You configure a 

题目

You configure a Windows Server 2008 R2 Hyper-V server with several virtual machines (VMs). A software vendor releases a software update for an application that runs on only one of the VMs. You need to plan a strategy that enables you to install and test the update without interrupting application availability and without corrupting data. What should you do first?()

  • A、Create a snapshot of the affected VM
  • B、Enable the Windows Volume Snapshot Service on the Hyper-V server
  • C、Export the VM
  • D、Enable the Windows Volume Snapshot Service on the affected VM
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You are the administrator of Company.com's Windows 2000 Network. The routed TCP/IP network that you administer consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. All computers are members of a single Windows 2000 domain named Company.com. TCP/IP is the only network protocol used at Company's office. You have recently installed 10 new Windows 2000 Professional computers and you want to enable the new computers to use host names to connect to shared resources on the network. You configure a TCP/IP address and a gateway address on each new computer. You want to complete the configuration to allow the computers to communicate on the network.  What should you do?()

  • A、Configure a DNS suffix.
  • B、Configure a subnet mask.
  • C、Configure an LMHOSTS file.
  • D、Configure an Interface metric.
  • E、Configure at least one DNS address.

正确答案:B,E

第2题:

You are preparing to install an operating system on virtual machines (VMs) in a Hyper-V environment. You need to configure each VM so that you can perform a network-based operating system installation. What should you do for each VM?()

  • A、Add a Network Adapter.
  • B、Add a Legacy Network Adapter.
  • C、Configure a static MAC address.
  • D、Configure a dynamic MAC address.

正确答案:B

第3题:

You are the administrator responsible for security and user desktop settings on your network. You need to configure a custom registry entry for all users. You want to add the custom registry entry into a Group Policy object (GPO) with the least amount of administrative effort.

What should you do?

A.Configure an ADM template and add the template to the GPO.

B.Configure an INF policy and add the policy to the GPO.

C.Configure a Microsoft Windows installer package and add the package to the GPO.

D.Configure RIS to include the registry entry.


正确答案:A
解析:Explanation: It is recommended that we should use the supplied Administrative Templates where possible. Administrative Templates propagate registry settings to a large number of computers without requiring us to have detailed knowledge of the registry. However, the administrator can create custom .adm files if the supplied templates are inadequate. In Windows 2000, we use Group Policy to set registry-based policies. In Windows NT 4.0, we used the System Policy Editor (Poledit.exe) to set System Policy.

Incorrect answers:
B: Windows 2000 does not support an INF policy.

C: Installer packages are used to deploy applications and cannot be used the change the registry.

D: RIS is used for the automated remote installation of Windows 2000 Professional and is not used to configure registry settings.

第4题:

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The server hasthe Web Server (IIS) server role installed. The server contains a Web site that is configured to use onlyWindows Authentication. You have a security group named Group1 that contains several user accounts.Now you receive an order from the company management. According to the company requirement, youhave to prevent the members of Group1 from accessing a Web site. But you are not allowed prevent otherusers from accessing the Web site. Which Web site feature should you configure?()

  • A、You should configure SSL Settings
  • B、You should configure Authentication
  • C、You should configure Authorization Rules
  • D、You should configure IIS Manager Permissions

正确答案:C

第5题:

You are managing an Oracle Database 11g database. You want to ensure the recovery of thedatabase to the point of failure.  Which configuration will you do to accomplish the task()

  • A、Multiplex all database files
  • B、Configure the Flash Recovery Area.
  • C、Configure the database instance for ARCHIVELOG mode.
  • D、Configure the FAST_START_MTTR_TARGET initialization parameter.

正确答案:C

第6题:

You are the network administrator for Company.You install Windows 2000 Professional on your computer at home. Your computer contains threemodems, each connected to a separate phone line. You create a new dial-up connection to connect toCompany’s remote access server. You configure the connection to dial up all three devices. You start thedial-up connection and connect to the remote access server. You notice that only one of the modems isconnected to the remote access server.You want to use as many modems as possible to make a single connection to the remote access server.What should you do? ()

  • A、Configure the dial-up connection to sue a SLIP connection.
  • B、Configure all three modems to use the same phone line.
  • C、Configure the remote access server to enable multi-link.
  • D、Configure the dial-up connection to only dial two of the three modems.
  • E、Configure the dial-up connection to Enable LCP extensions.

正确答案:C

第7题:

You are performing a backup of your database across the network. While taking the backup, you want to save space on the storage media and reduce the network bandwidth. Which command will you issue to configure the required type of backup?()

  • A、 CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO BACKUPSET;
  • B、 CONFIGURE DEVICE TYPE TO disk BACKUP TYPE TO COPY;
  • C、 CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO COMPRESSED BACKUPSET;
  • D、 CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO COMPRESSED COPY;

正确答案:C

第8题:

You are the network administrator of a small Layer 2 network with 50 users. Lately, users have beencomplaining that the network is very slow. While troubleshooting, you notice that the CAM table of yourswitch is full, although it supports up to 12, 000 MAC addresses. How can you solve this issue and preventit from happening in the future?()

  • A、Upgrade the switches
  • B、Configure BPDU guard
  • C、Configure VLAN access lists
  • D、Configure port security
  • E、Configure Dynamic ARP inspection

正确答案:D

第9题:

You are the administrator of you company network. A user named Peter requests assistance in his Windows 2000 Professional portable computer. Peter is preparing for his test and wants to optimize the battery life for his portable computer. You want to configure Peter’s computer to save the contents of memory on hard disk and then shutdown when Peter presses the sleep button.  What should you do? ()

  • A、Configure power settings to use the standard option. 
  • B、Configure power settings to use the power off option. 
  • C、Configure power settings to use the hibernate option. 
  • D、Configure power settings to use always on power scheme. 
  • E、Configure the computer to use the portable laptop power scheme.

正确答案:C

第10题:

Your portable computer is in sleep mode. When you resume work on the portable computer, you are not prompted for a password.  You need to ensure that you are prompted for a password each time the portable computer recovers from sleep mode.  What should you do?()

  • A、Configure the computer to hibernate when not in use.
  • B、In the current power plan settings, configure the computer to require a password when recovering from sleep mode.
  • C、Configure the computer to use the High Performance power plan.
  • D、Configure the screen saver settings to require a password on resumption of work.

正确答案:B

更多相关问题