网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
ou are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.Two of the servers on the network contain highly confidential documents. The company’s written security policy states that all network connections with these servers must be encrypted by using an IPSec policy.You place the two servers in an organizational unit (OU) named SecureServers. You configure a Group Policy object (GPO) that requires encryption for all connections. You assign the GPO to the SecureServers OU.  You need to verify that users are connecting to the two servers by using encrypted connections.   What should you do?()
A

Run the net view command.

B

Run the gpresult command.

C

Use the IP Security Monitor console.

D

Use the IPSec Policy Management console.


参考答案

参考解析
解析: 暂无解析
更多 “单选题ou are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.Two of the servers on the network contain highly confidential documents. The company’s written security policy states that all network connections with these servers must be encrypted by using an IPSec policy.You place the two servers in an organizational unit (OU) named SecureServers. You configure a Group Policy object (GPO) that requires encryption for all connections. You assign the GPO to the SecureServers OU.  You need to verify that users are connecting to the two servers by using encrypted connections.   What should you do?()A Run the net view command.B Run the gpresult command.C Use the IP Security Monitor console.D Use the IPSec Policy Management console.” 相关考题
考题 You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet.Which PIN architecture is applicable in those environments?()A.CampusB.TeleworkerC.BranchD.Data center

考题 A network administrator is designing a Cisco network for a large company. The network must be able to use minimal bandwidth for routing updates, converge quickly, and support VLSM, CIDR, IP and IPX. Which routing protocol will best fit the requirements of this network?()A、RIP v1B、RIP v2C、IGRPD、OSPFE、EIGRP

考题 You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()A、STPB、GVRPC、SNMPD、VTPE、DHCP

考题 You are the network administrator for your company. The network consists of a single Active Directorydomain. All network servers run Windows Server 2003. Some client computers run Windows 2000 Professional,and the rest run Windows XP Professional.All user accounts in the sales department are located in the Sales organizational unit (OU). To store roaming user profiles, you create a shared folder named Profiles on a member server named File1. You assign the Allow - Full Control permission on the Profiles folder to the Everyone group.Now you need to create roaming user profiles for the user accounts in the Sales OU.What should you do()?A、Select all user accounts in the Sales OU. Modify the account properties to specify //File1/Profiles/%username% as the profile path.B、Select all user accounts in the Sales OU. Modify the account properties to specify //File1/Profiles as the profile path.C、Create a Group Policy object (GPO) and link it to the Sales OU. In the User Configuration section of the GPO, configure Folder Redirection to use //File1/Profiles.D、Create a Group Policy object (GPO) and link it to the Domain Controllers OU. In the User Configuration section of the GPO, configure Folder Redirection to use //File1/Profiles.

考题 You are the administrator for ExamSheet.net's network.  You are using Windows Installer to deploy an application to 750 Windows 2000 Professional computers on your network. The network includes an organizational unit (OU) named Sales. A Group Policy object (GPO) is created for the Sales OU.  The software deployment of the application is unsuccessful. During the deployment, some users in the Sales OU report that the installation is aborting with random errors midway through the installation process. The remaining users in the Sales OU report that the software is installing, but is giving them general protection fault errors. You want to successfully deploy the software What should you do? ()A、Repackage and redeploy the application’s .msi file to the Sales OU.B、Repackage and redeploy the application’s .mst file to the Sales OU.C、Redeploy the application by using the Group Policy object (GPO) for the Sales OU.D、Restart Windows Installer on all computers in the Sales OU. Then redeploy the application’s .zap file to the Sales OU.

考题 You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()A、RepeaterB、Wireless routerC、HubD、Wireless network adapter

考题 You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()A、CampusB、TeleworkerC、BranchD、Data center

考题 ou are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.Two of the servers on the network contain highly confidential documents. The company’s written security policy states that all network connections with these servers must be encrypted by using an IPSec policy.You place the two servers in an organizational unit (OU) named SecureServers. You configure a Group Policy object (GPO) that requires encryption for all connections. You assign the GPO to the SecureServers OU.  You need to verify that users are connecting to the two servers by using encrypted connections.   What should you do?()A、Run the net view command.B、Run the gpresult command.C、Use the IP Security Monitor console.D、Use the IPSec Policy Management console.

考题 Your company has four regional offices. You install the Windows Deployment Services (WDS) role on the network.  Your company creates three images for each office. There are a total of 12 images for the company. The images will be used as standard images for workstations. You deploy the images by using WDS. You need to ensure that each administrator can view only the images for his or her regional office. What should you do?()A、Create a global group for each regional office and place the computers in the appropriate global group.B、Create an organizational unit (OU) for each regional office and place the computers in the appropriate OU.C、Place all images into a single image group on the WDS server. Grant each administrator permissions to the image group.D、Place each regional office into a separate image group on the WDS server. Grant each administrator permissions to his or her regional offices image group.

考题 You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm.   Immediately send a notification to a network administrator that the infected computer needs to be repaired.  What should you do?()A、Configure a WMI event trigger.B、Configure a Network Monitor capture filter.C、Configure a Network Monitor trigger.D、Configure a System Monitor alert.

考题 You are designing the top-level organizational unit (OU) structure to meet the business and technical requirements. Your design must accommodate the anticipated growth of the company.  Which top-level OU structure should you use?()A、Paris OU, Sydney OU, Los Angeles OU, Lisbon-Barcelona OU  B、IT Administration OU, All CohoVineyard Departments OU, All CohoVineyard Offices OUC、Sales OU, Purchasing OU, Marketing OU, Accounting OU, Distribution OU, Human Resources OUD、CohoVineyard Users OU, CohoVineyard Computers OU, CohoVineyard Servers OU, CohoVineyard Applications OU

考题 Your company has an Active Directory domain that runs Windows Server 2008 The Sales OU contains an OU for Computers, an OU for Groups, and an OU for Users You perform nightly backups. An administrator deletes the Groups OU You need to restore the Groups OU without affecting users and computers in the Sales OU What should you do()A、Perform an authoritative restore of the Sales OU.B、Perform an authoritative restore of the Groups OU.C、Perform a non-authoritative restore of the Groups OU.D、Perform a non-authoritative restore of the Sales OU.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. User and group objects for the sales department are located in an organizational unit (OU) named Sales.  Peter and Mary are administrators for your company. Peter is responsible for managing Sales user objects. Mary is responsible for managing Sales group objects.  You need to delegate Peter and Mary control over only the objects for which they are responsible.  What should you do?()A、 In the Sales OU, create two new OUs. Name one OU SalesUsers and place all user objects for the sales department in this OU. Name the other OU SalesGroups and place all group objects for the sales department in this OU. Grant Peter and Mary full control over the Sales OU.B、 On the Sales OU, grant Peter the right to manage user objects. On the Sales OU, grant Mary the right to manage group objects.C、 In the Sales OU, create a new OU. Name this OU SalesGroups. Place all Sales groups in theSalesGroups OU.Grant Peter the right to manage all objects in the Sales OU. Grant Mary the right to manage all objects in the SalesGroups OU.D、 On the Sales OU, deny Peter the right to manage group objects. On the Sales OU, deny Mary the right to manage user objects.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. The domain includes an organizational unit (OU) named Processing. There are 100 computer accounts in the Processing OU. You create a Group Policy object (GPO) named NetworkSecurity and link it to the domain. You configure NetworkSecurity to enable security settings through the Computer Configuration section of the Group Policy settings. You need to ensure that NetworkSecurity will apply only to the computers in the Processing OU. You need to minimize the number of GPO links.  What should you do?()A、 Link NetworkSecurity to the Processing OU. Disable the User Configuration section of NetworkSecurity.B、 Link NetworkSecurity to the Processing OU. Remove the link from NetworkSecurity to the domain.C、 Modify the discretionary access control list (DACL) for NetworkSecurity to assign all computer accounts in the Processing OU the Allow - Read and the Allow - Apply Group Policy permissions.D、 Modify the discretionary access control list (DACL) for NetworkSecurity to assign the Authenticated Users group the Deny - Apply Group Policy permission and to assign all of the computer accounts in the Processing OU the Allow - Read and the Allow - Apply Group Policy permissions.

考题 You have an Exchange Server 2010 organization.  Company policy states that a copy of a users mailbox must be kept for one year after the user leaves the company.  All user accounts are in an organizational unit (OU) named OU1.  A compliance administrator plans to export the mailboxes to personal folders.  You need to recommend a solution that allows the compliance administrator to meet the requirements ofthe company policy.  What should you include in the solution?()A、a new management role assignmentB、delegated permissions to OU1C、managed folder mailbox policiesD、new Personal Archives

考题 You are a network administrator for your company. You currently automate backups of the System State data on the servers in your network by using NTBackup. Your manager instructs you to document the procedure for restoring a server from a backup of the System State data.You need to select the correct method for performing a restoration of a backup of the System State data.What should you do?()A、Run the following command: ntbackup.exe backup /F {"FileName"}B、Run the following command: ntbackup.exe backup systemstate /F {"FileName"}C、In Control Panel, open System, and configure the Startup and Recovery settings on the Advanced tab.D、Use NTBackup interactively.

考题 单选题A network administrator is designing a Cisco network for a large company. The network must be able to use minimal bandwidth for routing updates, converge quickly, and support VLSM, CIDR, IP and IPX. Which routing protocol will best fit the requirements of this network?()A RIP v1B RIP v2C IGRPD OSPFE EIGRP

考题 单选题You are the network administrator for your company. Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2003. You add eight servers for a new application. You create an organizational unit (OU) named Application to hold the servers and other resources for the application. Users and groups in the domain will need varied permissions on the application servers. The members of a global group named Server Access Team need to be able to grant access to the servers. The Server Access Team group does not need to be able to perform any other tasks on the servers. You need to allow the Server Access Team group to grant permissions for the application servers without granting the Server Access Team group unnecessary permissions.  What should you do?()A  Create a Group Policy object (GPO) for restricted groups. Configure the GPO to make the Server Access Team group a member of the Power Users group on each application server. Link the GPO to the Application OU.B  Grant the Server Access Team group permissions to modify computer objects in the Application OU.C  Move the Server Access Team group object into the Application OU.D  Create domain local groups that grant access to the application servers. Grant the Server Access Team group permissions to modify the membership of the domain local groups.

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain named All network servers run Windows Server 2003. Terminal Server is installed on a member server named Server1, which is located in an organization unit (OU) named Servers. User of Server1 report unacceptable response times. To investigate, you start Task Manager on Server1. You discover that the average CPU usage is 80 percent. However, when you select the Processes tab, none of the processes show significant CPU usage. You need to identify the process that is responsible for the CPU usage. What should you do?()A In Task Manager, select the Show processes from all users option.B From a command prompt, run the query process command.C Open the Terminal Services Manager. Select Server1 from the list of servers, and then select the Processes tab.D Edit the Group policy object (GPO) for the Servers OU by adding your user account to the Profile a single process policy. Then use Task Manager to re-examine Server1.

考题 单选题You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()A STPB GVRPC SNMPD VTPE DHCP

考题 单选题You are the administrator of your company’s network. Using Windows Installer packages, you want to install customized versions of Microsoft Excel on different departments in the company. Which type of file should you apply to the installation database?()A msiB mstC zapD zip

考题 单选题You have an Exchange Server 2010 organization.  Company policy states that a copy of a users mailbox must be kept for one year after the user leaves the company.  All user accounts are in an organizational unit (OU) named OU1.  A compliance administrator plans to export the mailboxes to personal folders.  You need to recommend a solution that allows the compliance administrator to meet the requirements ofthe company policy.  What should you include in the solution?()A a new management role assignmentB delegated permissions to OU1C managed folder mailbox policiesD new Personal Archives

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The domain includes an organizational unit (OU) named Processing. There are 100 computer accounts in the Processing OU. You create a Group Policy object (GPO) named NetworkSecurity and link it to the domain. You configure NetworkSecurity to enable security settings through the Computer Configuration section of the Group Policy settings. You need to ensure that NetworkSecurity will apply only to the computers in the Processing OU. You need to minimize the number of GPO links.  What should you do?()A  Link NetworkSecurity to the Processing OU. Disable the User Configuration section of NetworkSecurity.B  Link NetworkSecurity to the Processing OU. Remove the link from NetworkSecurity to the domain.C  Modify the discretionary access control list (DACL) for NetworkSecurity to assign all computer accounts in the Processing OU the Allow - Read and the Allow - Apply Group Policy permissions.D  Modify the discretionary access control list (DACL) for NetworkSecurity to assign the Authenticated Users group the Deny - Apply Group Policy permission and to assign all of the computer accounts in the Processing OU the Allow - Read and the Allow - Apply Group Policy permissions.

考题 单选题You are the administrator for Company’s network.You are using Windows Installer to deploy an application to 500 Windows 2000 Professional computerson your network. The network includes an organizational unit (OU) named Marketing. A Group Policyobject (GPO) is created for the Marketing OU.The software deployment of the application is unsuccessful. During the deployment, some users in theMarketing OU report that the installation is stopping with random errors midway through theinstallation process. The remaining users in the Marketing OU report that the software is installing but itis giving them general protection fault errors.You want the installation of the application to complete successfully.What should you do?()A Redeploy the application as a .zap file to the Marketing OU.B Redeploy the application by using the Group Policy object (GPO) for the Marketing OU.C Repackage and redeploy the application’s .msi file to the Marketing OU.D Repackage and redeploy the application’s .mst file to the Marketing OU.

考题 单选题You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()A Configure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addressesB Configure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points useC Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networksD Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain.All servers run Windows Server 2003.You place computer accounts for servers in organizational units (OUs) that are organized by server roles. You apply Group Policy objects (GPOs) to these servers at the OU level.You need to add a new server to the domain. You need to ensure that the appropriate GPOs are applied to this server.What should you do? ()A Prestage a domain computer account for the new server in the appropriate OU. Join the server to the domain by using the prestaged computer account.B On the new server, add the domain name for the Active Directory domain to the DNS suffix setting. Join the server to the domain.C Assign a user account the Allow - Create permission for the appropriate OU. Join the new server to the domain by using the user account.D Join the new server to the Active Directory domain. On the new server, run the gpupdate /force command.

考题 单选题You are the network administrator for your company. All network servers run Windows Server 2003. All client computers run Windows XP Professional. A member server named Server1 is located at a branch office that does not permit the use of Remote Desktop Protocol. Another administrator uses the Backup utility to create a scheduled backup job on Server1. The backup job performs a normal backup of an application server. The application server is removed from the network. You need to use a client computer to remove the backup job from Server1. You cannot travel to the branch office. What should you do? ()A Use the RUNAS feature to run the at /delete command as the Server1/Administrator account.B Log on by using your Administrator account and run the ntbackup /D command.C Log on by using your Administrator account and run the schtasks /delete command.D Use the RUNAS feature to run the taskkill command as the Server1/Administrator account.

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All network servers run Windows Server 2003. The domain contains three domain controllers: DC1, DC2, and DC3. Each one hosts user data. DC1 experiences hard disk failure. You need to temporarily restore the user data to DC2. Which type of restoration should you perform? ()A Automated System Recovery (ASR)B normalC primaryD authoritative