Create a new Web site named Tsweb.
Create a new virtual directory named Tsweb.
Install IIS.
Install the Remote Administration IIS subcomponent.
Install the Remote Desktop Web Connection IIS subcomponent.
第1题:
You are an administrator of Ezonexam.com's network. You want to perform. routine upgrades on your Windows 2000 Server computer. You use your non-administrator user account in the domain to logon to the server.
You want to upgrade all of the critical system files and patches on the server in the shortest possible time.
What should you do?
A.Use Windows Update.
B.Run System File Checker.
C.Log on as administrator and run Windows Update.
D.Log on as administrator and run System File Checker.
第2题:
You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet.Which PIN architecture is applicable in those environments?()
A.Campus
B.Teleworker
C.Branch
D.Data center
第3题:
You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()
第4题:
You are a network administrator for your company. All servers run Windows Server 2003. You manage a server that functions as a file server. The data volume on the server is mirrored. Each physical disk is on a separate controller. One of the hard disks that contains the data volume fails. You discover that the failure was caused by a faulty SCSI controller. You replace the SCSI controller. You need to restore the data volume to its previous state. You need to achieve this goal by using the minimum amount of administrative effort. What should you do? ()
第5题:
Your environment includes multiple Windows Server 2008 R2 Hyper-V servers. You manage the virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You plan to place multiple Hyper-V servers in the perimeter network (also known as DMZ). You need to be able to manage the Hyper-V servers by using VMM. Which two actions should you perform for each server in the perimeter network?()
第6题:
You are the network administrator for Company. Company has recently upgraded its network to a 100Mbps standard and you are now in the process of removing all the old adapter and installing a new Token Ring network adapter into the Windows 2000 Professional computer. On the first computer you install the new hardware and configure the static TCP/IP protocol settings to be the same as they were for the previously installed network adapter. When you restart the computer, however, you cannot access the network. You try to ping your network adapter's TCP/IP address locally. You receive the following error message: "Request timed out." You want to enable the computer to communicate on the new network. What should you do? ()
第7题:
You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains an application server running Windows Server 2003. Users report intermittent slow performance when they access the application server throughout the day. You find out that the network interface on the application server is being heavily used during the periods of slow performance. You suspect that a single computer is causing the problem.You need to create a plan to identify the problem computer. What should you do?()
第8题:
You are the network administrator for your company. The network consists of a single Active Directory domain. User and group objects for the sales department are located in an organizational unit (OU) named Sales. Peter and Mary are administrators for your company. Peter is responsible for managing Sales user objects. Mary is responsible for managing Sales group objects. You need to delegate Peter and Mary control over only the objects for which they are responsible. What should you do?()
第9题:
Automated System Recovery (ASR)
normal
primary
authoritative
第10题:
STP
GVRP
SNMP
VTP
DHCP
第11题:
Grant Allow - Print permission to the DTAdmins group. Grant Allow - Manage Documents permission to your user account and to Stephen’s user account.
Grant Allow - Print permission to the DTAdmins group. Grant Allow - Manage Documents and Allow - Manage Printers permissions to your user account and to Stephen’s user account.
Grant Allow - Manage Documents permission to the DTAdmins group. Grant Allow - Manage Printers permission to your user account and to Stephen’s user account.
Grant Allow - Print permission to the DTAdmins group. Remove Allow - Manage Documents permission from the Creator Owner group. Grant Allow - Manage Printers permission to your user account and to Stephen’s user account.
第12题:
Use the RUNAS feature to run the at /delete command as the Server1/Administrator account.
Log on by using your Administrator account and run the ntbackup /D command.
Log on by using your Administrator account and run the schtasks /delete command.
Use the RUNAS feature to run the taskkill command as the Server1/Administrator account.
第13题:
Network management helps you to(66)the strengths and weaknesses of your network, as well as determine any configuration changes that may be necessary. Any controlled changes to your network and its components-especially configurations, software and(67), can have an effect on its overall efficiency. To maintain control, you need the tools and knowledge to manage all activity that has the potential to affect your(68).
A.see
B.know
C.monitor
D.control
第14题:
You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()
第15题:
You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()
第16题:
You are a network administrator for your company. You manage a computer named Server6 that runs Windows Server 2003 with the default settings.You install Terminal Services on Server6. You attempt to connect to Server6 by using the URLhttp://Server6/Tsweb. You cannot connect to Server6. You need to be able to access Terminal Services on Server6 by using Internet Explorer 6.0.Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two.)
第17题:
You are the network administrator for ExamSheet.net. You install Windows 2000 Professional on your portable computer. You use a docking station for your portable computer when you are in the office. You install a ISA-based network adapter in your docking station. You insert your computer into the docking station and start the computer. The network adapter is not detected during the startup process. You obtain a disk that contains the supported driver from the network adapter manufacturer. You want to allow Windows 2000 Professional to use the network adapter. What should you do?()
第18题:
You are a network administrator for ExamSheet.net's Windows 2000 network. Your computer is installed with Windows 2000 Professional. You schedule a task that will copy files from your computer to another computer on the network. You notice that the task is not completing correctly. You manually copy the files from your computer to other computers on the network without any errors. You verify that all of your other tasks are working correctly. You want the task to complete successfully. What should you do? ()
第19题:
You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm. Immediately send a notification to a network administrator that the infected computer needs to be repaired. What should you do?()
第20题:
You are a network administrator for your company. You currently automate backups of the System State data on the servers in your network by using NTBackup. Your manager instructs you to document the procedure for restoring a server from a backup of the System State data.You need to select the correct method for performing a restoration of a backup of the System State data.What should you do?()
第21题:
Enable the Require domain controller to unlock policy.
Set the Number of previous logons to cache policy to 0.
Remove all user and group accounts from the Log on locally user right.
Remove all user and group accounts from the Access this computer from the network user right.
第22题:
msi
mst
zap
zip
第23题:
Use the RUNAS feature to run the at /delete command as the Server1/Administrator account.
Log on by using your Administrator account and run the ntbackup /D command.
Log on by using your Administrator account and run the schtasks /delete command.
Use the RUNAS feature to run the taskkill command as the Server1/Administrator account.
第24题:
Automated System Recovery (ASR)
normal
primary
authoritative