单选题You are the network administrator for Testking.com. The TestKing network contains seven application servers. Each application server runs a database application named TestKingApp. Requirements for TestKingApp state that when you add a new user, you mus

题目
单选题
You are the network administrator for Testking.com. The TestKing network contains seven application servers. Each application server runs a database application named TestKingApp. Requirements for TestKingApp state that when you add a new user, you must add the user to the server that has the most available disk space. You need to ensure that you meet the requirements when you add new users to TestKingApp. What should you do?()
A

Use Event Viewer to review the application logs on each of the seven servers.

B

Use Performance Logs and Alerts to record the PhysicalDisk object on all seven servers.

C

Use Task Manager to view the performance data on each of the seven servers.

D

Use System Monitor to generate a histogram view of the LogicalDisk object on all seven servers.


相似考题

2. You are the network administrator for your company. Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2003. You add eight servers for a new application. You create an organizational unit (OU) named Application to hold the servers and other resources for the application. Users and groups in the domain will need varied permissions on the application servers. The members of a global group named Server Access Team need to be able to grant access to the servers. The Server Access Team group does not need to be able to perform any other tasks on the servers. You need to allow the Server Access Team group to grant permissions for the application servers without granting the Server Access Team group unnecessary permissions.  What should you do?()A、 Create a Group Policy object (GPO) for restricted groups. Configure the GPO to make the Server Access Team group a member of the Power Users group on each application server. Link the GPO to the Application OU.B、 Grant the Server Access Team group permissions to modify computer objects in the Application OU.C、 Move the Server Access Team group object into the Application OU.D、 Create domain local groups that grant access to the application servers. Grant the Server Access Team group permissions to modify the membership of the domain local groups.

4. You are the network administrator for your company. The network consists of a single Active Directory domain. The company has an internal network and a perimeter network. The internal network is protected by a firewall. Application servers on the perimeter network are accessible from the Internet.   You are deploying 10 Windows Server 2003 computers in application server roles. The servers will be located in theperimeter network and will not be members of the domain. The servers will host only publicly available Web pages.  The network design requires that custom security settings must be applied to the application servers. These custom security settings must be automatically refreshed every day to ensure compliance with the design.   You create a custom security template named Baseline1.inf for the application servers. You need to comply with the design requirements.   What should you do?  ()A、 Import Baseline1.inf into the Default Domain Policy Group Policy object (GPO).B、 Create a task on each application server that runs Security and Configuration Analysis with Baseline1.inf every day.C、 Create a task on each application server that runs the secedit command with Baseline1.inf every day.D、 Create a startup script in the Default Domain Policy Group Policy object (GPO) that runs the secedit command with Baseline1.inf.

更多“单选题You are the network administrator for Testking.com. The TestKing network contains seven application servers. Each application server runs a database application named TestKingApp. Requirements for TestKingApp state that when you add a new user, you mus”相关问题
  • 第1题:

    You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003. A server named TestKing2 functions as an application server. Users in the TestKing marketing department use an application on TestKing2 to analyze data. The application produces a high volume of disk activity. You give access to 15 new users for the application on TestKing2. Users in the TestKing marketing department report unacceptable delays when they use the application during periods of peak activity. You use System Monitor to analyze the performance of TestKing2. You need to ensure that TestKing2 can support the new users. Which counter should you monitor?()

    • A、The % Disk Time counter for the PhysicalDisk performance object
    • B、The Current Disk Queue Length counter for the PhysicalDisk performance object
    • C、The Free Megabytes counter for the LogicalDisk performance object
    • D、The Disk Transfers/sec counter for the LogicalDisk performance object

    正确答案:A

  • 第2题:

    You are the network administrator for Testking.com. The TestKing network contains seven application servers. Each application server runs a database application named TestKingApp. Requirements for TestKingApp state that when you add a new user, you must add the user to the server that has the most available disk space. You need to ensure that you meet the requirements when you add new users to TestKingApp. What should you do?()

    • A、Use Event Viewer to review the application logs on each of the seven servers.
    • B、Use Performance Logs and Alerts to record the PhysicalDisk object on all seven servers.
    • C、Use Task Manager to view the performance data on each of the seven servers.
    • D、Use System Monitor to generate a histogram view of the LogicalDisk object on all seven servers.

    正确答案:B

  • 第3题:

    You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. Some client computers run Windows XP Professional, and the rest run Windows NT 4.0 Workstation. TestKing includes departments for accounting, design, marketing, and sales. Each department has a corresponding organizational unit (OU). A member server named Testking1 can be accessed only by user accounts in the Accounting, Design, Marketing, and Sales OUs. You install Terminal Server on Testking1. Then you install four new applications on Testking1. Each application is intended for users in only one of the four departments. You need to ensure that each application can be accessed only by users in the appropriate department. You need to achieve this goal by using the minimum amount of administrative effort. What should you do?()

    • A、In the Default Policy Group Policy object (GPO), configure the Start program on connection policy to be the program path and file name of the application to start when the user logs on.
    • B、In each OU, set the Environment property for each user to the program path and file name of the application that corresponds to the OU.
    • C、On Testking1, select the RDP-Tcp connection properties. Set the program path and file name of the application to start when the user logs on.
    • D、Create one Group Policy object (GPO) for each department. Link each GPO to the corresponding OU. For each GPO, configure the Start program on connection policy to run the application that corresponds to the appropriate department.

    正确答案:D

  • 第4题:

    You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003 You install a new server named TestKing6. You install an application on TestKing6. The application fails to start because of the NTFS permission on TestKing6 are too restrictive. You use a security template from the manufacturer of the application to modify the NTFS permissions on TestKing6 to allow the application work. A new update to the application is released. The application no longer requires the modified NTFS permissions. You need to restore the default permissions on TestKing6 to restore the original level of system security. Which security template should you import into the local security policy of TestKing6?()

    • A、The Syssetup.inf template.
    • B、The Profsec.inf template.
    • C、The Defltsv.inf template.
    • D、The Netserv.inf template.

    正确答案:C

  • 第5题:

    You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as a database administrator for your company. A vendor company’s application is utilized, and the application is based on a proprietary database. Data is queried from the application database and the data is imported into a SQL Server 2005 database. A new OLE DB driver is offered by the application vendor, and the new OLE DB driver will be utilized when the application database is queried. According the company requirements, the connections between the SQL Server database and the application database is prohibited, except when this data is queried. You should think out a method to have data queried from the application database.  Which action should be performed to achieve the goal?()

    • A、To achieve the goal, a Linked Server connection should be configured to the application database.
    • B、To achieve the goal, a query should be written, and an OPENQUERY command is utilized by the query.
    • C、To achieve the goal, a Remote Server connection to the application database should be configured.
    • D、To achieve the goal, a query should be written, and an OPENDATASOURCE command is utilized by the query.

    正确答案:D

  • 第6题:

    单选题
    You are a network administrator for The network contains a Windows Server 2003 computer named Testking1. You need to install an application on Testking1. The installation will cause several changes to the registry. You plan to use the Backup utility to create a backup that will enable you to restore the registry. TestKing requirements for network management state that all backups must be performed during an eight-hour period at night. Because of this time constraint, you need to ensure that the backup can be recovered as quickly as possible. You need to create a backup that meets the requirements. What should you do?()
    A

    Create a backup of the system partition.

    B

    Create a backup of the boot partition.

    C

    Create a backup of the System State.

    D

    Create an Automated System Recovery (ASR) backup.

    E

    Create a backup of the Systemroot/System32/Config folder.


    正确答案: A
    解析: 暂无解析

  • 第7题:

    单选题
    You create Windows Forms application by using the .Net FrameWork 3.5 You plan to deploy a new application to client computers that use the Windows Vista operating system. You need to ensure that the user can install the application without being prompted fore elevated permission.What should you do?()
    A

    Sign the deployment manifest by using an Authenticode certificate.Publish the application to a CD-ROM.Install the application on each client computer from the CD-ROM

    B

    Sign the deployment manifest by using an Authenticode certificate.Publish the application to a server on the network.Install the application on each client computer.

    C

    Add the requestedExecutionLevel=highestAvailable attribute to the deployment.Publish the application to a server on the network.Install the application on each client computer.

    D

    Add the requestedExecutionLevel=requiresAdministrator attribute to the deployment.Publish the application to a server on the network.Install the application on each client computer.


    正确答案: A
    解析: 暂无解析

  • 第8题:

    单选题
    Your network contains an Active Directory domain. You have a server that runs Windows Server 2008 R2 and has the Remote Desktop Services server role enabled. All client computers run Windows 7. You need to plan the deployment of a new line-of-business application to all client computers. The  deployment must meet the following requirements:   èUsers must access the application from an icon on their desktops.   èUsers must have access to the application when they are not connected to the network. What should you do?()
    A

    Publish the application as a RemoteApp.

    B

    Publish the application by using Remote Desktop Web Access (RD Web Access).

    C

    Assign the application to the Remote Desktop Services server by using a Group Policy object (GPO).

    D

    Assign the application to all client computers by using a Group Policy object (GPO).


    正确答案: B
    解析: 暂无解析

  • 第9题:

    单选题
    You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains an application server running Windows Server 2003.   Users report intermittent slow performance when they access the application server throughout the day. You find out that the network interface on the application server is being heavily used during the periods of slow performance. You suspect that a single computer is causing the problem.You need to create a plan to identify the problem computer.   What should you do?()
    A

     Monitor the performance monitor counters on the application server by using System Monitor.  

    B

     Monitor the network traffic on the application server by using Network Monitor.

    C

     Monitor network statistics on the application server by using Task Manager.

    D

     Run network diagnostics on the application server by using Network Diagnostics.


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    You are the network administrator for Testking.com. The TestKing network contains seven application servers. Each application server runs a database application named TestKingApp. Requirements for TestKingApp state that when you add a new user, you must add the user to the server that has the most available disk space. You need to ensure that you meet the requirements when you add new users to TestKingApp. What should you do?()
    A

    Use Event Viewer to review the application logs on each of the seven servers.

    B

    Use Performance Logs and Alerts to record the PhysicalDisk object on all seven servers.

    C

    Use Task Manager to view the performance data on each of the seven servers.

    D

    Use System Monitor to generate a histogram view of the LogicalDisk object on all seven servers.


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    You are the network administrator for your company. Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2003. You add eight servers for a new application. You create an organizational unit (OU) named Application to hold the servers and other resources for the application. Users and groups in the domain will need varied permissions on the application servers. The members of a global group named Server Access Team need to be able to grant access to the servers. The Server Access Team group does not need to be able to perform any other tasks on the servers. You need to allow the Server Access Team group to grant permissions for the application servers without granting the Server Access Team group unnecessary permissions.  What should you do?()
    A

     Create a Group Policy object (GPO) for restricted groups. Configure the GPO to make the Server Access Team group a member of the Power Users group on each application server. Link the GPO to the Application OU.

    B

     Grant the Server Access Team group permissions to modify computer objects in the Application OU.

    C

     Move the Server Access Team group object into the Application OU.

    D

     Create domain local groups that grant access to the application servers. Grant the Server Access Team group permissions to modify the membership of the domain local groups.


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as a database administrator for your company. A vendor company’s application is utilized, and the application is based on a proprietary database. Data is queried from the application database and the data is imported into a SQL Server 2005 database. A new OLE DB driver is offered by the application vendor, and the new OLE DB driver will be utilized when the application database is queried. According the company requirements, the connections between the SQL Server database and the application database is prohibited, except when this data is queried. You should think out a method to have data queried from the application database.  Which action should be performed to achieve the goal?()
    A

    To achieve the goal, a Linked Server connection should be configured to the application database.

    B

    To achieve the goal, a query should be written, and an OPENQUERY command is utilized by the query.

    C

    To achieve the goal, a Remote Server connection to the application database should be configured.

    D

    To achieve the goal, a query should be written, and an OPENDATASOURCE command is utilized by the query.


    正确答案: D
    解析: 暂无解析

  • 第13题:

    You create Windows Forms application by using the .Net FrameWork 3.5 You plan to deploy a new application to client computers that use the Windows Vista operating system. You need to ensure that the user can install the application without being prompted fore elevated permission.What should you do?()

    • A、Sign the deployment manifest by using an Authenticode certificate.Publish the application to a CD-ROM.Install the application on each client computer from the CD-ROM
    • B、Sign the deployment manifest by using an Authenticode certificate.Publish the application to a server on the network.Install the application on each client computer.
    • C、Add the requestedExecutionLevel="highestAvailable" attribute to the deployment.Publish the application to a server on the network.Install the application on each client computer.
    • D、Add the requestedExecutionLevel="requiresAdministrator" attribute to the deployment.Publish the application to a server on the network.Install the application on each client computer.

    正确答案:A

  • 第14题:

    You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains an application server running Windows Server 2003.   Users report intermittent slow performance when they access the application server throughout the day. You find out that the network interface on the application server is being heavily used during the periods of slow performance. You suspect that a single computer is causing the problem.You need to create a plan to identify the problem computer.   What should you do?()

    • A、 Monitor the performance monitor counters on the application server by using System Monitor.  
    • B、 Monitor the network traffic on the application server by using Network Monitor.
    • C、 Monitor network statistics on the application server by using Task Manager.
    • D、 Run network diagnostics on the application server by using Network Diagnostics.

    正确答案:B

  • 第15题:

    You are the network administrator for . The network consists of single Active directory domain. The domain contains a Windows Server 2003 domain controller named TestKing3. The securews.inf security policy has been applied to the domain. A network application requires a service account. The network application runs constantly. You create and configure a service account named SrvAcct for the network application. The software functions properly using the new account and service. You discover an ongoing brute force attack against the SrvAcct account. The intruder appears to be attempting a distributed attack from several Windows XP Professional domain member computers on the LAN. The account has not been compromised and you are able to stop the attack, you restart Server6 and attempt to run the network application, but the application does not respond.()

    • A、Reset the SrvAcct password,
    • B、Configure the default Domain Controllers policy to assign the SrvAcct account the right to log on locally.
    • C、Unlock the SrvAcct account.
    • D、Restart the NetAppService service.

    正确答案:C

  • 第16题:

    You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003. All client computers run Windows XP Professional. purchases a host-connectivity gateway application developed by an independent software vendor. You need to install the application on a Windows Server 2003 computer named TestKing2. A support technician named Marie is assigned to install the application. Marie's user account is not a member of the Administrator's group on TestKing2. The installation fails and displays an error message stating the user account used for installing the application needs to be a member of the local Administrators group. Your user account is a member of the Domain Admins group. You want to enable Marie to install applications, but you do not want her to be able to make other changes on TestKing2. What should you do?()

    • A、Log on locally on TestKing2 as the local administrator. On TestKing2, in Control Panel, start Add or Remove Programs. Instruct Marie to install the application.
    • B、Use the Run as option to start the Add or Remove Programs Control Panel item on TestKing2. Provide the credentials of the local Administrator account. Instruct Marie to install the application.
    • C、Make Marie's user account a member of the local Administrators group on TestKing2. Instruct him to log on locally by using his user account and to install the application.
    • D、Instruct Marie to log on locally and to send a Remote Assistance request to you. Accept the request, and take remote control of the session. On TestKing2, in Control Panel, start Add or Remove Programs. Instruct Marie to install the application.

    正确答案:B

  • 第17题:

    You are the network administrator for TestKing. The network consists of a single Active Directory domain named testking.com. All domain controller run Windows Server 2003. employes three database administrators who administer seven databases servers that run Windows Server 2003. The database administrators occasionally restore a database server after a disaster. To restore a server, database administrators need the rights required to perform the following tasks: 1. Back up files and folders 2. Restore files and folders. 3. Restore the System State data. You need to assign the database administrators the rights that they require to perform the specified tasks. For security reasons, you must not assign the administrators more rights than they require to perform the tasks. What should you do?()

    • A、Add the database administrators' user accounts to the Administrators group on each of the database servers.
    • B、Add the database administrators' user accounts to the Power Users group on each of the database servers.
    • C、Add the database administrators' user accounts to the Backup Operators group on each of the database servers.
    • D、Add the database administrators' user accounts to the Backup Operators group on one of the domain controllers.
    • E、Add the database administrators' user accounts to the Server Operators group on one of the domain controllers.

    正确答案:C

  • 第18题:

    单选题
    You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. Some client computers run Windows XP Professional, and the rest run Windows NT 4.0 Workstation. TestKing includes departments for accounting, design, marketing, and sales. Each department has a corresponding organizational unit (OU). A member server named Testking1 can be accessed only by user accounts in the Accounting, Design, Marketing, and Sales OUs. You install Terminal Server on Testking1. Then you install four new applications on Testking1. Each application is intended for users in only one of the four departments. You need to ensure that each application can be accessed only by users in the appropriate department. You need to achieve this goal by using the minimum amount of administrative effort. What should you do?()
    A

    In the Default Policy Group Policy object (GPO), configure the Start program on connection policy to be the program path and file name of the application to start when the user logs on.

    B

    In each OU, set the Environment property for each user to the program path and file name of the application that corresponds to the OU.

    C

    On Testking1, select the RDP-Tcp connection properties. Set the program path and file name of the application to start when the user logs on.

    D

    Create one Group Policy object (GPO) for each department. Link each GPO to the corresponding OU. For each GPO, configure the Start program on connection policy to run the application that corresponds to the appropriate department.


    正确答案: B
    解析: 暂无解析

  • 第19题:

    单选题
    You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003. A server named TestKing2 functions as an application server. Users in the TestKing marketing department use an application on TestKing2 to analyze data. The application produces a high volume of disk activity. You give access to 15 new users for the application on TestKing2. Users in the TestKing marketing department report unacceptable delays when they use the application during periods of peak activity. You use System Monitor to analyze the performance of TestKing2. You need to ensure that TestKing2 can support the new users. Which counter should you monitor?()
    A

    The % Disk Time counter for the PhysicalDisk performance object

    B

    The Current Disk Queue Length counter for the PhysicalDisk performance object

    C

    The Free Megabytes counter for the LogicalDisk performance object

    D

    The Disk Transfers/sec counter for the LogicalDisk performance object


    正确答案: A
    解析: 暂无解析

  • 第20题:

    单选题
    You are the network administrator for your company. The network consists of a single Active Directory domain. The company has an internal network and a perimeter network. The internal network is protected by a firewall. Application servers on the perimeter network are accessible from the Internet.   You are deploying 10 Windows Server 2003 computers in application server roles. The servers will be located in theperimeter network and will not be members of the domain. The servers will host only publicly available Web pages.  The network design requires that custom security settings must be applied to the application servers. These custom security settings must be automatically refreshed every day to ensure compliance with the design.   You create a custom security template named Baseline1.inf for the application servers. You need to comply with the design requirements.   What should you do?  ()
    A

     Import Baseline1.inf into the Default Domain Policy Group Policy object (GPO).

    B

     Create a task on each application server that runs Security and Configuration Analysis with Baseline1.inf every day.

    C

     Create a task on each application server that runs the secedit command with Baseline1.inf every day.

    D

     Create a startup script in the Default Domain Policy Group Policy object (GPO) that runs the secedit command with Baseline1.inf.


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    Your network contains an Active Directory forest. The functional level of the forest is Windows  Server 2008 R2.     Your company’s corporate security policy states that the password for each user account must be  changed at least every 45 days.     You have a user account named Service1. Service1 is used by a network application named  Application1. Every 45 days, Application1 fails.  After resetting the password for Service1, Application1 runs properly. You need to resolve the  issue that causes Application1 to fail. The solution must adhere to the corporate security policy.     What should you do()
    A

    Run the Set-ADAccountControl cmdlet.

    B

    Run the Set-ADServiceAccount cmdlet.

    C

    Create a new password policy.

    D

    Create a new Password Settings object (PSO).


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    You are the network administrator for . The network consists of single Active directory domain. The domain contains a Windows Server 2003 domain controller named TestKing3. The securews.inf security policy has been applied to the domain. A network application requires a service account. The network application runs constantly. You create and configure a service account named SrvAcct for the network application. The software functions properly using the new account and service. You discover an ongoing brute force attack against the SrvAcct account. The intruder appears to be attempting a distributed attack from several Windows XP Professional domain member computers on the LAN. The account has not been compromised and you are able to stop the attack, you restart Server6 and attempt to run the network application, but the application does not respond.()
    A

    Reset the SrvAcct password,

    B

    Configure the default Domain Controllers policy to assign the SrvAcct account the right to log on locally.

    C

    Unlock the SrvAcct account.

    D

    Restart the NetAppService service.


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003. All client computers run Windows XP Professional. purchases a host-connectivity gateway application developed by an independent software vendor. You need to install the application on a Windows Server 2003 computer named TestKing2. A support technician named Marie is assigned to install the application. Marie's user account is not a member of the Administrator's group on TestKing2. The installation fails and displays an error message stating the user account used for installing the application needs to be a member of the local Administrators group. Your user account is a member of the Domain Admins group. You want to enable Marie to install applications, but you do not want her to be able to make other changes on TestKing2. What should you do?()
    A

    Log on locally on TestKing2 as the local administrator. On TestKing2, in Control Panel, start Add or Remove Programs. Instruct Marie to install the application.

    B

    Use the Run as option to start the Add or Remove Programs Control Panel item on TestKing2. Provide the credentials of the local Administrator account. Instruct Marie to install the application.

    C

    Make Marie's user account a member of the local Administrators group on TestKing2. Instruct him to log on locally by using his user account and to install the application.

    D

    Instruct Marie to log on locally and to send a Remote Assistance request to you. Accept the request, and take remote control of the session. On TestKing2, in Control Panel, start Add or Remove Programs. Instruct Marie to install the application.


    正确答案: A
    解析: 暂无解析

  • 第24题:

    单选题
    You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003 You install a new server named TestKing6. You install an application on TestKing6. The application fails to start because of the NTFS permission on TestKing6 are too restrictive. You use a security template from the manufacturer of the application to modify the NTFS permissions on TestKing6 to allow the application work. A new update to the application is released. The application no longer requires the modified NTFS permissions. You need to restore the default permissions on TestKing6 to restore the original level of system security. Which security template should you import into the local security policy of TestKing6?()
    A

    The Syssetup.inf template.

    B

    The Profsec.inf template.

    C

    The Defltsv.inf template.

    D

    The Netserv.inf template.


    正确答案: C
    解析: 暂无解析