Move the files and folders from TESTKING1 to TESTKING2.
Copy the files and folders from TESTKING1 to TESTKING2.
Change the NTFS permissions on TESTKING2 to match the NTFS permissions on TESTKING1.
Back up the files and folders in TESTKING1 and restore them, including permissions, to TESTKING2.
第1题:
Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest. The forest contains a single domain. You plan to deploy 10 Edge Transport servers on the perimeter network. You need to recommend a solution for the Edge Transport server deployment. The solution must meet the following requirements: .Allow administrators to apply a single security policy to all Edge Transport servers .Reduce the administrative overhead that is required to manage servers .Minimize the attack surface of the internal network What should you recommend?()
第2题:
You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster. The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template. You need to implement protective measures against the cluster’s most significant security vulnerability. What should you do? ()
第3题:
You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain. You administer a four-node Network Load Balancing cluster. All nodes run Windows Server 2003. The cluster has converged successfully. You use Network Load Balancing Manager on the default host to configure all nodes of the cluster. The nodes have a single network adapter and are connected to the same switching hub device. Administrators of non-cluster servers that are connected to the same switching hub device report that their servers receive traffic that is destined for the cluster nodes. Receiving this additional network traffic impairs the network performance of the non-cluster servers. You need to ensure that traffic destined for only the cluster nodes is not sent to all ports of the switching hub device. You do not want to move the cluster to another switching hub device. What should you do? ()
第4题:
You are the network administrator for Testking.com. The TestKing network contains seven application servers. Each application server runs a database application named TestKingApp. Requirements for TestKingApp state that when you add a new user, you must add the user to the server that has the most available disk space. You need to ensure that you meet the requirements when you add new users to TestKingApp. What should you do?()
第5题:
Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest. The forest contains a single domain. You plan to deploy 10 Edge Transport servers on the perimeter network. You need to recommend a solution for the Edge Transport server deployment. The solution must meet the following requirements: .Allow administrators to apply a single security policy to all Edge Transport servers .Reduce the administrative overhead that is required to manage servers .Minimize the attack surface of the internal network What should you recommend?()
第6题:
Add Tess King to the Administrators group.
Add Tess King to the Power Users group.
Add Tess King to the Remote Desktop Users group.
Delegate control of the Domain Controllers organizational unit (OU) to Tess King.
Delegate control of the Computers organizational unit (OU) to Tess King.
第7题:
Back up the System State data.
Back up C:/windows/ntds.
Back up C:/windows/sysvol.
Back up C:/windows/system32/certsrv.
第8题:
Modify the Default Domain Group Policy object (GPO).Configure a computer-level policy to prevent the temporary employees from connecting to the terminal servers.
Modify the Default Domain Group Policy object (GPO). Enable the user-level Terminal Server setting Sets rules for remote control of Terminal Services user sessions.
On the Terminal Services Profile tab of the user properties for each account, disable the option to log on to terminal servers.
In the security policy for domain controllers, disable the computer-level Terminal Server setting Allow users to connect remotely using the terminal server.
第9题:
Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.
Use packet filtering on all inbound traffic to the cluster.
Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.
Use intrusion detection on the perimeter network.
第10题:
Stop and restart every file server.
Stop and restart the backup application on every file server.
Change the password for the backup job on every file server.
In Active Directory Users and Computers, increase the value of the Account lockout threshold option.
Unlock the BackupSvc account.
第11题:
Decrease the default user quota limit.
Raise the functional level of the domain to Windows Server 2003.
Purchase additional client access licenses.
Move TestKingInfo to one of the servers.
第12题:
You are the network administrator for The network consists of an internal network and a perimeter network. The internal network is protected by a firewall. The perimeter network is exposed to the Internet. You are deploying 10 Windows Server 2003 computers as Web servers. The servers will be located in the perimeter network. The servers will host only publicly available Web pages. You want to reduce the possibility that users can gain unauthorized access to the servers. You are concerned that a user will probe the Web servers and find ports or services to attack. What should you do?()
第13题:
You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain. All servers run Windows Server 2003 and all client computers run Windows XP Professional. You are planning a security update infrastructure. You need to find out which computers are exposed to known vulnerabilities. You need to collect the information on existing vulnerabilities for each computer every night. You want this process to occur automatically. What should you do? ()
第14题:
You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.You install Windows Server Update Services (WSUS) on a network server named Server1. When you attempt to synchronize Server1 with the Windows Update servers, you receive an error message. You open Internet Explorer and verify that you can communicate with an external Web site by using the proxy server. You need to ensure that Server1 can communicate with the Windows Update servers. What should you do on Server1?()
第15题:
You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. You need to update six high-visibility servers with critical updates by using Windows Server Update Services (WSUS). You approve all of the updates.You need to ensure that the updates are applied within one hour. What should you do?()
第16题:
Configure the Internet browser home page on all client computers to point to http://windowsupdate.microsoft.com.
In the SUS Administrator, configure the Server Name property to be the server's fully qualified domain name (FQDN).
Open IIS Manager and enable HTTP over SSL.
Enable communication over port 135 between all client computers and the SUS server.
第17题:
The best option is to set up a new Active Directory domain in the internal forest and then join all EdgeTransport servers to the new domain.
The best option is to make use of Active Directory Federation Services (AD FS).
The best option is to make use of Network Policy and Access Services (NPAS).
The best option is to set up a new Active Directory domain in the perimeter network and then join all Edge Transport Servers to the new domain.
第18题:
Enable the Enable virtual LAN identification option for each virtual machine
Enable the Enable virtual LAN identification option for each virtual machine and then set the connection to Host for the network interface card
Set the Connection to None for the network interface card
Select the Not connected option for each virtual machine.
第19题:
Chief information officer
IT support staff in Boston
IT support staff in New York
Network administrator in Chicago
Network administrator in New York
第20题:
Acct-Session-Id
Acct-Status-Type
Class
NAS-Identifier
第21题:
Create a counter log and specify SQL Database as the log file type.
Create a trace log and specify Circular Trace File as the log file type.
Create a counter log and specify Binary Circular File as the log file type.
Create a trace log and specify Sequential Trace File as the log file type.