Open each backup log, beginning with Monday and moving forward through the week. In each log, search for a backup of the file. Restore the first backup that you find.
Open each backup log, beginning with Friday and moving backward through the week. In each log, search for a backup of the file. Restore the first backup that you find.
Open each backup log, beginning with Tuesday and moving forward through the week. In each log, search for a backup of the file. Restore the first backup that you find.
Open the backup log for Monday. Search for a backup of the file. If you find a backup, restore the file. If you do not find a backup, open the backup log for Friday and search there. If you find a backup, restore the file. If you do not find a backup, continue opening backup logs, moving backward through the week from Friday Restore the first backup that you find.
第1题:
When you create a network implementation VLAN solution, what is one procedure that you should include in your plan?()
第2题:
You are planning a new VLAN-based network solution. What is one item you should consider when creating your implementation plan as it concerns VLANs?()
第3题:
You are the administrator of a Windows 2000 Active Directory network. The network consists of a single domain. The domain includes 20 Windows NT Workstation 4.0 client computers. All other client computers are Windows 2000 Professional computers.
You create a Windows NT 4.0 default user policy on the Windows 2000 Server computer that is configured as the PDC emulator. This default user policy denies access to Network Neighborhood. You then install Terminal Services on one of the servers and Terminal Services Client on the 20 Windows NT Workstation client computers.
You find that the users of the Terminal Server can still browse the network when they open My Network Places. You want to prevent all users from browsing the network.
What should you do?
A.Modify the Windows NT policy template file so that you can restrict access to both My Network Places and Network Neighborhood. Save the policy file on the Terminal Server.
B.Copy the Windows NT policy file to the 20 Windows NT Workstation computers.
C.Create a Windows 2000 Group Policy that denies user access to My Network Places.
D.Edit the local registry on the Windows NT Workstation computers to deny access to Entire Network in Network Neighborhood.
第4题:
You are the administrator of ExamSheet.net's network. ExamSheet upgrades its network to 100 Mbps. You remove the old network adapter and install a new 10/100 Mbps network adapter into a Windows 2000 Professional computer. You configure the TCP/IP protocol settings so that IP and DNS addresses are obtained automatically. When you restart the computer you cannot access the network. When you attempt toPINGaddress 127.0.0.1 you receive the following error message: "Request timed out." You want this computer to communicate on the network. What should you do?()
第5题:
You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()
第6题:
You are the network administrator for Your network consists of a single Active Directory domain named All network servers run Windows Server 2003. All client computers run Windows XP Professional. TK1 is your global catalog server. TK2 runs Software Update Services (SUS). The Set Options console on TK2 uses all default settings. You configure the client computers to access the service on TK1 and TK2. Three months later, Microsoft releases a critical security update for Windows XP Professional. From a test client computer, you use Windows Update to download the update. You test the update and receive no error messages. Now you need to deploy the update to all client computers as quickly as possible. You must ensure that the update is not deployed to any servers. Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two)
第7题:
You work as a network administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.The network as a server named ABC_SR05 that provides DHCP services.You need to create the DHCP scopes to support a subnet that has 800 hosts.You want to minimize the number of unused IP addresses on each subnet. How would you configure DHCP to support these subnets?()
第8题:
You are the network administrator for Test King. All network servers run Windows Server 2003. A server named TestKingSrv hosts applications for network users.TestKingSrv contains a motherboard that can support two CPUs. One CPU is currently installed. TestKingSrv has 512 MB of RAM and a single 36 - GB integrated device electronics (IDE) hard disk. It has a 10 MB Ethernet card connected to a 10/100 Mb switch.After TestKingSrv is in use for five months, network users report unacceptable response times on their applications.You open System Monitor on TestKingSrv and see the information shown in the following table.You need to improve the performance of Server 1.What should you do?()
A. Add an additional CPU.
B. Add an additional 512 MB of RAM.
C. Replace the existing hard disk with a faster one.
D. Replace the 10-Mb Ethernet card with a 100-Mb Ethernet card.
第9题:
You are a network administrator for your company. All domain controllers run Windows Server 2003. The network contains 50 Windows 98 client computers, 300 Windows 2000 Professional computers, and 150 Windows XP Professional computers. According to the network design specification, the Kerberos version 5 authentication protocol must be used for all client computers on the internal network. You need to ensure that Kerberos version 5 authentication is used for all client computers on the internal network. What should you do? ()
第10题:
You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain. You administer a four-node Network Load Balancing cluster. All nodes run Windows Server 2003. The cluster has converged successfully. You use Network Load Balancing Manager on the default host to configure all nodes of the cluster. The nodes have a single network adapter and are connected to the same switching hub device. Administrators of non-cluster servers that are connected to the same switching hub device report that their servers receive traffic that is destined for the cluster nodes. Receiving this additional network traffic impairs the network performance of the non-cluster servers. You need to ensure that traffic destined for only the cluster nodes is not sent to all ports of the switching hub device. You do not want to move the cluster to another switching hub device. What should you do? ()