Use the Backup utility to back up the system files and to create an Automated System Recovery (ASR) disk.
Use the Backup utility to back up the contents of all mounted drives.
Use the Backup utility to back up only the System State data.
Use the Copy command to copy C:/windows and its subfolders to a shared folder on the network.
Use the Xcopy command to copy C:/windows and its subfolders to a shared folder on the network.
第1题:
You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()
第2题:
You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain. You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully. To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster. You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster. You want to add the port rule to the nodes of the cluster. What should you do? ()
第3题:
You are the administrator of WXYZ.com Incorporation. Your company’s network consists of Windows 2000 Professional clients and Windows 2000 Servers. Users have started reporting that the network performance has degraded in recent times. Most of the Windows 2000 Professional clients on your network use the TCP/IP protocol to communicate with the Server. You want to increase network performance. Where do you change the binding order?()
第4题:
You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. The domain contains three domain controllers: DC1, DC2, and DC3. Each one hosts user data. DC1 experiences hard disk failure. You need to temporary restore the user data to DC2. Which type of restoration should you perform?()
第5题:
You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .The Xxx network has a mail server named XXX-EX01.What actions must you take to do an unattended installation of Exchange Server 2010 server on XXXEX01?()
第6题:
You work as a network administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.The ABC.com network contains a network attached printer named HPNet01.You share HPNet01 from a server named ABC_SR02 and publish the printer in Active Directory. How would you ensure that members of a group named PrinterAdmin can manage HPNet01?()
第7题:
You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .What actions must you take to use administrative delegation on a series of cmdlets?()
第8题:
You are the administrator of Etechsol.com Enterprises. Your company consists of a small 20-user network. Management has decided to upgrade all computers to Windows 2000. After having a closer examination of your company’s network, you realize that only half of the network interface cards are Net PC compliant. You decide to create Windows 2000 remote boot floppies. What executable is used for creating RIS boot disks for non-PXE compliant clients?()
第9题:
Install the MS Loopback adapter on the virtual machine.
Enable the Multipath I/O feature on the host server.
Install Windows Server virtualization Guest Integration Components on the virtual machine.
Install the MS Loopback adapter on the host server.
None of the above
第10题:
You should assign the network 172.16.0.0/16.
You should assign the network 172.16.0.0/17.
You should assign the network 172.16.0.0/18.
You should assign the network 172.16.0.0/19.
You should assign the network 172.16.0.0/20.
You should assign the network 172.16.0.0/22.
第11题:
It maximizes network throughput, while minimizing network latency.
It maximizes network throughput, as well as network latency.
It avoids the virtual switch stack and allows the virtual machine direct access to the actual network switch.
It prevents the virtual machine from accessing the network switch directly.
第12题:
Install a DHCP server.
Install a WINS server. Configure each computer to use WINS.
Create an Lmhost file on each computer.
Create a Hosts file on each computer.
第13题:
You work as a network administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.The network as a server named ABC_SR05 that provides DHCP services. You need to create a new IPv4 subnet on the network. The subnet must support a maximum of 5,000 hosts and must have a few unused addresses as possible. How would you configure DHCP to support this subnet?()
第14题:
You are the network administrator for The network consists of an internal network and a perimeter network. The internal network is protected by a firewall. The perimeter network is exposed to the Internet. You are deploying 10 Windows Server 2003 computers as Web servers. The servers will be located in the perimeter network. The servers will host only publicly available Web pages. You want to reduce the possibility that users can gain unauthorized access to the servers. You are concerned that a user will probe the Web servers and find ports or services to attack. What should you do?()
第15题:
You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. A firewall at Testking.com separates the internal network and a perimeter network. The perimeter networkcontains an Exchange Server 2010 Edge Transport server. You have received instructions from the CIO to install an internal Exchange Server 2010 with the followingcriteria: 1. The support of EdgeSync synchronizaiton and encrypted delivery of outbound e-mail messages to theEdge Transport server. 2. The minimization of the attack surface of the internal network. What should you do?()
第16题:
You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. A member server named TK1 contains a large number of files that are frequently accessed by network users. Users report unacceptable response times on TK1. You compare the current performance of TK1 to a system performance baseline that you created several weeks ago. You decide that TK1 needs a higher-performance network adapter. After you add the appropriate network adapter, users report satisfactory performance. You need to gather new server performance data so you can establish a new performance baseline for TK1. You open the Performance console. What should you do next?()
第17题:
You work as a network administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed. The Hyper-V server role is installed on a server named ABC_SR07.ABC_SR07 has a legacy network card that you use when creating a virtual machine named ABC_VT01. What is the first thing you should do when assigning bandwidth to ABC_VT01?()
第18题:
You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains an application server running Windows Server 2003. Users report intermittent slow performance when they access the application server throughout the day. You find out that the network interface on the application server is being heavily used during the periods of slow performance. You suspect that a single computer is causing the problem.You need to create a plan to identify the problem computer. What should you do?()
第19题:
You are the network administrator for The network consists of a single Active Directory domain All network servers run Windows Server 2003. Your network includes a shared folder named TestKingDocs. This folder must not be visible in a browse list. However, users report that they can see TestKingDocs when they browse for shared folders. How should you solve this problem?()
第20题:
It provides host-based,two-way network traffic filtering for a computer.
It provides host-based,one-way network traffic filtering for a computer.
It blocks unauthorized network traffic flowing into or out of the local computer.
It only blocks unauthorized network traffic flowing into the local computer.
It only blocks unauthorized network traffic flowing out of the local computer.
第21题:
Install the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.
Open Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.
Install Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.
Open Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.
第22题:
STP
GVRP
SNMP
VTP
DHCP
第23题:
ldifde
csvde
ntdsutil with the authoritative restore option
dsadd user
第24题:
Configure a HOSTS file.
Configure a LMHOSTS file.
Configure a WINS server database.
Configure a DHCP server address.
Configure at least one DNS address.