You are a systems administrator responsible for configuring a Windows Server 2008 SMTP server. Yourorganization is currently using the default SMTP virtual server for sending order notifications from a single Web application called ContosoOrderManagement. Recently, you have noticed that a largenumber of messages have been sent to the SMTP virtual server from other computers and users. Which two methods can you use to prevent unauthorized access to the SMTP server?()
第1题:
How do you know the system loading PAK version
第2题:
You are evaluating the implementation of two Hyper-V hosts for the Web servers. You need to design a solution that will move the Web servers automatically between the Hyper-V hosts based on the physical resources available. Which software should you include in the design?()
第3题:
You have a computer that runs Windows 7. Windows Backup is configured to store backups on an externaldrive. You create a new NTFS volume on the computer. You need to configure Windows Backup to includethe files on the new volume as part of regularly scheduled backups. What should you do?()
第4题:
You have a computer that runs Windows 7. You perform regular data backups and system image backups.The computer experiences a hard disk failure. You replace the failed hard disk. You need to recover thecomputer to the previous Windows 7 environment. You start the computer from the Windows 7 installationmedia. Which recover option should you select?()
第5题:
You need to ensure that you can recover system configuration and data if your computer hard disk fails. What should you do? ()
第6题:
Run Disk Cleanup for Programs and Features.
Run Disk Cleanup for System Restore and Shadow Copies.
From the System Protection Restore settings, select Turn off System Restore.
From the System Protection Restore settings, select Only restore previous versions of files.
第7题:
Control Panel >> Data Sources (ODBC).
Control Panel >> System Tools >> Shared Folders.
Computer Management >> System Tools >> System Information.
Computer Management >> System Tools >> Shared Folders >> Open Files.
Computer Management >> System Tools >> Shared Folders >> Sessions.
Computer Management >> System Tools >> Shared Folders >> Shares.
第8题:
From Disk Management, shrink the boot partition.
From Disk Management, shrink the system partition.
From System, modify the Advanced system settings.
From System, modify the System protection settings.
第9题:
user@router> request system storage cleanup
user@router> show system storage
user@router> request system storage cleanup dry-run
user@router> show system storage detail
第10题:
Create a NTFS partition.
Create a mirrored volume.
Create a system repair disc.
Log on to the computer by using a different account.
第11题:
request system software add
request system software downgrade
request system software replace
request system software rollback
第12题:
You are the administrator of your Windows 2000 Professional computer. You share severalfolders on your computer, which are accessible to all the users on your company’s network. You want to ensure that you have correctly assigned the appropriate permissions to all the shares.Where can you view all the shares in use on your computer, so as to verify the permissions as quickly as possible? ()
第13题:
You have a computer that runs Windows 7. You need to configure system image backups to meet thefollowing requirements: Automatically create a system image every day without user intervention Retain multiple copies of the system image. Which type of backup destination should you use?( )
第14题:
You need to identify a type that meets the following criteria: Is always a number. Is not greater than 65,535. Which type should you choose?()
第15题:
You work as the exchange administrator at TestKing.com. The TestKing.com network contains anExchange Server 2010 Organization. The Active Directory Rights Management Services (AD RMS) isinstalled within the organization. You receive an instruction from the CIO to recommend a messaging security solution that will make surethat a disclaimer is applied to all e-mail messages and that all e-mail messages from the Financedepartment is unable to be printed. What should you do?()
第16题:
From Disk Management, convert the new disk to a dynamic disk.
From System Properties, configure the System Protection settings.
From System and Security, enable BitLocker Drive Encryption (BitLocker).
From the properties of the new drive, create a share and modify the caching settings.
第17题:
Run the following command: ntbackup.exe backup /F {FileName}
Run the following command: ntbackup.exe backup systemstate /F {FileName}
In Control Panel, open System, and configure the Startup and Recovery settings on the Advanced tab.
Use NTBackup interactively.
第18题:
Use the at command to schedule a weekly job to back up the boot partition.
Use the at command to schedule a weekly job to run the system file checker.
Use Windows backup to schedule a backup of the System State Data.
Use Windows backup to schedule a backup of the system partition and the boot partition.
第19题:
Create a backup of the system partition.
Create a backup of the boot partition.
Create a backup of the System State.
Create an Automated System Recovery (ASR) backup.
Create a backup of the Systemroot/System32/Config folder.
第20题:
Microsoft System Center Operations Manager
Microsoft System Center Virtual Machine Manager
Microsoft System Center Data Protection Manager
Microsoft System Center Configuration Manager
第21题:
user@router# show system services
user@router> show configuration services
user@router# show configuration system services
user@router# show system login
第22题:
create a plan directive in the SYS_GROUP
create the pending area for the consumer group
activate the provided SYSTEM_PLAN in Resource Manager
set the TIMED_STATISTICS parameter to TRUE in the parameter file
set the execution time limit for all users, except SYS and SYSTEM, in their profiles