You are the network administrator for your company. The netw

题目
单选题
You are the network administrator for your company. The network consists of a single Active Directory domain. All domain controllers run Windows Server 2003, and each one has a locally attached tape device. You need to back up each domain controller. Your backup process must fulfill the following requirements: System recovery must be possible in the event of server failure. The system configuration and all current dynamic disk configurations must be backed up. Other data partitions do not need to be backed up. What should you do?()
A

Use the Backup utility to back up the system files and to create an Automated System Recovery (ASR) disk.

B

Use the Backup utility to back up the contents of all mounted drives.

C

Use the Backup utility to back up only the System State data.

D

Use the Copy command to copy C:/windows and its subfolders to a shared folder on the network.

E

Use the Xcopy command to copy C:/windows and its subfolders to a shared folder on the network.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You are a network administrator for your company. You currently automate backups of the System State data on the servers in your network by using NTBackup. Your manager instructs you to document the procedure for restoring a server from a backup of the System State data.You need to select the correct method for performing a restoration of a backup of the System State data.What should you do?()

A. Run the following command: ntbackup.exe backup /F {"FileName"}

B. Run the following command: ntbackup.exe backup systemstate /F {"FileName"}

C. In Control Panel, open System, and configure the Startup and Recovery settings on the Advanced tab.

D. Use NTBackup interactively.


参考答案:D

第2题:

You are an administrator of Ezonexam.com's network. You want to perform. routine upgrades on your Windows 2000 Server computer. You use your non-administrator user account in the domain to logon to the server.

You want to upgrade all of the critical system files and patches on the server in the shortest possible time.

What should you do?

A.Use Windows Update.

B.Run System File Checker.

C.Log on as administrator and run Windows Update.

D.Log on as administrator and run System File Checker.


正确答案:C
解析:Explanation:WindowsUpdateisusedtoupgradethesystemfilesandtoretrieveandapplythelatestservicepacksandpatchesfortheoperatingsystem.AllnecessaryfilesaredownloadedthroughtheInternet.TobeabletorunWindowsUpdatewemusthaveadministrativerights.Incorrectanswers:A:Thenon-administrativeuseraccountcannotbeusedtorunWindowsUpdate.TorunWindowsUpdatewemusthaveadministrativerights.B:SystemFileCheckercheckstheintegrityofthesystemfiles.Itcannotbeusedtoupgradethesystemfilesortoretrieveandapplythelatestservicepacksandpatchesfortheoperatingsystem.D:SystemFileCheckercheckstheintegrityofthesystemfiles.Itcannotbeusedtoupgradethesystemfilesortoretrieveandapplythelatestservicepacksandpatchesfortheoperatingsystem.

第3题:

You are an administrator of the Ezonexam switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in the Ezonexam network.

However, you need to share the VLAN information across numerous switches. Which of the following would allow you accomplish this?

A. STP

B. GVRP

C. SNMP

D. VTP

E. DHCP

F. None of the above


正确答案:D
D 解析:Explanation:
The VTP (VLAN Trunking Protocol) is a Cisco Layer 2 messaging protocol that manages the addition, deletion, and renaming of VLANs on a network-wide basis. It allows for VLAN information to span multiple switches within the switch domain.

Incorrect Answers:
A. STP is a switching protocol but it is used for preventing network loops.

B. GVARP is an actual protocol used in switch administration, but it beyond the scope of what a CCNA is expected to know.

C. SNMP is a protocol used for managing and monitoring networks

E. DHCP is the Dynamic Host Configuration Protocol, which allows for PC's to obtain their IP address dynamically upon booting up, along with their DNS and default gateway information.

第4题:

You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain. The domain contains a Windows Server 2003 computer named Server1.   You are planning a public key infrastructure (PKI) for the company. You want to deploy a certification authority (CA) on Server1.   You create a new global security group named Cert Administrators. You need to delegate the tasks to issue, approve, and revoke certificates to members of the Cert Administrators group.   What should you do?()

  • A、 Add the Cert Administrators group to the Cert Publishers group in the domain.
  • B、 Configure the Certificates Templates container in the Active Directory configuration naming context to assign the Cert Administrators group the Allow - Write permission.
  • C、 Configure the CertSrv virtual directory on Server1 to assign the Cert Administrators group the Allow - Modify permission.
  • D、 Assign the Certificate Managers role to the Cert Administrators group.

正确答案:D

第5题:

You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet.Which PIN architecture is applicable in those environments?()

A.Campus

B.Teleworker

C.Branch

D.Data center


参考答案:C

第6题:

You are a network administrator for your company. All servers run Windows Server 2003. A server namedServer34 runs an application named App1.Users report that App1 is performing slowly. You suspect that an unauthorized application is installed on Server34.You run the netstat command and examine the output, as shown in the exhibit. (Click the Exhibit button.)You need to identify the unauthorized application by using the output from the netstat command.Which tool should you use to identify the application? ()

A. Performance console

B. System Monitor

C. Network Monitor

D. Task Manager


参考答案:D

第7题:

You are a network administrator for Ezonexam.com's Windows 2000 network.

Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers.

Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Jack Bauer leaves the company. You grant her manager the Full Control NTFS permission to Jack's home folder. When the manager attempts to open any of the files, she receives the following error message: "Access is denied."

What should you do?

A.Use System File Checker (SFC) to decrypt the file.

B.Log on the network as the Recovery Agent. Decrypt the files for the manager.

C.Log on the network as the administrator. Use the cipher command to decrypt the files.

D.Log on the network as a member of the Backup Operators group. Decrypt the files for the manager.


正确答案:B
解析:Explanation: A user has asked for EFS to be configured on his or her Windows 2000 Professional computer. You need to enable the Recovery Agent on the computer to be able to unencrypt files if the user's private key has been deleted. In this case Jack left the company and his manager needs access to the files. Even with Full Control NTFS permissions she could not get access, thus you need to make use of the recovery agent to decrypt the files for the manager. Remember that the user who encrypts a file is the only user who can access the file (except for the recovery agent).

Incorrect answers:
A: System file checker (sfc.exe) is a command-line utility that scans and verifies the versions of all protected system files. System file checker (sfc.exe) will discover that a protected file has been overwritten and replace it with the correct version of the file from the %systemroot%\system32\dllcache folder. This is not going to grant the manager access to the files in this case.

C: The Cipher utility allows you to encrypt files and folders as well as check the encryption statistics. But this is not what should be used in this scenario.

D: Membership in the Backup Operators group enables a user to back up and restore file systems regardless of permissions, ownership, encryption settings, or audit settings. Membership in this group enables you to assign users the authority to back up file systems without having to assign the users specific permissions to access the resources. However, this is not what is required here.

第8题:

You are the network administrator for your company. The network originally consists of a single Windows NT 4.0 domain.

You upgrade the domain to a single Active Directory domain. All network servers now run Windows Server 2003, and all client computers run Windows XP Professional.

Your staff provides technical support to the network. They frequently establish Remote Desktop connections with a domain controller named DC1.

You hire 25 new support specialists for your staff. You use Csvde.exe to create Active Directory user accounts for all 25.

A new support specialist named Paul reports that he cannot establish a Remote Desktop connection with DC1. He receives the message shown in the Logon Message exhibit. (Click the Exhibit button.)

You open Gpedit.msc on DC1. You see the display shown in the Security Policy exhibit. (Click the Exhibit button.)

You need to ensure that Paul can establish Remote Desktop connections with DC1.

What should you do? ()


参考答案:B

第9题:

You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()

  • A、STP
  • B、GVRP
  • C、SNMP
  • D、VTP
  • E、DHCP

正确答案:D

第10题:

You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()

  • A、Repeater
  • B、Wireless router
  • C、Hub
  • D、Wireless network adapter

正确答案:D

更多相关问题