You are a network administrator for The network contains a W

题目
单选题
You are a network administrator for The network contains a Windows Server 2003 computer named Testking1. You need to install an application on Testking1. The installation will cause several changes to the registry. You plan to use the Backup utility to create a backup that will enable you to restore the registry. TestKing requirements for network management state that all backups must be performed during an eight-hour period at night. Because of this time constraint, you need to ensure that the backup can be recovered as quickly as possible. You need to create a backup that meets the requirements. What should you do?()
A

Create a backup of the system partition.

B

Create a backup of the boot partition.

C

Create a backup of the System State.

D

Create an Automated System Recovery (ASR) backup.

E

Create a backup of the Systemroot/System32/Config folder.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()

  • A、STP
  • B、GVRP
  • C、SNMP
  • D、VTP
  • E、DHCP

正确答案:D

第2题:

You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()

  • A、Repeater
  • B、Wireless router
  • C、Hub
  • D、Wireless network adapter

正确答案:D

第3题:

Your network contains a server named Server1 that runs Windows Server 2008 R2. The network contains multiple subnets.An administrator reports that Server1 fails to communicate with computers on remote subnets.You run route.exe print on Server1 as shown in the exhibit. (Click the Exhibit button.)You need to ensure that Server1 can communicate with all computers on the network.What should you do?()

A. Disable IPv6.

B. Change the subnet mask.

C. Add a default gateway address.

D. Change the default metric to 100.


参考答案:C

第4题:

You work as a exchange administrator at TestKing.com. The TestKing.com network contains an internalnetwork as well as a perimeter network. The primeter network contains an Exchange Server 2010 EdgeTransport Server named TESTKING-EX. During the course of day you receive an instruction form the CIO to formulate a remote managementsolution for TESTKING-EX01 based on the set criteria below: You need to ensure that management traffic is encypted. You nedd to ensure that remote administration is permitted fron the Internet network.You need to ensure that Exchange Management Console (EMC) is supported. What should you do?()

  • A、You should recommend that Windows Management Instrumentation Command-line (WMIC) be used.
  • B、You should recommend that Lightweight Directory Access Protocol(LDAP)over Secure Socket Layer(SSL) be used.
  • C、You should recommend that Windows Remote Management (WinRM) over SSL be used.
  • D、You should recommend that Remote Desktop Protocol(RDP)over Secure Socket Layer(SSL)be used.

正确答案:C

第5题:

You are the network administrator setting up the IP network for a new branch office. You need at least 5 networks with 25 hosts each. You have been allocated a /24 network.Which prefix length will satisfy the given requirements?()

  • A、/24
  • B、/26
  • C、/27
  • D、/28

正确答案:C

第6题:

You work as a network administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.The network as a server named ABC_SR05 that provides DHCP services.You need to create the DHCP scopes to support a subnet that has 800 hosts.You want to minimize the number of unused IP addresses on each subnet. How would you configure DHCP to support these subnets?()

  • A、You should assign the network 172.16.0.0/16.
  • B、You should assign the network 172.16.0.0/17.
  • C、You should assign the network 172.16.0.0/18.
  • D、You should assign the network 172.16.0.0/19.
  • E、You should assign the network 172.16.0.0/20.
  • F、You should assign the network 172.16.0.0/22.

正确答案:F

第7题:

Your network contains an internal network and a perimeter network that are separated by a firewall. The perimeter network contains an Exchange Server 2010 Edge Transport server.  You plan to deploy an internal Exchange Server 2010 organization that meets the following requirements:.Support EdgeSync synchronization .Support encrypted delivery of outbound e-mail messages to the Edge Transport server .Minimize the attack surface of the internal network  Which TCP ports should you allow from the internal network to the perimeter network?()

  • A、3389 and 25
  • B、3389 and 636
  • C、50636 and 25
  • D、50636 and 135

正确答案:C

第8题:

You are a network administrator for Ezonexam.com's Windows 2000 network.

Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers.

Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Jack Bauer leaves the company. You grant her manager the Full Control NTFS permission to Jack's home folder. When the manager attempts to open any of the files, she receives the following error message: "Access is denied."

What should you do?

A.Use System File Checker (SFC) to decrypt the file.

B.Log on the network as the Recovery Agent. Decrypt the files for the manager.

C.Log on the network as the administrator. Use the cipher command to decrypt the files.

D.Log on the network as a member of the Backup Operators group. Decrypt the files for the manager.


正确答案:B
解析:Explanation: A user has asked for EFS to be configured on his or her Windows 2000 Professional computer. You need to enable the Recovery Agent on the computer to be able to unencrypt files if the user's private key has been deleted. In this case Jack left the company and his manager needs access to the files. Even with Full Control NTFS permissions she could not get access, thus you need to make use of the recovery agent to decrypt the files for the manager. Remember that the user who encrypts a file is the only user who can access the file (except for the recovery agent).

Incorrect answers:
A: System file checker (sfc.exe) is a command-line utility that scans and verifies the versions of all protected system files. System file checker (sfc.exe) will discover that a protected file has been overwritten and replace it with the correct version of the file from the %systemroot%\system32\dllcache folder. This is not going to grant the manager access to the files in this case.

C: The Cipher utility allows you to encrypt files and folders as well as check the encryption statistics. But this is not what should be used in this scenario.

D: Membership in the Backup Operators group enables a user to back up and restore file systems regardless of permissions, ownership, encryption settings, or audit settings. Membership in this group enables you to assign users the authority to back up file systems without having to assign the users specific permissions to access the resources. However, this is not what is required here.

第9题:

You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully.   To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster.   You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster.  You want to add the port rule to the nodes of the cluster.   What should you do?  ()

  • A、 Use Network Load Balancing Manager on the Network Load Balancing default host to add the port rule.
  • B、 Change the host priority of the second node to be the highest in the cluster, and then use Network Load Balancing Manager to add the port rule.
  • C、 Run the nlb.exe drain command on each node, and then use Network Load Balancing Manager to add the port rule.
  • D、 Add the port rule through Network Connections Properties on each node.

正确答案:D

第10题:

You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster.   The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template.   You need to implement protective measures against the cluster’s most significant security vulnerability.   What should you do?  ()

  • A、 Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.
  • B、 Use packet filtering on all inbound traffic to the cluster.
  • C、 Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.
  • D、 Use intrusion detection on the perimeter network.

正确答案:B

更多相关问题