You are the domain administrator for TestKing's Active Directory domain. All
servers run Windows Server 2003. All client computers run Windows XP
Professional.
A newly installed server was added to your domain. You need to administer this
server remotely from your client computer.
You need to configure the new server to ensure that it can be administered
remotely.
What should you do?()
A. Install Terminal Server Licensing. Restart the server.
B. Modify the system properties for the server. Enable Remote Desktop for the server by selecting the Allow users to connect remotely to this system check box.
C. Start the Remote Access Connection Manager service and then configure the service to start automatically.
D. Modify your user account properties to enable you to connect to the terminal server
您可能感兴趣的试卷
你可能感兴趣的试题
You are the network administrator for TestKing. The network contains a Windows
Server 2003 computer named Testking1.
You back up the data folders on Testking1 by using the following schedule:
1. Normal backup every Monday.
2. Incremental backups every Tuesday, Wednesday, Thursday, and Friday.
After the backup on Friday is completed, a user accidentally deletes a file from a
data folder on Server1. The user reports that he modified the file in the past week,
but he does not know which day he modified the file. You do not know when the file
was last backed up.
You need to restore the latest copy of the file as quickly as possible.
What should you do?()
A.Open the backup log for each day. Begin by opening the log for Monday, and then work forward through the logs for each day of the week. In each log, search for a backup of the file. Restore the first backup that you find.
B.Open the backup log for each day. Begin by opening the log for Tuesday, and then work forward through the logs for each day of the week. In each log, search for a backup of the file. Restore the first backup that you find.
C.Open the backup log for each day. Begin by opening the log for Friday, and then work backward through the logs for each day of the week. In each log, search for a backup of the file. Restore the first backup that you find.
D.Restore the file from the Monday, Tuesday, Wednesday, Thursday, and Friday backups, in that order.
E.Restore the file from the Monday backup, and then from the Friday backup.
You are the network administrator for Active Directory domain. The
domain includes Windows Server 2003 domain controllers and Windows XP
Professional client computers.
A new administrator named Sandra is hired to assist you in deploying Windows XP
Professional to 100 new computers. Sandra installs the operating system on a new
computer named TestKing11.
However, when Sandra tries to log on to the domain from TestKing11, she is
unsuccessful. The logon dialog box does now allow her to view and select the domain
name.
You need to ensure that Sandra can log on to the domain from TestKing11.
What should you do?()
A. Enable the computer account for Testking11.
B. Configure TestKing11 as a member of the domain.
C. Add Sandra's user account to the Enterprise Admins group.
D. Add Sandra's user account to the Server Operators group.
You are the domain administrator for TestKing's Active Directory domain. The
domain consists of four domain controllers named TestkingDC1, TestkingDC2,
TestkingDC3, and TestkingDC4. TestkingDC1 and TestkingDC2 run Windows 2000
Server and have the latest service pack installed. TestkingDC3 and TestkingDC4
run Windows Server 2003. All client computers run Windows XP Professional and
have the latest service pack installed.
You have a new client computer that you plan to use to perform domain
administration functions.
You need to be able to manage Active Directory users and computers remotely.
What should you do?()
A. Install the Windows Support Tools from the Windows Server 2003 installation CD on your client computer.
B. Install the Adminpak.msi file from the Windows Server 2003 installation CD on your client computer.
C. Use the Help and Support Center tools on your client computer to connect to the domain controller that you need to manage.
D. Use Computer Management on your client computer to connect to the domain controller that you need to manage.
You are the network administrator for TestKing. The network consists of a single
Active Directory domain. All servers run Windows Server 2003.
The domain contains two domain controllers named Testking1 and Testking2. You
use a Windows XP Professional client computer named Client1.
In Active Directory, the domain administrator creates two new user accounts
named NetAdmin1 and AdminUser1. The NetAdmin1 account is a member of the
Domain Admins global group. The AdminUser1 account is a member of only the
Users local group. You assign the AdminUser1 logon account the Allow log on
locally user right in the Default Domain Controller Group Policy object (GPO).
A new written security policy states that user accounts that are member of the
Domain Admins global group should not be used to log on to the console of a
domain controller. It also states that administrative tasks should be performed by
using the Secondary Logon service.
You need to create a new computer account in Active Directory, and you must
comply with the new company security policy.
What should you do?()
A. Log on to Testking1 by using the AdminUser1 user account. Run the dsa.msc command.
B. Log on to Testking1 by using the NetAdmin1 user account. Run the dsa.msc command.
C. Log on to Client1 by using the AdminUser1 user account. Run the runas /user:netadmin1 dsa.msc
D. Log on to Client1 by using the NetAdmin1 user account. Run the runas /user:adminuser1 dsa.msc
You are the network administrator for The network consists of a
single Active Directory domain named The domain contains Windows
Server 2003 computers and Windows XP Professional computers.
All confidential company files are stored on a file server named TestKing1. The
written company security states that all confidential data must be stored and
transmitted in a secure manner. To comply with the security policy, you enable
Encrypting File System (EFS) on the confidential files. You also add EFS
certificates to the data decryption field (DDF) of the confidential files for the users
who need to access them.
While performing network monitoring, you notice that the confidential files that are
stored on TestKing1 are being transmitted over the network without encryption.
You must ensure that encryption is always used when the confidential files on
TestKing1 are stored and transmitted over the network.
What are two possible ways to accomplish this goal?() (Each correct answer presents
a complete solution. Choose two)
A. Enable offline files for the confidential files that are stored on TestKing1, and select the Encrypt offline files to secure data check box on the client computers of the users who need to access the files.
B. Use IPSec encryption between TestKing1 and the client computers of the users who need to access the confidential files.
C. Use Server Message Block (SMB) signing between TestKing1 and the client computers of the users who need to access the confidential files.
D. Disable all LM and NTLM authentication methods on TestKing1.
E. Use IIS to publish the confidential files. Enable SSL on the IIS server. Open the files as a Web folder.
You are the network administrator for TestKing. The network consists of a single
Active Directory domain. All network servers run Windows Server 2003.
A member server named TestkingA has a locally attached tape device. TestkingA
contains several folders and files that are encrypted by using Encrypting File
System (EFS).
You create a new user account for a new employee named Victoria. Victoria's user
account is member of the Users group only.
You need to ensure that Victoria can back up the encrypted folders and files on
TestkingA. Victoria must be assigned the minimum administrative privileges
needed to complete this task.
What should you do?()
A. Add Victoria's domain user account to the Administrators group.
B. Add Victoria's user account to the Backup Operators group.
C. Assign the Allow - Full Control permission on the encrypted folders and files to Victoria.
D. Designate Victoria as a recovery agent for the encrypted files.
You are the network administrator for TestKing. The network consists of a single
Active Directory domain. All network servers run Windows Server 2003. Half of the
client computers run Windows XP Professional, and the other half run Windows
NT 4.0 Workstation.
You install Terminal Services on three member servers named Testking1,
Testking2, and Testking3. Each server has a single Pentium III 600-Mhz CPU with
512 MB of RAM and a single-channel EIDE disk subsystem. You place all three
terminal servers in an organizational unit (OU) named Terminal Server. You link a
Group Policy Object (GPO) to the Terminal Server OU.
Several days after the installation, users report that the performance of all three
terminal servers is unacceptably slow. You discover that each server has at least 50
active sessions at once.
You need to improve the performance of all three terminal servers. You must
achieve this goal by using the minimum amount of administrative effort, without
upgrading any hardware.
What should you do?()
A. Log on to the console of each terminal server. In the RDP-Tcp connection properties, set the Maximum connections option to 35.
B. Edit the GPO to set the Limit number of connections policy to 35.
C. Modify all domain user accounts to set the When a session limit is reached or broken user property to End session.
D. Edit the GPO to enable the Remove Disconnected option from shutdown dialog policy
You are the administrator of a Windows Server 2003 computer named Testking1.
An application on Testking1 gradually uses more and more memory until it causes
Testking1 to stop responding. If you restart the application before it uses the
available memory, there is no interruption of user services.
You need to configure Testking1 to notify you when it encounters a low-memory
condition.
What should you do?()
A. Using Task Scheduler, schedule a repeating task that runs the tracert command.
B. Using Performance Logs and Alerts, configure an alert for the appropriate performance object.
C. Using System Monitor, configure the appropriate performance object to display.
D. Using Startup and Recovery Settings, configure Testking1 to send an Administrative Alert.
You are the network administrator for Test King. The network consists of a single
Active Directory domain named The domain contains Windows
Server 2003 computers and Windows XP Professional computers.
The Default Domain Policy has been modified by importing a security template file,
which contain several security settings.
A server named TestKing1 cannot run a program that us functioning on other
similarly configured servers. You need to find out whether additional security
settings have been added to the local security policy on TestKing1.
To troubleshoot, you want to use a tool to compare the current security settings on
TestKing1 against the security template file in order to automatically identify any
settings that might have been added to the local security policy.
Which tool should you run on TestKing1?()
A. Microsoft Baseline Security Analyzer (MBSA)
B. Security Configuration and Analysis console
C. gpresult.exe
D. Resultant Set of Policy console in planning mode
You are the network administrator for The network consists of a
single Active Directory domain named All network servers run
Windows Server 2003. Three thousand client computers run Windows 2000
Professional, and 1,500 client computers run Windows XP Professional.
A new employee named Dr King is hired to assist you in installing Windows XP
Professional on 150 new client computers.
You need to ensure that Dr King has only the minimum permissions required to add
new computer accounts to the domain and to own the accounts that he creates. Dr
King must not be able to delete computer accounts.
What should you do?()
A. Add Dr King's user account to the Server Operators group.
B. Add Dr King's user account to the Account Operators group.
C. Use the Delegation of Control Wizard to permit Dr King's user account to create new computer objects in the Computers container.
D. Create a Group Policy object (GPO) and link it to the domain. Configure the GPO to permit Dr King's user account to add client computers to the domain.
最新试题
You are the network administrator for The network consists of asingle Active Directory domain named The domain contains WindowsServer 2003 computers and Windows XP Professional computers.All confidential company files are stored on a file server named TestKing1. Thewritten company security states that all confidential data must be stored andtransmitted in a secure manner. To comply with the security policy, you enableEncrypting File System (EFS) on the confidential files. You also add EFScertificates to the data decryption field (DDF) of the confidential files for the userswho need to access them.While performing network monitoring, you notice that the confidential files that arestored on TestKing1 are being transmitted over the network without encryption.You must ensure that encryption is always used when the confidential files onTestKing1 are stored and transmitted over the network.What are two possible ways to accomplish this goal?() (Each correct answer presentsa complete solution. Choose two)
You are the network administrator for the Beijing office of TestKing. A branchoffice is located in Cairo. The DNS servers in both locations run Windows Server2003.The network uses two DNS namespaces internally. They are namedpublishing.testking.com and testking.com. The locations of the primary nameservers are shown in the following table.The Beijing office contains some servers that are registered in the testking.com zoneand other that are registered in the publishing.testking.com zone. All computers inthe Beijing office are configured to use the local DNS server as their preferred DNSserver. The two offices are connected only by using a VPN through the Internet.Various network problems occasionally result in loss of connectivity between thetwo offices.Firewalls prevent the DNS servers in both offices from receiving queries from theInternet.You need to configure the DNS server in the Beijing office to allow successfulresolution of all queries from the Beijing office for names in thepublishing.testking.com namespace, even when the VPN link between the Beijingand Cairo offices fails.What should you configure on the DNS server in the Beijing office?()
You are the network administrator for TestKing. The network consists of a singleActive Directory domain that contains five member servers running Windows 2000Server. All five servers have CD-ROM drives and floppy disk drives.You purchase a new computer that has a CD-RW drive. This computer does notcurrently have a floppy disk drive, but you plan to install one eventually.You install and configure Windows Server 2003 and Recovery Console on the newcomputer. You configure it as a member server named Testking6.Now you need to ensure that Testking6 can be restored in the event of an operatingsystem failure.Which two actions should you perform? ()(Each correct answer presents part of thesolution. Choose two.)
You are the network administrator for TestKing. The network consists of a singleActive Directory domain. All servers run Windows Server 2003.The domain contains two domain controllers named Testking1 and Testking2. Youuse a Windows XP Professional client computer named Client1.In Active Directory, the domain administrator creates two new user accountsnamed NetAdmin1 and AdminUser1. The NetAdmin1 account is a member of theDomain Admins global group. The AdminUser1 account is a member of only theUsers local group. You assign the AdminUser1 logon account the Allow log onlocally user right in the Default Domain Controller Group Policy object (GPO).A new written security policy states that user accounts that are member of theDomain Admins global group should not be used to log on to the console of adomain controller. It also states that administrative tasks should be performed byusing the Secondary Logon service.You need to create a new computer account in Active Directory, and you mustcomply with the new company security policy.What should you do?()
You are the network administrator for All network servers run Windows Server 2003.A member server named TESTKING1 hosts several hundred folders, which residein various locations on the server. TESTKING1 is configured to run a normalbackup of the folder every Saturday at 1:00 A.M.You discover that users edit the contents of the folders on Saturday and Sunday.You need to use the Backup utility to reschedule the backup job so that it runs everyMonday at 1:00 A.M. instead of every Saturday at 1:00 A.M. You must achieve thisgoal by using the minimum amount of administrative effort.What should you do?()
You are the network administrator for You manage a WindowsServer 2003 computer named TestKing1.There are multiple scheduled tasks configure on TestKing1. One task is a scheduledbackup job. You need to temporarily disable the backup job from running so thatyou can troubleshoot a problem. You must not interfere with any other scheduledtasks.You need to disable the scheduled backup job. You want to achieve this goal byusing the minimum amount of administrative effort.What should you do?()
You are the network administrator for TestKing. The network consists of a singleActive Directory domain. All network servers run Windows Server 2003.A member server named TestkingA has a locally attached tape device. TestkingAcontains several folders and files that are encrypted by using Encrypting FileSystem (EFS).You create a new user account for a new employee named Victoria. Victoria's useraccount is member of the Users group only.You need to ensure that Victoria can back up the encrypted folders and files onTestkingA. Victoria must be assigned the minimum administrative privilegesneeded to complete this task.What should you do?()
You are the network administrator for TestKing. The network contains a WindowsServer 2003 computer named Testking1.You back up the data folders on Testking1 by using the following schedule:1. Normal backup every Monday.2. Incremental backups every Tuesday, Wednesday, Thursday, and Friday.After the backup on Friday is completed, a user accidentally deletes a file from adata folder on Server1. The user reports that he modified the file in the past week,but he does not know which day he modified the file. You do not know when the filewas last backed up.You need to restore the latest copy of the file as quickly as possible.What should you do?()
You are the network administrator for All network severs runWindows Server 2003. Business hours are 9:00 A.M. to 5:00 P.M., Monday throughFridayA file server named TestKingB is configured to create a shadow copy every morningat 1:00 A.M. TestKingB hosts several shared folders. One shared folder has theconfiguration shown in the following table.For several months, users frequently access both databases in TestKingOrders. OneMonday morning, a user tells you that she needs to edit Receivables.mdb as itexisted at 5:00 P.M. on the previous Thursday.You need to modify TestKingB to enable the appropriate editing. You must ensurethat other users can continue to access current data without interruption.First, you map a drive to \\TestKingB\TestKingOrders.Which two additional actions should you perform? ()(Each correct answer presentspart of the solution. Choose two)
You are the network administrator for TestKing. All servers run Windows 2003. Allclient computers run Windows XP Professional.You log on to a server named Testking15 by using the local Administrator account.You start the installation of a new server application. After you start theinstallation, you return to your office, which is located in another building.You need to find out the status of the installation that is in progress on Testking15.What should you do?()