网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

You network contains an Exchange Server 2010 Mailbox server.You install and configure a third-party antivirus application on the server.You discover that a mailbox database named DB1 does not mount.You attempt to mount the mailbox database and receive an error message starting that the file named E01.log cannot be found.You need to mount DB1.The solution must prevent the antivirus application from causing the same error. What should you do?()

  • A、Disable the antivirus application.Restore E01.log from the most recent backup.Run the mount-database DB1 command
  • B、Disable the antivirus application.Restore DB1 from the most recent backup.Run the mount-database DB1 command
  • C、Exclude the transaction log folder from the antivirus application scans.Restore E01.log from the antivirus quarentine.Run the mount-database DB1 command
  • D、Exclude the transaction log folder from the antivirus application scans.Restore DB1 from the most recent backup.Run the mount-database DB1 command

参考答案

更多 “You network contains an Exchange Server 2010 Mailbox server.You install and configure a third-party antivirus application on the server.You discover that a mailbox database named DB1 does not mount.You attempt to mount the mailbox database and receive an error message starting that the file named E01.log cannot be found.You need to mount DB1.The solution must prevent the antivirus application from causing the same error. What should you do?()A、Disable the antivirus application.Restore E01.log from the most recent backup.Run the mount-database DB1 commandB、Disable the antivirus application.Restore DB1 from the most recent backup.Run the mount-database DB1 commandC、Exclude the transaction log folder from the antivirus application scans.Restore E01.log from the antivirus quarentine.Run the mount-database DB1 commandD、Exclude the transaction log folder from the antivirus application scans.Restore DB1 from the most recent backup.Run the mount-database DB1 command” 相关考题
考题 Your network contains a Network Policy Server (NPS) named Server1.NPS1 provides authentication for all of the VPN servers on the network.You need to track the usage information of all VPN connections.Which RADIUS attribute should you log?()A. Acct-Session-IdB. Acct-Status-TypeC. ClassD. NAS-Identifier

考题 Your network contains a Network Policy Server (NPS) named NPS1.You deploy a new NPS named NPS2.You need to ensure that NPS2 sends all authentication requests to NPS1.What should you modify on NPS2?() A. health policiesB. network policiesC. RADIUS clientsD. remote RADIUS server groups

考题 Your network contains an Active Directory forest. The forest schema contains a custom attribute  for user objects.     You need to give the human resources department a file that contains the last logon time and the  custom attribute values for each user in the forest.     Which should you use()A、the Dsquery toolB、the Export-CSV cmdletC、the Get-ADUser cmdletD、the Net.exe user command

考题 Your network contains an internal network and a perimeter network that are separated by a firewall. The perimeter network contains an Exchange Server 2010 Edge Transport server.  You plan to deploy an internal Exchange Server 2010 organization that meets the following requirements:.Support EdgeSync synchronization .Support encrypted delivery of outbound e-mail messages to the Edge Transport server .Minimize the attack surface of the internal network  Which TCP ports should you allow from the internal network to the perimeter network?()A、3389 and 25B、3389 and 636C、50636 and 25D、50636 and 135

考题 Your network contains an Active Directory forest. The forest contains a single domain. You want  to access resources in a domain that is located in another forest.     You need to configure a trust between the domain in your forest and the domain in the other  forest.     What should you create()A、an incoming external trustB、an incoming realm trustC、an outgoing external trustD、an outgoing realm trust

考题 Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest. The forest contains a single domain.  You plan to deploy 10 Edge Transport servers on the perimeter network.  You need to recommend a solution for the Edge Transport server deployment. The solution must meet the following requirements: .Allow administrators to apply a single security policy to all Edge Transport servers .Reduce the administrative overhead that is required to manage servers .Minimize the attack surface of the internal network What should you recommend?()A、Implement Network Policy and Access Services (NPAS).B、Implement Active Directory Federation Services (AD FS).C、Create a new Active Directory domain in the internal forest, and then join all Edge Transport servers to the new domain.D、Create an Active Directory forest in the perimeter network, and then join all Edge Transport servers to the new domain.

考题 Your network contains a single Active Directory domain named contoso.com.The domain contains a DNS server named Server1 that hosts the contoso.com zone.The network is connected to the network of a partner company. The partner companys network contains a DNS server that hosts a zone named nwtraders.com.You need to ensure that computers in contoso.com can resolve the names of computers in nwtraders.com.The solution must not require any changes to the zone configuration of nwtraders.com.What should you configure on Server1?()A、a conditional forwarderB、a GlobalNames zoneC、a secondary zoneD、a zone delegation

考题 Your network contains an Active Directory forest. The forest schema contains a custom attribute for  user objects.   You need to modify the custom attribute value of 500 user accounts.   Which tool should you use()A、CsvdeB、DsmodC、DsrmD、Ldifde

考题 Your network contains an internal network and a perimeter network. The internal network contains a single Active Directory site.  The perimeter network contains two Exchange Server 2010 Edge Transport servers. You plan to deploy an Exchange Server 2010 organization on the internal network.  You need to plan the deployment of Hub Transport server roles to meet the following requirements:.If a single Hub Transport server fails, e-mail messages from the Internet must be delivered to the Mailboxservers. .If a single Hub Transport server fails, users must be able to send e-mail messages to other users thathave mailboxes on the same Mailbox server.  What should you include in the plan?()A、Deploy one Edge Transport server on the internal network, and then configure EdgeSync synchronization.B、Deploy one Hub Transport server on the internal network, and then configure EdgeSync synchronization.C、Deploy one Hub Transport server on the internal network and one Hub Transport server on the perimeter network.D、Deploy two Hub Transport servers on the internal network.

考题 You are the network administrator for ExamSheet.net.  You install Windows 2000 Professional on your portable computer. You use a docking station for your portable computer when you are in the office. You install a ISA-based network adapter in your docking station. You insert your computer into the docking station and start the computer. The network adapter is not detected during the startup process. You obtain a disk that contains the supported driver from the network adapter manufacturer. You want to allow Windows 2000 Professional to use the network adapter. What should you do?()A、Restart the computer in the docking station.B、Run the Add/Remove Hardware wizard.C、Use Device Manager to scan for hardware changes.D、Copy the network adapter driver to the Winnt/Driver Cache/i386 folder.E、Install the new network adapter driver.

考题 Your network contains a Network Policy Server (NPS) named Server1.NPS1 provides authentication for all of the VPN servers on the network.You need to track the usage information of all VPN connections.Which RADIUS attribute should you log?()A、Acct-Session-IdB、Acct-Status-TypeC、ClassD、NAS-Identifier

考题 Your network contains an internal network and a perimeter network.You have one Exchange Server 2010 server on the internal network. You install Windows Server 2008 R2 on a new server in the perimeter network.You need to ensure that you can install the Edge Transport server role on the new server. What should you do?()A、Join the new server to an Active Directory domain.B、Install Active? Directory Lightweight Directory Services on the new server.C、Run ImportEdgeConfig.ps1 on the existing Exchange Server 2010 server.D、Open TCP port 88 and TCP port 3268 on the firewall between the perimeter network and the internal network.

考题 Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest. The forest contains a single domain.  You plan to deploy 10 Edge Transport servers on the perimeter network.  You need to recommend a solution for the Edge Transport server deployment. The solution must meet the following requirements: .Allow administrators to apply a single security policy to all Edge Transport servers .Reduce the administrative overhead that is required to manage servers .Minimize the attack surface of the internal network  What should you recommend?()A、Implement Network Policy and Access Services (NPAS).B、Implement Active Directory Federation Services (AD FS).C、Create a new Active Directory domain in the internal forest, and then join all EdgeTransport servers to the new domain.D、Create an Active Directory forest in the perimeter network, and then join all Edge Transport servers to the new domain.

考题 Your network contains two Hyper-V hosts that run Windows Server 2012 R2. The Hyper-V hosts contains several virtual machines that run Windows Server 2012 R2. You install the Network Load Balancing feature on the virtual machines. You need to configure the virtual machines to support Network Load Balancing (NLB). Which virtual machine settings should you configure?()A、Port mirroringB、DHCP guardC、Router guardD、MAC address

考题 单选题Your network contains an internal network and a perimeter network that are separated by a firewall. The perimeter network contains an Exchange Server 2010 Edge Transport server.  You plan to deploy an internal Exchange Server 2010 organization that meets the following requirements:.Support EdgeSync synchronization .Support encrypted delivery of outbound e-mail messages to the Edge Transport server .Minimize the attack surface of the internal network  Which TCP ports should you allow from the internal network to the perimeter network?()A 3389 and 25B 3389 and 636C 50636 and 25D 50636 and 135

考题 单选题Your network contains a Network Policy Server (NPS) named Server1.NPS1 provides authentication for all of the VPN servers on the network.You need to track the usage information of all VPN connections.Which RADIUS attribute should you log?()A Acct-Session-IdB Acct-Status-TypeC ClassD NAS-Identifier

考题 单选题You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()A Use Windows Explorer to receive the offline filesB Using the Windows Explorer, disable the cache for the reports on the network shareC Use the Windows NT explorer to grant the special access for the reports on the network  shareD Use the synchronization manager to configure synchronization not to occur when users are  connected to the LAN connection. 

考题 单选题Your network contains a server that has the SNMP Service installed.You need to configure the SNMP security settings on the server.Which tool should you use?()A Local Security PolicyB ScwC SeceditD Services console

考题 单选题Your network contains a single Active Directory domain named contoso.com.The domain contains a DNS server named Server1 that hosts the contoso.com zone.The network is connected to the network of a partner company. The partner companys network contains a DNS server that hosts a zone named nwtraders.com.You need to ensure that computers in contoso.com can resolve the names of computers in nwtraders.com.The solution must not require any changes to the zone configuration of nwtraders.com.What should you configure on Server1?()A a conditional forwarderB a GlobalNames zoneC a secondary zoneD a zone delegation

考题 单选题The company has a Windows 2008 Active Directory-based network.The network contains an Exchange Server 2003 organization.The management instructs you to deploy Exchange Server 2010 in your network.You decide to prepare the schema and domain first.Which of the following commands should you run prior to performing the normal schema and domain preparation?()A Setup /PrepareSchemaB Setup /PrepareLegacyExchangePermissionsC Setup /PrepareADD Setup /PrepareLegacyExchangePermissions:child.Xxx

考题 单选题Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. You create a new inbound rule by using Windows Firewall with Advanced Security. You need to configure the rule to allow Server1 to accept unsolicited inbound packets that are received through a network address translation (NAT) device on the network. Which setting in the rule should you configure?()A Edge traversalB Authorized computersC Interface typesD Remote IP address

考题 单选题Your network contains an Active Directory domain named adatum.com. The domain contains a  member server named LON-DC1. LON-DC1 runs Windows Server 2012 R2 and has the DHCP  Server server role installed.The network contains 100 client computers and 50 IP phones. The computers and the phones arefrom the same vendor. You create an IPv4 scope that contains addresses from 172.16.0.1 to 172.16.1.254.You need to ensure that the IP phones receive IP addresses in the range of 172.16.1.100 to 172.16.1.200. The solution must minimize administrative effort.  What should you create?()A Server level policiesB FiltersC ReservationsD Scope level policies

考题 单选题Your network contains an Active Directory domain. The domain contains 1000 user accounts.  You have a list that contains the mobile phone number of each user  You need to add the mobile number of each user to Active Directory.     What should you do()A Create a file that contains the mobile phone numbers, and then run ldifde.exeB Create a fila that contains the mobile phone numbers, and then run csvde.exeC From Adsiedit, select the CN=Users container, and then mofify the properties of the container.D From Active Directory Users and Computers, select all of the users, and then modify the properties of the users.