You are the network administrator for Active Directory.Another system administrator installs Software Update Services (SUS) on a production Windows Server 2003 computer. You are assigned to manage the SUS computer. You need to ensure that you can recover SUS if the server fails.You need to back up all components that are required to restore SUS to its current configuration. Because of limited space, you must not back up unnecessary data.What action or actions should you perform? Select all that apply.()
A. Back up the SUS folder that contains synchronized content.
B. Back up the folder in which the SYSAdmin site was created.
C. Back up the System State data fro the Windows Server 2003 computer.
D. Back up the IIS metabase
第1题:
You are the network administrator for Active Directory. Another system administrator installs Software Update Services (SUS) on a production Windows Server 2003 computer. You are assigned to manage the SUS computer. You need to ensure that you can recover SUS if the server fails. You need to back up all components that are required to restore SUS to its current configuration. Because of limited space, you must not back up unnecessary data. What action or actions should you perform? Select all that apply.()
第2题:
A user reports they cannot access the network share folder, the users workstation is configured to use automatic IP. When the administrator checks the IP address the response returns as 169.254.0.5. Which of the following should the administrator verify?()
第3题:
A system has a critical need for network services on a small network with a limited number of hosts. System overhead is not a concern. Which of the following should the system administrator do to help ensure connectivity in the event of a gateway failure?()
第4题:
Certkiller .com has organizational units in the Active Directory domain. There are 10 servers in the organizational unit called Security. As an administrator at Certkiller .com, you generate a Group Policy Object (GPO) and link it to the Security organizational unit. What should you do to monitor the network connections to the servers in Security organizational unit()
第5题:
You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. The domain contains three domain controllers: DC1, DC2, and DC3. Each one hosts user data. DC1 experiences hard disk failure. You need to temporary restore the user data to DC2. Which type of restoration should you perform?()
第6题:
You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains an application server running Windows Server 2003. Users report intermittent slow performance when they access the application server throughout the day. You find out that the network interface on the application server is being heavily used during the periods of slow performance. You suspect that a single computer is causing the problem.You need to create a plan to identify the problem computer. What should you do?()
第7题:
You work as the exchange administrator at TestKing.com. The TestKing.com network contains anExchange Server 2010 Organization. The Active Directory Rights Management Services (AD RMS) isinstalled within the organization. You receive an instruction from the CIO to recommend a messaging security solution that will make surethat a disclaimer is applied to all e-mail messages and that all e-mail messages from the Financedepartment is unable to be printed. What should you do?()
第8题:
Automated System Recovery (ASR)
normal
primary
authoritative
第9题:
Chief information officer
IT support staff in Boston
IT support staff in New York
Network administrator in Chicago
Network administrator in New York
第10题:
Automatic switchover from active to standby on primary supervisor failure
Reset of the primary supervisor.
Manual switchover from active to standby supervisor
Manual switchover from standby to active supervisor
第11题:
VM snapshots
a VM checkpoint
Windows Server Backup from within the VMs
Windows Server Backup from the Hyper-V hosts
第12题:
The contents of a shared folder on the active node should be encrypted by using Encrypting File System (EFS)
You should restore a backup to the active node
You should get rid of the shared array from the active node
From the active node, you have to uplug the network cable(s)
第13题:
You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()
第14题:
Which of the following tools would allow an administrator to push out a software update to allswitches on the network?()
第15题:
System, machine, and user policies can be configured though AccessAdmin. How are changes synchronized with the AccessAgent?()
第16题:
You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all client computers run Windows XP Professional. XML Web services for the internal network run on a member server named TestKingSrv1, which is configured with default settings. You are a member of the local Administrators group on TestKingSrv1. You need the ability to remotely manage TestKingSrv1. You have no budget to purchase any additional licensing for your network until the next fiscal year. How should you reconfigure TestKingSrv1?()
第17题:
You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. A member server named TK1 contains a large number of files that are frequently accessed by network users. Users report unacceptable response times on TK1. You compare the current performance of TK1 to a system performance baseline that you created several weeks ago. You decide that TK1 needs a higher-performance network adapter. After you add the appropriate network adapter, users report satisfactory performance. You need to gather new server performance data so you can establish a new performance baseline for TK1. You open the Performance console. What should you do next?()
第18题:
You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm. Immediately send a notification to a network administrator that the infected computer needs to be repaired. What should you do?()
第19题:
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 cluster. According to the company requirement, the failover response of the cluster has to be tested. The company assigns this task to you. On the cluster, you have to implement a manual failover. What should you do? ()
第20题:
Back up the System State data.
Back up C:/windows/ntds.
Back up C:/windows/sysvol.
Back up C:/windows/system32/certsrv.
第21题:
Use Roll Back Driver to reinstall the previous driver for the network adapter.
Use the Backp or Restore Wizard to restore the backup from the previous night.
Restart TestKing8 by using Last Known Good Configuration option.
Use the Registry Editor to delete the registry settings for the network adapter driver.
第22题:
Modify the NTFS permissions on the Data folder.
Modify the share permissions on the Data share.
Add the domain administrator to the local Administrator’s group on Server1.
Move the Data folder to a new file allocation table (FAT) partition. Share the folder by using the default permissions.
第23题:
Convert the system partition to NTFS.
Enable the Advanced Features option in the View menu of Active Directory Users and Computers.
Enable the Users, Groups, and Computers as Containers option in the View menu of Active Directory Users and Computers.
Log on by using a user account that has Administrator permissions for the Engineering OU.