review SAN configuration, connectivity, and zoning
review application parameters for contention or tuning problems
use internal disk monitoring tools to determine the problem source
check the disk parameters in the OS setup on the systems
第1题:
A company has acquired another company and is consolidating data centers. During the consolidation, half of the users of a business critical application lost access. The users who maintained access experienced slow performance. What is the first action the SAN/storage administrator should take to determine the source of the problem()
第2题:
You are the network administrator for your company. The network consists of a single Active Directory domain. All client computers run Windows XP Professional. The company has a large number of sales representatives who need access to the company network when they travel. A Windows 2000 Server computer is configured to allow users to access the network by using a dial-up connection. Several of the sales representatives occasionally travel to rural locations that have telephone lines that use outdated technology. The sales representatives report that when they attempt to establish a dial-up connection in these locations, they receive the following error message: "The server is not responding." They cannot connect to the remote access server or to the company network. Users who travel to urban areas do not report this problem. You investigate and find out that the server is running properly, but the problem persists. The sales representatives need to be able to use the dial-up connection to access the company network. What should you do?()
第3题:
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. The Active Directory Federation Services (AD FS) role is installed on Server1. Contoso.com is defined as an account store. A partner company has a Web-based application that uses AD FS authentication. The partner company plans to provide users from contoso.com access to the Web application. You need to configure AD FS on contoso.com to allow contoso.com users to be authenticated by the partner company. What should you create on Server1()
第4题:
You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains an application server running Windows Server 2003. Users report intermittent slow performance when they access the application server throughout the day. You find out that the network interface on the application server is being heavily used during the periods of slow performance. You suspect that a single computer is causing the problem.You need to create a plan to identify the problem computer. What should you do?()
第5题:
You are a network administrator for your company. The network contains a Windows Server 2003 computer named Server1. Server1 has a single CPU, 512 MB of RAM, and a single 100-Mb network adapter. All network users’ home folders are stored on Server1. Users access their home folders by using a mapped network drive that connects to a shared folder on Server1. After several weeks, users report that accessing home folders on Server1 is extremely slow at certain times during the day. You need to identify the resource bottleneck that is causing the poor performance. What should you do? ()
第6题:
Multicasting
Proxy server
NAT
Subnetting
第7题:
Create a domain account for each of the company’s users. Provide each domain account with access to SQL1 and the Services database.
Create a local logon account on SQL1 for each of the company’s users. Provide each logon account with access to SQL1 and the Services database.
Create a SQL Server logon account for each of the company’s users. Enable the Enforce password policy option for each logon account. Provide each logon account with access to the Services database.
Configure a virtual directory through Internet Information Services (IIS) for access to SQL1. Direct users to the virtual directory for data access.
Create one SQL Server logon account for all of the company’s computers running MS-DOS or UNIX-based operating systems. Enable the Enforce password policy option for users’ accounts. Provide the logon accounts with access to the Services database.
第8题:
a new application
a resource partner
an account partner
an organization claim
第9题:
Use the Msiexec.exe program to perform a quiet installation of the application.
Use the Msiexec.exe program to perform a passive installation of the application.
Create a Group Policy object (GPO) that assigns the application. Link the GPO to the site containing the users who will use the application.
Create a Group Policy object (GPO) that advertises the application. Link the GPO to the domain.
第10题:
Create an IPsec Enforcement Network policy
Create an 802.1X enforcement network policy
Create a wired network (IEEE 802.3) Group Policy
Create an Extensible Authentication Portocol (EAP) Enforcement Network Policy
第11题:
The best option is to set up an Outlook Web App Mailbox policy so that the users comply with the Company.com policy.
The best option is to set up a Group Policy Object so that the users comply with the Company.com policy.
The best option is to change the authentication settings of the OWA virtual directory so that the users comply with the Company.com policy.
The best option is to change the authentication settings of the IISADMPWD virtual directory so that the users comply with the Company.com policy.
第12题:
You should consider changing the EWS virtual directory.
You should consider changing the Federation Trust.
You should consider changing the Organizational Relationship.
You should consider changing the default sharing policy.
第13题:
You are the administrator of a SQL Server 2005 computer named SQL1. All servers run Microsoft Windows Server 2003 and belong to a Microsoft Active Directory domain. The companys written security policy mandates strong passwords for all domain, local, and application accounts. The appropriate domain password policy has been deployed through the use of a Group Policy object (GPO). Many of the company’s computers run MS-DOS-based or UNIX-based operating systems. These computers require varying levels of access to a database named Services on SQL1. You need to ensure that these computers can access the Services database without violating the company’s written security policy. What should you do?()
第14题:
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com has merged with another company named Courseware Publishers.The users at Courseware Publishers complained that they cannot automatically locate the Client Access servers at Company.com.The users need to locate the Client Access servers at Company.com.What should you do?()
第15题:
You are a desktop administrator for your company. You are responsible for deploying a new application. The application is packaged in an .msi file. You need to deploy the application to only three users in the company. The .msi file contains all of the information necessary to correctly install the application. You need to install the application so that users see information about the installation progress, but no other user interface is displayed during the installation. What should you do?()
第16题:
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com has merged with another company.The users at Company.com have complained that they are not able to share contacts with the users in the merge company.However, they can share free/busy information.The users at Company.com need to share contacts.What should you do?()
第17题:
You are the network administrator for your company. The network consists of a single Active Directory domain. The company has remote users in the sales department who work from home. The remote users’ client computers run Windows XP Professional, and they are not members of the domain. The remote users’ client computers have local Internet access through an ISP. The company is deploying a Windows Server 2003 computer named Server1 that has Routing and Remote Access installed. Server1 will function as a VPN server, and the remote users will use it to connect to the company network. Confidential research data will be transmitted from the remote users’ client computers. Security is critical to the company and Server1 must protect the remote users’ data transmissions to the main office. The remote client computers will use L2TP/IPSec to connect to the VPN server. You need to choose a secure authentication method. What should you do? ()
第18题:
review SAN configuration, connectivity, and zoning
review application parameters for contention or tuning problems
use internal disk monitoring tools to determine the problem source
check the disk parameters in the OS setup on the systems
第19题:
Change the flow control option in the modem properties to Xon / Xoff.
Disable error correction in the modem's default data connection preferences.
Adjust the modem's default connection speed to a lower rate.
Disable the first-in, first-out (FIFO) receive and transmit buffers on the modem.
第20题:
review SAN configuration, connectivity, and zoning
review application parameters for contention or tuning problems
use internal disk monitoring tools to determine the problem source
check the disk parameters in the OS setup on the systems
第21题:
Monitor the performance monitor counters on the application server by using System Monitor.
Monitor the network traffic on the application server by using Network Monitor.
Monitor network statistics on the application server by using Task Manager.
Run network diagnostics on the application server by using Network Diagnostics.
第22题:
a new application
a resource partner
an account partner
an organization claim
第23题:
The best option is to use an A record for FederatedSharing.Company.com.
The best option is to use an SRV record for _autodiscover._TCP._msdcs.Company.com.
The best option is to use an A record for autodiscover.Company.com.
The best option is to use an SRV record for _FederatedSharing._UDP._msdcs.Company.com.
第24题:
Use the authentication method of the default IPSec policies.
Create a custom IPSec policy and use the Kerberos version 5 authentication protocol.
Create a custom IPSec policy and use certificate-based authentication.
Create a custom IPSec policy and use preshared key authentication.
Use the authentication method of the Routing and Remote Access custom IPSec policy for L2TP connection.