网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

You are the network administrator for The network contains a Windows Server 2003 compter named TestKing1. TestKing1 functions as a file server. Six users in the accounting department use an accounting software application to open files that are stored in a shared folder on TestKing1. The users keep these files open for an extended period of time. You need to restart TestKing1. You need to find out if any files on Testking1 are open before you restart the computer. What should you do?()

  • A、Use Computer Management to view existing connections.
  • B、Use the netsend command to send a message to all domain members.
  • C、Use Task Manager to monitor processes started by all users.
  • D、Use System Monitor to monitor the Server object in Report view.

参考答案

更多 “ You are the network administrator for The network contains a Windows Server 2003 compter named TestKing1. TestKing1 functions as a file server. Six users in the accounting department use an accounting software application to open files that are stored in a shared folder on TestKing1. The users keep these files open for an extended period of time. You need to restart TestKing1. You need to find out if any files on Testking1 are open before you restart the computer. What should you do?()A、Use Computer Management to view existing connections.B、Use the netsend command to send a message to all domain members.C、Use Task Manager to monitor processes started by all users.D、Use System Monitor to monitor the Server object in Report view.” 相关考题
考题 You are the administrator of a Windows 2000 network. You need to store secured files for your company's accounting and legal departments on a Windows 2000 Professional computer.You want to accomplish the following goals:1. Enable users in both departments to access their own files from the network2. Enable users in the accounting department to view the legal accounting department's documents3. Prevent users in the legal department from being able to view the accounting department's documents4. Enable managers within the company to access and modify both the accounting and the legal department's filesYou take the following actions:1. Create two shared folders named Accounting and Legal2. Create three groups named Accounting, Legal, and Management3. Allow the Accounting group modify permission on the Accounting folder4. Allow the Legal group modify permission on the Legal folders.5. Allow the Management group modify permission on both the Accounting and Legal folders.Which result or results do these actions produce? (Choose all that apply)A.Users in both departments can access to their own files from the network.B.Users in the accounting department can view the legal department's documents.C.Users in the legal department cannot view the accounting department's documents.D.Company managers can access and modify both departments' files.

考题 You are a network administrator for Ezonexam.com's Windows 2000 network.Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers.Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Jack Bauer leaves the company. You grant her manager the Full Control NTFS permission to Jack's home folder. When the manager attempts to open any of the files, she receives the following error message: "Access is denied."What should you do?A.Use System File Checker (SFC) to decrypt the file.B.Log on the network as the Recovery Agent. Decrypt the files for the manager.C.Log on the network as the administrator. Use the cipher command to decrypt the files.D.Log on the network as a member of the Backup Operators group. Decrypt the files for the manager.

考题 You are the network administrator for The network contains a Windows Server 2003 compter named TestKing1. TestKing1 functions as a file server.Six users in the accounting department use an accounting software application to open files that are stored in a shared folder on TestKing1. The users keep these files open for an extended period of time.You need to restart TestKing1. You need to find out if any files on Testking1 are open before you restart the computer.What should you do?()A. Use Computer Management to view existing connections.B. Use the netsend command to send a message to all domain members.C. Use Task Manager to monitor processes started by all users.D. Use System Monitor to monitor the Server object in Report view.

考题 You are the network administrator for The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. All confidential company files are stored on a file server named TestKing1. The written company security states that all confidential data must be stored and transmitted in a secure manner. To comply with the security policy, you enable Encrypting File System (EFS) on the confidential files. You also add EFS certificates to the data decryption field (DDF) of the confidential files for the users who need to access them. While performing network monitoring, you notice that the confidential files that are stored on TestKing1 are being transmitted over the network without encryption. You must ensure that encryption is always used when the confidential files on TestKing1 are stored and transmitted over the network. What are two possible ways to accomplish this goal?() (Each correct answer presents a complete solution. Choose two)A、Enable offline files for the confidential files that are stored on TestKing1, and select the Encrypt offline files to secure data check box on the client computers of the users who need to access the files.B、Use IPSec encryption between TestKing1 and the client computers of the users who need to access the confidential files.C、Use Server Message Block (SMB) signing between TestKing1 and the client computers of the users who need to access the confidential files.D、Disable all LM and NTLM authentication methods on TestKing1.E、Use IIS to publish the confidential files. Enable SSL on the IIS server. Open the files as a Web folder.

考题 You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all client computers run Windows XP Professional. A user named King uses a client computer named TestKing1. This computer has a locally attached tape device. You grant King the necessary permission to perform backups of a member server named TestKingSrvB. King runs the Backup utility on TestKing1 to back up the files located on TestKingSrvB. You need to use your client computer to view the most recent backup logs for TestKingSrvB. What should you do?()A、Use Notepad to view the contents of the backup report located on TestKingSrvb.B、Use Notepad to view the contents of the backup report located on TestKing1.C、Use Event Viewer to view the contents of the application log located on TestKingSrvb.D、Use Event Viewer to view the contents of the application log located on TestKing1

考题 You are the network administrator for The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. All confidential company files are stored on a file server named TestKing1. The written company security states that all confidential data must be stored and transmitted in a secure manner. To comply with the security policy, you enable Encrypting File System (EFS) on the confidential files. You also add EFS certificates to the data decryption field (DDF) of the confidential files for the users who need to access them. While performing network monitoring, you notice that the confidential files that are stored on TestKing1 are being transmitted over the network without encryption. You must ensure that encryption is always used when the confidential files on TestKing1 are stored and transmitted over the network. What are two possible ways to accomplish this goal? ()(Each correct answer presents a complete solution. Choose two)A、Enable offline files for the confidential files that are stored on TestKing1, and select the Encrypt offline files to secure data check box on the client computers of the users who need to access the files.B、Use IPSec encryption between TestKing1 and the client computers of the users who need to access the confidential files.C、Use Server Message Block (SMB) signing between TestKing1 and the client computers of the users who need to access the confidential files.D、Disable all LM and NTLM authentication methods on TestKing1.E、Use IIS to publish the confidential files. Enable SSL on the IIS server. Open the files as a Web folder.

考题 You are a network administrator for your company. The network contains a Windows Server 2003 computernamed Server3. Server3 functions as a file server. Six users in the accounting department use an accounting software application to open files that are stored in a shared folder on Server3. The users keep these files open for an extended period of time. You need to restart Server3. You need to find out if any files on Server3 are open before you restart the computer. What should you do? ()A、Use Computer Management to view existing connections.B、Use the netsend command to send a message to all domain members.C、Use Task Manager to monitor processes started by all users.D、Use System Monitor to monitor the Server object in Report view.

考题 You are the network administrator for Company.  You have been assigned the task to upgrade the 23 Windows NT Workstation 4.0 computers in the accounting department to Windows 2000 Professional. Users in the accounting department run a peer-to-peer financial and credit application on their computers. The application requires that information is passed between the accounting department computers over the network. You upgrade all the computers and configure them to have the default security settings. You want to ensure that network traffic between accounting computers is secure. What should you do? ()A、Disable NetBIOS over TCP/IP on the accounting department computers.B、Apply the Hisecws.inf security template to the local security policy on the accounting department computers.C、Enable the Encrypting File System (EFS) on all files used by the financial and credit application on the accounting department computers.D、Configure port filters for each port used by the financial and credit application on the accounting department computers.

考题 You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003. A server named TestKing2 functions as an application server. Users in the TestKing marketing department use an application on TestKing2 to analyze data. The application produces a high volume of disk activity. You give access to 15 new users for the application on TestKing2. Users in the TestKing marketing department report unacceptable delays when they use the application during periods of peak activity. You use System Monitor to analyze the performance of TestKing2. You need to ensure that TestKing2 can support the new users. Which counter should you monitor?()A、The % Disk Time counter for the PhysicalDisk performance objectB、The Current Disk Queue Length counter for the PhysicalDisk performance objectC、The Free Megabytes counter for the LogicalDisk performance objectD、The Disk Transfers/sec counter for the LogicalDisk performance object

考题 You are a network administrator for A Windows Server 2003 computer named Testking1 functions as a print server on the network. Testking1 contains a single printer named SalesPrinter12. Several users submit large print jobs to SalesPrinter12. A user reports that the print jobs fails to complete. You examine the print queue on SalesPrinter12, and you discover that one of the print jobs is showing an error. You attempt to delete the job, but you are unsuccessful. You need to ensure that print jobs submitted to SalesPrinter12 complete successfully. What should you do?()A、Configure SalesPrinter12 to use a TCP/IP port.B、Increase the priority of SalesPrinter12.C、Delete all files from the C:/Windows/System32/Spool folder.D、Restart the spooler service on Testking1.

考题 You are the network administrator for Testking.com. The network consists of a single Active Directory domain testking.com. The functional level of the domain is Windows 2000 native. Some network servers run Windows 2000 Server, and others run Windows Server 20003. All users in your accounting department are members of an existing global distribution group named Global-1. You create a new network share for the accounting users. You need to enable the members of Global-1 to access the file share. What should you do?()A、Raise the functional level of the domain to Windows Server 2003.B、Change the group type of Global-1 to security.C、Change the group scope of Global-1 to universal.D、Raise the functional level of the forest to Windows Server 2003.

考题 Your network contains a Windows Server 2008 R2 server that functions as a file server. All users have laptop computers that run Windows 7.   The network is not connected to the Internet. Users save files to a shared folder on the server. You need to design a data provisioning solution that meets the following requirements:   èUsers who are not connected to the corporate network must be able to access the files and the folders in the corporate network.    èUnauthorized users must not have access to the cached files and folders. What should you do?()A、Implement a certification authority (CA). Configure IPsec domain isolation.B、Implement a certification authority (CA). Configure Encrypting File System (EFS) for the drive that hosts the files.C、Implement Microsoft SharePoint Foundation 2010. Enable Secure Socket Layer (SSL) encryption.D、Configure caching on the shared folder. Configure offline files to use encryption.

考题 You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. Some client computers run Windows XP Professional, and the rest run Windows NT 4.0 Workstation. TestKing includes departments for accounting, design, marketing, and sales. Each department has a corresponding organizational unit (OU). A member server named Testking1 can be accessed only by user accounts in the Accounting, Design, Marketing, and Sales OUs. You install Terminal Server on Testking1. Then you install four new applications on Testking1. Each application is intended for users in only one of the four departments. You need to ensure that each application can be accessed only by users in the appropriate department. You need to achieve this goal by using the minimum amount of administrative effort. What should you do?()A、In the Default Policy Group Policy object (GPO), configure the Start program on connection policy to be the program path and file name of the application to start when the user logs on.B、In each OU, set the Environment property for each user to the program path and file name of the application that corresponds to the OU.C、On Testking1, select the RDP-Tcp connection properties. Set the program path and file name of the application to start when the user logs on.D、Create one Group Policy object (GPO) for each department. Link each GPO to the corresponding OU. For each GPO, configure the Start program on connection policy to run the application that corresponds to the appropriate department.

考题 You are the network administrator for . Your network consists of a single Active Directory domain named . All network servers run Windows Server 2003, and all client computers run Windows XP Professional. You install a new file and print server named File1. You configure standard company policies and other local options. You use third-party software to create and save an image of the server. Then you join File1 to the domain. Six weeks later, you reapply the saved image to File1 and restart the server. You try to log on to the domain by using domain credentials. However, you are unsuccessful. You need to log on to File1 and re-establish its domain membership. Your solution must require the minimum amount of administrative effort. Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two)A、Reset the computer account for File1 in Active Directory Users and Computers.B、Reset the password for Administrator account by logging on locally to File1 as a member of the local Power Users group.C、Reinstall and reconfigure File1.D、Join File1 to the domain.E、Remove File1 from the domain.

考题 You are the network administrator for The network consists of a single Active Directory domain named Some client computers run Windows NT 4.0 Workstation. Others run Windows 2000 Professional, and the rest run Windows XP Professional. Users in the accounting department require a shared folder for their own use only. The accounting users must be able to read, edit, and delete files in the shared folder. You create the shared folder and use default share permissions. You assign the Allow - Full Control NTFS permission to members of the Administrators group. You assign the Allow - Modify NTFS permission to the accounting users. However, accounting users report that they cannot access the shared folder. How should you solve this problem?()A、Change the type of setting on the folder to Documents (for any file types).B、Change the NTFS permissions on the folder to assign the Allow - Delete Sub-Folders and Files permission to the accounting users.C、Add the accounting users as owners of the folder.D、Change the share permissions to assign the Allow - Full Control permission to the accounting users.

考题 You are the administrator of a Windows 2000 network. You need to store secured files for your company’s Accounting and Legal departments on a Windows 2000 Professional computer. You want to accomplish the following goals:  • Enable users in both departments to access their own files from the network  • Enable users in the Accounting department to view the Legal department’s documents  • Prevent users in the Legal department from being able to view the Accounting department’s    documents  • Enable managers within the company to access and modify both the Accounting and the Legal   department’s files You take the following actions:   • Create two shared folders named Accounting and Legal  • Create three groups named Accounting, Legal, and Management  • Allow the Accounting group Modify permission on the Accounting folder  • Allow the Accounting group Read permissions on the Legal folders.  • Allow the Management group Modify permission on both the Accounting and Legal folders.   Which result or results do these actions produce?()A、Users in both departments can access to their own files from the network.B、Users in the Accounting department can view the Legal department’s documents.C、Users in the Legal department cannot view the Accounting department’s documents.D、Company managers can access and modify both departments’ files.

考题 You are the administrator of your company’s network. The software department is preparing to rewrite an accounting application so that it will run on Windows 2000 Professional computers. All of the computers in the software department currently use Windows 98.  You want to configure the computers in the software department so that the users can use both Windows 98 and Windows 2000 Professional during the project. You also want to ensure that the computers are configured for optimal disk performance. In addition you want to ensure that users in the software department can access all of the files on their computers by using either operating system.  What should you do? ()A、 Create and format a FAT 32 partition.B、 Create and format an NTFS volume.C、 Configure Windows 2000 Professional to enable disk compression.D、 Configure Windows 2000 Professional to enable dynamic volume

考题 You are the administrator of ExamSheet's Windows 2000 network.  You need to store secured files for ExamSheet's accounting and legal departments on a Windows 2000 Professional computer. You create two shared folders named Accounting and Legal with the default NTFS and share permissions. You also create two groups named Accounting and Legal and add the appropriate user accounts into the appropriate groups. To meet the security requirements for the shared folders the following criteria must be met:  1.Users in both departments must be able to update their own files from the network.  2.Users in the accounting department must be able to view the legal department's documents from the network.  3.Users in the legal department must be prevented from being able to view the accounting department's documents from the network.You want to ensure that all security requirements are met using the least amount of administrative effort.  What should you do? ()A、Allow the Accounting groupReadpermission on the Accounting share and the Legal shared folder. Allow the Legal groupReadpermissions on the Legal shared folder.B、Allow the Accounting groupFull Controlpermissions on the Accounting shared folder and the Legal shared folder. Allow the Legal groupFull Controlpermission on the Legal shared folder.C、Deny the Everyone groupFull Controlpermissions on the Accounting shared folder.D、Deny the Legal groupFull Controlpermission on the Accounting shared folder.

考题 You are the network administrator for The network contains a Windows Server 2003 computer named Print1 that functions as a print server. Print1 contains a printer named MarketingPrinter. Users report that print jobs they submit to the MarketingPrinter take a long time to print. You immediately examine Print1 and conclude that the server is performing at acceptable levels. You need to identify the problem. What should your next step be?()A、Use Task Manager to monitor processor and memory performance.B、Use Windows Explorer to monitor the size of the Windows/System32/Spool/prtprocs folder.C、Use System Monitor to view the Print Queue/Jobs counter.D、Use System Monitor to view the Print Queue/Enumerate Network Printer Calls couner.

考题 You are a network administrator for All servers run Windows Server 2003. A network server named Testking1 functions as the main file server. Testking1 is backed up each night by using the Backup utility. You perform a test restoration of Testking1 by using the Backup utility. You discover that files that are open during the backup process are not being backed up. You need to ensure that open files are backed up successfully. What should you do?()A、Enable volume shadow copies on the partitions that are being backed up.B、Disable volume shadow copies on the partitions that are being backed up.C、Select the Verify data after backup check box in the Advanced backup options of the backup job.D、Clear the Disable volume shadow copy check box in the Advanced backup options of the backup job.

考题 单选题You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all client computers run Windows XP Professional. A user named King uses a client computer named TestKing1. This computer has a locally attached tape device. You grant King the necessary permission to perform backups of a member server named TestKingSrvB. King runs the Backup utility on TestKing1 to back up the files located on TestKingSrvB. You need to use your client computer to view the most recent backup logs for TestKingSrvB. What should you do?()A Use Notepad to view the contents of the backup report located on TestKingSrvb.B Use Notepad to view the contents of the backup report located on TestKing1.C Use Event Viewer to view the contents of the application log located on TestKingSrvb.D Use Event Viewer to view the contents of the application log located on TestKing1

考题 单选题You are the network administrator for The network contains a Windows Server 2003 compter named TestKing1. TestKing1 functions as a file server. Six users in the accounting department use an accounting software application to open files that are stored in a shared folder on TestKing1. The users keep these files open for an extended period of time. You need to restart TestKing1. You need to find out if any files on Testking1 are open before you restart the computer. What should you do?()A Use Computer Management to view existing connections.B Use the netsend command to send a message to all domain members.C Use Task Manager to monitor processes started by all users.D Use System Monitor to monitor the Server object in Report view.

考题 多选题You are the network administrator for The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. All confidential company files are stored on a file server named TestKing1. The written company security states that all confidential data must be stored and transmitted in a secure manner. To comply with the security policy, you enable Encrypting File System (EFS) on the confidential files. You also add EFS certificates to the data decryption field (DDF) of the confidential files for the users who need to access them. While performing network monitoring, you notice that the confidential files that are stored on TestKing1 are being transmitted over the network without encryption. You must ensure that encryption is always used when the confidential files on TestKing1 are stored and transmitted over the network. What are two possible ways to accomplish this goal?() (Each correct answer presents a complete solution. Choose two)AEnable offline files for the confidential files that are stored on TestKing1, and select the Encrypt offline files to secure data check box on the client computers of the users who need to access the files.BUse IPSec encryption between TestKing1 and the client computers of the users who need to access the confidential files.CUse Server Message Block (SMB) signing between TestKing1 and the client computers of the users who need to access the confidential files.DDisable all LM and NTLM authentication methods on TestKing1.EUse IIS to publish the confidential files. Enable SSL on the IIS server. Open the files as a Web folder.

考题 多选题You are the administrator of a Windows 2000 network. You need to store secured files for your company’s Accounting and Legal departments on a Windows 2000 Professional computer. You want to accomplish the following goals:  • Enable users in both departments to access their own files from the network  • Enable users in the Accounting department to view the Legal department’s documents  • Prevent users in the Legal department from being able to view the Accounting department’s    documents  • Enable managers within the company to access and modify both the Accounting and the Legal   department’s files You take the following actions:   • Create two shared folders named Accounting and Legal  • Create three groups named Accounting, Legal, and Management  • Allow the Accounting group Modify permission on the Accounting folder  • Allow the Accounting group Read permissions on the Legal folders.  • Allow the Management group Modify permission on both the Accounting and Legal folders.   Which result or results do these actions produce?()AUsers in both departments can access to their own files from the network.BUsers in the Accounting department can view the Legal department’s documents.CUsers in the Legal department cannot view the Accounting department’s documents.DCompany managers can access and modify both departments’ files.

考题 单选题Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers. Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Tess King leaves the company. You grant her manager the Full Control NTFS permission to Tess's home folder. When the manager attempts to open any of the files, she receives the follo wing error message: "Access is denied." What should you do?()A Use System File Checker (SFC) to decrypt the file.B Log on the network as the Recovery Agent. Decrypt the files for the manager.C Log on the network as the administrator. Use theciphercommand to decrypt the files.D Log on the network as a member of the Backup Operators group. Decrypt the files for the manager.

考题 单选题You are a network administrator for your company. The network contains a Windows Server 2003 computernamed Server3. Server3 functions as a file server. Six users in the accounting department use an accounting software application to open files that are stored in a shared folder on Server3. The users keep these files open for an extended period of time. You need to restart Server3. You need to find out if any files on Server3 are open before you restart the computer. What should you do? ()A Use Computer Management to view existing connections.B Use the netsend command to send a message to all domain members.C Use Task Manager to monitor processes started by all users.D Use System Monitor to monitor the Server object in Report view.

考题 多选题You are the network administrator for The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. All confidential company files are stored on a file server named TestKing1. The written company security states that all confidential data must be stored and transmitted in a secure manner. To comply with the security policy, you enable Encrypting File System (EFS) on the confidential files. You also add EFS certificates to the data decryption field (DDF) of the confidential files for the users who need to access them. While performing network monitoring, you notice that the confidential files that are stored on TestKing1 are being transmitted over the network without encryption. You must ensure that encryption is always used when the confidential files on TestKing1 are stored and transmitted over the network. What are two possible ways to accomplish this goal? ()(Each correct answer presents a complete solution. Choose two)AEnable offline files for the confidential files that are stored on TestKing1, and select the Encrypt offline files to secure data check box on the client computers of the users who need to access the files.BUse IPSec encryption between TestKing1 and the client computers of the users who need to access the confidential files.CUse Server Message Block (SMB) signing between TestKing1 and the client computers of the users who need to access the confidential files.DDisable all LM and NTLM authentication methods on TestKing1.EUse IIS to publish the confidential files. Enable SSL on the IIS server. Open the files as a Web folder.

考题 多选题You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all client computers run Windows XP Professional. A member server named Testking1 functions as a file and print server. Testking1 is configured with default operating system settings. A user named Tess is a member of the local Backup Operators group on Testking1. She is responsible for performing backups on this computer. You need to ensure that Tess can create Remote Assistance invitations from Testking1. What are two possible ways for you to achieve this goal? ()(Each correct answer presents a complete solution. Choose two)ALog on to Testking1 with administrative privileges.Use the System Properties dialog box to enable Remote Assistance.BDirect Tess to use the System Properties dialog box to enable Remote Assistance on Testking1.CIn your Default Domain Policy, enable the Solicit Remote Assistance setting.DIn your Default Domain Policy, enable the Offer Remote Assistance setting.ELog on to Testking1 with administrative privileges. Use GPedit.msc to enable the Offer Remote Assistance setting.