WMI
RIS
DNS
SNMP
SMTP
第1题:
An administrator notes that after a recent power outage, some open files were corrupted on one affected file server. Which of the following items should the administrator consider to determine the cause of this corruption?()
第2题:
An administrator wants to use a Windows system to monitor a server that is rebooting. Which of the following commands should the administrator use to know when the NIC is back online in the server?()
第3题:
An administrator is configuring one server to monitor hardware level information on a second Windows server.Which of the following should be setup on the Windows server to allow the monitoring server to access this information?()
第4题:
An administrator is configuring RAID 1 in a server. The administrator has been given two matching 80GB SATA-2 hard drives, two SATA-2 cables, and a SATA-2 RAID adapter. How should the administrator BEST configure these drives?()
第5题:
An administrator wants to use the online planning worksheets as an aid to configuring a PowerHA cluster.Which PowerHA fileset would the administrator need to install in order to obtain this tool?()
第6题:
You have a VPN server that runs Windows Server 2003 Service Pack 2 (SP2). You need to monitor the performance of the VPN server for one day. What should you do? ()
第7题:
You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains an application server running Windows Server 2003. Users report intermittent slow performance when they access the application server throughout the day. You find out that the network interface on the application server is being heavily used during the periods of slow performance. You suspect that a single computer is causing the problem.You need to create a plan to identify the problem computer. What should you do?()
第8题:
You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003.The network contains a Web server named Server1 that runs IIS 6.0 and hosts a secure Web site. The Web site is accessible from the intranet, as well as from the Internet. All users must authenticate when they connect to Server1. All users on the Internet must use a secure protocol to connect to the Web site. Users on the intranet do not need to use a secure protocol.You need verify that all users are using a secure protocol to connect to Server1 from the Internet. What are two possible ways to achieve this goal?()
第9题:
Database server
NTP server
DHCP server
SQL server
DNS server
Domain name
第10题:
WMI
RIS
DNS
SNMP
SMTP
第11题:
Page File
Disk Utilization
System Temperature
Processor Utilization
Network Utilization
第12题:
The server's memory
The server's RAID controller battery
The server's processor
The server's NIC teaming configuration
第13题:
A cluster administrator decides ti implement application monitoring in order to monitor both a web application and its supporting database. The plan is to use a single resource group prod_rg and to configure one monitor method for the web app and one monitor method for the database. Which of the following statements best describes the need for custom resource monitor?()
第14题:
You are the network administrator for your company. The Denver office is currently connected to the corporate WAN by using a Windows Server 2003 computer named Server23.Server23 is configured as a dial-up router. Server23 has two network adapters. One network adapter connects to the Ethernet LAN. The other network adapter is a broadband networking device.The company plans to increase the number of employees in the Denver office by at least 25 percent. You need to confirm that the current network bandwidth of the broadband connection will be sufficient for the future expansion of the Denver office.You want to use System Monitor on Server23 to find out the current utilization of the broadband network connection. What should you do?()
第15题:
When configuring a DHCP server, which of the following can the administrator define for DHCPusers?()
第16题:
Which of the following tools can an administrator use to get a server baseline?()
第17题:
You work as a database administrator for Supportcenter.cn. You suspect that in one of your applications the customer table is being accessed by some unauthorized users. Which option would you use to monitor the queries being executed on the customer table?()
第18题:
You are the administrator of an Active Directory domain. The network contains a Windows Server 2003 domain controller named Server1Users report that they experience intermittent delays when they log on to Server1. Administrators report that replication attempts between Server1 and other domain controllers are occasionally delayed.You need to verify the cause of the intermittent connection delays to Server1. You also need to find out whether the problem is related to a hardware deficiency on Server1. You need to track these delays over a period of one day. What should you do first?()
第19题:
You are a network administrator for your company.A Windows Server 2003 computer named Server1 is exhibiting connectivity problems. You monitor Server1 by using System Monitor and Network Monitor. While monitoring, you notice that Server1 has approximately 4 MB of available memory, and the average CPU utilization is running at 95 percent. When you investigate the Network Monitor capture, you notice that some network packets sent to Server1 during the capture have not been captured. You need to ensure that the impact of monitoring on Server1 is reduced and that all packets sent to the computer are captured. What should you do?()
第20题:
Configure the application monitor with a restart count of 0
Configure the application monitor with a monitor mode of Notify
Configure the application monitor with a notify method of Monitor
Configure the application monitor with a failure action of Notify
第21题:
Install the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.
Open Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.
Install Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.
Open Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.
第22题:
Multiple application servers must be in a single resource group.
Multiple application servers per resource group may be monitored.
Multiple resource groups must each contain a single application server.
Multiple application servers in a cluster cannot use process monitoring.
第23题:
cluster.es.haw
cluster.es.worksheets
cluster.es.tools.worksheets
cluster.es.server.worksheets
第24题:
ping i 240
ping -t
ping -a
ping w 240