CMS专题

单选题You are the network administrator for . All network servers run Windows Server 2003. The network includes a file server named TestKing17. TestKing17 contains a single disk for system files and two SCSI hard disks that comprise a 72-GB mirrored volume w

题目
单选题
You are the network administrator for . All network servers run Windows Server 2003. The network includes a file server named TestKing17. TestKing17 contains a single disk for system files and two SCSI hard disks that comprise a 72-GB mirrored volume with 65 GB of read-only data. Users connect to this data by using shortcuts on their desktops. TestKing17 is scheduled for replacement. You have a scheduled maintenance window to complete this task. Before the maintainance window, you build a new server. You need to bring the new server online with current data and re-establish redundancy as quickly as possible. You must also ensure that the desktop shortcuts will continue to functions. What should you do?()
A

Name the new server TestKing20. Create a new mirrored volume by using two 72-GB disks. Connect TestKing20 to the network and copy the data from TestKing17. When copying is complete, shut down the old TestKing17.

B

Name the new server TestKing17. Move both disks from the old TestKing17 to the new TestKing17. Scan the disks for changes.Connect the new TestKing17 to the network.

C

Name the new server TestKing17. Break the mirror on the old TestKing17. Move one of the disks from the old TestKing17 to the new TestKing17. Scan the disk for changes. Initialize the disk. Select the spare disk and create the mirror. Connect the new TestKing17 to the network.

D

Name the new server TestKing17. Remove one of the disks in the mirror from the old TestKing17. Move the disk to the new TestKing17. Scan the disk for changes. Import the disk. Shut down the old TestKing17 and connect the new TestKing17 to the network.

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

ou are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.Two of the servers on the network contain highly confidential documents. The company’s written security policy states that all network connections with these servers must be encrypted by using an IPSec policy.You place the two servers in an organizational unit (OU) named SecureServers. You configure a Group Policy object (GPO) that requires encryption for all connections. You assign the GPO to the SecureServers OU.  You need to verify that users are connecting to the two servers by using encrypted connections.   What should you do?()

  • A、Run the net view command.
  • B、Run the gpresult command.
  • C、Use the IP Security Monitor console.
  • D、Use the IPSec Policy Management console.

正确答案:C

第2题:

Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest. The forest contains a single domain.  You plan to deploy 10 Edge Transport servers on the perimeter network.  You need to recommend a solution for the Edge Transport server deployment. The solution must meet the following requirements: .Allow administrators to apply a single security policy to all Edge Transport servers .Reduce the administrative overhead that is required to manage servers .Minimize the attack surface of the internal network What should you recommend?()

  • A、Implement Network Policy and Access Services (NPAS).
  • B、Implement Active Directory Federation Services (AD FS).
  • C、Create a new Active Directory domain in the internal forest, and then join all Edge Transport servers to the new domain.
  • D、Create an Active Directory forest in the perimeter network, and then join all Edge Transport servers to the new domain.

正确答案:D

第3题:

You are designing a strategy to upgrade the DHCP servers after the new Active Directory structure is in place.  Who can authorize the DHCP servers?()

  • A、 Chief information officer
  • B、 IT support staff in Boston
  • C、 IT support staff in New York
  • D、 Network administrator in Chicago
  • E、 Network administrator in New York

正确答案:A

第4题:

You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a four-node Network Load Balancing cluster. All nodes run Windows Server 2003. The cluster has converged successfully. You use Network Load Balancing Manager on the default host to configure all nodes of the cluster.   The nodes have a single network adapter and are connected to the same switching hub device.   Administrators of non-cluster servers that are connected to the same switching hub device report that their servers receive traffic that is destined for the cluster nodes. Receiving this additional network traffic impairs the network performance of the non-cluster servers.   You need to ensure that traffic destined for only the cluster nodes is not sent to all ports of the switching hub device.  You do not want to move the cluster to another switching hub device.   What should you do? ()

  • A、 On one node, run the nlb.exe reload command.
  • B、 On each node, run the wlbs.exe drainstop command.
  • C、 Use Network Load Balancing Manager to enable Internet Group Management Protocol (IGMP) support on the cluster.
  • D、 Use Network Load Balancing Manager to add a second cluster IP address.

正确答案:C

第5题:

You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster.   The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template.   You need to implement protective measures against the cluster’s most significant security vulnerability.   What should you do?  ()

  • A、 Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.
  • B、 Use packet filtering on all inbound traffic to the cluster.
  • C、 Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.
  • D、 Use intrusion detection on the perimeter network.

正确答案:B

第6题:

You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. The TestKing.com network contains the following: * Exchange 2000 Server Service Pack 3 (SP3) servers. * Exchange Server 2003 Service Pack 2 (SP2) servers. * Exchange Server 2007 Service Pack 1 (SP1) servers. You need to install Exchange Server 2010 to the TestKing.com network; however, you need to changes tothe existing servers for the installation of the Exchange Server 2010 servers. What should you do?()

  • A、You should consider removing all Exchange 2000 Server servers.Thereafter all Exchange Server 2007 servers should be upgraded to SP2.
  • B、You should consider removing all Exchange Server 2007 SP1 servers.
  • C、You should consider removing all Exchange Server 2003 servers.Thereafter all Exchange Server 2007 servers should be upgraded to SP2.
  • D、You should consider removing all Exchange 2000 Server as well as all Exchange Server 2003 servers.

正确答案:A

第7题:

You are the network administrator for The network consists of an internal network and a perimeter network. The internal network is protected by a firewall. The perimeter network is exposed to the Internet. You are deploying 10 Windows Server 2003 computers as Web servers. The servers will be located in the perimeter network. The servers will host only publicly available Web pages. You want to reduce the possibility that users can gain unauthorized access to the servers. You are concerned that a user will probe the Web servers and find ports or services to attack. What should you do?()

  • A、Disable File and Printer Sharing on the servers.
  • B、Disable the IIS Admin service on the servers.
  • C、Enable Server Message Block (SMB) signing on the servers.
  • D、Assign the Secure Server (Require Security) IPSec policy to the servers.

正确答案:A

第8题:

You work as a network administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.The network as a server named ABC_SR05 that provides DHCP services.You need to create the DHCP scopes to support a subnet that has 800 hosts.You want to minimize the number of unused IP addresses on each subnet. How would you configure DHCP to support these subnets?()

  • A、You should assign the network 172.16.0.0/16.
  • B、You should assign the network 172.16.0.0/17.
  • C、You should assign the network 172.16.0.0/18.
  • D、You should assign the network 172.16.0.0/19.
  • E、You should assign the network 172.16.0.0/20.
  • F、You should assign the network 172.16.0.0/22.

正确答案:F

第9题:

You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain. All servers run Windows Server 2003 and all client computers run Windows XP Professional.  You are planning a security update infrastructure.   You need to find out which computers are exposed to known vulnerabilities. You need to collect the information on existing vulnerabilities for each computer every night. You want this process to occur automatically.  What should you do? ()

  • A、 Schedule the secedit command to run every night.
  • B、 Schedule the mbsacli.exe command to run every night.
  • C、 Install Microsoft Baseline Security Analyzer (MBSA) on one of the servers. Configure Automatic Updates on all other computers to use that server.
  • D、 Install Software Update Services (SUS) on one of the servers. Configure the SUS server to update every night.

正确答案:B

第10题:

You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.You install Windows Server Update Services (WSUS) on a network server named Server1. When you attempt to synchronize Server1 with the Windows Update servers, you receive an error message. You open Internet Explorer and verify that you can communicate with an external Web site by using the proxy server. You need to ensure that Server1 can communicate with the Windows Update servers. What should you do on Server1?()

  • A、Restart the IIS administration tool.
  • B、Configure the Internet Explorer settings to bypass the proxy server.
  • C、In the WSUS options, configure authentication to the proxy server.
  • D、Install the ISA Firewall Client.

正确答案:C

更多相关问题