You are the network administrator for Test King. All network

题目
单选题
You are the network administrator for Test King. All network servers run Windows Server 2003. You perform a full backup of the network every Monday. You perform incremental backups on Tuesday, Wednesday, Thursday, and Friday. Backups are always performed at 1:00 A.M. On Friday afternoon, a user accidentally deletes a file. You need to restore the file. What should you do?()
A

Open each backup log, beginning with Monday and moving forward through the week. In each log, search for a backup of the file. Restore the first backup that you find.

B

Open each backup log, beginning with Friday and moving backward through the week. In each log, search for a backup of the file. Restore the first backup that you find.

C

Open each backup log, beginning with Tuesday and moving forward through the week. In each log, search for a backup of the file. Restore the first backup that you find.

D

Open the backup log for Monday. Search for a backup of the file. If you find a backup, restore the file. If you do not find a backup, open the backup log for Friday and search there. If you find a backup, restore the file. If you do not find a backup, continue opening backup logs, moving backward through the week from Friday Restore the first backup that you find.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

When you create a network implementation VLAN solution, what is one procedure that you should include in your plan?()

  • A、Perform an incremental implementation of components.
  • B、Following the PPDIOO model, implement the entire solution and then test end-to-end to make sure that it is performing as designed.
  • C、Implement trunking of all VLANs to ensure that traffic is crossing the network as needed before performing any pruning of VLANs.
  • D、Test the solution on a segmented portion of a lab network prior to rolling out across the entire network.

正确答案:A

第2题:

You are planning a new VLAN-based network solution.  What is one item you should consider when creating your implementation plan as it concerns VLANs?()

  • A、generic router and switch configuration parameters
  • B、end-to-end test plan after all components have been installed and  configured
  • C、administrator assignments
  • D、rollback plan

正确答案:D

第3题:

You are the administrator of a Windows 2000 Active Directory network. The network consists of a single domain. The domain includes 20 Windows NT Workstation 4.0 client computers. All other client computers are Windows 2000 Professional computers.

You create a Windows NT 4.0 default user policy on the Windows 2000 Server computer that is configured as the PDC emulator. This default user policy denies access to Network Neighborhood. You then install Terminal Services on one of the servers and Terminal Services Client on the 20 Windows NT Workstation client computers.

You find that the users of the Terminal Server can still browse the network when they open My Network Places. You want to prevent all users from browsing the network.

What should you do?

A.Modify the Windows NT policy template file so that you can restrict access to both My Network Places and Network Neighborhood. Save the policy file on the Terminal Server.

B.Copy the Windows NT policy file to the 20 Windows NT Workstation computers.

C.Create a Windows 2000 Group Policy that denies user access to My Network Places.

D.Edit the local registry on the Windows NT Workstation computers to deny access to Entire Network in Network Neighborhood.


正确答案:C
解析:Explanation: Windows NT 4.0 system polices affect computers running Windows NT 4.0. The Windows NT computers in this scenario are being used as Terminals for the Windows 2000 Server computer that is running Terminal Services. In effect the Windows NT clients are running locally on the Windows 2000 Server. The restriction must be applied on the Windows 2000 Server. This can be done by using a group policy.

Incorrect answers:
A: System policy templates only affect Windows NT 4.0 computers. The restriction must be applied on the Windows 2000 Server.

B: Windows NT policies only affect Windows NT 4.0 computers. The restriction must be applied on the Windows 2000 Server.

D: The NT clients are running locally on the Windows 2000 Server. The restriction must be applied on the Windows 2000 Server.

第4题:

You are the administrator of ExamSheet.net's network.  ExamSheet upgrades its network to 100 Mbps. You remove the old network adapter and install a new 10/100 Mbps network adapter into a Windows 2000 Professional computer. You configure the TCP/IP protocol settings so that IP and DNS addresses are obtained automatically. When you restart the computer you cannot access the network. When you attempt toPINGaddress 127.0.0.1 you receive the following error message: "Request timed out."  You want this computer to communicate on the network. What should you do?()

  • A、Configure IP address settings manually.
  • B、Replace the network adapter.
  • C、Disable TCP/IP filtering for all network adapters.
  • D、Configure DNS server address settings manually.
  • E、Enable IEEE 802.1x authentication.

正确答案:B

第5题:

You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()

  • A、Repeater
  • B、Wireless router
  • C、Hub
  • D、Wireless network adapter

正确答案:D

第6题:

You are the network administrator for Your network consists of a single Active Directory domain named All network servers run Windows Server 2003. All client computers run Windows XP Professional. TK1 is your global catalog server. TK2 runs Software Update Services (SUS). The Set Options console on TK2 uses all default settings. You configure the client computers to access the service on TK1 and TK2. Three months later, Microsoft releases a critical security update for Windows XP Professional. From a test client computer, you use Windows Update to download the update. You test the update and receive no error messages. Now you need to deploy the update to all client computers as quickly as possible. You must ensure that the update is not deployed to any servers. Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two)

  • A、On TK1, configure the Default Domain Group Policy object (GPO) to distribute the security update.
  • B、On TK1, initiate replication.
  • C、On TK2, initiate synchronization.
  • D、On TK2, approve the security update.

正确答案:C,D

第7题:

You work as a network administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.The network as a server named ABC_SR05 that provides DHCP services.You need to create the DHCP scopes to support a subnet that has 800 hosts.You want to minimize the number of unused IP addresses on each subnet. How would you configure DHCP to support these subnets?()

  • A、You should assign the network 172.16.0.0/16.
  • B、You should assign the network 172.16.0.0/17.
  • C、You should assign the network 172.16.0.0/18.
  • D、You should assign the network 172.16.0.0/19.
  • E、You should assign the network 172.16.0.0/20.
  • F、You should assign the network 172.16.0.0/22.

正确答案:F

第8题:

You are the network administrator for Test King. All network servers run Windows Server 2003. A server named TestKingSrv hosts applications for network users.TestKingSrv contains a motherboard that can support two CPUs. One CPU is currently installed. TestKingSrv has 512 MB of RAM and a single 36 - GB integrated device electronics (IDE) hard disk. It has a 10 MB Ethernet card connected to a 10/100 Mb switch.After TestKingSrv is in use for five months, network users report unacceptable response times on their applications.You open System Monitor on TestKingSrv and see the information shown in the following table.You need to improve the performance of Server 1.What should you do?()

A. Add an additional CPU.

B. Add an additional 512 MB of RAM.

C. Replace the existing hard disk with a faster one.

D. Replace the 10-Mb Ethernet card with a 100-Mb Ethernet card.


参考答案:C

第9题:

You are a network administrator for your company. All domain controllers run Windows Server 2003. The network contains 50 Windows 98 client computers, 300 Windows 2000 Professional computers, and 150 Windows XP Professional computers.   According to the network design specification, the Kerberos version 5 authentication protocol must be used for all client computers on the internal network.   You need to ensure that Kerberos version 5 authentication is used for all client computers on the internal network.   What should you do?  ()

  • A、 On each domain controller, disable Server Message Block (SMB) signing and encryption of the secure channel traffic.
  • B、 Replace all Windows 98 computers with new Windows XP Professional computers.
  • C、 Install the Active Directory Client Extensions software on the Windows 98 computers.
  • D、 Upgrade all Windows 98 computers to Windows NT Workstation 4.0.

正确答案:B

第10题:

You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a four-node Network Load Balancing cluster. All nodes run Windows Server 2003. The cluster has converged successfully. You use Network Load Balancing Manager on the default host to configure all nodes of the cluster.   The nodes have a single network adapter and are connected to the same switching hub device.   Administrators of non-cluster servers that are connected to the same switching hub device report that their servers receive traffic that is destined for the cluster nodes. Receiving this additional network traffic impairs the network performance of the non-cluster servers.   You need to ensure that traffic destined for only the cluster nodes is not sent to all ports of the switching hub device.  You do not want to move the cluster to another switching hub device.   What should you do? ()

  • A、 On one node, run the nlb.exe reload command.
  • B、 On each node, run the wlbs.exe drainstop command.
  • C、 Use Network Load Balancing Manager to enable Internet Group Management Protocol (IGMP) support on the cluster.
  • D、 Use Network Load Balancing Manager to add a second cluster IP address.

正确答案:C

更多相关问题