review SAN configuration, connectivity, and zoning
review application parameters for contention or tuning problems
use internal disk monitoring tools to determine the problem source
check the disk parameters in the OS setup on the systems
第1题:
You are the network administrator for your company. The network consists of a single Active Directory domain. All client computers run Windows XP Professional. The company has a large number of sales representatives who need access to the company network when they travel. A Windows 2000 Server computer is configured to allow users to access the network by using a dial-up connection. Several of the sales representatives occasionally travel to rural locations that have telephone lines that use outdated technology. The sales representatives report that when they attempt to establish a dial-up connection in these locations, they receive the following error message: "The server is not responding." They cannot connect to the remote access server or to the company network. Users who travel to urban areas do not report this problem. You investigate and find out that the server is running properly, but the problem persists. The sales representatives need to be able to use the dial-up connection to access the company network. What should you do?()
第2题:
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com has merged with another company named Courseware Publishers.The users at Courseware Publishers complained that they cannot automatically locate the Client Access servers at Company.com.The users need to locate the Client Access servers at Company.com.What should you do?()
第3题:
You are a desktop administrator for your company. You are responsible for deploying a new application. The application is packaged in an .msi file. You need to deploy the application to only three users in the company. The .msi file contains all of the information necessary to correctly install the application. You need to install the application so that users see information about the installation progress, but no other user interface is displayed during the installation. What should you do?()
第4题:
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com has merged with another company.The users at Company.com have complained that they are not able to share contacts with the users in the merge company.However, they can share free/busy information.The users at Company.com need to share contacts.What should you do?()
第5题:
Multicasting
Proxy server
NAT
Subnetting
第6题:
You should consider having a management role created and assigned to all users from the Exchange Management Shell.
You should consider having a retention policy created and assigned to all users from the Exchange Management Shell.
You should consider having the properties of the mailbox database modified from the Exchange Management Console (EMC).
You should consider having the properties of the Mailbox server object modified from the Exchange Management Console (EMC).
第7题:
Use the Lock Waits/sec performance counter.
Use the Number of Deadlocks/sec performance counter.
Use the Transactions/sec performance counter.
Use the Full Scans/sec performance counter.
Use the Batches/sec performance counter.
第8题:
Change the flow control option in the modem properties to Xon / Xoff.
Disable error correction in the modem's default data connection preferences.
Adjust the modem's default connection speed to a lower rate.
Disable the first-in, first-out (FIFO) receive and transmit buffers on the modem.
第9题:
Use the Msiexec.exe program to perform a quiet installation of the application.
Use the Msiexec.exe program to perform a passive installation of the application.
Create a Group Policy object (GPO) that assigns the application. Link the GPO to the site containing the users who will use the application.
Create a Group Policy object (GPO) that advertises the application. Link the GPO to the domain.
第10题:
In order to make the application available through TS Web Access, the data source for TS Web Accessshould be specified from the TS Web Access Web site.
In order to make the application available through TS Web Access, the application should be added to the RemoteApp Programs list from TS RemoteApp Manager.
In order to make the application available through TS Web Access, the users should be added to the TS Web Access Computers group from the Local Users and Groups snap-in.
In order to make the application available through TS Web Access, the mstsc.exe command should be run and specify the /v parameter should be specified from the command prompt.
第11题:
The best option is to use an A record for FederatedSharing.Company.com.
The best option is to use an SRV record for _autodiscover._TCP._msdcs.Company.com.
The best option is to use an A record for autodiscover.Company.com.
The best option is to use an SRV record for _FederatedSharing._UDP._msdcs.Company.com.
第12题:
Use Task Manager to review network utilization of the VPN adapter.
Use the Performance console to create a log of network utilization outside of business hours.
Use System Monitor to review network utilization of the VPN connection.
Use Task Manager to select Bytes Sent as the Network Adapter History setting.
第13题:
You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You manage a server that runs Windows Server 2008. The server hasTerminal Service Web Access (TS Web Access) installed. Several line-of-business applications areavailable on the server by using TS Web Access. You have a new application installed on the server. Youhave to make the application available through TS Web Access. In order to achieve this,What action should you perform?()
第14题:
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. The Active Directory Federation Services (AD FS) role is installed on Server1. Contoso.com is defined as an account store. A partner company has a Web-based application that uses AD FS authentication. The partner company plans to provide users from contoso.com access to the Web application. You need to configure AD FS on contoso.com to allow contoso.com users to be authenticated by the partner company. What should you create on Server1()
第15题:
You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains an application server running Windows Server 2003. Users report intermittent slow performance when they access the application server throughout the day. You find out that the network interface on the application server is being heavily used during the periods of slow performance. You suspect that a single computer is causing the problem.You need to create a plan to identify the problem computer. What should you do?()
第16题:
You are the network administrator for your company. The network consists of a single Active Directory domain. The company has remote users in the sales department who work from home. The remote users’ client computers run Windows XP Professional, and they are not members of the domain. The remote users’ client computers have local Internet access through an ISP. The company is deploying a Windows Server 2003 computer named Server1 that has Routing and Remote Access installed. Server1 will function as a VPN server, and the remote users will use it to connect to the company network. Confidential research data will be transmitted from the remote users’ client computers. Security is critical to the company and Server1 must protect the remote users’ data transmissions to the main office. The remote client computers will use L2TP/IPSec to connect to the VPN server. You need to choose a secure authentication method. What should you do? ()
第17题:
review SAN configuration, connectivity, and zoning
review application parameters for contention or tuning problems
use internal disk monitoring tools to determine the problem source
check the disk parameters in the OS setup on the systems
第18题:
you should consider having an accepted domain and an e-mail address policy created.
you should consider having the properties of the default receive connector modified.
you should consider having an accepted domain and a sharing policy created.
you should consider having a remote domain and an e-mail address policy created.
第19题:
Create a domain account for each of the company’s users. Provide each domain account with access to SQL1 and the Services database.
Create a local logon account on SQL1 for each of the company’s users. Provide each logon account with access to SQL1 and the Services database.
Create a SQL Server logon account for each of the company’s users. Enable the Enforce password policy option for each logon account. Provide each logon account with access to the Services database.
Configure a virtual directory through Internet Information Services (IIS) for access to SQL1. Direct users to the virtual directory for data access.
Create one SQL Server logon account for all of the company’s computers running MS-DOS or UNIX-based operating systems. Enable the Enforce password policy option for users’ accounts. Provide the logon accounts with access to the Services database.
第20题:
review SAN configuration, connectivity, and zoning
review application parameters for contention or tuning problems
use internal disk monitoring tools to determine the problem source
check the disk parameters in the OS setup on the systems
第21题:
Monitor the performance monitor counters on the application server by using System Monitor.
Monitor the network traffic on the application server by using Network Monitor.
Monitor network statistics on the application server by using Task Manager.
Run network diagnostics on the application server by using Network Diagnostics.
第22题:
a new application
a resource partner
an account partner
an organization claim
第23题:
You should consider changing the EWS virtual directory.
You should consider changing the Federation Trust.
You should consider changing the Organizational Relationship.
You should consider changing the default sharing policy.
第24题:
Use the authentication method of the default IPSec policies.
Create a custom IPSec policy and use the Kerberos version 5 authentication protocol.
Create a custom IPSec policy and use certificate-based authentication.
Create a custom IPSec policy and use preshared key authentication.
Use the authentication method of the Routing and Remote Access custom IPSec policy for L2TP connection.