 connects the main office to the branch office by using an external dial-up modem.
One morning, users report that the connection to the branch office is not functioning.
On investigation, you discover that the modem is turned off. You restart the modem. Then you open Device Manager and see the information shown in the exhibit. (Click the Exhibit button.)
You need to ensure that the connection between the main office and the branch office functions correctly. Your
solution must involve the minimum amount of change to Server1 and the minimum amount of interruption in network service.
What should you do? ()
A. Restart Server1.
B. Create a new dial-up connection to the branch office.
C. Open Device Manager to scan Server1 for changes in hardware.
D. Use the Add Hardware Wizard to detect and install the modem.
You are the network administrator for your company. All network servers run Windows Server 2003.
Server1 hosts highly confidential files. The Disk Management console for Server1 is shown in the exhibit. (Click the Exhibit button.)
You need to ensure the security of all files on Server1. In the event of disk failure, you need to minimize the time required to make these files available again. You also need to improve file system performance.
Which two actions should you perform?() (Each correct answer presents part of the solution. Choose two.)
A. Configure the unallocated disks in a RAID-0 configuration.
B. Configure one of the unallocated disks in a RAID-1 configuration.
C. Store a shadow copy of disk C on one of the unallocated disks.
D. Configure the unallocated disks as an extended volume.
E. Convert the disks to basic disks.
F. Convert the disks to dynamic disks.
You are the network administrator for your company. All network servers run Windows Server 2003. A server named Server1 hosts applications for network users.
Server1 contains a motherboard that can support two CPUs. One CPU is currently installed. Server1 has 512 MB of RAM and a single 36-GB integrated device electronics (IDE) hard disk. It has a 10 Mb Ethernet card connected to a 10/100 Mb switch.
After Server1 is in use for five months, network users report unnacceptable response times on their applications.
You open System Monitor on Server1 and see the information shown in the following table.
You need to improve the performance of Server1.
What should you do? ()
A. Add an additional CPU.
B. Add an additional 512 MB of RAM.
C. Replace the existing hard disk with a faster one.
D. Replace the 10-Mb Ethernet card with a 100-Mb Ethernet card.
You are the domain administrator for your company's Active Directory domain. All servers run Windows
Server 2003. All client computers run Windows XP Professional and have the latest service pack installed.
You manage a server that has Windows Server Update Services (WSUS) installed. The latest updates were
synchronized and approved for installation on the client computers.
You need to configure the client computers to download and automatically install the approved updates from the WSUS server.
What should you do? ()
A. On the client computers, open the System Properties dialog box. On the Automatic Updates tab, configure the client computers to update automatically every day.
B. Create a Group Policy object (GPO) that has the appropriate Automatic Updates settings configured. Apply the GPO to an organizational unit (OU) that includes the client computers.
C. In Active Directory Users and Computers, modify the settings for the client computer accounts. Configure the Managed By property to specify the WSUS server account.
D. Create a local group on the WSUS server. Assign the group the Allow - Read and the Allow - Write permissions for the WSUSContent folder on the WSUS server. Add all the users of the client computers to the local group.
最新试题
You are the network administrator for the Beijing office of TestKing. A branchoffice is located in Cairo. The DNS servers in both locations run Windows Server2003.The network uses two DNS namespaces internally. They are namedpublishing.testking.com and testking.com. The locations of the primary nameservers are shown in the following table.The Beijing office contains some servers that are registered in the testking.com zoneand other that are registered in the publishing.testking.com zone. All computers inthe Beijing office are configured to use the local DNS server as their preferred DNSserver. The two offices are connected only by using a VPN through the Internet.Various network problems occasionally result in loss of connectivity between thetwo offices.Firewalls prevent the DNS servers in both offices from receiving queries from theInternet.You need to configure the DNS server in the Beijing office to allow successfulresolution of all queries from the Beijing office for names in thepublishing.testking.com namespace, even when the VPN link between the Beijingand Cairo offices fails.What should you configure on the DNS server in the Beijing office?()
You are the network administrator for The network consists of a single Active Directory domain named.You configure a new Windows Server 2003 file server named TestKingSrv1.You restore user files from a tape backup, and you create a logon script that maps driveletters to shared files on TestKingSrv1.Users report that they cannot access TestKingSrv1 through the drive mappings youcreated. Users also report that TestKingSrv1 does not appear in My NetworkPlaces.You log on to TestKingSrv1 and confirm that the files are present and that theNTFS permissions and share permissions are correct. You cannot access anynetwork resources. You run the ipconfig command and see the following output.You need to configure the TCP/IP properties on TestKingSrv1 to resolve theproblem.What should you do?()
You are the network administrator in the New York office of TestKing.The company network consists of a single Active Directory domain The New York office currently contains one Windows Server 2003 file server named TestKingA.All file servers in the New York office are in an organizational unit (OU) namedNew York Servers. You have been assigned the Allow - Change permission for aGroup Policy object (GPO) named NYServersGPO, which is linked to the NewYork Servers OU.The written company security policy states that all new servers must be configuredwith specified predefined security settings when the servers join the domain. Thesesettings differ slightly for the various company offices.You plan to install Windows Sever 2003, on 15 new computers, which all functionsas file servers. You will need to configure the specified security settings on the newfile servers.TestKingA currently has the specified security settings configured in its localsecurity policy. You need to ensure that the security configuration of the new fileservers is identical to that of TestKingA. You export a copy of TestKingA's localsecurity policy settings to a template file.You need to configure the security settings of the new servers, and you want to usethe minimum amount of administrative effort.What should you do?()
You are the network administrator for The network consists of asingle Active Directory domain named All network servers runWindows Server 2003.Confidential files are stored on a member server named TK1. The computer objectfor TK1 resides in an organizational unit (OU) named Confidential. A Group Policyobject (GPO) named GPO1 is linked to the Confidential OU.To audit access to the confidential files, you enable auditing on all private folders onTK1.Several days later, you review the audit logs. You discover that auditing is notsuccessful.You need to ensure that auditing occurs successfully.What should you do?()
You are the network administrator for The network consists of asingle Active Directory domain named All network servers runWindows Server 2003, and all client computers run Windows XP Professional.You use the Backup utility to schedule a full backup of TESTKINGDC1 everynight. You ensure that the Active Directory configuration is also backed up.One week later, TESTKINGDC1 stops accepting logon requests. On investigation,you discover that the Active Directory configuration is corrupt.You need to restore TESTKINGDC1 as a functioning domain controller.Which two actions should you perform? ()(Each correct answer presents part of thesolution. Choose two)
You are the network administrator for your company. All network servers runWindows Server 2003. All client computers run Windows XP Professional.A member server named Server1 is located at a branch office that does not permitthe use of Remote Desktop Protocol. Another administrator uses the Backup utilityto create a scheduled backup job on Server1. The backup job performs a normalbackup of an application server.The application server is removed from the network.You need to use a client computer to remove the backup job from Server1. Youcannot travel to the branch office.What should you do?()
You are the domain administrator for TestKing's Active Directory domain. Thedomain consists of four domain controllers named TestkingDC1, TestkingDC2,TestkingDC3, and TestkingDC4. TestkingDC1 and TestkingDC2 run Windows 2000Server and have the latest service pack installed. TestkingDC3 and TestkingDC4run Windows Server 2003. All client computers run Windows XP Professional andhave the latest service pack installed.You have a new client computer that you plan to use to perform domainadministration functions.You need to be able to manage Active Directory users and computers remotely.What should you do?()
You are the network administrator for You manage a WindowsServer 2003 computer named TestKing1.There are multiple scheduled tasks configure on TestKing1. One task is a scheduledbackup job. You need to temporarily disable the backup job from running so thatyou can troubleshoot a problem. You must not interfere with any other scheduledtasks.You need to disable the scheduled backup job. You want to achieve this goal byusing the minimum amount of administrative effort.What should you do?()
You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all client computers run Windows XP Professional.You are required to implement a backup strategy for all five servers on the network. You use the Backup Utility to schedule nightly backup jobs. You create a domain user account named BackupSvc, and add it to the local Backup Operators group on all file servers. The scheduled backup jobs will use BackupSvc to log on to the network Nightly backups occur successfully for six weeks. Then, nightly backups fail on all servers. When you examine the event log of one server, you discover that thepassword for BackupSvc is expired. You reset the password and select the Password never expires option for BackupSvc.The next day, you discover that the previous night's backup failed on all file servers.You need to ensure that the next night's backup is successful.Which two actions should you perform? (Each correct answer presents part of thesolution.() Choose two)
You are the network administrator for All servers run Windows Server 2003.You are creating a backup schedule for the main file server.You need to create a schedule so that backup jobs are completed in the shortestamount of time possible.What should you do?()