多项选择题

You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003.
Your network includes domain controllers, file and print servers, and application servers. The application servers run a variety of programs, including Microsoft SQL Server 2000 and Microsoft Exchange Server 2003.
Your staff are responsible for monitoring current system performance on all servers.
You need to enable your staff to use System Monitor to gather performance data for each unique server type. The data will be used for trend analysis and forecasting.
Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two)

A. For each server, add the most common performance counters and save them as an HTML file.
B. For each server, add the most common performance counters and save them as a counter report file.
C. Create trace logs based on the file and schedule and trace logs to gather data.
D. Create alerts on the file and schedule the alerts to gather data.
E. Create counter logs based on the file and schedule the counter logs to gather data.


您可能感兴趣的试卷

你可能感兴趣的试题

2.单项选择题

You are one of the network administrators for All network servers run Windows Server 2003. TestKing operates a total of four offices.
The office where you work has 15 servers. You are responsible for supporting and maintaining all of these servers.
You need to design a monitoring plan that will achieve the following goals:
1. Track all performance changes on the servers.
2. Record performance data to anticipate the need for future upgrades.
What should you do?()

A. On each server in your office, use Performance Logs and Alerts to create a baseline log. Configure the log to collect data every five minutes for one day. Use the same counters for each server to create a log file. Schedule the log to run weekly.
B. From a monitoring computer, use Performance Logs and Alerts to create a baseline log for each server in your office. Configure the log to collect data every five minutes for one day. Use the same counters for each server to create a log file. Schedule the log to run weekly.
C. On each server in your office, use Performance Logs and Alerts to create threshold-based alerts. Configure the alerts to send a message to your monitoring computer when they are triggered. Set each alert to start a new scan when the alert finishes.
D.From a monitoring computer use Performance Logs and Alerts to create a new counter set in System Monitor. Configure the counters to run continuously.

3.单项选择题

You are the network administrator for The network contains a Windows Server 2003 computer named Print1 that functions as a print server.
Print1 contains a printer named MarketingPrinter. Users report that print jobs they submit to the MarketingPrinter take a long time to print. You immediately examine Print1 and conclude that the server is performing at acceptable levels.
You need to identify the problem.
What should your next step be?()

A. Use Task Manager to monitor processor and memory performance.
B. Use Windows Explorer to monitor the size of the Windows\System32\Spool\prtprocs folder.
C. Use System Monitor to view the Print Queue\Jobs counter.
D. Use System Monitor to view the Print Queue\Enumerate Network Printer Calls couner.

4.单项选择题

You are the network administrator for All network servers run Windows Server 2003.
A server named PrintTK1 has a print device directly connected to the parallel port.
The print device is shared for use by all users.
Peter is the IT manager. Peter reports that his documents are often printed after documents submitted by other users.
You need to ensure that Peter's documents take precedence over documents submitted for printing by other users. However, if a document is already printing,
the printing must not be interrupted.
What should you do?()

A. Configure the printer permissions to assign the Allow - Take Ownership permission to Peter. Restart the Print Spooler service on PrintTK1.
B. Make Peter's user account the owner of the printer. Restart the Print Spooler service on PrintTK1.
C. Create a new printer on PrintTK1 and configure it to print to the print device. In the Advanced tab of the new printer properties, select the Print directly to the printer option. Configure Peter's computer to print to the new printer.
D. Create a new printer PrintTK1 and configure it to print to the print device. Modify the priority of the new printer. Configure Peter's computer to print to the new printer.

5.单项选择题

You are the network administrator for All network servers run Windows Server 2003.
A server named PrintTK1 contains a print queue that is shared for use by all users in your office.
Marie is the office manager. She reports that users frequently submit large print jobs just before they leave for lunch. These print jobs require long printing times.
They often prevent users from printing other important documents.
You need to enable Marie to delete print jobs that are submitted to the printer by anyone in the office.
What should you do?()

A. Configure the printer permission to assign the Allow - Manage Printers permission to Marie.
B. Configure the printer permission to assign the Allow - Manage Documents permission to Marie.
C. On Marie's client computer, create a new print queue that prints to the same print device. Configure the permission on the print queue to assign the Allow - Manage Printers permission to Marie.
D. On Marie's client computer, create a new print queue that prints to the same print device. Configure the permission on the print queue to assign the Allow - Manage Documents permission to Marie.

7.单项选择题

Your company network consists of a single Active Directory domain named The network has a print server running Windows 2003 Server. A single printer is installed on the print server. Technicians in the IT Support department have the necessary permissions to manage printers on the print server.
You are a member of the Domain Admins group.
A user in the Accounts department reports that his documents are not printing. A technician named John examines the print queue and finds a list of documents waiting to be printed. John tries to delete the documents from the queue but is unsuccessful.
You need to enable users to successfully print.
What should you do?()

A. Install a new print device. Reconfigure the printer to send print jobs to the new print device.
B. Stop and restart the Print Spooler service on the print server. Instruct users to resubmit their print jobs.
C. Install a second instance of the printer. Configure the print queue to hold mismatched documents. Redirect the original printer to the new printer.
D. Install a second instance of the printer. Delete the original printer. Instruct users to resubmit their print jobs.

最新试题

You are the network administrator for TestKing. The network contains a WindowsServer 2003 computer named Testking1.You back up the data folders on Testking1 by using the following schedule:1. Normal backup every Monday.2. Incremental backups every Tuesday, Wednesday, Thursday, and Friday.After the backup on Friday is completed, a user accidentally deletes a file from adata folder on Server1. The user reports that he modified the file in the past week,but he does not know which day he modified the file. You do not know when the filewas last backed up.You need to restore the latest copy of the file as quickly as possible.What should you do?()

题型:单项选择题

You are the network administrator for Test King. The network consists of a singleActive Directory domain named The domain contains WindowsServer 2003 computers and Windows XP Professional computers.The Default Domain Policy has been modified by importing a security template file,which contain several security settings.A server named TestKing1 cannot run a program that us functioning on othersimilarly configured servers. You need to find out whether additional securitysettings have been added to the local security policy on TestKing1.To troubleshoot, you want to use a tool to compare the current security settings onTestKing1 against the security template file in order to automatically identify anysettings that might have been added to the local security policy.Which tool should you run on TestKing1?()

题型:单项选择题

You are the network administrator for The network consists of asingle Active Directory domain named All domain controllers runWindows Server 2003, and all client computers run Windows XP Professional. Eachdomain server has a locally attached tape device.You need to back up each domain controller. Your backup process must fulfil thefollowing requirements:a. System recovery must be possible in the event of server failure.b. The system configuration and all current dynamic disk configurations must bebacked up.c. Other data partitions do not need to be backed up.What should you do?()

题型:单项选择题

You are the network administrator for TestKing. The network contains a WindowsServer 2003 computer named testking1, which hosts a critical business applicationnamed Salesapp. Testking1 has one disk that contains a single NTFS volume.Five days ago, the System State of testking1 was backed up, and an AutomatedSystem Recovery (ASR) backup was created. No additional backups wereperformed. Subsequently, many changes were made to the Salesapp data files.You apply an update to the application, which requires you to restart testking1.Windows startup terminates with a Stop error. You restart the computer and bootto a floppy disk. A utility on this disk gives you read-only access to the NTFS filesystem. You discover that one of the .dll files for the Salesapp application iscorrupted. The corrupted file is stored in the C.\Windows\System32 folder.You need to restore the corrupted file. You need to avoid losing any changes madeto the data files on testking1.What should you do onTestKing1?()

题型:单项选择题

You are the network administrator for You administer a Windows Server 2003 computer named TestKing2. User profiles are stored on TestKing2.A user named Sandra reports that she accidentally deleted a folder namedTestKingStuff from her user profile. She needs to have her TestKingStuff folderrestored. Other users are accessing TestKing2, and you do not want to negativelyaffect their work. You locate the latest backup that contains the files that you needto restore.You need to restore Sandra's TestKingStuff folder. You want to achieve this goal byusing the minimum amount of administrative effort.What should you do?()

题型:单项选择题

You are the network administrator for TestKing. The network consists of a singleActive Directory domain. All network servers run Windows Server 2003.A member server named TestkingA has a locally attached tape device. TestkingAcontains several folders and files that are encrypted by using Encrypting FileSystem (EFS).You create a new user account for a new employee named Victoria. Victoria's useraccount is member of the Users group only.You need to ensure that Victoria can back up the encrypted folders and files onTestkingA. Victoria must be assigned the minimum administrative privilegesneeded to complete this task.What should you do?()

题型:单项选择题

You are the network administrator for TestKing. The network consists of a singleActive Directory domain.A member server named Testking1 runs Windows Server 2003 and SoftwareUpdate Services (SUS). You perform a full backup of Testking1 every night.Testking1 fails unexpectedly and cannot be restarted. As a result, automatic updatesare no longer distributed within the domain.You need to restore the functionality of Testking1.First, you install Windows Server 2003 on a new computer and configure it as amember server. You name the new computer Testking1 and install all IIScomponents that were installed on the original Testking1. Then you install SUS andobtain the most recent successful backup of the original Testking1.Which two additional actions should you perform?() (Each correct answer presentspart of the solution. Choose two.)

题型:多项选择题

You are the network administrator for TestKing. Your network consists of a singleActive Directory domain. You manage a Terminal Server farm that includes fiveterminal servers and a Terminal Services Licensing server named testking9. Allservers run Windows 2000 Server. There are 2,500 users who log on to the terminalservers to access a custom human resource (HR) application.You install Windows Server 2003 on a new server named testking10. Testking10 isconfigured with all default settings enabled. You install Terminal Services and theHR application on testking10. You instruct some users to access the HR applicationon testking10.Four months later, users report that they can no longer establish Terminal Servicessessions to testking10. You verify that users can connect to the other terminalservers in your Terminal Server farm.You need to ensure that users can run the HR application on all terminal servers onthe network.What should you do?()

题型:单项选择题

You are the administrator of a Windows Server 2003 computer named Testking1.Backups of the System State data of Testking1 occur each day by using the localAdministrator account.A new requirement restricts you from running services by using theAdministrator account. To meet the requirement, you create a new service accountnamed BackupTestking1 to be used for backups. You want this account to have theminimum permissions necessary to perform backups.You need to grant the appropriate permissions to the BackupTestking1 account andto configure the backup job to use the BackupTestking1 account.What should you do?()

题型:单项选择题

You are the network administrator for The network consists of asingle Active Directory domain named The domain contains WindowsServer 2003 computers and Windows XP Professional computers.All confidential company files are stored on a file server named TestKing1. Thewritten company security states that all confidential data must be stored andtransmitted in a secure manner. To comply with the security policy, you enableEncrypting File System (EFS) on the confidential files. You also add EFScertificates to the data decryption field (DDF) of the confidential files for the userswho need to access them.While performing network monitoring, you notice that the confidential files that arestored on TestKing1 are being transmitted over the network without encryption.You must ensure that encryption is always used when the confidential files onTestKing1 are stored and transmitted over the network.What are two possible ways to accomplish this goal?() (Each correct answer presentsa complete solution. Choose two)

题型:多项选择题