You are the network administrator for your company. The network consists of a single Active Directory
domain. All network servers run Windows Server 2003.
You are directed to back up all files in a folder named C:\Data on one of the servers. You use the Backup utility to perform a normal backup of C:\Data. When the backup is complete, you review the backup log file and discover the following message:
"WARNING: Portions of '\Data\Letter.doc' cannot be read. The backed up data is corrupt or incomplete. This file will not restore correctly."
You need to ensure that all documents in C:\Data can be restored successfully.
What should you do? ()
A. In the Backup utility, specify an incremental backup. Run the backup again.
B. In the Backup utility, clear the Disable volume shadow copy option. Run the backup again.
C. In the attribute properties of C:\Data\Letter.doc, select the File is ready for archiving option. Run the backup again.
D. In the Offline Settings dialog box of C:\Data, select the All files and programs that users open from the share will be automatically available offline option. Run the backup again.
您可能感兴趣的试卷
你可能感兴趣的试题
You are the network administrator for your company. Your network consists of a single Active Directory
domain. All network servers run Windows Server 2003.
You successfully install a new server named Server9. Immediately afterward, you perform the first backup of the server. The date is January 25, 2003.
Next, you add a user named Anne to the local Backup Operators group. You direct Anne to perform nightly backups of Server9.
One week later, you try to review the backup logs for Server9. The Backup utility displays the information shown in the exhibit. (Click the Exhibit button.)
You verify that Anne is performing nightly backups.
You need to be able to review the backup logs for the previous week.
What should you do?()
A. Add your user account to the local Backup Operators group.
B. Direct Anne to use her user account to log on and open the Backup utility.
C. In the Backup utility, select the Verify data after the backup completes check box.
D. Open %windir%\system32\LogFiles. Create a new subfolder named BackupLogs.
You are the network administrator for your company. The network consists of a single Active Directory
domain. All network servers run Windows Server 2003, and all client computers run Windows XP Professional.
A user named Peter uses a client computer named Client1. This computer has a locally attached tape device.
You grant Peter the necessary permissions to perform backups of a member server named Server1. Peter runs the Backup utility on Client1 to back up the files located on Server1.
You need use your client computer to view the most recent backup logs for Server1.
What should you do? ()
A. Use Notepad to view the contents of the backup report located on Server1.
B. Use Notepad to view the contents of the backup report located on Client1.
C. Use Event Viewer to view the contents of the application log located on Server1.
D. Use Event Viewer to view the contents of the application log located on Client1.
You are the network administrator for your company. All network servers run Windows Server 2003.
A member server named Server1 is configured to run shadow copies without a storage limit. Server1 has the disk configuration shown in the following table.
You need to create additional free space on DATA1. You also need to improve the performance of Server1 and ensure that it has sufficient space for shadow copies in the future.
Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two.)
A. Delete the shadow copies on DATA1.
B. Delete Backup.bkf on DATA3.
C. In the properties of DATA1, relocate the shadow copies to DATA2.
D. In the properties of DATA1, relocate the shadow copies to DATA3.
E. Delete DATA3 and extend the DATA1 partition to include the space on DATA3.
You are the network administrator for your company. Your network consists of a single Active Directory
domain. All network servers run Windows Server 2003. Each domain controller contains one disk that is
configured with both the system partition and the boot partition.
Every day, you use custom software to perform a full backup of user profiles and user data. The custom backup software provides a bootable floppy disk that includes the drivers for the backup media.
Every Sunday, you run the Automated System Recovery (ASR) wizard on your domain controllers in conjunction with removable backup media. Data is backed up in a file named Backup1.bkf.
One Monday morning, you install a new application on a domain controller named DC1. When you restart DC1, you receive the following error message:
"NTLDR is missing. Press any key to restart."
You need to bring DC1 back online as quickly as possible.
What should you do?()
A. Restart DC1 by using the installation CD-ROM. Reinstall the operating system and restore the contents of the latest full backup by using the Restore wizard. Restart DC1.
B. Restart DC1 by using the installation CD-ROM. Restore the contents of Backup1.bkf by using the ASR disk. Restart DC1.
C. Restart DC1 by using the bootable floppy disk. Copy the contents of Backup1.bkf from the backup media to C:\winnt. Restart DC1.
D. Restart DC1 by using the bootable floppy disk. Copy the contents of the ASR disk to C:\. Restart DC1.
You are the network administrator for Litware, Inc. All network servers run Windows Server 2003.
Your IIS server is named Server6. Its configuration is shown in the exhibit. (Click the Exhibit button.)
Users access the internal network by connecting to http://server6.litwareinc.intra.
A folder named Marketing_Data stores the Web interface for the company's client management tool. Currently,
users in the marketing department access this tool by connecting to http://server6.litwareinc.intra/Marketing_Web.
You share Marketing_Data on a server named Server2.
You need to modify Server6 to ensure that marketing users can access Marketing_Data through the internal network.
What should you do? ()
A. Create a new virtual directory named Marketing_Web under the default Web site. Specify \\server2\Marketing_Data as the Web site content directory.
B. Create a new Web site named Marketing_Data. Specify \\server2\Marketing_Data as the Web site home directory.
C. Create a new Web site named Marketing_Data. Specify Marketing_Data as the host header name of the Web site.
D. Redirect the default Web site home directory to http://server2/Marketing_Data. Specify Marketing_Data as the host header name of the default Web site.
You are the network administrator for your company. Your network consists of a single Active Directory
domain. All network servers run Windows Server 2003, and all client computers run Windows 2000 Professional.
You install Windows Server 2003 with default settings on a new computer named Server1. You install and share several printers on Server1. You instruct all users to connect to these printers by using the address http://Server1/Printers.
However, users report that they cannot connect to this address.
You need to ensure that all users can connect to the printers by using HTTP.
Which two actions should you perform?() (Each correct answer presents part of the solution. Choose two.)
A. Publish all shared printers that are installed on Server1.
B. Create a virtual directory named Printers on Server1.
C. Install IIS with default settings on Server1.
D. Reshare all printers on Server1.
E. Install the Internet Printing component of IIS.
F. Type Net Start W3SVC at a command prompt.
You are one of the network administrators for your company. All network servers run Windows Server 2003.
Your company operates a total of four offices.
The office where you work has 15 servers. You are responsible for supporting and maintaining all of these servers.
You need to design a monitoring plan that will achieve the following goals:
Track all performance changes on the servers.
Record performance data to anticipate the need for future upgrades.
What should you do? ()
A. On each server in your office, use Performance Logs and Alers to create a baseline log. Configure the log to collect data every five minutes for one day. Use the same counters for each server to create a log file. Schedule the log to run weekly.
B. From a monitoring computer, use Performance Logs and Alerts to create a baseline log for each server in your office. Configure the log to collect data every five minutes for one day. Use the same counters for each server to create a log file. Schedule the log to run weekly.
C. On each server in your office, use Performance Logs and Alerts to create threshold-based alerts. Configure the alerts to send a message to your monitoring computer when they are triggered. Set each alert to start a new scan when the alert finishes.
D. From a monitoring computer use Performance Logs and Alerts to create a new counter set in System Monitor. Configure the counters to run continuously.
You are the network administrator for your company. The network consists of a single Active Directory
domain. All network servers run Windows Server 2003.
A server named Server54 hosts all shared documents for the legal and human resources departments. Server54 is frequently accessed and updated throughout the business day.
Users report extremely slow response times when they try to open the shared documents.
You log on to Server54 and observe real-time data indicating that the processor is operating at 100 percent of
capacity.
Now you need to gather additional data to diagnose the cause of the problem.
What should you do? ()
A. In System Monitor, create an alert that will be triggered when processor usage exceeds 80 percent for more than five minutes.
B. In Event Viewer, open and review the application log for System Monitor events.
C. In Task Manager, review the Processes tab to see the percentage of processor capacity used by each application.
D. In the Performance console, create a counter log to track processor usage.
You are the network administrator for your company. The network consists of a single Active Directory
domain. All network servers run Windows Server 2003.A server named Print1 has a print device directly
connected to the parallel port. The print device is shared for use by all users.
Peter is the IT manager. Peter reports that his documents are often printed after documents submitted by other users.
You need to ensure that Peter's documents take precedence over documents submitted for printing by other users.
However, if a document is already printing, the printing must not be interrupted.
What should you do? ()
A. Configure the printer permissions to assign the Allow - Take Ownership permission to Peter. Restart the Print Spooler service on Print1.
B. Make Peter's user account the owner of the printer. Restart the Print Spooler service on Print1.
C. Create a new printer on Print1 and configure it to print to the print device. In the Advanced tab of the new printer properties, select the Print directly to the printer option. Configure Peter's computer to print to the new printer.
D. Create a new printer on Print1 and configure it to print to the print device. Modify the priority of the new printer. Configure Peter's computer to print to the new printer.
You are the network administrator for your company. The network originally consists of a single Windows NT 4.0 domain.
You upgrade the domain to a single Active Directory domain. All network servers now run Windows Server 2003, and all client computers run Windows XP Professional.
Your staff provides technical support to the network. They frequently establish Remote Desktop connections with a domain controller named DC1.
You hire 25 new support specialists for your staff. You use Csvde.exe to create Active Directory user accounts for all 25.
A new support specialist named Paul reports that he cannot establish a Remote Desktop connection with DC1. He receives the message shown in the Logon Message exhibit. (Click the Exhibit button.)
You open Gpedit.msc on DC1. You see the display shown in the Security Policy exhibit. (Click the Exhibit button.)
You need to ensure that Paul can establish Remote Desktop connections with DC1.
What should you do? ()
A. Direct Paul to establish a VPN connection with DC1 before he starts Remote Desktop Connection.
B. Direct Paul to set a password for his user account before he starts Remote Desktop Connection.
C. In the local security policy of DC1, disable the Require strong (Windows 2000 or later) session key setting.
D. In the local security policy of DC1, enable the Disable machine account password changes setting
![](https://static.ppkao.com/ppmg/img/appqrcode.png)
最新试题
You are the network administrator for the Beijing office of TestKing. A branchoffice is located in Cairo. The DNS servers in both locations run Windows Server2003.The network uses two DNS namespaces internally. They are namedpublishing.testking.com and testking.com. The locations of the primary nameservers are shown in the following table.The Beijing office contains some servers that are registered in the testking.com zoneand other that are registered in the publishing.testking.com zone. All computers inthe Beijing office are configured to use the local DNS server as their preferred DNSserver. The two offices are connected only by using a VPN through the Internet.Various network problems occasionally result in loss of connectivity between thetwo offices.Firewalls prevent the DNS servers in both offices from receiving queries from theInternet.You need to configure the DNS server in the Beijing office to allow successfulresolution of all queries from the Beijing office for names in thepublishing.testking.com namespace, even when the VPN link between the Beijingand Cairo offices fails.What should you configure on the DNS server in the Beijing office?()
You are the network administrator for The network consists of asingle Active Directory domain named All network servers runWindows Server 2003.Confidential files are stored on a member server named TK1. The computer objectfor TK1 resides in an organizational unit (OU) named Confidential. A Group Policyobject (GPO) named GPO1 is linked to the Confidential OU.To audit access to the confidential files, you enable auditing on all private folders onTK1.Several days later, you review the audit logs. You discover that auditing is notsuccessful.You need to ensure that auditing occurs successfully.What should you do?()
You are the network administrator for You administer a Windows Server 2003 computer named TestKing2. User profiles are stored on TestKing2.A user named Sandra reports that she accidentally deleted a folder namedTestKingStuff from her user profile. She needs to have her TestKingStuff folderrestored. Other users are accessing TestKing2, and you do not want to negativelyaffect their work. You locate the latest backup that contains the files that you needto restore.You need to restore Sandra's TestKingStuff folder. You want to achieve this goal byusing the minimum amount of administrative effort.What should you do?()
You are the network administrator for The network consists of asingle Active Directory domain named All network servers runWindows Server 2003. Three thousand client computers run Windows 2000Professional, and 1,500 client computers run Windows XP Professional.A new employee named Dr King is hired to assist you in installing Windows XPProfessional on 150 new client computers.You need to ensure that Dr King has only the minimum permissions required to addnew computer accounts to the domain and to own the accounts that he creates. DrKing must not be able to delete computer accounts.What should you do?()
You are the network administrator for The network consists of a single Active Directory domain named.You configure a new Windows Server 2003 file server named TestKingSrv1.You restore user files from a tape backup, and you create a logon script that maps driveletters to shared files on TestKingSrv1.Users report that they cannot access TestKingSrv1 through the drive mappings youcreated. Users also report that TestKingSrv1 does not appear in My NetworkPlaces.You log on to TestKingSrv1 and confirm that the files are present and that theNTFS permissions and share permissions are correct. You cannot access anynetwork resources. You run the ipconfig command and see the following output.You need to configure the TCP/IP properties on TestKingSrv1 to resolve theproblem.What should you do?()
You are the network administrator for TestKing. The network consists of a singleActive Directory domain.A member server named Testking1 runs Windows Server 2003 and SoftwareUpdate Services (SUS). You perform a full backup of Testking1 every night.Testking1 fails unexpectedly and cannot be restarted. As a result, automatic updatesare no longer distributed within the domain.You need to restore the functionality of Testking1.First, you install Windows Server 2003 on a new computer and configure it as amember server. You name the new computer Testking1 and install all IIScomponents that were installed on the original Testking1. Then you install SUS andobtain the most recent successful backup of the original Testking1.Which two additional actions should you perform?() (Each correct answer presentspart of the solution. Choose two.)
You are the network administrator for All network severs runWindows Server 2003. Business hours are 9:00 A.M. to 5:00 P.M., Monday throughFridayA file server named TestKingB is configured to create a shadow copy every morningat 1:00 A.M. TestKingB hosts several shared folders. One shared folder has theconfiguration shown in the following table.For several months, users frequently access both databases in TestKingOrders. OneMonday morning, a user tells you that she needs to edit Receivables.mdb as itexisted at 5:00 P.M. on the previous Thursday.You need to modify TestKingB to enable the appropriate editing. You must ensurethat other users can continue to access current data without interruption.First, you map a drive to \\TestKingB\TestKingOrders.Which two additional actions should you perform? ()(Each correct answer presentspart of the solution. Choose two)
You are the administrator of a Windows Server 2003 computer named Testking1.An application on Testking1 gradually uses more and more memory until it causesTestking1 to stop responding. If you restart the application before it uses theavailable memory, there is no interruption of user services.You need to configure Testking1 to notify you when it encounters a low-memorycondition.What should you do?()
You are the network administrator for Test King. The network consists of a singleActive Directory domain named The domain contains WindowsServer 2003 computers and Windows XP Professional computers.The Default Domain Policy has been modified by importing a security template file,which contain several security settings.A server named TestKing1 cannot run a program that us functioning on othersimilarly configured servers. You need to find out whether additional securitysettings have been added to the local security policy on TestKing1.To troubleshoot, you want to use a tool to compare the current security settings onTestKing1 against the security template file in order to automatically identify anysettings that might have been added to the local security policy.Which tool should you run on TestKing1?()
You are the network administrator for TestKing. All servers run Windows 2003. Allclient computers run Windows XP Professional.You log on to a server named Testking15 by using the local Administrator account.You start the installation of a new server application. After you start theinstallation, you return to your office, which is located in another building.You need to find out the status of the installation that is in progress on Testking15.What should you do?()