网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You are the network administrator for TestKing.com. The network consists of a single Active Directory domain named testking.com. The domain contains Windows Server 2003 computers and Windows XP Professional computers. You use a non-administrative user account named Joseph to log on to a client computer. You need to change the password for a domain user account named Sophia. You open the Active Directory Users and Computers console. When you attempt to change Sophia's password, you receive the following error message: "Access is denied". You need to remain logged on to the client computer as Joseph, and you need to be able to change Sophia's password. What should you do?()
A

Add the non-administrative domain user account to the local Administrators group.

B

Use the runas command to run Active Directory Users and Computers with domain administrative credentials.

C

From a command prompt, run the net user Sophia /add /passwordreq:yes command.

D

From a command prompt, run the net accounts /uniquepw: /domain command.


参考答案

参考解析
解析: 暂无解析
更多 “单选题You are the network administrator for TestKing.com. The network consists of a single Active Directory domain named testking.com. The domain contains Windows Server 2003 computers and Windows XP Professional computers. You use a non-administrative user account named Joseph to log on to a client computer. You need to change the password for a domain user account named Sophia. You open the Active Directory Users and Computers console. When you attempt to change Sophia's password, you receive the following error message: "Access is denied". You need to remain logged on to the client computer as Joseph, and you need to be able to change Sophia's password. What should you do?()A Add the non-administrative domain user account to the local Administrators group.B Use the runas command to run Active Directory Users and Computers with domain administrative credentials.C From a command prompt, run the net user Sophia /add /passwordreq:yes command.D From a command prompt, run the net accounts /uniquepw: /domain command.” 相关考题
考题 You are the network administrator setting up the IP network for a new branch office. You need at least 5 networks with 25 hosts each. You have been allocated a /24 network.Which prefix length will satisfy the given requirements?()A./24B./26C./27D./28

考题 You work as a network engineer at TestKing.com. You are required to allow establishment of a Telnet session with a router TestKingC.Which set command must be configured?() A.B.C.D.E.F.

考题 You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()A、STPB、GVRPC、SNMPD、VTPE、DHCP

考题 You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. TestKing.com makes use of Microsoft Exchange Server messagingsolution. During the course of day you receive an instruction from the CIO to deploy a database availability group(DAG) within the organization. You thus decide to recommend disk configuration for the servers in the organization whilst keeping the costs to a minimum. What should you do?()A、You should recommend 15000 RPM SAS hard disks in a Fiber Channel(FC)Storage Area Network(SAN).B、You should recommend 7200 RPM SATA hard disks in a direct Attach Storage (DAS).C、You should recommend 15000 RPM SAS hard disks in a Network Attached Storage (NAS).D、You should recommend 7200 RPM SATA hard disks in a Network Attached Storage (NAS).

考题 You work as the enterprise exchange administrator at TestKing.com. The TestKing.com network consistsof an Active Directory forest that contains a single domain named testking.com. TestKing.com has anExchange Server 2010 organization. For the future, you envisage to add a new domain to the forest as well as deploying the Exchange Server2010 servers in the domain. A TestKing.com employee named Andy Reid that is a member of an ActiveDirectory group. You have received instructions from the CIO to allow Andy Reid to install ExchangeServer 2010 servers in the new domain.  You thus nedd to identify the appropriate group to which AndyReid should be assigned()A、You should add Andy Reid to the Server Operators group.B、You should add Andy Reid to the Domain Admins group.C、You should add Andy Reid to the Enterprise Admins group.D、You should add Andy Reid to the Exchange Install Domain Servers group.

考题 You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. TestKing.com contains two global catalog servers and one DNSserver. During the course of the day you receive an instruction from the CIO to deploy Exchange Server 2010 intothe environment.  In order to accomplish this you need to propose a DNS implementation that will providesredundancy in the event of a DNS server failure. ()A、The test option is to use multiple MX records.B、The test option is to use integrated DNS and WINS.C、The test option is to use Active Directory integrated DNS Server.D、The test option is to use DNS forwarding.

考题 You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()A、RepeaterB、Wireless routerC、HubD、Wireless network adapter

考题 You are the network administrator setting up the IP network for a new branch office. You need at least 5 networks with 25 hosts each. You have been allocated a /24 network.Which prefix length will satisfy the given requirements?()A、/24B、/26C、/27D、/28

考题 You work as the exchange administrator at Testking.com. The TestKing.com network contains an Exchange Server 2010 Organization. You are responsible for managing the Exchange network for TestKing.com. Currently Microsoft Office Outlook is used by all TestKing.com users to connect to their mailboxes. Thecompliance policy of the organization states that a copy of messages sent to the Finance department fromthe Internet is archived. The archived e-mails need to be stored on a third-party archival server. You areinstructed to recommend a solution that will comply with the set criteria. What should you do?()A、You should include Retention Policies.B、You should include Transport Protection Rules.C、You should include Personal archives.D、You should include Journal rules.

考题 You work as a exchange administrator at TestKing.com. The TestKing.com network contains an internalnetwork as well as a perimeter network. The primeter network contains an Exchange Server 2010 EdgeTransport Server named TESTKING-EX. During the course of day you receive an instruction form the CIO to formulate a remote managementsolution for TESTKING-EX01 based on the set criteria below: You need to ensure that management traffic is encypted. You nedd to ensure that remote administration is permitted fron the Internet network.You need to ensure that Exchange Management Console (EMC) is supported. What should you do?()A、You should recommend that Windows Management Instrumentation Command-line (WMIC) be used.B、You should recommend that Lightweight Directory Access Protocol(LDAP)over Secure Socket Layer(SSL) be used.C、You should recommend that Windows Remote Management (WinRM) over SSL be used.D、You should recommend that Remote Desktop Protocol(RDP)over Secure Socket Layer(SSL)be used.

考题 You work as the exchange administrator at TestKing.com. The TestKing.com network contains anExchange Server 2010 Organization that contains a number of Hub Transport servers. During the course of day you receive an instruction form management to recommend a messaging hygiene solution. Your recommendation should ensure that servers known to send spam is blocked andthat the administrative efforts are reduced. What should you do?()A、You should recommend to management recipient filtering.B、You should recommend to management an IP Block list.C、You should recommend to management IP Block list providers.D、You should recommend to management sender filtering.

考题 You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. A firewall at Testking.com separates the internal network and a perimeter network. The perimeter networkcontains an Exchange Server 2010 Edge Transport server. You have received instructions from the CIO to install an internal Exchange Server 2010 with the followingcriteria: 1. The support of EdgeSync synchronizaiton and encrypted delivery of outbound e-mail messages to theEdge Transport server. 2. The minimization of the attack surface of the internal network. What should you do?()A、The best option is to use port 3309 and 25 from the internal network to the perimeter network.B、The best option is to use port 3309 and 636 from the internal network to the perimeter network.C、The best option is to use port 50636 and 25 from the internal network to the perimeter network.D、The best option is to use port 50636 and 135 from the internal network to the perimeter network.

考题 You are the network administrator for TestKing.com. The network consists of a single Active Directory domain named testking.com. All network servers run Windows Server 2003. You place computer accounts for servers in OUs that are organized by server roles. You apply GPOs to these servers at the OU level. You need to add a new server to the domain. You need to ensure that the appropriate GPOs are applied to this server. What should you do?()A、Prestage a domain computer account for the new server in the appropriate OU. Join the server to the domain by using the prestaged computer account.B、On the server, add the domain name for the Active Directory domain to the DNS suffix setting. Join the server to the domain.C、Assign a user account the Allow - Create permission for the appropriate OU. Join the new server to the domain by using the user account.D、Join the new server to the Active Directory domain. On the new server, run the gpupdate /force command.

考题 You are the network administrator for Testking.com. The network consists of a single Active Directory domain testking.com. All domain controllers run Windows Server 2003. Users who enter an invalid password more than twice in one day must be locked out. You need to configure domain account policy settings to enforce this rule. Which two actions should you perform?() (Each correct answer presents part of the solution. Choose two)A、Set the minimum password age to one day.B、Set the maximum password age to one day.C、Change the Enforce password history setting to three passwords remembered.D、Change the Account lockout duration setting to 1440 minutes.E、Change the Account lockout threshold setting to three invalid logon attempts.F、Change the Reset account lockout counter after setting to 1440 minutes.

考题 You are the network administrator for Testking.com. The TestKing network contains seven application servers. Each application server runs a database application named TestKingApp. Requirements for TestKingApp state that when you add a new user, you must add the user to the server that has the most available disk space. You need to ensure that you meet the requirements when you add new users to TestKingApp. What should you do?()A、Use Event Viewer to review the application logs on each of the seven servers.B、Use Performance Logs and Alerts to record the PhysicalDisk object on all seven servers.C、Use Task Manager to view the performance data on each of the seven servers.D、Use System Monitor to generate a histogram view of the LogicalDisk object on all seven servers.

考题 You are the network administrator for Testking.com. The network consists of a single Active Directory domain testking.com. The functional level of the domain is Windows 2000 native. Some network servers run Windows 2000 Server, and others run Windows Server 20003. All users in your accounting department are members of an existing global distribution group named Global-1. You create a new network share for the accounting users. You need to enable the members of Global-1 to access the file share. What should you do?()A、Raise the functional level of the domain to Windows Server 2003.B、Change the group type of Global-1 to security.C、Change the group scope of Global-1 to universal.D、Raise the functional level of the forest to Windows Server 2003.

考题 You are the network administrator for TestKing.com. The network consists of a single Active Directory domain named testking.com. All network servers run Windows Server 2003, and all client computers run Windows XP Professional. A user named King will leave TestKing in one week. A replacement will be hired in one month. The replacement will need the same access to network resources that King currently has. The replacement will also need ownership of all files that currently reside in King's home folder. You need to minimize the administrative effort that will be required when the replacement is hired. You also need to ensure that no one can use King's user account to log on to the domain until the replacement is hired. What should you do?()A、Move King's user account to the LostAndFound organizational unit (OU).B、Disable King's user account.C、Configure King's user account to require a change in password at next logon.D、Delete King's user account.

考题 You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. You are responsible for managing the Exchange network forTestKing.com. All servers on the TestKing.com network are configured to run Exchange Server 2010.At present the network is separated from the Internet by means of a firewall. You receive an instructionform management to ensure that customers from the Internet to use Outlook Anywhere, Outlook Web App(OWA), Exchange ActivSync as well as IMAP4 over Secure Sockets Layer (SSL). You thus need todetermine the TCP ports that you need to open. What should you do?()A、You should consider opening port 25, port 80, port 143 as well as port 3269.B、You should consider opening port 25, port 443 as well as port 993.C、You should consider opening port 80, port 143, port 443 as well as port 389.D、You should consider opening port 26, port 443 as well as port 995.

考题 You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. TestKing.com has its headquarters in Stockholm where you are located.The TestKing.com network contains a database availability group (DAG). You receive an instruction fromthe management to devise a Mailbox database security solution for the organization. Management wantsthe read/write performance to be maximized as well as ensuring that any access to the database isprohibited in the event of theft. What should you do?()A、You should recommend that management make use of DAG network encryption.B、You should recommend that management make use of Encrypted File System (EFS)C、You should recommend that management make use of Windows BitLocker Drive Encryption.D、You should recommend that management make use of Rights Management Service RMS.

考题 单选题You work as a exchange administrator at TestKing.com. The TestKing.com network contains an internalnetwork as well as a perimeter network. The primeter network contains an Exchange Server 2010 EdgeTransport Server named TESTKING-EX. During the course of day you receive an instruction form the CIO to formulate a remote managementsolution for TESTKING-EX01 based on the set criteria below: You need to ensure that management traffic is encypted. You nedd to ensure that remote administration is permitted fron the Internet network.You need to ensure that Exchange Management Console (EMC) is supported. What should you do?()A You should recommend that Windows Management Instrumentation Command-line (WMIC) be used.B You should recommend that Lightweight Directory Access Protocol(LDAP)over Secure Socket Layer(SSL) be used.C You should recommend that Windows Remote Management (WinRM) over SSL be used.D You should recommend that Remote Desktop Protocol(RDP)over Secure Socket Layer(SSL)be used.

考题 多选题You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. TestKing.com makes use of Microsoft Exchange Server messagingsolution. During the course of day you receive an instruction from the CIO to deploy a database availability group(DAG) within the organization. You thus decide to recommend disk configuration for the servers in the organization whilst keeping the costs to a minimum. What should you do?()AYou should recommend 15000 RPM SAS hard disks in a Fiber Channel(FC)Storage Area Network(SAN).BYou should recommend 7200 RPM SATA hard disks in a direct Attach Storage (DAS).CYou should recommend 15000 RPM SAS hard disks in a Network Attached Storage (NAS).DYou should recommend 7200 RPM SATA hard disks in a Network Attached Storage (NAS).

考题 单选题You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()A STPB GVRPC SNMPD VTPE DHCP

考题 单选题You work as the exchange administrator at Testking.com. The TestKing.com network contains an Exchange Server 2010 Organization. You are responsible for managing the Exchange network for TestKing.com. Currently Microsoft Office Outlook is used by all TestKing.com users to connect to their mailboxes. Thecompliance policy of the organization states that a copy of messages sent to the Finance department fromthe Internet is archived. The archived e-mails need to be stored on a third-party archival server. You areinstructed to recommend a solution that will comply with the set criteria. What should you do?()A You should include Retention Policies.B You should include Transport Protection Rules.C You should include Personal archives.D You should include Journal rules.

考题 单选题You are the network administrator for . You are the administrator of a Windows Server 2003 computer named TestKing8. You log on to TestKing8 and attempt to access the network. You discover that the server is not communicationg on the network. You discover that a service pack and an updated network adapter driver were installed on TestKing8 the previous night. A complete backup, including the System State data, was performed before the service pack and the driver were installed. You need to restore network communications. What should you do first?()A Use Roll Back Driver to reinstall the previous driver for the network adapter.B Use the Backp or Restore Wizard to restore the backup from the previous night.C Restart TestKing8 by using Last Known Good Configuration option.D Use the Registry Editor to delete the registry settings for the network adapter driver.

考题 单选题You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. A firewall at Testking.com separates the internal network and a perimeter network. The perimeter networkcontains an Exchange Server 2010 Edge Transport server. You have received instructions from the CIO to install an internal Exchange Server 2010 with the followingcriteria: 1. The support of EdgeSync synchronizaiton and encrypted delivery of outbound e-mail messages to theEdge Transport server. 2. The minimization of the attack surface of the internal network. What should you do?()A The best option is to use port 3309 and 25 from the internal network to the perimeter network.B The best option is to use port 3309 and 636 from the internal network to the perimeter network.C The best option is to use port 50636 and 25 from the internal network to the perimeter network.D The best option is to use port 50636 and 135 from the internal network to the perimeter network.

考题 单选题You are the network administrator for TestKing.com. The network consists of a single Active Directory domain named testking.com. All network servers run Windows Server 2003, and all client computers run Windows XP Professional. All user accounts in the Sales department are located in the Sales organizational unit (OU). You suspect that one or more user accounts in the OU have compromised passwords. You need to force all users in the Sales department to reset their passwords. What should you do?()A Select all user accounts in the Sales OU. Disable the accounts and re-enable them.B Select all user accounts in the Sales OU. Modify the account properties to force all passwords to be changed on next logon.C Create a Group Policy object (GPO) and link it to the Sales OU. Modify the password policy to set the maximum password age to 0.D Create as Group Policy object (GPO) and link it to the domain. Modify the password policy to set the maximum password age to 0.

考题 单选题You are the network administrator for TestKing.com. The network consists of a single Active Directory domain named testking.com. All network servers run Windows Server 2003. You create an organizational unit (OU) named Engineering, which will hold all objects associated with the users and computers in the engineering department. You also create a global group named Engineering Admins, whose members will administer these objects. Now you need to assign the appropriate permissions to the Engineering Admins group so its members can administer the objects in the Engineering OU. First, you use Active Directory Users and Computers to view the properties of the Engineering OU. However, the Security tab is not available. What should you do next?()A Convert the system partition to NTFS.B Enable the Advanced Features option in the View menu of Active Directory Users and Computers.C Enable the Users, Groups, and Computers as Containers option in the View menu of Active Directory Users and Computers.D Log on by using a user account that has Administrator permissions for the Engineering OU.