Open Event Viewer and review the security logs on the server.
Create a System Monitor log that uses memory counters and gather data over time.
Open Task Manager and gather memory usage statistics.
Modify Boot.ini to use /maxmem:1536.
第1题:
You are a network administrator for Ezonexam.com's Windows 2000 network.
Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers.
Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Jack Bauer leaves the company. You grant her manager the Full Control NTFS permission to Jack's home folder. When the manager attempts to open any of the files, she receives the following error message: "Access is denied."
What should you do?
A.Use System File Checker (SFC) to decrypt the file.
B.Log on the network as the Recovery Agent. Decrypt the files for the manager.
C.Log on the network as the administrator. Use the cipher command to decrypt the files.
D.Log on the network as a member of the Backup Operators group. Decrypt the files for the manager.
第2题:
You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()
第3题:
You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()
第4题:
You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster. The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template. You need to implement protective measures against the cluster’s most significant security vulnerability. What should you do? ()
第5题:
Your network contains a Network Policy Server (NPS) named Server1.NPS1 provides authentication for all of the VPN servers on the network.You need to track the usage information of all VPN connections.Which RADIUS attribute should you log?()
第6题:
You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains an application server running Windows Server 2003. Users report intermittent slow performance when they access the application server throughout the day. You find out that the network interface on the application server is being heavily used during the periods of slow performance. You suspect that a single computer is causing the problem.You need to create a plan to identify the problem computer. What should you do?()
第7题:
Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest. The forest contains a single domain. You plan to deploy 10 Edge Transport servers on the perimeter network. You need to recommend a solution for the Edge Transport server deployment. The solution must meet the following requirements: .Allow administrators to apply a single security policy to all Edge Transport servers .Reduce the administrative overhead that is required to manage servers .Minimize the attack surface of the internal network What should you recommend?()
第8题:
Automated System Recovery (ASR)
normal
primary
authoritative
第9题:
3389 and 25
3389 and 636
50636 and 25
50636 and 135
第10题:
ldifde
csvde
ntdsutil with the authoritative restore option
dsadd user
第11题:
Use Task Manager to monitor processor and memory performance.
Use Windows Explorer to monitor the size of the Windows/System32/Spool/prtprocs folder.
Use System Monitor to view the Print Queue/Jobs counter.
Use System Monitor to view the Print Queue/Enumerate Network Printer Calls counter.
第12题:
Configure the system event log to Do not overwrite.
In IAS, in Remote Access Logging, enable the Authentication requests setting.
Configure the Remote Access server to Log all events.
Create a custom remote access policy and configure it for Authentication-Type.
第13题:
A.A
B.B
C.C
D.D
E.E
第14题:
You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()
第15题:
Your network contains an internal network and a perimeter network that are separated by a firewall. The perimeter network contains an Exchange Server 2010 Edge Transport server. You plan to deploy an internal Exchange Server 2010 organization that meets the following requirements:.Support EdgeSync synchronization .Support encrypted delivery of outbound e-mail messages to the Edge Transport server .Minimize the attack surface of the internal network Which TCP ports should you allow from the internal network to the perimeter network?()
第16题:
You are the network administrator for ExamSheet.net. You install Windows 2000 Professional on your portable computer. You use a docking station for your portable computer when you are in the office. You install a ISA-based network adapter in your docking station. You insert your computer into the docking station and start the computer. The network adapter is not detected during the startup process. You obtain a disk that contains the supported driver from the network adapter manufacturer. You want to allow Windows 2000 Professional to use the network adapter. What should you do?()
第17题:
You are a network administrator for ExamSheet.net's Windows 2000 network. Your computer is installed with Windows 2000 Professional. You schedule a task that will copy files from your computer to another computer on the network. You notice that the task is not completing correctly. You manually copy the files from your computer to other computers on the network without any errors. You verify that all of your other tasks are working correctly. You want the task to complete successfully. What should you do? ()
第18题:
You work as the Exchange administrator at Company.com.The Company.com network contains an Exchange Server 2010 Organization.You are responsible for managing the Exchange network for Company.com.The network contains numerous Mailbox servers.During the course of the week you receive an instruction from the CIO to determine the message latency between the Mailbox servers in the organization.What should you do?()
第19题:
Your network contains two Hyper-V hosts that run Windows Server 2012 R2. The Hyper-V hosts contains several virtual machines that run Windows Server 2012 R2. You install the Network Load Balancing feature on the virtual machines. You need to configure the virtual machines to support Network Load Balancing (NLB). Which virtual machine settings should you configure?()
第20题:
STP
GVRP
SNMP
VTP
DHCP
第21题:
Acct-Session-Id
Acct-Status-Type
Class
NAS-Identifier
第22题:
Use Windows Explorer to receive the offline files
Using the Windows Explorer, disable the cache for the reports on the network share
Use the Windows NT explorer to grant the special access for the reports on the network share
Use the synchronization manager to configure synchronization not to occur when users are connected to the LAN connection.
第23题:
Configure the network category of your wireless network connection to Private.
Configure the network category of your wireless network connection to Public.
Configure the TCP/IP packet filtering on the wireless network connection.
Configure the wireless network connection with the appropriate authentication to the router.
第24题:
Automated System Recovery (ASR)
normal
primary
authoritative