网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You have two servers that run Windows Server 2008 Enterprise. Both servershave the Failover Clustering feature installed. You have the servers configured as a two-node cluster. Thecluster nodes are named NODE1 and NODE2. You have an application named PrintService that includes aprint spooler resource. You need to configure the cluster to automatically return the PrintService applicationto NODE1 after a failover. Which two actions should you perform?()
A

The Allow Failback and Immediate options should be enabled for the PrintService application.

B

The If restart is unsuccessful, failover all resources in this server or application option should bedisabled in the properties of the print spooler resource.

C

The Period (hours) option should be set to 0 in the properties of the print spooler resource.

D

NODE1 should be moved to the top of the list of preferred owners for the PrintService application.


参考答案

参考解析
解析: 暂无解析
更多 “多选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You have two servers that run Windows Server 2008 Enterprise. Both servershave the Failover Clustering feature installed. You have the servers configured as a two-node cluster. Thecluster nodes are named NODE1 and NODE2. You have an application named PrintService that includes aprint spooler resource. You need to configure the cluster to automatically return the PrintService applicationto NODE1 after a failover. Which two actions should you perform?()AThe Allow Failback and Immediate options should be enabled for the PrintService application.BThe If restart is unsuccessful, failover all resources in this server or application option should bedisabled in the properties of the print spooler resource.CThe Period (hours) option should be set to 0 in the properties of the print spooler resource.DNODE1 should be moved to the top of the list of preferred owners for the PrintService application.” 相关考题
考题 A: What do you do, Polly? B: I work for an IT company.()

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a server named S01 that runs Windows Server 2008 and Hyper-V inyour company. Three virtual machines are hosted on S01. According to the requirement of company policy,the virtual machines must not connect to the company network. All of the virtual machines need to beconfigured to connect to each other. You must meet the company policy. Which should you do?()A、The Connection should be set to Host for the network interface card.B、The Connection should be set to None for the network interface card.C、You should choose the Not connected option for each virtual machine.D、The Enable virtual LAN identification option should be enabled for each virtual machine.

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. A Windows Server 2008 server is contained by your company and the WebServer (IIS) server role is installed on the server. A Web site is included by the server. Since you are thetechnical report, you are required to encrypt the cookies sent from the Web site on users computers. Which Web site feature should be configured to achieve the goal?()A、To achieve the goal, Authorization Rules should be configured.B、To achieve the goal, Pages And Controls should be configured.C、To achieve the goal, SSL Settings should be configured.D、To achieve the goal, Machine Key should be configured.

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services,and configuring aweb services infrastructure. You have the Windows Deployment Services (WDS) role installed on a serverthat runs Windows Server 2008. You plan to install Windows Vista on a computer that does not supportPreboot Execution Environment (PXE). You have a Windows Vista image that is stored on the WDS server. You have to start the computer and install the image that is stored on the WDS server. What should you create?()A、You should create a discover imageB、You should create an install imageC、You should create a capture imageD、You should create a CD-ROM that contains PXE drivers

考题 You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as a database administrator for your company. The users report the slow performance of a SQL Server 2005 application. You are required to identify the queries which perform slowly because of blocking. Which action should you perform?()A、In a SQL Trace log file, you should look for queries with low duration values and high read and write values.B、In a query execution plan, you should look for queries with missing or out-of-date statistics.C、In a SQL Trace log file, you should look for queries with high duration values and low read and write values.D、In a query execution plan, you should look for queries with a large number of table scans.

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The server hasthe Web Server (IIS) server role installed. The server contains a Web site that is configured to use onlyWindows Authentication. You have a security group named Group1 that contains several user accounts.Now you receive an order from the company management. According to the company requirement, youhave to prevent the members of Group1 from accessing a Web site. But you are not allowed prevent otherusers from accessing the Web site. Which Web site feature should you configure?()A、You should configure SSL SettingsB、You should configure AuthenticationC、You should configure Authorization RulesD、You should configure IIS Manager Permissions

考题 You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services, configuring name resolution and network access and so on. You are in charge of a domain controller that runs windows server 2008 and the DNS server role. The dns server hosts an active directory-integrated zone for your domain. You need to provide a user with the ability to manage records in the zone. But the user must not so what action should you perform?()A、The user permissions on the zone should be granted.B、The user permissions on the DNS zone should be granted.C、The user should be added to the DNSUpdateProxy Global security group.D、The user should be added to the DNSAdmins domain local security group.

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is an Active Directory domain in your company. The company runsTerminal Services. All Terminal Services accounts are configured to allow session takeover without permission. A user has used an account named User1 to log on to a server named S02. The session ID forUser1 is 1337. You need to perform a session takeover for session ID 1337. Which commands should you run?()A、You should run Tsdiscon 1337, and then Tscon 1337B、You should run Chgusr 1337 /disable, and then Tscon 1337C、You should run Takeown /U User1 1337, and then Tscon 1337D、You should run Tsdiscon 1337, and then Chgport /U User1 1337

考题 You work as the IT professional in an international company which is named wikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services, configuring name resolution and network access and so on. Your company has a server named printer a that runs windows server 2008. Printer a has the print services server role installed. You have to reduce the so what action should you perform?()A、After you open the print management console, you should open the properties of each individual printer on printer A and clear the enable advanced printing features option.B、After you open the event viewer console, a custom view for the system log should be created. Exclude the events that are notified by event ID 10 from the filter.C、After you open the print management console, you should open the properties of printer A and clear the log spooler information events option.D、After you open the print management console, you should open the properties of printer A and clear the show informational notifications for network printers option.

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There are four Terminal Servers that run Windows Server 2008. The TerminalServers are respectively named S01, S02, S03, and S04. You have the Terminal Server Session Brokerrole service installed on S01. You have to configure load balancing for the four Terminal Servers. Now youreceive an order from the company management. According to the company requirement, you must makesure that S02 is the preferred server for Terminal Services sessions. Which tool should you choose to use?()A、You should choose to use TS Gateway ManagerB、You should choose to use Terminal Services ManagerC、You should choose to use Group Policy ManagementD、You should choose to use Terminal Services Configuration

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a single Active Directory domain in your company. The domaincontains a server that runs Windows Server 2008. The server has Windows SharePoint Services (WSS)installed. Now you receive an order from the company management. According to the company requirement, you should allow users to create distribution lists from a SharePoint site. What action should you perform on the WSS server?()A、The site should be configured to use the default Rights Management server in Active Directory DomainServices.B、The outgoing mail character set should be set to 1200(Unicode).C、The SharePoint Directory Management Service should be enabled.D、The site should be configured to accept messages from authenticated users only.

考题 You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as a database administrator for your company. You utilize the SP:Recompile event class to run SQL Server Profiler. You find that a great amount of recompiles occurring. The possible causes of the large number of recompiles should be identified.  From the flowing four options, which one is the most possible cause of the problem?()A、The sp_executesql batches are not being recovered from the procedure cache.B、A database administrator executed UPDATE STATISTICS statements on all tables, and the most common stored procedures reference all the tables.C、One new stored procedure is created by a database administrator.D、Ad hoc batches are not being recovered from the procedure cache.

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a server that runs Windows Server 2008 in your company. The serverhas the Web Server (IIS) server role installed. Now you receive an order from the company management.You are asked to activate SSL for the default Web site. What should you do?()A、Use the IIS Manager console to add bindings for the HTTPS protocol to the default Web site.B、You should use the IIS Manager console to obtain and import a server certificate.C、Use the Server Manager console to perform the installation of the Digest Authentication component forthe Web server role.D、You should choose the Generate Key option in the Machine Key dialog box for the default Web site.

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The server hasthe Hyper-V server role installed. Now you receive an order from the company management. According tothe company requirement, you have to merge a differencing disk and a parent disk. What action should you perform?()A、The differencing disk should be inspected.B、The parent disk should be edited.C、The parent disk should be inspected.D、The differencing disk should be edited.

考题 You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services. Configuring name resolution and network access and so on.Your company is desigiing its network. The network will use an IPv6 prefix of 2001:DB8: BBCC:0000::/53. You have to identify an IPv6 addressing scheme that will support 2000 subnets. Which network mask should you use?()A、You should use /63.B、You should use /64.C、You should use /61.D、You should use /62.

考题 单选题You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services. Configuring name resolution and network access and so on.Your company is desigiing its network. The network will use an IPv6 prefix of 2001:DB8: BBCC:0000::/53. You have to identify an IPv6 addressing scheme that will support 2000 subnets. Which network mask should you use?()A You should use /63.B You should use /64.C You should use /61.D You should use /62.

考题 单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The server hasthe Web Server (IIS) server role installed. The server contains a Web site that is configured to use onlyWindows Authentication. You have a security group named Group1 that contains several user accounts.Now you receive an order from the company management. According to the company requirement, youhave to prevent the members of Group1 from accessing a Web site. But you are not allowed prevent otherusers from accessing the Web site. Which Web site feature should you configure?()A You should configure SSL SettingsB You should configure AuthenticationC You should configure Authorization RulesD You should configure IIS Manager Permissions

考题 单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services,and configuring aweb services infrastructure. You have the Windows Deployment Services (WDS) role installed on a serverthat runs Windows Server 2008. You plan to install Windows Vista on a computer that does not supportPreboot Execution Environment (PXE). You have a Windows Vista image that is stored on the WDS server. You have to start the computer and install the image that is stored on the WDS server. What should you create?()A You should create a discover imageB You should create an install imageC You should create a capture imageD You should create a CD-ROM that contains PXE drivers

考题 单选题As the administrator of your company’s network, you will be installing Windows 2000 Professional on 10 new Pentium III computers. Your company does business with a horde of countries and accepts many currencies. You must ensure that international currency options are set for 5 of the 10 computers. The remaining 5 computers must be configured to support different input locales.   How can you most efficiently set the correct international currency options and configure different input locales on each specified group of computers? ()A  During the unattended installation of Windows 2000 Professional.B  Make the appropriate changes in the regional settings dialogue box during the installation of Windows 2000 Professional.C  After Windows 2000 Professional is installed, logon and make the changes through thecontrol panel.D  Make the appropriate changes in the date and time settings dialogue box during theinstallation of Windows 2000 Professional.

考题 单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. A Windows Server 2008 server is contained by your company and the WebServer (IIS) server role is installed on the server. A Web site is included by the server. Since you are thetechnical report, you are required to encrypt the cookies sent from the Web site on users computers. Which Web site feature should be configured to achieve the goal?()A To achieve the goal, Authorization Rules should be configured.B To achieve the goal, Pages And Controls should be configured.C To achieve the goal, SSL Settings should be configured.D To achieve the goal, Machine Key should be configured.

考题 单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a single Active Directory domain in your company. The domaincontains a server that runs Windows Server 2008. The server has Windows SharePoint Services (WSS)installed. Now you receive an order from the company management. According to the company requirement, you should allow users to create distribution lists from a SharePoint site. What action should you perform on the WSS server?()A The site should be configured to use the default Rights Management server in Active Directory DomainServices.B The outgoing mail character set should be set to 1200(Unicode).C The SharePoint Directory Management Service should be enabled.D The site should be configured to accept messages from authenticated users only.

考题 单选题Our company is a professional one,and you may rely()it.A onB inC atD up

考题 单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The server hasthe Hyper-V server role installed. Now you receive an order from the company management. According tothe company requirement, you have to merge a differencing disk and a parent disk. What action should you perform?()A The differencing disk should be inspected.B The parent disk should be edited.C The parent disk should be inspected.D The differencing disk should be edited.

考题 单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is an Active Directory domain in your company. The company runsTerminal Services. All Terminal Services accounts are configured to allow session takeover without permission. A user has used an account named User1 to log on to a server named S02. The session ID forUser1 is 1337. You need to perform a session takeover for session ID 1337. Which commands should you run?()A You should run Tsdiscon 1337, and then Tscon 1337B You should run Chgusr 1337 /disable, and then Tscon 1337C You should run Takeown /U User1 1337, and then Tscon 1337D You should run Tsdiscon 1337, and then Chgport /U User1 1337

考题 多选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a server named S01 that runs Windows Server 2008 and Hyper-V inyour company. Three virtual machines are hosted on S01. According to the requirement of company policy,the virtual machines must not connect to the company network. All of the virtual machines need to beconfigured to connect to each other. You must meet the company policy. Which should you do?()AThe Connection should be set to Host for the network interface card.BThe Connection should be set to None for the network interface card.CYou should choose the Not connected option for each virtual machine.DThe Enable virtual LAN identification option should be enabled for each virtual machine.

考题 单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There are four Terminal Servers that run Windows Server 2008. The TerminalServers are respectively named S01, S02, S03, and S04. You have the Terminal Server Session Brokerrole service installed on S01. You have to configure load balancing for the four Terminal Servers. Now youreceive an order from the company management. According to the company requirement, you must makesure that S02 is the preferred server for Terminal Services sessions. Which tool should you choose to use?()A You should choose to use TS Gateway ManagerB You should choose to use Terminal Services ManagerC You should choose to use Group Policy ManagementD You should choose to use Terminal Services Configuration

考题 多选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a server that runs Windows Server 2008 in your company. The serverhas the Web Server (IIS) server role installed. Now you receive an order from the company management.You are asked to activate SSL for the default Web site. What should you do?()AUse the IIS Manager console to add bindings for the HTTPS protocol to the default Web site.BYou should use the IIS Manager console to obtain and import a server certificate.CUse the Server Manager console to perform the installation of the Digest Authentication component forthe Web server role.DYou should choose the Generate Key option in the Machine Key dialog box for the default Web site.

考题 单选题You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005.You work as a database administrator for your company. A SQL Server 2005 database is utilized in your company. And a table named Inventory is contained by the database. A column named Price is included by the table. According to the company policy, you cannot reduce more than 10 percent the value in the Price column in any single database operation. Through many kinds of method, the company makes updates to the Price column. For instance, the utilization of ad hoc queries is one of the methods. Since you are the database administrator, you should confirm that this company policy takes its effect. Which action should be performed?()A A stored procedure should be created, and changes are disallowed by the procedure to the Price column that violates company policy.B On the Price column, a check constraint should be created, and a specified minimum value is required by the check constraint.C A trigger should be created, and changes are rolled back by the trigger to the Price column that violates company policy.D On the Price column, a foreign key constraint is created to a table that valid prices are included.