Create a single shared printer to be used by all three groups.Allow each print administrator Manage Documents permission.
Create a separate shared printer for each group. For each shared printer, allow the respective print administrator Manage Documents permission.
Create a single shared printer to be used by all three groups. Add the print administrator’s user account from each group to the Power Users group on Peter’s client computer.
Create a separate shared printer for each group. Add the print administrator’s user account from each group to the Power Users group on Peter’s client computer.
第1题:
You are an administrator of Ezonexam.com's network. You want to perform. routine upgrades on your Windows 2000 Server computer. You use your non-administrator user account in the domain to logon to the server.
You want to upgrade all of the critical system files and patches on the server in the shortest possible time.
What should you do?
A.Use Windows Update.
B.Run System File Checker.
C.Log on as administrator and run Windows Update.
D.Log on as administrator and run System File Checker.
第2题:
You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet.Which PIN architecture is applicable in those environments?()
A.Campus
B.Teleworker
C.Branch
D.Data center
第3题:
You are a network administrator for your company. You currently automate backups of the System State data on the servers in your network by using NTBackup. Your manager instructs you to document the procedure for restoring a server from a backup of the System State data.You need to select the correct method for performing a restoration of a backup of the System State data.What should you do?()
A. Run the following command: ntbackup.exe backup /F {"FileName"}
B. Run the following command: ntbackup.exe backup systemstate /F {"FileName"}
C. In Control Panel, open System, and configure the Startup and Recovery settings on the Advanced tab.
D. Use NTBackup interactively.
第4题:
You are the network administrator for your company. Your network consists of a single Active Directory domain named All network servers run Windows Server 2003. A total of three servers are configured as domain controllers. You need to restore a failed domain controller named DC3. The last backup for any domain controller on the network occurred one week ago. First, you reinstall Windows Server 2003 on DC3. What should you do next?()
第5题:
You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()
第6题:
You are a network administrator for Ezonexam.com's Windows 2000 network.
Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers.
Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Jack Bauer leaves the company. You grant her manager the Full Control NTFS permission to Jack's home folder. When the manager attempts to open any of the files, she receives the following error message: "Access is denied."
What should you do?
A.Use System File Checker (SFC) to decrypt the file.
B.Log on the network as the Recovery Agent. Decrypt the files for the manager.
C.Log on the network as the administrator. Use the cipher command to decrypt the files.
D.Log on the network as a member of the Backup Operators group. Decrypt the files for the manager.
第7题:
You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()
第8题:
You are a network administrator for your company. All servers run Windows Server 2003. A server namedServer34 runs an application named App1.Users report that App1 is performing slowly. You suspect that an unauthorized application is installed on Server34.You run the netstat command and examine the output, as shown in the exhibit. (Click the Exhibit button.)You need to identify the unauthorized application by using the output from the netstat command.Which tool should you use to identify the application? ()
A. Performance console
B. System Monitor
C. Network Monitor
D. Task Manager
第9题:
You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain. You administer a three-node Network Load Balancing cluster. Each cluster node runs Windows Server 2003 and has a single network adapter. The cluster has converged successfully. You notice that the nodes in the cluster run at almost full capacity most of the time. You want to add a fourth node to the cluster. You enable and configure Network Load Balancing on the fourth node. However, the cluster does not converge to a four-node cluster. In the System log on the existing three nodes, you find the exact same TCP/IP error event. The event has the following description: "The system detected an address conflict for IP address 10.50.8.70 with the system having network hardware address 02:BF://0A:32:08:46." In the System log on the new fourth node, you find a similar TCP/error event with the following description: "The system detected an address conflict for IP address 10.50.8.70 with the system having network hardware address 03:BF://0A:32:08:46." Only the hardware address is different in the two descriptions. You verify that IP address 10.50.8.70 is configured as the cluster IP address on all four nodes. You want to configure a four-node Network Load Balancing cluster. What should you do? ()
第10题:
You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains an application server running Windows Server 2003. Users report intermittent slow performance when they access the application server throughout the day. You find out that the network interface on the application server is being heavily used during the periods of slow performance. You suspect that a single computer is causing the problem.You need to create a plan to identify the problem computer. What should you do?()