On a Windows network, users are reporting that they cannot access any network resources. The users can ping the IP address and connect to the network resource using the IP address. Which of the following is the cause of the problem?()
第1题:
You must configure access to the corporate network for employees using a client access method. Users require IPsec tunneling to protected resources and an 802.1X supplicant. Users will access the network using Windows platforms.Which two client access methods would support these requirements?()
A. Junos Pulse
B. Java Agent
C. Odyssey Access Client
D. Native 802.1X supplicant
第2题:
You are the network administrator for .Your network consists of a single Active Directory domain named . The Default Domain Group Policy object (GPO) uses all default settings. The network contains five servers running Windows Server 2003 and 800 client computers. Half of the client computers are portable computers. The other half are desktop computers. Users of portable computers often work offline, but users of desktop computers do not. You install Windows XP Professional on all client computers with default settings. Then you configure user profiles and store them on the network. Some users of portable computers now report that they cannot log on to their computers. Other users of portable computers do not experience this problem. You need to ensure that all users of portable computers can log on successfully,whether they are working online or offline. What should you do?()
第3题:
Your network contains a public computer that runs Windows 7. Multiple users log on to the computer byusing a local user account named User1. Users report that they can log on to some secure Web sites byusing credentials that were saved by other users. You need to prevent forms-based credentials from beingsaved on the computer. What should you do?()
第4题:
You are the administrator of Company.com’s network. Your network has 100 Windows 2000 Professional computers and 10 Windows 2000 Server computers. Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. In addition, the network servers is configured with disk quotas for the NTFS volume that contains the home folders. All users have a default limit of 100 MB, and the option to deny space to users who exceed their limit has been enabled. A user reports that he cannot save any files to his home folder. He also cannot update files in his home folder. When he attempts to save files to the folder, he receives the following error message: “Insufficient disk space.” Other users are not experiencing this problem with their home folders. You want to enable the user to save files in his home folder. What should you do?()
第5题:
You are the network administrator for Testking.com. The network consists of a single Active Directory domain testking.com. The functional level of the domain is Windows 2000 native. Some network servers run Windows 2000 Server, and others run Windows Server 20003. All users in your accounting department are members of an existing global distribution group named Global-1. You create a new network share for the accounting users. You need to enable the members of Global-1 to access the file share. What should you do?()
第6题:
Your network contains a Windows Server 2008 R2 server that functions as a file server. All users have laptop computers that run Windows 7. The network is not connected to the Internet. Users save files to a shared folder on the server. You need to design a data provisioning solution that meets the following requirements: èUsers who are not connected to the corporate network must be able to access the files and the folders in the corporate network. èUnauthorized users must not have access to the cached files and folders. What should you do?()
第7题:
You are the network administrator for The network consists of a single Active Directory domain named Some client computers run Windows NT 4.0 Workstation. Others run Windows 2000 Professional, and the rest run Windows XP Professional. Users in the accounting department require a shared folder for their own use only. The accounting users must be able to read, edit, and delete files in the shared folder. You create the shared folder and use default share permissions. You assign the Allow - Full Control NTFS permission to members of the Administrators group. You assign the Allow - Modify NTFS permission to the accounting users. However, accounting users report that they cannot access the shared folder. How should you solve this problem?()
第8题:
You are the network administrator for The network consists of a single Active Directory domain All network servers run Windows Server 2003. Your network includes a shared folder named TestKingDocs. This folder must not be visible in a browse list. However, users report that they can see TestKingDocs when they browse for shared folders. How should you solve this problem?()
第9题:
Require authentication by a domain controller to unlock the client computer.
Cache zero interactive logons.
Cache 50 interactive logons.
Grant the Log on locally user right to the Users group.
第10题:
Junos Pulse
Java Agent
Odyssey Access Client
Native 802.1X supplicant
第11题:
Use Synchronization manager to configure synchronization to occur when users are connected to the LAN connection.
Use Windows Explorer to grant Sales Staff Special access for the reports on the network share.
Use Windows Explorer to enable automatic caching for documents on the network share.
Create a new share for the Sales users only and enable caching on that share only.
第12题:
Instruct all users to configure a calendar subscription that has an update interval of 15 minutes.
Instruct all users to perform calendar synchronization for all shared calendar subscriptions.
Instruct all users to map a network drive to the folder that holds the shared calendar. Import the .ics file for the shared calendar.
Use e-mail messages to deploy the .ics file for the shared calendar to each user. Instruct each user to import the .ics file that is attached to the e-mail message.
第13题:
You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()

A.A
B.B
C.C
D.D
第14题:
You are the administrator of WXYZ.com Incorporation. Your company’s network consists of Windows 2000 Professional clients and Windows 2000 Servers. Users have started reporting that the network performance has degraded in recent times. Most of the Windows 2000 Professional clients on your network use the TCP/IP protocol to communicate with the Server. You want to increase network performance. Where do you change the binding order?()
第15题:
You use a Windows 2000 Professional computer.You are responsible for maintaining Company’s client contact list. You want other users on the networkto be able to read the client contact list. You use Windows Explorer to share the client contact list folderon the network.You want users touse the most current available information when contacting clients. You want toprevent users from enabling offline access for the network share that contains the client contact list.What should you do?()
第16题:
You are the network administrator for ExamSheet. Computers on your network run Windows 2000 Professional, Windows NT Workstation 4.0 and Windows 98. Ten Windows 2000 Professional computers are located in the research department. These computers contain highly confidential information. You want the 10 Windows 2000 Professional computers to be able to communicate only with other Windows 2000 computers. What should you do?()
第17题:
You are the network administrator for ExamSheet.net. You administer ExamSheet’s Windows 2000 network. Computers on the network run Windows 2000 Professional, Windows NT Workstation 4.0 and Windows 98. Ten Windows 2000 Professional computers are located in the research department. The users of the Windows 2000 Professional computers run legacy applications which are not certified for Windows 2000. These applications will not run for those users who only have User rights on the computers. You want to uniformly grant the users of these computers with the least possible administrative rights and still allow them to run the applications. What should you do? ()
第18题:
Your company network consists of a single Active Directory domain named testking.com. The functional level of the domain is Windows 2000 Native. The network contains 20 member servers running Windows 2000 and 5 domain controllers running Windows Server 2003. The user accounts for employees in the Finance department are members of a global distribution group named Finance_Users. You create a shared folder named Finance_Docs on a Windows 2000 member server. You need to enable the Finance users to access the Finance_Docs folder. What should you do?()
第19题:
Your network contains two servers that run the Server Core installation of Windows Server 2008 R2. The two servers are part of a Network Load Balancing cluster. The cluster hosts a Web site. Administrators use client computers that run Windows 7. You need to recommend a strategy that allows the administrators to remotely manage the Network Load Balancing cluster. Your strategy must support automation. What should you recommend?()
第20题:
All servers on your company’s network run Windows Server 2008 R2. All users have thin client computers. You need to recommend a virtualization solution that allows users to use applications that run only on Windows 7. Which technology should you recommend?()
第21题:
Use Windows Explorer to receive the offline files
Using the Windows Explorer, disable the cache for the reports on the network share
Use the Windows NT explorer to grant the special access for the reports on the network share
Use the synchronization manager to configure synchronization not to occur when users are connected to the LAN connection.
第22题:
Configure a Windows Connect Now Group Policy.
Configure a Wireless Network (IEEE 802.11) Policy.
Delete the rogue network from the Network and Sharing Center on each computer.
Create a Connection Manager Administration Kit (CMAK) profile and deploy it to all users.
第23题:
Configure the system event log to Do not overwrite.
In IAS, in Remote Access Logging, enable the Authentication requests setting.
Configure the Remote Access server to Log all events.
Create a custom remote access policy and configure it for Authentication-Type.
第24题:
Decrease the default user quota limit.
Raise the functional level of the domain to Windows Server 2003.
Purchase additional client access licenses.
Move TestKingInfo to one of the servers.