单项选择题

You are a network administrator for your company. You install Windows Server 2003 on two servers named Server1 and Server2. You configure Server1 and Server2 as a two-node cluster.  
You configure a custom application on the cluster by using the Generic Application resource, and you put all resources in the Application group. You test the cluster and verify that it fails over properly and that you can move the Applications group from one node to the other and back again.  
The application and the cluster run successfully for several weeks. Users then report that they cannot access the application. You investigate and discover that Server1 and Server2 are running but the Application group is in a failed state.  
You restart the Cluster service and attempt to bring the Application group online on Server1. The Application group fails. You discover that Server1 fails, restarts automatically, and fails again soon after restarting. Server1 continues to fail and restart until the Application group reports that it is in a failed state and stops attempting to bring itself back online.  
You need to configure the Application group to remain on Server2 while you research the problem on Server1. 
 What should you do?  ()

A. On Server2, configure the failover threshold to 0.
B. On Server2, configure the failover period to 0.
C. Remove Server1 from the Possible owners list.
D. Remove Server1 from the Preferred owners list.


您可能感兴趣的试卷

你可能感兴趣的试题

1.单项选择题

You are a network administrator for your company. The network contains a Windows Server 2003 computer named Server1. Server1 has a single CPU, 512 MB of RAM, and a single 100-Mb network adapter.  
All network users’ home folders are stored on Server1. Users access their home folders by using a mapped network drive that connects to a shared folder on Server1.  
After several weeks, users report that accessing home folders on Server1 is extremely slow at certain times during the day.  
You need to identify the resource bottleneck that is causing the poor performance. 
 What should you do?  ()

A. Capture a counter log by using LogicalDisk, PhysicalDisk, Processor, Memory, and Network Interface performance objects, and view the log data information that is captured during periods of poor performance.
B. Configure Alerts on Server1 to log entries in the event logs for the LogicalDisk, PhysicalDisk, Processor, Memory, and Network Interface performance objects when the value of any object is more than 90.
C. Capture a trace log that captures Page faults, File details, Network TCP/IP, and Process creations/deletions events.
D. Implement auditing on the folder that contains the users’ home folders. Configure Network Monitor on Server1.

2.单项选择题

You are a network adminstrator for your company. You install an intranet application on three Windows Server 2003 computers. You configure the servers as a Network Load Balancing cluster. You configure each server with two network adapters. One network adapter provides client computers access to the servers. The second network adapter is for cluster communications. Cluster communications is on a separate network segment.  
The network team wants to reduce the cluster’s vulnerability to attack. These servers need to be highly available. The network team decides that the Network Load Balancing cluster needs to filter IP ports. The team wants the cluster to allow only the ports that are required for the intranet application.  
You need to implement filtering so that only the intranet application ports are available on the cluster. You need to achieve this goal by using the minimum amount of administrative effort.  
What should you do?  ()

A. Use Network Load Balancing Manager to configure port rules. Allow only the intranet application ports on the cluster IP address.
B. Use TCP/IP filtering on each server. Configure only the intranet application ports on the network adapter that provides client computers access to the servers.
C. Use TCP/IP filtering on each server. Configure only the intranet application ports on both of the network adapters.
D. Configure Routing and Remote Access on each server. Use Routing and Remote Access input filters to allow only the intranet application ports on the network adapter that provides client computers access to the servers.

3.单项选择题

You are a network administrator for your company. The company has a main office and two branch offices. The branch offices are connected to the main office by T1 lines. The network consists of three Active Directory sites, one for each office. All client computers run either Windows 2000 Professional or Windows XP Professional. Each office has a small data center that contains domain controllers, WINS, DNS, and DHCP servers, all running Windows Server 2003.  
Users in all offices connect to a file server in the main office to retrieve critical files. The network team reports that the WAN connections are severely congested during peak business hours. Users report poor file server performance during peak business hours. The design team is concerned that the file server is a single point of failure. The design team requests a plan to alleviate the WAN congestion during business hours and to provide high availability for the file server.  
You need to provide a solution that improves file server performance during peak hours and that provides high availability for file services. You need to minimize bandwidth utilization.  
What should you do? ()

A. Purchase two high-end servers and a shared fiber-attached disk array. Implement a file server cluster in the main office by using both new servers and the shared fiber-attached disk array.
B. Implement Offline Files on the client computers in the branch offices by using Synchronization Manager. Schedule synchronization to occur during off-peak hours.
C. Implement a stand-alone Distributed File System (DFS) root in the main office. Implement copies of shared folders for the branch offices. Schedule replication of shared folders to occur during off-peak hours by using scheduled tasks.
D. Implement a domain Distributed File System (DFS) root in the main office. Implement DFS replicas for the branch offices. Schedule replication to occur during off-peak hours.

4.单项选择题

You are a systems engineer for your company. Your company has 20,000 users in a large campus environment located in Los Angeles. Each department in the company is located in its own building. Each department has its own IT staff, which is responsible for all network administration within the building.  
The company’s network is divided into several IP subnets that are connected to one another by using dedicated routers. Each building on the company’s main campus contains at least one subnet, and possibly up to five subnets. Each building has at least one router. All routers use RIP version 2 (RIPv2) broadcasts.  
The company acquires a new business unit located in Denver. The Denver office has 25 users. The network in the Denver office is connected to the network at the main campus by using a leased frame relay connection. The network administrator at the Denver office installs a Windows Server 2003 computer and configures Routing and Remote Access on this server. The network administrator at the Denver office configures this server as a router and implements RIPv2 in Routing and Remote Access.  
Later, the Denver administrator reports that his router is not receiving routing table updates from the routers on the main campus network. He must manually add routing entries to the routing table to enable connectivity between the locations. You investigate and discover that the RIPv2 broadcasts are not being received at the Denver office. You also discover that no routing table announcements from the Denver office are being received on the main campus network.  You need to ensure that the network in the Denver office can communicate with the main campus network and can send and receive automatic routing table updates as network conditions change.  
What should you do on the router in the Denver office?()

A. Configure the router to use RIPv1 broadcasts.
B. Configure the router to use auto-static update mode.
C. Add the IP address ranges of the main campus network to the router’s Accept list and Announce list.
D. Add the IP addresses of the main campus routers to the router’s Neighbors list.

5.单项选择题

You are a network administrator for your company. The company has a main office and one branch office. The network consists of a single Active Directory domain. All servers run Windows Server 2003.  
The company needs to connect the main office network and the branch office network by using Routing and Remote Access servers at each office. The networks will be connected by a VPN connection over the Internet.  
The company’s written security policy includes the following requirements for VPN connections over the Internet:  All data must be encrypted with end-to-end encryption.  VPN connection authentication must be at the computer level.  
Credential information must not be transmitted over the Internet as part of the authentication process.  
You need to configure security for VPN connection between the main office and the branch office. You need to comply with the written security policy.  
What should you do?  ()

A. Use a PPTP connection with EAP-TLS authentication.
B. Use a PPTP connection with MS-CHAP v2 authentication.
C. Use an L2TP connection with EAP-TLS authentication.
D. Use an L2TP connection with MS-CHAP v2 authentication.

6.单项选择题

You are a network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. The company’s main office is in Barcelona, and it has branch offices in Paris and London. The company has no immediate plans to expand or relocate the offices.  
The company wants to connect the office networks by using a frame relay WAN connection and Routing and Remote Access servers that are configured with frame relay WAN adapters. Computers in each office will be configured to use the local Routing and Remote Access server as a default gateway. You are planning the routing configuration for the Routing and Remote Access servers.  
You need to allow computers in Barcelona, Paris, and London to connect to computers in any office. You want to minimize routing traffic on the WAN connection.  
What should you do?  ()

A. At each office, add the OSPF routing protocol to Routing and Remote Access, add the WAN adapter to the OSPF routing protocol, and deploy OSPF as a single-area internetwork.
B. At each office, add the RIP version 2 routing protocol to Routing and Remote Access, and configure the WAN adapter to use RIP version 2. Configure the outgoing packet protocol as RIP version 2 broadcast and the incoming packet protocol as RIP version 1 and 2.
C. At each office, add the RIP version 2 routing protocol to Routing and Remote Access, and configure the WAN adapter to use RIP version 2. Configure the outgoing packet protocol as RIP version 2 multicast and the incoming packet protocol as RIP version 2 only.
D. At each office, configure the Routing and Remote Access server with static routes to the local networks at the other two offices.

7.单项选择题

You are the systems engineer for Contoso, Ltd. The internal network consists of a Windows NT 4.0 domain. The company maintains a separate network that contains publicly accessible Web and mail servers. These Web and mail servers are members of a DNS domain named contoso.com. The contoso.com zone is hosted by a UNIX-based DNS server running BIND 4.8.1.  
Contoso, Ltd., is planning to migrate to a Windows Server 2003 Active Directory domain-based network. The migration plan states that all client computers will be upgraded to Windows XP Professional and that all servers will be replaced with new computers running Windows Server 2003.  
The migration plan specifies the following requirements for DNS in the new environment:
•  Active Directory data must not be accessible from the Internet.
• The DNS namespace must be contiguous to minimize confusion for users and administrators.  
• Users must be able to connect to resources in the contoso.com domain.
• Users must be able to connect to resources located on the Internet.  
• The existing UNIX-based DNS server will continue to host the contoso.com domain. 
• The existing UNIX-based DNS server cannot be upgraded or replaced.
You plan to install a Windows Server 2003 DNS server on the internal network.  
You need to configure this Windows-based DNS server to meet the requirements specified in the migration plan.  
What should you do? ()

A. Create a primary zone named ad.contoso.com on your Windows-based DNS server. Create a delegation record for the new zone on the UNIX-based DNS server. Configure forwarders on your Windows-based DNS server.
B. Create a primary zone named ad.contoso.com on the UNIX-based DNS server. Create a secondary zone on your Windows-based DNS server for the ad.contoso.com domain.
C. Create a primary zone named contoso-ad.com on your Windows-based DNS server. Create a secondary zone on the UNIX-based DNS server for the contoso-ad.com domain.
D. Create a primary zone named contoso-ad.com on the UNIX-based DNS server. Create a stub zone on the Windows-based DNS server for the contoso-ad.com domain. Configure conditional forwarders on your Windows-based DNS server for the contoso-ad.com and contoso.com domains.

9.单项选择题

You are the network administrator for your company. The network contains an application server running Windows Server 2003.  
Users report that the application server intermittently responds slowly. When the application server is responding slowly, requests that normally take 1 second to complete take more than 30 seconds to complete. You suspect that the slow server response is because of high broadcast traffic on the network.  
You need to plan how to monitor the application server and to have a message generated when broadcast traffic is high. You also want to minimize the creation of false alarms when nonbroadcast traffic is high. 
 What should you do?  ()

A. Use the Alerts option in the Performance Logs and Alerts snap-in to configure an alert to trigger when the Datagrams/sec counter in the UDPv4 object is high.
B. Use System Monitor and configure it to monitor the Segments/sec counter in the TCPv4 object.  
C. Use System Monitor and configure it to monitor the Datagrams/sec counter in the UDPv4 object.
D. Use the Alerts option in the Performance Logs and Alerts snap-in to configure an alert to trigger when the Datagrams/sec counter in the TCPv4 object is high.

10.多项选择题

You are a network administrator for Alpine Ski House. The internal network has an Active Directory-integrated zone for the alpineskihouse.org domain. Computers on the internal network use the Active Directory-integrated DNS service for all host name resolution.  
The Alpine Ski House Web site and DNS server are hosted at a local ISP. The public Web site for Alpine Ski House is accessed at www.alpineskihouse.com. The DNS server at the ISP hosts the alpineskihouse.com domain.  
To improve support for the Web site, your company wants to move the Web site and DNS service from the ISP to the company’s perimeter network. The DNS server on the perimeter network must contain only the host (A) resource records for computers on the perimeter network.  
You install a Windows Server 2003 computer on the perimeter network to host the DNS service for the alpineskihouse.com domain. You need to ensure that the computers on the internal network can properly resolve host names for all internal resources, all perimeter resources, and all Internet resources.  
Which two actions should you take? ()

A. On the DNS server that is on the perimeter network, install a primary zone for alpineskihouse.com.
B. On the DNS server that is on the perimeter network, install a stub zone for alpineskihouse.com.
C. Configure the DNS server that is on the internal network to conditionally forward lookup requests to the DNS server that is on the perimeter network.
D. Configure the computers on the internal network to use one of the internal DNS servers as the preferred DNS server. Configure the the TCP/IP settings on the computers on the internal network to use the DNS server on the perimeter network as an alternate DNS server.
E. On the DNS server that is on the perimeter network, configure a root zone.

最新试题

You are a network administrator for your company. The network consists of a single Active Directory domain and contains 10 Windows Server 2003 computers.  You install a new service on a server named Server1. The new service requires that you restart Server1. When you attempt to restart Server1, the logon screen does not appear. You turn off and then turn on the power for Server1. The logon screen does not appear. You attempt to recover the failed server by using the Last Known Good Configuration startup option. It is unsuccessful. You attempt to recover Server1 by using the Safe Mode startup options. All Safe Mode options are unsuccessful.  You restore Server1. Server1 restarts successfully. You discover that Server1 failed because the new service is not compatible with a security patch.  You want to configure all servers so that you can recover from this type of failure by using the minimum amount of time and by minimizing data loss. You need to ensure that in the future, other services that fail do not result in the same type of failure.  What should you do? ()

题型:单项选择题

You are the network administrator for your company. The network contains an application server running Windows Server 2003.  Users report that the application server intermittently responds slowly. When the application server is responding slowly, requests that normally take 1 second to complete take more than 30 seconds to complete. You suspect that the slow server response is because of high broadcast traffic on the network.  You need to plan how to monitor the application server and to have a message generated when broadcast traffic is high. You also want to minimize the creation of false alarms when nonbroadcast traffic is high.  What should you do?  ()

题型:单项选择题

You are a network administrator for Alpine Ski House. The network consists of a single Active Directory domain. The domain name is alpineskihouse.com. The network contains three Windows Server 2003 domain controllers.  You are creating the recovery plan for the company. According to the existing backup plan, domain controllers are backed up by using normal backups each night. The normal backups of the domain controllers include the system state of each domain controller.  Your recovery plan must incorporate the following organizational requirements:  • Active Directory objects that are accidentally or maliciously deleted must be recoverable.• Active Directory must be restored to its most recent state as quickly as possible.• Active Directory database replication must be minimized.  You need to create a plan to restore a deleted organizational unit (OU).  Which two actions should you include in your plan?()

题型:多项选择题

You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster.  The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template.  You need to implement protective measures against the cluster’s most significant security vulnerability.  What should you do?  ()

题型:单项选择题

You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains an application server running Windows Server 2003.  Users report intermittent slow performance when they access the application server throughout the day. You find out that the network interface on the application server is being heavily used during the periods of slow performance. You suspect that a single computer is causing the problem.You need to create a plan to identify the problem computer.  What should you do?()

题型:单项选择题

You are the senior systems engineer for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. Client computers in the sales department run Windows NT Workstation 4.0 with the Active Directory Client Extensions software installed. All other client computers run Windows XP Professional. All servers are located in an organizational unit (OU) named Servers. All client computers are located in an OU named Desktops.  Four servers contain confidential company information that is used by users in either the finance department or the research department. Users in the sales department also store files and applications on these servers. The company’s written security policy states that for auditing purposes, all network connections to these resources must require authentication at the protocol level. The written security policy also states that all network connections to these resources must be encrypted. The company budget does not allow for the purchase of any new hardware or software. The applications and data located on these servers may not be moved to any other server in the network.  You define and assign the appropriate permissions to ensure that only authorized users can access the resources on the servers.  You now need to ensure that all connections made to these servers by the users in the finance department and in the research department meet the security guidelines stated by the written security policy. You also need to ensure that all users in the sales department can continue to access their resources.  Which two actions should you take?()

题型:多项选择题

You are the network administrator for your company. The network consists of a single Active Directory domain.  The domain contains a Windows Server 2003 computer named Server1 that is located in an organizational unit (OU) named Servers. Server1 contains confidential data, and all network communications with Server1 must be encrypted by using IPSec.  The default Client (Respond Only) IPSec policy is enabled in the Default Domain Policy Group Policy object (GPO). You create a new GPO and link it to the Servers OU. You configure the new GPO by creating and enabling a custom IPSec policy. You monitor and discover that network communications with Server1 are not being encrypted.  You need to view all IPSec policies that are being applied to Server1.  What should you do?  ()

题型:单项选择题

You are a network administrator for Alpine Ski House. The internal network has an Active Directory-integrated zone for the alpineskihouse.org domain. Computers on the internal network use the Active Directory-integrated DNS service for all host name resolution.  The Alpine Ski House Web site and DNS server are hosted at a local ISP. The public Web site for Alpine Ski House is accessed at www.alpineskihouse.com. The DNS server at the ISP hosts the alpineskihouse.com domain.  To improve support for the Web site, your company wants to move the Web site and DNS service from the ISP to the company’s perimeter network. The DNS server on the perimeter network must contain only the host (A) resource records for computers on the perimeter network.  You install a Windows Server 2003 computer on the perimeter network to host the DNS service for the alpineskihouse.com domain. You need to ensure that the computers on the internal network can properly resolve host names for all internal resources, all perimeter resources, and all Internet resources.  Which two actions should you take? ()

题型:多项选择题

You are the systems engineer for your company. The company has a main office in Los Angeles and two branch offices, one in Chicago and one in New York. The offices are connected to one another by dedicated T1 lines. Each office has its own local IT department and administrative staff.  The company network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional. All servers support firmware-based console redirection by means of the serial port. The server hardware does not support any other method of console redirection and cannot be upgraded to do so.  The company is currently being reorganized. The IT departments from each branch office are being relocated to a new central data center in the Los Angeles office. Several servers from each branch office are also being relocated to the Los Angeles data center. Each branch office will retain 10 servers. A new written security policy includes the following requirements:  • All servers must be remotely administered for all administrative tasks.  • All servers must be administered from the Los Angeles office.  • All remote administration connections must be authenticated and encrypted.  Your current network configuration already adheres to the new written security policy for day-to-day server administration tasks performed on the servers. You need to plan a configuration for out-of-band management tasks for each office that meets the new security requirements.  Which three actions should you take?()

题型:多项选择题

You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.  You administer a three-node Network Load Balancing cluster. Each cluster node runs Windows Server 2003 and has a single network adapter. The cluster has converged successfully.  You notice that the nodes in the cluster run at almost full capacity most of the time. You want to add a fourth node to the cluster. You enable and configure Network Load Balancing on the fourth node.  However, the cluster does not converge to a four-node cluster. In the System log on the existing three nodes, you find the exact same TCP/IP error event. The event has the following description: "The system detected an address conflict for IP address 10.50.8.70 with the system having network hardware address 02:BF:0A:32:08:46."  In the System log on the new fourth node, you find a similar TCP/error event with the following description: "The system detected an address conflict for IP address 10.50.8.70 with the system having network hardware address 03:BF:0A:32:08:46." Only the hardware address is different in the two descriptions.  You verify that IP address 10.50.8.70 is configured as the cluster IP address on all four nodes.  You want to configure a four-node Network Load Balancing cluster.  What should you do?  ()

题型:单项选择题