网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

You have a FAT32-formatted volume.You need to enable file-level security on the volume. The solution must maintain all files on the volume. What should you do?()

  • A、Run the sfc.exe command-line tool.
  • B、Run the convert.exe command-line tool. 
  • C、From Disk Management, format the volume and select the NTFS file system.
  • D、From Disk Management, upgrade the disk that contains the volume to a dynamic disk.

参考答案

更多 “You have a FAT32-formatted volume.You need to enable file-level security on the volume. The solution must maintain all files on the volume. What should you do?()A、Run the sfc.exe command-line tool.B、Run the convert.exe command-line tool. C、From Disk Management, format the volume and select the NTFS file system.D、From Disk Management, upgrade the disk that contains the volume to a dynamic disk.” 相关考题
考题 You are planning to deploy Windows 7.   You have a custom line-of-business application that is not compatible with Windows 7.   You need to design a solution that allows the application to run.   What should you do?()A、Use the Setup Analysis Tool.B、Use the Compatibility Administrator.C、Use the Update Compatibility Evaluator.D、Use the Windows Compatibility Evaluator.

考题 You have two computers named Computer1 and Computer2 that run Windows 7. Computer1 has adynamic disk. You remove the disk from Computer1 and connect the disk to Computer2. You need toensure that you can open files on all hard disk drives connected to Computer2. What should you do fromthe Disk Management snap-in?()A、Convert a disk.B、Rescan the disks.C、Import a foreign disk.D、Attach a virtual hard disk (VHD).

考题 You install Windows Server 2008 R2 (Server Core Installation) on a server. You need to be able to remotely manage storage on the server by using Disk Manager. What should you do?()A、Install the Microsoft Remote Server Administration Tools (RSAT).B、Use the DISKPART utility to run the attributes volume clear readonly command for each volume. C、Run the netsh advfirewall Firewall set rule group="Remote Administration" new enable=yes command.D、Run the netsh advfirewall Firewall set rule group="Remote Volume Management" new enable=yes command.

考题 Your company has a single Active Directory directory service forest with three domains. You plan to modify the Active Directory schema. You need to identify the schema master for the forest.  What should you do?()A、 Run the regsvr32 schmmgmt.dll command. Use the Active Directory Domains and Trusts snap-in. B、 Run the regsvr32 schmmgmt.dll command. Use the Active Directory Users and Computers snap-in. C、 Use the Dsget command-line tool.D、 Use the Dsquery command-line tool.

考题 You have a computer that runs Windows XP professional. The computer contains one partition and a floppy disk drive. You connect a new USB drive. You need to back up the computer to meet the following requirements: Enable a complete recovery if the hard disk fails. Enable an automatic restore of the operating systems. Automatically recreate the partitions during a restore process. What should you do?()A、From System Restore, create a system restore point.B、From the System Tools menu, run the Files and Settings Transfer Wizard.C、From Windows Backup, run the Automated System Recovery (ASR) Wizard. D、From Windows Backup, run the Backup Wizard, and then select Only backup the System State data. 

考题 You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed.All servers run Windows Server 2008 R2.The organization contains Mailbox servers, Client Access servers, and Hub Transport servers only. You need to ensure that you can review any changes made by administrators to the Exchange configuration.The solution must identify which administrator performed each change. What should you do?()A、Run the Get-MailboxStatistics cmdlet.B、Enable SMTP protocol logging.C、Run the Exchange Server User Monitor (ExMon).D、Modify the Log Settings from the properties of the Hub Transport server.E、Run the Set-AdminAuditLogConfig cmdlet.F、Review the Application event log.

考题 You have a server that runs Windows Server 2003 Service Pack 2 (SP2). You need to ensure that a defragmentation of the server’s hard disk drive runs each night. What should you do? ()A、Create a scheduled task that runs Dfrg.msc.B、Create a scheduled task that runs Defrag.exe.C、From Computer Management, run Disk Management.D、From Computer Management, run Disk Defragmenter.

考题 You create a Web site that you must copy from a development server to a testing server, along with all source files. You do not have terminal access to the testing server. You need to create the virtual directory. Then you must copy the Web site to the virtual directory on the testing server without precompiling the site. What should you do?()A、Use the Publish Web tool.B、Use the Copy Web tool.C、Use the command line to XCOPY the files.D、Create a Web Setup project.

考题 You have a server that runs Windows Server 2003 Service Pack 2 (SP2). A server application creates report files. The application saves the report files in a folder named Report. A service account is listed as the owner of all report files. You need to assign ownership of the report files to a user in a department named Audit. You must achieve this goal by using the minimum amount of administrative effort. What should you do? ()A、Rewrite the application.B、Create a scheduled task to run Attrib.exe.C、Create a scheduled task to run Icacls.exe.D、Use the Advanced Security settings to change the owner of each file.

考题 You are the network administrator for. You administer a Windows Server 2003 computer named TestKing4. TestKing4 has a single physical disk that is configured as a simple volume. You plan to store the files for a large database on TestKing4. You plan to install additional physical disks on TestKing4. You need to reconfigure the disks on TestKing4. Your solution must provide fault tolerance for the operating system and the database files. Which two actions should you perform?() (Each correct answer presents part of the solution. Choose two.)A、Install three additional physical disks. Create a new RAID-5 volume. Place the database files on the new volume.B、Install three additional physical disks. Create a new striped volume. Place the database files on the new volume.C、Install one additional physical disk. Configure the simple volume as a mirrored volume.D、Install one additional physical disk. Configure the simple volume as a spanned volume.

考题 You have a computer that runs Windows XP Professional. The computer has a limited amount of free disk space. You need to identify the amount of disk space that is used to store the following:Temporary Internet Files, Files in the Recycle Bin, Downloaded program files. What should you do?()A、From the command prompt, run chkdsk.exe.B、From the System Tools menu, run Disk Cleanup.C、From Internet Explorer, view the Internet Options.D、From System Properties, view the User Profiles settings.

考题 Your network consists of an Active Directory domain. The domain controllers run Windows Server 2008 R2. Client computers run Windows 7.   You need to implement Encrypting File System (EFS) for all client computers. You want to achieve this goal while meeting the following requirements:   èYou must minimize the amount of data that is transferred across the network when a user logs on to or off from a client computer.   èUsers must be able to access their EFS certificates on any client computers. èIf a client computer s disk fails, EFS certificates must be accessible    What should you do?()A、Enable credential roaming.B、Enable roaming user profiles.C、Enable a Data Recovery Agent.D、Issue smart cards to all users.

考题 You have a computer that runs Windows 7 Professional. You need to upgrade the computer to Windows 7Ultimate. You must achieve this goal in the minimum amount of time.  What should you do?()A、Run Windows Update.B、Run Windows Anytime Upgrade.C、From the Windows 7 installation media, run Setup.exe.D、From the Windows 7 installation media, run Migwiz.exe.

考题 You encrypt your files to ensure the security of the files. You want to make a backup copy of the files and maintain their security settings. You have the option of backing up to either the network or floppy disk.  What should you do?()A、Copy the files to a network share on an NTFS volume and do nothing further.B、Copy the files to a network share on a FAT 32 volume and do nothing further.C、Copy the files to a floppy disk that has been formatted by using Windows 2000 Professional. D、Place the files in an encrypted folder, and then copy the folder to floppy disk.

考题 You have a computer that runs Windows 7. Windows Backup is configured to store backups on an externaldrive. You create a new NTFS volume on the computer. You need to configure Windows Backup to includethe files on the new volume as part of regularly scheduled backups.  What should you do?()A、From Backup and Restore, select Change settings.B、From Backup and Restore, select Create a system image.C、From the System Protection tab, create a restore point.D、From the System Protection tab, enable system protection for the new volume.

考题 You have a standalone computer that runs Windows 7. Multiple users share the computer. You need toensure that you can read the content of all encrypted files on the computer.  What should you do?()A、Run the Certificates Enrollment wizard and then run Certutil.exe importpfx.B、Run the Certificates Enrollment wizard and then run Certutil.exe installcert.C、Run Cipher.exe /r and then add a data recovery agent from the local security policy.D、Run Cipher.exe /rekey and then import a security template from the local security policy.

考题 You work as a network administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed. The ABC.com network has a domain controller named ABC_DC01.Which of the following tools would you use to manually remove Active Director from ABC_DC01?()A、You should consider using the dism.exe command-line tool.B、You should consider using the dsadd.exe command-line tool.C、You should consider using the pcpromo.exe command-line tool.D、You should consider using the ntdsutil.exe command-line tool.E、You should consider using the netsh.exe command-line tool.F、You should consider using the rexec.exe command-line tool.

考题 Your company has an Active Directory Domain Services (AD DS) forest with a single domain.  Domain controllers are located in the company’s offices in New York and Boston.  You deploy a group policy at the domain level that includes security filtering.   You discover that Group Policy object(GPO) settings are being applied to computers in the New York office, but not to computers in the Boston office.   You need to find out which settings are being applied to computers in the Boston office.   What should you do?()A、Run a Group Policy Modeling report against computers in the Boston office.B、Run a Group Policy Results report against computers in the Boston office.C、Use the GpoTool.exe command-line tool.D、Use the RepAdmin.exe command-line tool.

考题 You have a computer that runs Windows 7. The computer has System Protection enabled. You need toretain only the last System Protection snapshot of the computer. All other snapshots must be deleted.  Whatshould you do?()A、Run Disk Cleanup for Programs and Features.B、Run Disk Cleanup for System Restore and Shadow Copies.C、From the System Protection Restore settings, select Turn off System Restore.D、From the System Protection Restore settings, select Only restore previous versions of files.

考题 You have a Virtual Hard Disk (VHD) and a computer that runs Windows 7. The VHD has Windows 7installed. You need to start the computer from the VHD.  What should you do?()A、From Diskpart.exe, run Select vdisk.B、From Disk Management, modify the active partition.C、Run Bootcfg.exe and specify the /default parameter.D、Run Bcdedit.exe and modify the Windows Boot Manager settings.

考题 单选题Your company has a single Active Directory directory service forest with three domains. You plan to modify the Active Directory schema. You need to identify the schema master for the forest.  What should you do?()A  Run the regsvr32 schmmgmt.dll command. Use the Active Directory Domains and Trusts snap-in. B  Run the regsvr32 schmmgmt.dll command. Use the Active Directory Users and Computers snap-in. C  Use the Dsget command-line tool.D  Use the Dsquery command-line tool.

考题 单选题You have a standalone computer that runs Windows 7. Multiple users share the computer. You need toensure that you can read the content of all encrypted files on the computer.  What should you do?()A Run the Certificates Enrollment wizard and then run Certutil.exe importpfx.B Run the Certificates Enrollment wizard and then run Certutil.exe installcert.C Run Cipher.exe /r and then add a data recovery agent from the local security policy.D Run Cipher.exe /rekey and then import a security template from the local security policy.

考题 多选题You are the network administrator for. You administer a Windows Server 2003 computer named TestKing4. TestKing4 has a single physical disk that is configured as a simple volume. You plan to store the files for a large database on TestKing4. You plan to install additional physical disks on TestKing4. You need to reconfigure the disks on TestKing4. Your solution must provide fault tolerance for the operating system and the database files. Which two actions should you perform?() (Each correct answer presents part of the solution. Choose two.)AInstall three additional physical disks. Create a new RAID-5 volume. Place the database files on the new volume.BInstall three additional physical disks. Create a new striped volume. Place the database files on the new volume.CInstall one additional physical disk. Configure the simple volume as a mirrored volume.DInstall one additional physical disk. Configure the simple volume as a spanned volume.

考题 单选题You have two computers named Computer1 and Computer2 that run Windows 7. Computer1 has adynamic disk. You remove the disk from Computer1 and connect the disk to Computer2. You need toensure that you can open files on all hard disk drives connected to Computer2. What should you do fromthe Disk Management snap-in?()A Convert a disk.B Rescan the disks.C Import a foreign disk.D Attach a virtual hard disk (VHD).

考题 单选题You encrypt three files to ensure the security of the files. You want to make a backup copy of these three files and maintain their security settings. You have the option of backing up to either the network or a floppy disk. What should you do?()A Copy the files to a network share on an NTFS volume. Do nothing further.B Copy the files to a network share on a FAT32 volume. Do nothing further.C Copy the files to a floppy disk that has been formatted by using Win2000 Professional. Do nothing further.D Place the files in an encrypted folder. Then copy the folder to a floppy disk.

考题 单选题You have a FAT32-formatted volume.You need to enable file-level security on the volume. The solution must maintain all files on the volume. What should you do?()A Run the sfc.exe command-line tool.B Run the convert.exe command-line tool. C From Disk Management, format the volume and select the NTFS file system.D From Disk Management, upgrade the disk that contains the volume to a dynamic disk.

考题 单选题You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003. A server named TestKing7 runs Microsoft SQL Server and hosts several mission critical databases. TestKing7 contains a mirrored volume. A routine review of TestKing7 shows failed redundancy on the mirrored volume. TestKing7 is still running and the databases are still functioning correctly. You need to correct the error and restore redundancy. What should you do first?()A Initialize the failed disk.B Select the failed disk and reactivate the diskC Defragment the mirrored volume.D Perform a disk cleanup on the mirrored volume.