A. Create a client connection object with default settings and deploy the object to each terminal server.
B. Edit the RDP-Tcp properties by selecting the Connect client drives at logon option.
C. Install NetMeeting on all client computers. Configure Remote Desktop Sharing.
D. Install the default Windows 2000 Terminal Server Client software on the Windows NT 4.0 workstations.
E. Install Remote Desktop Connection on the Windows NT 4.0 workstations.
您可能感兴趣的试卷
你可能感兴趣的试题
You are the network administrator for your company. The network consists of a single Active Directory
domain. All network servers run Windows Server 2003, and all client computers run Windows XP Professional.
Your company's main office is located in Dublin, which is also the location of all domain controllers. The Dublin office contains 200 client computers.
A branch office is located in Helsinki. This office contains 60 client computers. All user accounts for permanent employees in Helsinki are contained in an organizational unit (OU) named HelUsers. All user accounts for temporary employees in Helsinki are contained in an OU named TempUsers.
A temporary employee named Peter is hired in the Helsinki office. The business hours in his office are 9:00 A.M.
to 5:00 P.M. At 9:05 A.M. on his first Monday at work, Peter tries to log on to the domain from his client computer. However, he receives the message shown in the exhibit. (Click the Exhibit button.)
You need to ensure that Peter can log on to the domain.
What should you do? ()
A. Move Peter's account to HelUsers. Create a Group Policy object (GPO) and link it to HelUsers. In the GPO, decrease the account lockout duration.
B. Make TempUsers a child of HelUsers. Create a Group Policy object (GPO) and link it to HelUsers. In the GPO, decrease the account lockout threshold.
C. Modify the properties of Peter's user account so the Logon Hours setting is the same as the business hours for the Helsinki office.
D. Modify the properties for Peter's user account to extend the dates during which his account can be used.
You are the network administrator for your company's Active Directory domain. The domain includes
Windows Server 2003 domain controllers and Windows XP Professional client computers.
A new administrator named Paul is hired to assist you in deploying Windows XP Professional to 100 new
computers. Paul installs the operating system on a new computer named Client1.
However, when Paul tries to log on to the domain from Client1, he is unsuccessful. The logon dialog box does not allow him to view and select the domain name.
You need to ensure that Paul can log on to the domain from Client1.
What should you do? ()
A. Enable the computer account for Client1.
B. Configure Client1 as a member of the domain.
C. Add Paul's user account to the Enterprise Admins group.
D. Add Paul's user account to the Server Operators group.
You are the network administrator for your company. The network consists of a single Active Directory
domain. All five domain controllers run Windows Server 2003, and all client computers run Windows XP
Professional.
The domain's audit policy ensures that all account logon events are audited.
A temporary employee named Peter uses a client computer named Client1. When Peter's temporary assignment concludes, his employment is terminated.
Now you need to learn the times and dates when Peter logged on to the domain. You need to accomplish this goal by reviewing the minimum amount of information.
What should you do?()
A. Log on to Client1 as a local Administrator. Use Event Viewer to view the local security log. Use the Find option to list only the events for Peter's user account.
B. Log on to Client1 as a local Administrator. Use Event Viewer to view the local security log. Use the Find option to list only the events for the Client1 computer account. Use Event Viewer to view the security log on each domain controller. Use the Find option to list only the events for Peter's user account. Use Event Viewer to view the security log on each domain controller.
C. Set a filter to list only the events for Peter's user account. Use Event Viewer to view the security log on each domain controller.
D. Set a filter to list only the events for the Client1 computer account.
A. Require authentication by a domain controller to unlock the client computer.
B. Cache zero interactive logons.
C. Cache 50 interactive logons.
D. Grant the Log on locally user right to the Users group.
A. Export the query results to a comma-delimited file. Use a CSVDE script to modify the password property of each user account.
B. From the Results pane of the query, select all user accounts and modify their password properties simultaneously.
C. Export the query results to a comma-delimited file. Use an LDIFDE script to modify the password property of each user account.
D. From the Results pane of the query, select each user account and modify the password property, one by one.
A. Add Peter's user account to the Server Operators group.
B. Add Peter's user account to the Account Operators group.
C. Use the Delegation of Control Wizard to permit Peter's user account to create new computer objects in the Computers container.
D. Create a Group Policy object (GPO) and link it to the domain. Configure the GPO to permit Peter's user account to add client computers to the domain.
A. Select all user accounts in the Sales OU. Modify the account properties to specify \\File1\Profiles\%username% as the profile path.
B. Select all user accounts in the Sales OU. Modify the account properties to specify \\File1\Profiles as the profile path.
C. Create a Group Policy object (GPO) and link it to the Sales OU. In the User Configuration section of the GPO, configure Folder Redirection to use \\File1\Profiles.
D. Create a Group Policy object (GPO) and link it to the Domain Controllers OU. In the User Configuration section of the GPO, configure Folder Redirection to use \\File1\Profiles.
You are the network administrator for your company. The network consists of a single Active Directory
domain. All network servers run Windows Server 2003, and all client computers run Windows 2000 Professional.
You need to standardize the desktop environment for all client computers. Your solution must prevent domain users from permanently modifying their regional settings or the desktop background.
Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two.)
A. Specify the profile's network path in the user properties in Active Directory Users and Computers.
B. Specify the profile's local path in the user properties in Computer Management.
C. Specify the profile's network path in the user properties in Computer Management.
D. In the network share where profiles reside, rename Ntuser.dat to Ntuser.man.
E. In the local profile directory, rename Ntuser.dat to Ntuser.man.
F. In the network share where profiles reside, rename Ntuser.ini to Ntuser.man.
You are the network administrator for your company. All network servers run Windows Server 2003.
Your network includes one branch office in addition to the main office. A server named Server1 connects the main office to the branch office by using an external dial-up modem.
One morning, users report that the connection to the branch office is not functioning.
On investigation, you discover that the modem is turned off. You restart the modem. Then you open Device Manager and see the information shown in the exhibit. (Click the Exhibit button.)
You need to ensure that the connection between the main office and the branch office functions correctly. Your
solution must involve the minimum amount of change to Server1 and the minimum amount of interruption in network service.
What should you do? ()
A. Restart Server1.
B. Create a new dial-up connection to the branch office.
C. Open Device Manager to scan Server1 for changes in hardware.
D. Use the Add Hardware Wizard to detect and install the modem.
You are the network administrator for your company. All network servers run Windows Server 2003.
Server1 hosts highly confidential files. The Disk Management console for Server1 is shown in the exhibit. (Click the Exhibit button.)
You need to ensure the security of all files on Server1. In the event of disk failure, you need to minimize the time required to make these files available again. You also need to improve file system performance.
Which two actions should you perform?() (Each correct answer presents part of the solution. Choose two.)
A. Configure the unallocated disks in a RAID-0 configuration.
B. Configure one of the unallocated disks in a RAID-1 configuration.
C. Store a shadow copy of disk C on one of the unallocated disks.
D. Configure the unallocated disks as an extended volume.
E. Convert the disks to basic disks.
F. Convert the disks to dynamic disks.
最新试题
You are the network administrator for TestKing. The network contains a WindowsServer 2003 computer named testking1, which hosts a critical business applicationnamed Salesapp. Testking1 has one disk that contains a single NTFS volume.Five days ago, the System State of testking1 was backed up, and an AutomatedSystem Recovery (ASR) backup was created. No additional backups wereperformed. Subsequently, many changes were made to the Salesapp data files.You apply an update to the application, which requires you to restart testking1.Windows startup terminates with a Stop error. You restart the computer and bootto a floppy disk. A utility on this disk gives you read-only access to the NTFS filesystem. You discover that one of the .dll files for the Salesapp application iscorrupted. The corrupted file is stored in the C.\Windows\System32 folder.You need to restore the corrupted file. You need to avoid losing any changes madeto the data files on testking1.What should you do onTestKing1?()
You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all client computers run Windows XP Professional.You are required to implement a backup strategy for all five servers on the network. You use the Backup Utility to schedule nightly backup jobs. You create a domain user account named BackupSvc, and add it to the local Backup Operators group on all file servers. The scheduled backup jobs will use BackupSvc to log on to the network Nightly backups occur successfully for six weeks. Then, nightly backups fail on all servers. When you examine the event log of one server, you discover that thepassword for BackupSvc is expired. You reset the password and select the Password never expires option for BackupSvc.The next day, you discover that the previous night's backup failed on all file servers.You need to ensure that the next night's backup is successful.Which two actions should you perform? (Each correct answer presents part of thesolution.() Choose two)
You are the network administrator for Test King. The network consists of a singleActive Directory domain named The domain contains WindowsServer 2003 computers and Windows XP Professional computers.The Default Domain Policy has been modified by importing a security template file,which contain several security settings.A server named TestKing1 cannot run a program that us functioning on othersimilarly configured servers. You need to find out whether additional securitysettings have been added to the local security policy on TestKing1.To troubleshoot, you want to use a tool to compare the current security settings onTestKing1 against the security template file in order to automatically identify anysettings that might have been added to the local security policy.Which tool should you run on TestKing1?()
You are the domain admin for Testking's Active Directory domain. You use aSoftware Update Services (SUS) server to manage the security updates for allservers that run Windows Server 2003.You need to install three critical security hotfixes from Microsoft. One of thehotfixes cannot be installed in the current production environment because thehotfix causes a custom application to stop responding.You need to install two of the three hotfixes during a maintenance session tomorrowat 2:00 A.M. You need to automate the installation process.What should you do?()
You are the network administrator for TestKing. You manage a Windows Server2003 computer named TestKing4 that functions as an application server.TestKing4 will be used for development during the next 30 days. You need to backup all data on TestKing4 every day for the next 30 days.You need to automate the backups of TestKing4 to meet these businessrequirements. You want to achieve this goal by using the minimum amount ofadministrative effort.What should you do?()
You are the network administrator for The network consists of asingle Active Directory domain named All network servers runWindows Server 2003, and all client computers run Windows XP Professional.You use the Backup utility to schedule a full backup of TESTKINGDC1 everynight. You ensure that the Active Directory configuration is also backed up.One week later, TESTKINGDC1 stops accepting logon requests. On investigation,you discover that the Active Directory configuration is corrupt.You need to restore TESTKINGDC1 as a functioning domain controller.Which two actions should you perform? ()(Each correct answer presents part of thesolution. Choose two)
You are the domain administrator for TestKing's Active Directory domain. Allservers run Windows Server 2003. All client computers run Windows XPProfessional.A newly installed server was added to your domain. You need to administer thisserver remotely from your client computer.You need to configure the new server to ensure that it can be administeredremotely.What should you do?()
You are the network administrator for TestKing. Your network consists of a singleActive Directory domain. You manage a Terminal Server farm that includes fiveterminal servers and a Terminal Services Licensing server named testking9. Allservers run Windows 2000 Server. There are 2,500 users who log on to the terminalservers to access a custom human resource (HR) application.You install Windows Server 2003 on a new server named testking10. Testking10 isconfigured with all default settings enabled. You install Terminal Services and theHR application on testking10. You instruct some users to access the HR applicationon testking10.Four months later, users report that they can no longer establish Terminal Servicessessions to testking10. You verify that users can connect to the other terminalservers in your Terminal Server farm.You need to ensure that users can run the HR application on all terminal servers onthe network.What should you do?()
You are the network administrator for the Beijing office of TestKing. A branchoffice is located in Cairo. The DNS servers in both locations run Windows Server2003.The network uses two DNS namespaces internally. They are namedpublishing.testking.com and testking.com. The locations of the primary nameservers are shown in the following table.The Beijing office contains some servers that are registered in the testking.com zoneand other that are registered in the publishing.testking.com zone. All computers inthe Beijing office are configured to use the local DNS server as their preferred DNSserver. The two offices are connected only by using a VPN through the Internet.Various network problems occasionally result in loss of connectivity between thetwo offices.Firewalls prevent the DNS servers in both offices from receiving queries from theInternet.You need to configure the DNS server in the Beijing office to allow successfulresolution of all queries from the Beijing office for names in thepublishing.testking.com namespace, even when the VPN link between the Beijingand Cairo offices fails.What should you configure on the DNS server in the Beijing office?()
You are the network administrator for The network consists of asingle Active Directory domain named All network servers runWindows Server 2003. Three thousand client computers run Windows 2000Professional, and 1,500 client computers run Windows XP Professional.A new employee named Dr King is hired to assist you in installing Windows XPProfessional on 150 new client computers.You need to ensure that Dr King has only the minimum permissions required to addnew computer accounts to the domain and to own the accounts that he creates. DrKing must not be able to delete computer accounts.What should you do?()