MCSE

单选题You are the network administrator for your company. All network servers run Windows Server 2003. All client computers run Windows XP Professional. A member server named Server1 is located at a branch office that does not permit the use of Remote Deskto

题目
单选题
You are the network administrator for your company. All network servers run Windows Server 2003. All client computers run Windows XP Professional. A member server named Server1 is located at a branch office that does not permit the use of Remote Desktop Protocol. Another administrator uses the Backup utility to create a scheduled backup job on Server1. The backup job performs a normal backup of an application server. The application server is removed from the network. You need to use a client computer to remove the backup job from Server1. You cannot travel to the branch office. What should you do?()
A

Use the RUNAS feature to run the at /delete command as the Server1/Administrator account.

B

Log on by using your Administrator account and run the ntbackup /D command.

C

Log on by using your Administrator account and run the schtasks /delete command.

D

Use the RUNAS feature to run the taskkill command as the Server1/Administrator account.

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You are an administrator of Ezonexam.com's network. You want to perform. routine upgrades on your Windows 2000 Server computer. You use your non-administrator user account in the domain to logon to the server.

You want to upgrade all of the critical system files and patches on the server in the shortest possible time.

What should you do?

A.Use Windows Update.

B.Run System File Checker.

C.Log on as administrator and run Windows Update.

D.Log on as administrator and run System File Checker.


正确答案:C
解析:Explanation:WindowsUpdateisusedtoupgradethesystemfilesandtoretrieveandapplythelatestservicepacksandpatchesfortheoperatingsystem.AllnecessaryfilesaredownloadedthroughtheInternet.TobeabletorunWindowsUpdatewemusthaveadministrativerights.Incorrectanswers:A:Thenon-administrativeuseraccountcannotbeusedtorunWindowsUpdate.TorunWindowsUpdatewemusthaveadministrativerights.B:SystemFileCheckercheckstheintegrityofthesystemfiles.Itcannotbeusedtoupgradethesystemfilesortoretrieveandapplythelatestservicepacksandpatchesfortheoperatingsystem.D:SystemFileCheckercheckstheintegrityofthesystemfiles.Itcannotbeusedtoupgradethesystemfilesortoretrieveandapplythelatestservicepacksandpatchesfortheoperatingsystem.

第2题:

You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()

  • A、STP
  • B、GVRP
  • C、SNMP
  • D、VTP
  • E、DHCP

正确答案:D

第3题:

You are the network administrator for your company. The network originally consists of a single Windows NT 4.0 domain.

You upgrade the domain to a single Active Directory domain. All network servers now run Windows Server 2003, and all client computers run Windows XP Professional.

Your staff provides technical support to the network. They frequently establish Remote Desktop connections with a domain controller named DC1.

You hire 25 new support specialists for your staff. You use Csvde.exe to create Active Directory user accounts for all 25.

A new support specialist named Paul reports that he cannot establish a Remote Desktop connection with DC1. He receives the message shown in the Logon Message exhibit. (Click the Exhibit button.)

You open Gpedit.msc on DC1. You see the display shown in the Security Policy exhibit. (Click the Exhibit button.)

You need to ensure that Paul can establish Remote Desktop connections with DC1.

What should you do? ()


参考答案:B

第4题:

You are a network administrator for your company. All domain controllers run Windows Server 2003. The network contains 50 Windows 98 client computers, 300 Windows 2000 Professional computers, and 150 Windows XP Professional computers.   According to the network design specification, the Kerberos version 5 authentication protocol must be used for all client computers on the internal network.   You need to ensure that Kerberos version 5 authentication is used for all client computers on the internal network.   What should you do?  ()

  • A、 On each domain controller, disable Server Message Block (SMB) signing and encryption of the secure channel traffic.
  • B、 Replace all Windows 98 computers with new Windows XP Professional computers.
  • C、 Install the Active Directory Client Extensions software on the Windows 98 computers.
  • D、 Upgrade all Windows 98 computers to Windows NT Workstation 4.0.

正确答案:B

第5题:

You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()

  • A、Campus
  • B、Teleworker
  • C、Branch
  • D、Data center

正确答案:C

第6题:

You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet.Which PIN architecture is applicable in those environments?()

A.Campus

B.Teleworker

C.Branch

D.Data center


参考答案:C

第7题:

You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()

  • A、Repeater
  • B、Wireless router
  • C、Hub
  • D、Wireless network adapter

正确答案:D

第8题:

You are a network administrator for your company. All servers run Windows Server 2003. A server namedServer34 runs an application named App1.Users report that App1 is performing slowly. You suspect that an unauthorized application is installed on Server34.You run the netstat command and examine the output, as shown in the exhibit. (Click the Exhibit button.)You need to identify the unauthorized application by using the output from the netstat command.Which tool should you use to identify the application? ()

A. Performance console

B. System Monitor

C. Network Monitor

D. Task Manager


参考答案:D

第9题:

ou are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.Two of the servers on the network contain highly confidential documents. The company’s written security policy states that all network connections with these servers must be encrypted by using an IPSec policy.You place the two servers in an organizational unit (OU) named SecureServers. You configure a Group Policy object (GPO) that requires encryption for all connections. You assign the GPO to the SecureServers OU.  You need to verify that users are connecting to the two servers by using encrypted connections.   What should you do?()

  • A、Run the net view command.
  • B、Run the gpresult command.
  • C、Use the IP Security Monitor console.
  • D、Use the IPSec Policy Management console.

正确答案:C

第10题:

You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster.   The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template.   You need to implement protective measures against the cluster’s most significant security vulnerability.   What should you do?  ()

  • A、 Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.
  • B、 Use packet filtering on all inbound traffic to the cluster.
  • C、 Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.
  • D、 Use intrusion detection on the perimeter network.

正确答案:B

更多相关问题