You are the network administrator for All network servers run Windows Server 2003.
A member server named TestKingA contains two volumes.
You need to perform a complete backup of the data on TestKingA. You must ensure that TestKingA can be completely restored in case of hardware failure.
Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two)
A. Create an Automated System Recovery (ASR) backup.
B. Create a backup of user data.
C. Create a Windows Server 2003 bootable floppy disk.
D. Create a DOS bootable floppy disk.
E. Copy all Windows Server 2003 boot files to the Windows Server 2003 bootable floppy disk.
F. Copy only Boot.ini to the Windows Server 2003 bootable floppy disk
您可能感兴趣的试卷
你可能感兴趣的试题
You are the network administrator for The network consists of a single Active Directory domain All network servers run Windows Server 2003.
Recovery Console is installed on each domain controller. The disk configuration for each domain controller is shown in the following table.
MAINis configured with both the system partition and the boot partition.
Every Friday at 6:00 P.M., you run the Automated System Recovery (ASR) wizard in conjunction with removable storage media. Every night at midnight, you use third-party software to perform full backups of user profiles and user data on removable storage media.
One Friday at 8:00 P.M., an administrator reports that the CA database on a domain controller named DC1 is corrupted. You need to restore the database as quickly as possible.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two)()
A. Restart DC1 by using Directory Services Restore Mode.
B. Restart DC1 by using the installation CD-ROM.
C. Perform a nonauthorative restoration of Active Directory.
D. Perform an authoritative restoration of Active Directory.
E. Use the ASR disk to restore the content of the ASR back file
You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003.
One domain controller on the network is configured as a certification authority (CA). The network contains a Web server that runs IIS 6.0 and hosts a secure intranet site. The server also hosts other sites that do not require HTTPS.
You configure a server certificate on the IIS server by using a certificate from your internal CA. All users are required to connect to the intranet site by using HTTPS.
Some users report that they cannot connect to the secure intranet site by using HTTPS. You confirm that all users can connect to the nonsecure sites hosted on the Web server by using HTTP.
You want to view the failed HTTPS requests.
What should you do?()
A. Review the log files created by IIS on the Web server.
B. Review the security log in Event Viewer on the Web server.
C. Review the security log in Event Viewer on the ca.
D. Review the contents of the Failed Requests folder on the ca.
You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003.
The network contains a Web server that runs IIS 6.0 and hosts a secure intranet site. All users are required to connect to the intranet site by authenticating and using HTTPS. However, because an automated Web application must connect to the Web site by using HTTP, you cannot configure the intranet site to require HTTPS.
You need to collect information about which users are connecting to the Web site by using HTTPS.
What should you do?()
A. Check the application log on the Web server.
B. Use Network Monitor to capture network traffic on the Web server.
C. Review the log files created by IIS on the Web server.
D. Configure a performance log to capture all Web service counters. Review the performance log data.
You are the network administrator for The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers.
All confidential company files are stored on a file server named TestKing1. The written company security states that all confidential data must be stored and transmitted in a secure manner. To comply with the security policy, you enable Encrypting File System (EFS) on the confidential files. You also add EFS certificates to the data decryption field (DDF) of the confidential files for the users who need to access them.
While performing network monitoring, you notice that the confidential files that are stored on TestKing1 are being transmitted over the network without encryption.
You must ensure that encryption is always used when the confidential files on TestKing1 are stored and transmitted over the network.
What are two possible ways to accomplish this goal? ()(Each correct answer presents a complete solution. Choose two)
A. Enable offline files for the confidential files that are stored on TestKing1, and select the Encrypt offline files to secure data check box on the client computers of the users who need to access the files.
B. Use IPSec encryption between TestKing1 and the client computers of the users who need to access the confidential files.
C. Use Server Message Block (SMB) signing between TestKing1 and the client computers of the users who need to access the confidential files.
D. Disable all LM and NTLM authentication methods on TestKing1.
E. Use IIS to publish the confidential files. Enable SSL on the IIS server. Open the files as a Web folder.
You are the network administrator for The network consists of a single Active Directory domain named The intranet Web site is hosted on a Windows Server 2003 computer named TestKing4, which is a member of a
workgroup. All client computers are members of the domain and are enabled for IPSec.
The network security administrator creates a new security policy for TestKing4.
The policy states that only HTTP traffic is permitted, that HTTP traffic must be encrypted, and that all computers must be authenticated.
The new security policy is implemented. Domain users report that they are not able to connect to TestKing4. You load the IP Security Monitor snap-in, and you view the details shown in the following window.
You need to ensure that all domain users can securely connect to TestKing4.
What should you do?()
A. Install a digital certificate on TestKing4.
B. Make TestKing4 a member of the domain.
C. Change the source and destination ports for outbound traffic.
D. Change the source and destination ports for inbound traffic.
You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003.
A member server named TK1 runs IIS. You install a Web-enabled application on TK1. The application includes a security feature that detects unauthorized attemptsto access the server. Whenever an authorized attempt is detected, the application automatically modifies the IIS configuration file to restrict the unauthorized user's access.
To test the security feature, you try to gain unauthorized access to TK1. Twenty seconds after your first attempt, you try again. However, TK1 does not restrict your access on the second attempt.
You wait five minutes, and then you examine the IIS configuration file. You verify that it was correctly modified by the application to restrict your access.
You need to configure IIS to ensure that changes in the IIS configuration file will result in immediate changes in the behaviour of IIS.
What should you do?()
A. Select the Enable Direct Metabase Edit option.
B. Specify the service account for the Application Pool as the IIS service account.
C. Select the Enable Rapid-Fail protection option.
D. Specify the status of the Internet Data Connector Web service extension as Allow.
You are the network administrator for The network consists of a single Active Directory domain named testking.com. All domain controllers run Windows Server 2003.
A member server named TestKing3 has IIS installed. TestKing3 hosts all content for company web sites. The server is backed up on magnetic tape once each month.
To replace the web functionality of TestKing3, the company acquires a new computer. You configure the computer as a member server named TestKing4 and install IIS. You transfer all content from TestKing3 to TestKing4 and start the IIS service on TestKing4.
You discover that TestKing4 is not configured with the IIS settings that were defined on TestKing3.
You need to ensure that TestKing4 has the same IIS settings that were defined on TestKing3.
What should you do?()
A. Use the most recent backup tape of TestKing3 to restore the System State data on TestKing4.
B. Use the most recent backup tape of TestKing3 to restore C:\windows\system32\inetsrv\History on TestKing4.
C. Use IIS manager on TestKing3 to select the Save Configuration to Disk option. Edit the files to replace system-specific information. Use the edited files to restore the IIS metabase on TestKing4.
D. Use IIS manager on TestKing3 to select the Backup/Restore Configuration option. Edit the files to replace system-specific information. Use the edited files to restore the IIS metabase on TestKing4.
You are the network administrator for The network consists of a single Active Directory domain named Site License Logging is enabled in the domain.
Administrators report that they cannot manage Client Access Licenses. When they attempt to open Licensing, they receive the following error: "RPC Server too busy."
You suspect there is a problem on the domain controller that functions as the site license server. You do not know which domain controller is the site license server.
You need to locate the site license server.
What should you do?()
A. Open Licensing, click the Server Browser tab, and expand your domain. Inspect the properties of each server.
B. Open Active Directory Sites and Services, open the properties for the site name. Inspect the contents of the Location tab.
C. Open the Active Directory Users and Computers, click your domain name, click Action, and select Operations Masters. Inspect the contents of the Infrastructure tab.
D. Open Active Directory Sites and Services, and click your site name. Inspect the properties of the Licensing Site Settings.
You are the network administrator for TestKing. All servers run Windows Server 2003.
Twenty TestKing employees connect to a terminal server named Testking2 to run applications and to gain access to the Internet.
The 20 employees report that they receive security messages while browsing Internet Web sites. The employees report that they cannot modify the Internet Explorer security settings on their client computers while connected to Testking2.
You need to allow these 20 employees to modify the Internet Explorer security settings in their client computers while connected to Testking2.
What should you do?()
A. Log on to Testking2 as Administrator and add http:// to the list of trusted sites in Internet Explorer.
B. Instruct the 20 employees to add http:// to the list of trusted sites in Internet Explorer on their client computers.
C. Instruct the 20 employees to change the Internet Explorer privacy settings on their client computers to Low.
D. Uninstall Internet Explorer Enhanced Security Configuration on Testking2.
You are the network administrator for All network servers run either Windows 2000 Server or Windows Server 2003, and all client computers run Windows XP Professional.
A computer named Server2 runs Windows Server 2003 with IIS 6.0 installed. On Server2, you create a virtual directory named WebFolder. You use IIS Manager to enable the following permissions on WebFolder: Read, Write, and Directory Browsing.
When users try to access WebFolder as a Web folder from Internet Explorer, they receive the error message shown in the exhibit.
You need to ensure that all users can access WebFolder as a Web folder.
What should you do?()
A. Restart the World Wide Web Publishing Service on Server2.
B. Enable anonymous access to WebFolder.
C. Modify the Execute permissions to allow scripts and executable files.
D. Enable the WebDAV Web service extension on Server2.
最新试题
You are the network administrator for TestKing. All servers run Windows 2003. Allclient computers run Windows XP Professional.You log on to a server named Testking15 by using the local Administrator account.You start the installation of a new server application. After you start theinstallation, you return to your office, which is located in another building.You need to find out the status of the installation that is in progress on Testking15.What should you do?()
You are the network administrator for The network consists of asingle Active Directory domain named All network servers runWindows Server 2003.Confidential files are stored on a member server named TK1. The computer objectfor TK1 resides in an organizational unit (OU) named Confidential. A Group Policyobject (GPO) named GPO1 is linked to the Confidential OU.To audit access to the confidential files, you enable auditing on all private folders onTK1.Several days later, you review the audit logs. You discover that auditing is notsuccessful.You need to ensure that auditing occurs successfully.What should you do?()
You are the network administrator for your company. All network servers runWindows Server 2003.You install and configure Software Update Services (SUS) on a server namedServer1. You configure the following settings:1. Do not use a proxy server for Internet access.2. Synchronize directly from the Microsoft Windows Update servers.3. Automatically approve new versions of previously approved updates.4. Save updates in a local folder.You back up the SUS configuration and schedule a daily synchronization procedurefor Server1.Later the same day, Server1 fails. You use the original names and locations torestore Windows Server 2003, IIS 6.0, and SUS.Now you need to fully restore the SUS configuration, without overwriting any otherdata.What should you do?()
You are the domain administrator for TestKing's Active Directory domain. Allservers run Windows Server 2003. All client computers run Windows XPProfessional.A newly installed server was added to your domain. You need to administer thisserver remotely from your client computer.You need to configure the new server to ensure that it can be administeredremotely.What should you do?()
You are the network administrator for Active Directory domain. Thedomain includes Windows Server 2003 domain controllers and Windows XPProfessional client computers.A new administrator named Sandra is hired to assist you in deploying Windows XPProfessional to 100 new computers. Sandra installs the operating system on a newcomputer named TestKing11.However, when Sandra tries to log on to the domain from TestKing11, she isunsuccessful. The logon dialog box does now allow her to view and select the domainname.You need to ensure that Sandra can log on to the domain from TestKing11.What should you do?()
You are the network administrator for TestKing. Your network consists of a singleActive Directory domain. You manage a Terminal Server farm that includes fiveterminal servers and a Terminal Services Licensing server named testking9. Allservers run Windows 2000 Server. There are 2,500 users who log on to the terminalservers to access a custom human resource (HR) application.You install Windows Server 2003 on a new server named testking10. Testking10 isconfigured with all default settings enabled. You install Terminal Services and theHR application on testking10. You instruct some users to access the HR applicationon testking10.Four months later, users report that they can no longer establish Terminal Servicessessions to testking10. You verify that users can connect to the other terminalservers in your Terminal Server farm.You need to ensure that users can run the HR application on all terminal servers onthe network.What should you do?()
You are the network administrator for the Beijing office of TestKing. A branchoffice is located in Cairo. The DNS servers in both locations run Windows Server2003.The network uses two DNS namespaces internally. They are namedpublishing.testking.com and testking.com. The locations of the primary nameservers are shown in the following table.The Beijing office contains some servers that are registered in the testking.com zoneand other that are registered in the publishing.testking.com zone. All computers inthe Beijing office are configured to use the local DNS server as their preferred DNSserver. The two offices are connected only by using a VPN through the Internet.Various network problems occasionally result in loss of connectivity between thetwo offices.Firewalls prevent the DNS servers in both offices from receiving queries from theInternet.You need to configure the DNS server in the Beijing office to allow successfulresolution of all queries from the Beijing office for names in thepublishing.testking.com namespace, even when the VPN link between the Beijingand Cairo offices fails.What should you configure on the DNS server in the Beijing office?()
You are the domain administrator for TestKing's Active Directory domain. Thedomain consists of four domain controllers named TestkingDC1, TestkingDC2,TestkingDC3, and TestkingDC4. TestkingDC1 and TestkingDC2 run Windows 2000Server and have the latest service pack installed. TestkingDC3 and TestkingDC4run Windows Server 2003. All client computers run Windows XP Professional andhave the latest service pack installed.You have a new client computer that you plan to use to perform domainadministration functions.You need to be able to manage Active Directory users and computers remotely.What should you do?()
You are the network administrator for TestKing. The network consists of a singleActive Directory domain.A member server named Testking1 runs Windows Server 2003 and SoftwareUpdate Services (SUS). You perform a full backup of Testking1 every night.Testking1 fails unexpectedly and cannot be restarted. As a result, automatic updatesare no longer distributed within the domain.You need to restore the functionality of Testking1.First, you install Windows Server 2003 on a new computer and configure it as amember server. You name the new computer Testking1 and install all IIScomponents that were installed on the original Testking1. Then you install SUS andobtain the most recent successful backup of the original Testking1.Which two additional actions should you perform?() (Each correct answer presentspart of the solution. Choose two.)
You are the network administrator for The network consists of asingle Active Directory domain named The domain contains WindowsServer 2003 computers and Windows XP Professional computers.All confidential company files are stored on a file server named TestKing1. Thewritten company security states that all confidential data must be stored andtransmitted in a secure manner. To comply with the security policy, you enableEncrypting File System (EFS) on the confidential files. You also add EFScertificates to the data decryption field (DDF) of the confidential files for the userswho need to access them.While performing network monitoring, you notice that the confidential files that arestored on TestKing1 are being transmitted over the network without encryption.You must ensure that encryption is always used when the confidential files onTestKing1 are stored and transmitted over the network.What are two possible ways to accomplish this goal?() (Each correct answer presentsa complete solution. Choose two)