Perform a full normal backup for on-site storage on Friday night after business hours. Perform a full copy backup for off-site storage on Saturday night after the Friday backup is complete.
Perform a full normal backup for on-site storage on Friday night after business hours. Perform another full normal backup for off-site storage on Saturday night after the Friday backup is complete.
Perform a full copy backup for on-site storage on Friday night after business hours. Perform a full copy backup for off-site storage on Saturday night after the Friday backup is complete.
Perform differential backups on Sunday, Monday, Tuesday, Wednesday, and Thursday nights after business hours.
Perform incremental backups on Sunday, Monday, Tuesday, Wednesday, and Thursday nights after business hours.
Perform incremental backups on Sunday, Tuesday, and Thursday nights after business hours. Perform differential backups on Monday and Wednesday nights after business hours.
第1题:
As an experienced technician, you are responsible for infrastructure design and global configuration changes. You are asked to deploy a Voice over Wireless LAN for your company. If the cells have the same channel, the separation between them should be:()
A.19dbm
B.10dbm
C.67dbm
D.86dbm
第2题:
Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2008 R2. All servers run Windows Server 2008 R2. A corporate security policy requires complex passwords for user accounts that have administrator privileges. You need to design a strategy that meets the following requirements: èEnsures that administrators use complex passwords èMinimizes the number of servers required to support the solution What should you include in your design?()
第3题:
You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()
第4题:
You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains 50 application servers that run Windows Server 2003. The security configuration of the application servers is not uniform. The application servers were deployed by local administrators who configured the settings for each of the application servers differently based on their knowledge and skills. The application servers are configured with different authentication methods, audit settings, and account policy settings. The security team recently completed a new network security design. The design includes a baseline configuration for security settings on all servers. The baseline security settings use the Hisecws.inf predefined security template. The design also requires modified settings for servers in an application role. These settings include system service startup requirements, renaming the administrator account, and more stringent account lockout policies. The security team created a security template named Application.inf that contains the modified settings. You need to plan the deployment of the new security design. You need to ensure that all security settings for the application servers are standardized, and that after the deployment, the security settings on all application servers meet the design requirements. What should you do? ()
第5题:
You are the network administrator for ExamSheet.net. You install Windows 2000 Professional on your portable computer. You use a docking station for your portable computer when you are in the office. You install a ISA-based network adapter in your docking station. You insert your computer into the docking station and start the computer. The network adapter is not detected during the startup process. You obtain a disk that contains the supported driver from the network adapter manufacturer. You want to allow Windows 2000 Professional to use the network adapter. What should you do?()
第6题:
You are a network administrator for ExamSheet.net's Windows 2000 network. Your computer is installed with Windows 2000 Professional. You schedule a task that will copy files from your computer to another computer on the network. You notice that the task is not completing correctly. You manually copy the files from your computer to other computers on the network without any errors. You verify that all of your other tasks are working correctly. You want the task to complete successfully. What should you do? ()
第7题:
You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm. Immediately send a notification to a network administrator that the infected computer needs to be repaired. What should you do?()
第8题:
You are a network administrator for your company. You currently automate backups of the System State data on the servers in your network by using NTBackup. Your manager instructs you to document the procedure for restoring a server from a backup of the System State data.You need to select the correct method for performing a restoration of a backup of the System State data.What should you do?()
第9题:
The size of the card.
The right color scheme.
A unique design of the card.
A friendlier logo of your company.
第10题:
STP
GVRP
SNMP
VTP
DHCP
第11题:
Import Baseline1.inf into the Default Domain Policy Group Policy object (GPO).
Create a task on each application server that runs Security and Configuration Analysis with Baseline1.inf every day.
Create a task on each application server that runs the secedit command with Baseline1.inf every day.
Create a startup script in the Default Domain Policy Group Policy object (GPO) that runs the secedit command with Baseline1.inf.
第12题:
Use the RUNAS feature to run the at /delete command as the Server1/Administrator account.
Log on by using your Administrator account and run the ntbackup /D command.
Log on by using your Administrator account and run the schtasks /delete command.
Use the RUNAS feature to run the taskkill command as the Server1/Administrator account.
第13题:
You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()
第14题:
You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()
第15题:
You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. TestKing.com is configured to run an exchange 2010 environment. You are planning to design the installation of numerous Mailbox servers. TestKing.com Service LevelAgreement (SLA) requires the following: * The servers need to support 1,500 concurrent connections to mailboxes.* The servers need to maintain a latency of less than 20 milliseconds. You ensure deployment success you need to ensure that your design comply with the Service LevelAgreement (SLA) of TestKing.com. What should you do?()
第16题:
You are a network administrator for your company. All domain controllers run Windows Server 2003. The network contains 50 Windows 98 client computers, 300 Windows 2000 Professional computers, and 150 Windows XP Professional computers. According to the network design specification, the Kerberos version 5 authentication protocol must be used for all client computers on the internal network. You need to ensure that Kerberos version 5 authentication is used for all client computers on the internal network. What should you do? ()
第17题:
You are the network administrator for Company. Company has recently upgraded its network to a 100Mbps standard and you are now in the process of removing all the old adapter and installing a new Token Ring network adapter into the Windows 2000 Professional computer. On the first computer you install the new hardware and configure the static TCP/IP protocol settings to be the same as they were for the previously installed network adapter. When you restart the computer, however, you cannot access the network. You try to ping your network adapter's TCP/IP address locally. You receive the following error message: "Request timed out." You want to enable the computer to communicate on the new network. What should you do? ()
第18题:
You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains an application server running Windows Server 2003. Users report intermittent slow performance when they access the application server throughout the day. You find out that the network interface on the application server is being heavily used during the periods of slow performance. You suspect that a single computer is causing the problem.You need to create a plan to identify the problem computer. What should you do?()
第19题:
You are the network administrator for your company. The network contains a single Active Directory domain. All computers on the network are members of the domain. All domain controllers run Windows Server 2003. You are planning a public key infrastructure (PKI). The PKI design documents for your company specify that certificates that users request to encrypt files must have a validity period of two years. The validity period of a Basic EFS certificate is one year. In the Certificates Templates console, you attempt to change the validity period for the Basic EFS certificate template. However, the console does not allow you to change the value. You need to ensure that you can change the value of the validity period of the certificate that users request to encrypt files. What should you do? ()
第20题:
Automated System Recovery (ASR)
normal
primary
authoritative
第21题:
Enable the Require domain controller to unlock policy.
Set the Number of previous logons to cache policy to 0.
Remove all user and group accounts from the Log on locally user right.
Remove all user and group accounts from the Access this computer from the network user right.
第22题:
msi
mst
zap
zip
第23题:
Use the RUNAS feature to run the at /delete command as the Server1/Administrator account.
Log on by using your Administrator account and run the ntbackup /D command.
Log on by using your Administrator account and run the schtasks /delete command.
Use the RUNAS feature to run the taskkill command as the Server1/Administrator account.
第24题:
Automated System Recovery (ASR)
normal
primary
authoritative