单选题You are the network administrator for Your network contains a single Active Directory domain named All network servers run Windows Server 2003. One of your application servers runs proprietary software. This server stops responding. After help desk tec

题目
单选题
You are the network administrator for Your network contains a single Active Directory domain named All network servers run Windows Server 2003. One of your application servers runs proprietary software. This server stops responding. After help desk technicians restart the server, it appears to run normally. Two weeks later, the same server stops responding again. You need to gather and store data to diagnose the problem. What should you do?()
A

Open Event Viewer and review the security logs on the server.

B

Create a System Monitor log that uses memory counters and gather data over time.

C

Open Task Manager and gather memory usage statistics.

D

Modify Boot.ini to use /maxmem:1536.


相似考题
更多“You are the network administrator for Your network contains”相关问题
  • 第1题:

    You are a network administrator for Ezonexam.com's Windows 2000 network.

    Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers.

    Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Jack Bauer leaves the company. You grant her manager the Full Control NTFS permission to Jack's home folder. When the manager attempts to open any of the files, she receives the following error message: "Access is denied."

    What should you do?

    A.Use System File Checker (SFC) to decrypt the file.

    B.Log on the network as the Recovery Agent. Decrypt the files for the manager.

    C.Log on the network as the administrator. Use the cipher command to decrypt the files.

    D.Log on the network as a member of the Backup Operators group. Decrypt the files for the manager.


    正确答案:B
    解析:Explanation: A user has asked for EFS to be configured on his or her Windows 2000 Professional computer. You need to enable the Recovery Agent on the computer to be able to unencrypt files if the user's private key has been deleted. In this case Jack left the company and his manager needs access to the files. Even with Full Control NTFS permissions she could not get access, thus you need to make use of the recovery agent to decrypt the files for the manager. Remember that the user who encrypts a file is the only user who can access the file (except for the recovery agent).

    Incorrect answers:
    A: System file checker (sfc.exe) is a command-line utility that scans and verifies the versions of all protected system files. System file checker (sfc.exe) will discover that a protected file has been overwritten and replace it with the correct version of the file from the %systemroot%\system32\dllcache folder. This is not going to grant the manager access to the files in this case.

    C: The Cipher utility allows you to encrypt files and folders as well as check the encryption statistics. But this is not what should be used in this scenario.

    D: Membership in the Backup Operators group enables a user to back up and restore file systems regardless of permissions, ownership, encryption settings, or audit settings. Membership in this group enables you to assign users the authority to back up file systems without having to assign the users specific permissions to access the resources. However, this is not what is required here.

  • 第2题:

    You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()

    • A、STP
    • B、GVRP
    • C、SNMP
    • D、VTP
    • E、DHCP

    正确答案:D

  • 第3题:

    You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()

    • A、Campus
    • B、Teleworker
    • C、Branch
    • D、Data center

    正确答案:C

  • 第4题:

    You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster.   The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template.   You need to implement protective measures against the cluster’s most significant security vulnerability.   What should you do?  ()

    • A、 Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.
    • B、 Use packet filtering on all inbound traffic to the cluster.
    • C、 Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.
    • D、 Use intrusion detection on the perimeter network.

    正确答案:B

  • 第5题:

    Your network contains a Network Policy Server (NPS) named Server1.NPS1 provides authentication for all of the VPN servers on the network.You need to track the usage information of all VPN connections.Which RADIUS attribute should you log?()

    • A、Acct-Session-Id
    • B、Acct-Status-Type
    • C、Class
    • D、NAS-Identifier

    正确答案:C

  • 第6题:

    You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains an application server running Windows Server 2003.   Users report intermittent slow performance when they access the application server throughout the day. You find out that the network interface on the application server is being heavily used during the periods of slow performance. You suspect that a single computer is causing the problem.You need to create a plan to identify the problem computer.   What should you do?()

    • A、 Monitor the performance monitor counters on the application server by using System Monitor.  
    • B、 Monitor the network traffic on the application server by using Network Monitor.
    • C、 Monitor network statistics on the application server by using Task Manager.
    • D、 Run network diagnostics on the application server by using Network Diagnostics.

    正确答案:B

  • 第7题:

    Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest. The forest contains a single domain.  You plan to deploy 10 Edge Transport servers on the perimeter network.  You need to recommend a solution for the Edge Transport server deployment. The solution must meet the following requirements: .Allow administrators to apply a single security policy to all Edge Transport servers .Reduce the administrative overhead that is required to manage servers .Minimize the attack surface of the internal network  What should you recommend?()

    • A、Implement Network Policy and Access Services (NPAS).
    • B、Implement Active Directory Federation Services (AD FS).
    • C、Create a new Active Directory domain in the internal forest, and then join all EdgeTransport servers to the new domain.
    • D、Create an Active Directory forest in the perimeter network, and then join all Edge Transport servers to the new domain.

    正确答案:D

  • 第8题:

    单选题
    You are the network administrator for your company. The network consists of a single Active Directory domain. All network servers run Windows Server 2003. The domain contains three domain controllers: DC1, DC2, and DC3. Each one hosts user data. DC1 experiences hard disk failure. You need to temporarily restore the user data to DC2. Which type of restoration should you perform? ()
    A

    Automated System Recovery (ASR)

    B

    normal

    C

    primary

    D

    authoritative


    正确答案: B
    解析: 暂无解析

  • 第9题:

    单选题
    Your network contains an internal network and a perimeter network that are separated by a firewall. The perimeter network contains an Exchange Server 2010 Edge Transport server.  You plan to deploy an internal Exchange Server 2010 organization that meets the following requirements:.Support EdgeSync synchronization .Support encrypted delivery of outbound e-mail messages to the Edge Transport server .Minimize the attack surface of the internal network  Which TCP ports should you allow from the internal network to the perimeter network?()
    A

    3389 and 25

    B

    3389 and 636

    C

    50636 and 25

    D

    50636 and 135


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    You are the network administrator for . The network consists of a single Active Directory domain. All domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. TestKing acquires a subsidiary. You receive a comma delimited file that contains the names of all user accounts at the subsidiary. You need to import these accounts into your domain. Which command should you use?()
    A

    ldifde

    B

    csvde

    C

    ntdsutil with the authoritative restore option

    D

    dsadd user


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    You are a network administrator for your company. The network contains a Windows Server 2003 computer named Print1 that functions as a print server. Print1 contains a printer named MarketingPrinter. Users report that print jobs they submit to the MarketingPrinter take a long time to print. You immediately examine Print1 and conclude that the server is performing at acceptable levels. You need to identify the problem. What should your next step be? ()
    A

    Use Task Manager to monitor processor and memory performance.

    B

    Use Windows Explorer to monitor the size of the Windows/System32/Spool/prtprocs folder.

    C

    Use System Monitor to view the Print Queue/Jobs counter.

    D

    Use System Monitor to view the Print Queue/Enumerate Network Printer Calls counter.


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers.   You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized.  You need to configure Server1 to log the details of access attempts by VPN users.   What should you do?  ()
    A

     Configure the system event log to Do not overwrite.

    B

     In IAS, in Remote Access Logging, enable the Authentication requests setting.

    C

     Configure the Remote Access server to Log all events.

    D

     Create a custom remote access policy and configure it for Authentication-Type.


    正确答案: C
    解析: 暂无解析

  • 第13题:

    Your wireless network is not listed in the Connect to a network window of your computer. You need to connect to your wireless network.Which two actions should you perform?()

    A.A

    B.B

    C.C

    D.D

    E.E


    参考答案:C, D

  • 第14题:

    You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()

    • A、Repeater
    • B、Wireless router
    • C、Hub
    • D、Wireless network adapter

    正确答案:D

  • 第15题:

    Your network contains an internal network and a perimeter network that are separated by a firewall. The perimeter network contains an Exchange Server 2010 Edge Transport server.  You plan to deploy an internal Exchange Server 2010 organization that meets the following requirements:.Support EdgeSync synchronization .Support encrypted delivery of outbound e-mail messages to the Edge Transport server .Minimize the attack surface of the internal network  Which TCP ports should you allow from the internal network to the perimeter network?()

    • A、3389 and 25
    • B、3389 and 636
    • C、50636 and 25
    • D、50636 and 135

    正确答案:C

  • 第16题:

    You are the network administrator for ExamSheet.net.  You install Windows 2000 Professional on your portable computer. You use a docking station for your portable computer when you are in the office. You install a ISA-based network adapter in your docking station. You insert your computer into the docking station and start the computer. The network adapter is not detected during the startup process. You obtain a disk that contains the supported driver from the network adapter manufacturer. You want to allow Windows 2000 Professional to use the network adapter. What should you do?()

    • A、Restart the computer in the docking station.
    • B、Run the Add/Remove Hardware wizard.
    • C、Use Device Manager to scan for hardware changes.
    • D、Copy the network adapter driver to the Winnt/Driver Cache/i386 folder.
    • E、Install the new network adapter driver.

    正确答案:B,E

  • 第17题:

    You are a network administrator for ExamSheet.net's Windows 2000 network.  Your computer is installed with Windows 2000 Professional. You schedule a task that will copy files from your computer to another computer on the network. You notice that the task is not completing correctly. You manually copy the files from your computer to other computers on the network without any errors. You verify that all of your other tasks are working correctly. You want the task to complete successfully.  What should you do? ()

    • A、Start the Remote Procedure Call (RPC) Locater service and configure the service to start automatically.
    • B、Start the RunAs service and configure the service to start automatically.
    • C、Configure the Task Scheduler service account to use the local Administrator account and password. Restart the service.
    • D、Use Scheduled Tasks to configure the task to run under the security context of your account.

    正确答案:D

  • 第18题:

    You work as the Exchange administrator at Company.com.The Company.com network contains an Exchange Server 2010 Organization.You are responsible for managing the Exchange network for Company.com.The network contains numerous Mailbox servers.During the course of the week you receive an instruction from the CIO to determine the message latency between the Mailbox servers in the organization.What should you do?()

    • A、Your best option would be to increase the MSExchangeMailSubmission diagnostic logging level to Expert.
    • B、Your best option would be to run the Test-Mailflow cmdlet.
    • C、Your best option would be to increase the MSExchangeTransport diagnostic logging level to Expert.
    • D、Your best option would be to run the Test-OutlookConnectivity cmdlet.

    正确答案:B

  • 第19题:

    Your network contains two Hyper-V hosts that run Windows Server 2012 R2. The Hyper-V hosts contains several virtual machines that run Windows Server 2012 R2. You install the Network Load Balancing feature on the virtual machines. You need to configure the virtual machines to support Network Load Balancing (NLB). Which virtual machine settings should you configure?()

    • A、Port mirroring
    • B、DHCP guard
    • C、Router guard
    • D、MAC address

    正确答案:D

  • 第20题:

    单选题
    You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()
    A

    STP

    B

    GVRP

    C

    SNMP

    D

    VTP

    E

    DHCP


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    Your network contains a Network Policy Server (NPS) named Server1.NPS1 provides authentication for all of the VPN servers on the network.You need to track the usage information of all VPN connections.Which RADIUS attribute should you log?()
    A

    Acct-Session-Id

    B

    Acct-Status-Type

    C

    Class

    D

    NAS-Identifier


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()
    A

    Use Windows Explorer to receive the offline files

    B

    Using the Windows Explorer, disable the cache for the reports on the network share

    C

    Use the Windows NT explorer to grant the special access for the reports on the network  share

    D

    Use the synchronization manager to configure synchronization not to occur when users are  connected to the LAN connection. 


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter. Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.  You need to configure the wireless connection to allow your computer to discover other computers.  What should you do?()
    A

    Configure the network category of your wireless network connection to Private.

    B

    Configure the network category of your wireless network connection to Public.

    C

    Configure the TCP/IP packet filtering on the wireless network connection.

    D

    Configure the wireless network connection with the appropriate authentication to the router.


    正确答案: A
    解析: 暂无解析

  • 第24题:

    单选题
    You are the network administrator for your company. The network consists of a single Active Directory domain. All network servers run Windows Server 2003. The domain contains three domain controllers: DC1, DC2, and DC3. Each one hosts user data. DC1 experiences hard disk failure. You need to temporarily restore the user data to DC2. Which type of restoration should you perform? ()
    A

    Automated System Recovery (ASR)

    B

    normal

    C

    primary

    D

    authoritative


    正确答案: C
    解析: 暂无解析