You are the network administrator for The network contains Windows Server 2003 computers and Windows XP Professional computers.You install Software Update Services (SUS) on a server named TestKingSrv.You scan the client computers to find out if any curren

题目

You are the network administrator for The network contains Windows Server 2003 computers and Windows XP Professional computers.You install Software Update Services (SUS) on a server named TestKingSrv.You scan the client computers to find out if any current hotfixes are installed. You notice that no client computers have been updated during the past seven days. You are unable to access the synchronization logs on TestKingSrv.You need to ensure that SUS is functioning properly.What should you do on TestKingSrv?()

A. Delete the History_Approve.xml file and restart the computer.

B. Delete the Aucatalog.cab file and restart the computer.

C. Restart the Background Intelligent Transfer Service (BITS).

D. Restart all IIS-related services.


相似考题
更多“You are the network administrator for The network contains Windows Server 2003 computers a ”相关问题
  • 第1题:

    You are a network administrator for Ezonexam.com's Windows 2000 network.

    Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers.

    Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Jack Bauer leaves the company. You grant her manager the Full Control NTFS permission to Jack's home folder. When the manager attempts to open any of the files, she receives the following error message: "Access is denied."

    What should you do?

    A.Use System File Checker (SFC) to decrypt the file.

    B.Log on the network as the Recovery Agent. Decrypt the files for the manager.

    C.Log on the network as the administrator. Use the cipher command to decrypt the files.

    D.Log on the network as a member of the Backup Operators group. Decrypt the files for the manager.


    正确答案:B
    解析:Explanation: A user has asked for EFS to be configured on his or her Windows 2000 Professional computer. You need to enable the Recovery Agent on the computer to be able to unencrypt files if the user's private key has been deleted. In this case Jack left the company and his manager needs access to the files. Even with Full Control NTFS permissions she could not get access, thus you need to make use of the recovery agent to decrypt the files for the manager. Remember that the user who encrypts a file is the only user who can access the file (except for the recovery agent).

    Incorrect answers:
    A: System file checker (sfc.exe) is a command-line utility that scans and verifies the versions of all protected system files. System file checker (sfc.exe) will discover that a protected file has been overwritten and replace it with the correct version of the file from the %systemroot%\system32\dllcache folder. This is not going to grant the manager access to the files in this case.

    C: The Cipher utility allows you to encrypt files and folders as well as check the encryption statistics. But this is not what should be used in this scenario.

    D: Membership in the Backup Operators group enables a user to back up and restore file systems regardless of permissions, ownership, encryption settings, or audit settings. Membership in this group enables you to assign users the authority to back up file systems without having to assign the users specific permissions to access the resources. However, this is not what is required here.

  • 第2题:

    You are a network administrator for your company. All domain controllers run Windows Server 2003. The network contains 50 Windows 98 client computers, 300 Windows 2000 Professional computers, and 150 Windows XP Professional computers.   According to the network design specification, the Kerberos version 5 authentication protocol must be used for all client computers on the internal network.   You need to ensure that Kerberos version 5 authentication is used for all client computers on the internal network.   What should you do?  ()

    • A、 On each domain controller, disable Server Message Block (SMB) signing and encryption of the secure channel traffic.
    • B、 Replace all Windows 98 computers with new Windows XP Professional computers.
    • C、 Install the Active Directory Client Extensions software on the Windows 98 computers.
    • D、 Upgrade all Windows 98 computers to Windows NT Workstation 4.0.

    正确答案:B

  • 第3题:

    You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains 35 Windows Server 2003 computers; 3,000 Windows XP Professional computers; and 2,000 Windows 2000 Professional computers.Windows Server Update Services (WSUS) is installed on a server named Server1. The necessary Group Policy object (GPO)is configured.You need to confirm whether all computers in the domain have received all approved updates from Server1.  What should you do on Server1?()

    • A、Install and configure Urlscan.exe.
    • B、At the command prompt, type gpresult /scope COMPUTER.
    • C、Open the WSUS console. Run the Status of Computers report.
    • D、Open the WSUS console. Run the Synchronization Results report.

    正确答案:C

  • 第4题:

    You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains 35 Windows Server 2003 computers; 3,000 Windows XP Professional computers; and 2,000 Windows 2000 Professional computers.Windows Server Update Services (WSUS) is installed on a server named Server1. The necessary Group Policy object (GPO) is configured.You need to confirm whether all computers in the domain have received all approved updates fromServer1. What should you do on Server1?()

    • A、Install and configure Urlscan.exe.
    • B、At the command prompt, type gpresult /scope COMPUTER.
    • C、Open the WSUS console. Run the Status of Computers report.
    • D、Open the WSUS console. Run the Synchronization Results report.

    正确答案:C

  • 第5题:

    You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains an application server running Windows Server 2003.   Users report intermittent slow performance when they access the application server throughout the day. You find out that the network interface on the application server is being heavily used during the periods of slow performance. You suspect that a single computer is causing the problem.You need to create a plan to identify the problem computer.   What should you do?()

    • A、 Monitor the performance monitor counters on the application server by using System Monitor.  
    • B、 Monitor the network traffic on the application server by using Network Monitor.
    • C、 Monitor network statistics on the application server by using Task Manager.
    • D、 Run network diagnostics on the application server by using Network Diagnostics.

    正确答案:B

  • 第6题:

    单选题
    You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains Windows Server 2003 computers and Windows XP Professional computers.  You configure a server named Server1 to be a file server. The written company security policy states that you must analyze network traffic that is sent to and from all file servers.You need to capture file-transfer network traffic that is being sent to and from Server1. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on a server named Server2, which is on the same network segment as Server1.You run Network Monitor on Server2. However, Network Monitor captures only network traffic that is sent to and from Server2. You need to capture all network traffic that is sent to and from Server1.  What should you do?()
    A

    Install the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.

    B

    Open Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.

    C

    Install Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.

    D

    Open Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.


    正确答案: C
    解析: 暂无解析

  • 第7题:

    单选题
    You are the network administrator for The network contains Windows Server 2003 computers and Windows XP Professional computers. You install Software Update Services (SUS) on a server named TestKingSrv. You scan the client computers to find out if any current hotfixes are installed. You notice that no client computers have been updated during the past seven days. You are unable to access the synchronization logs on TestKingSrv. You need to ensure that SUS is functioning properly. What should you do on TestKingSrv?()
    A

    Delete the History_Approve.xml file and restart the computer.

    B

    Delete the Aucatalog.cab file and restart the computer.

    C

    Restart the Background Intelligent Transfer Service (BITS).

    D

    Restart all IIS-related services.


    正确答案: B
    解析: 暂无解析

  • 第8题:

    单选题
    You are the network administrator for . The network consists of a single Active Directory domain. All domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. TestKing acquires a subsidiary. You receive a comma delimited file that contains the names of all user accounts at the subsidiary. You need to import these accounts into your domain. Which command should you use?()
    A

    ldifde

    B

    csvde

    C

    ntdsutil with the authoritative restore option

    D

    dsadd user


    正确答案: B
    解析: 暂无解析

  • 第9题:

    单选题
    You are the administrator of a Windows Server 2003 computer named Server1. The network contains another Windows Server 2003 computer named Server2 that has the DNS and WINS services installed. Two hundred Windows 2000 Professional computers regularly connect to Server1 to access file and print resourcesAdministrators report that network traffic has increased and that response times for requests for network resources on Server1 have increased.   You need to identify whether Server1 is receiving requests for resources through NetBIOS broadcasts. What should you do?()
    A

    Use Network Monitor to capture traffic between Server1 and all client computers.

    B

    Use Network Monitor to capture traffic between Server1 and Server2.

    C

    Monitor Event Viewer for Net Logon error or warning events.

    D

    Run the tracert command on Server1.


    正确答案: A
    解析: 暂无解析

  • 第10题:

    多选题
    You are the administrator of Company.com’s Windows 2000 Network.  Your routed TCP/IP network consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. All computers are in the Company.com domain. Your network uses TCP/IP as the only network protocol. You are installing 10 new Windows 2000 Professional computers. You want to enable the new computers to use host names to connect to shared resources on the network. You configure a TCP/IP address, a gateway address and a subnet mask on each new computer.   You want to complete the configuration to allow the computers to communicate on the network.  What should you do?()
    A

    Configure a HOSTS file.

    B

    Configure a LMHOSTS file.

    C

    Configure a WINS server database.

    D

    Configure a DHCP server address.

    E

    Configure at least one DNS address.


    正确答案: A,D
    解析: 暂无解析

  • 第11题:

    You are the network administrator for Humongous Insurance. The network consists of a single Active Directory domain named humongous.com. The domain contains Windows Server 2003 computers and Windows XP Professional computers. You configure several Group Policy objects (GPOs) to enforce the use of IPSec for certain types of communication between specified computers.   A server named Server2 runs the Telnet service. A GPO is supposed to ensure that all Telnet connections to Server2 are encrypted by using IPSec. However, when you monitor network traffic, you notice that Telnet connections are not being encrypted.You need to view all of the IPSec settings that are applied to Server2 by GPOs. Which tool should you use?()

    • A、the IP Security Policy Management console
    • B、the IP Security Monitor console
    • C、the Resultant Set of Policy console
    • D、Microsoft Baseline Security Analyzer (MBSA)

    正确答案:C

  • 第12题:

    You are the desktop administrator for one of your company's branch offices. The network in the branch office consists of a single network segment, which contains a domain controller, a DHCP server, 10 Windows 2000 Server computers, and 50 Windows 2000 Professional computers. All servers and client computers are members of the company's Active Directory domain. You purchase 50 new client computers for the branch office. Each new client computer contains a built-in PXE-compliant network adapter. You install and configure RIS on one of the Windows 2000 Server computers that is on the network in the branch office. You create a Windows XP Professional RIS image on the Windows 2000 Server computer. You connect the new client computers to the network in the office, and you turn on each computer. Each computer displays a message stating that it cannot contact a PXE boot server. You verify that the RIS server is connected to the network. You need to ensure that the new client computers can connect to the RIS server and can begin installing Windows XP Professional. What should you do?()

    • A、Ask a domain administrator to authorize the RIS server. 
    • B、Grant the Everyone group Allow - Read NTFS permission on the RIS image.
    • C、Install RIS on the domain controller. Copy the RIS image to the domain controller.
    • D、Add a reservation for the RIS server to the DHCP server. 

    正确答案:A

  • 第13题:

    You are a network administrator for your company. The network consists of a single Active Directory domain. The domain contains three Windows Server 2003 domain controllers, 20 Windows Server 2003 member servers, and 750 Windows XP Professional computers. The domain is configured to use only Kerberos authentication for all server connections.A user reports that she receives an "Access denied" error message when she attempts to connect to one of the member servers. You want to test the functionality of Kerberos authentication on the user’s client computer.  Which command should you run from the command prompt on the user’s computer?()

    • A、netsh
    • B、netdiag
    • C、ktpass
    • D、ksetup

    正确答案:B

  • 第14题:

    You are the network administrator for your company. The network contains 12 Windows Server 2003 computers and 300 Windows XP Professional computers. Three servers named Server4, Server5, and Server6 run a critical business application. When performing performance baselining on these three servers, you notice that Server6 has a larger number of concurrently connected users at any given moment than Server4 or Server5. The additional workload is causing performance problems on Server6. You need to identify which client computers are connecting to Server6.You plan to run Network Monitor on Server6 to capture all packets sent to Server6. The capture task must be configured to meet the following requirements.To reduce the size of the captured data, you want to capture only the packet headers.If a large number of packets are captured, the packets must be retained on the server. Captured packets must not overwrite previously captured packets.   Which two tasks should you perform to configure Network Monitor?()

    • A、Configure the Network Monitor display filters.
    • B、Configure the Network Monitor capture filters.
    • C、Increase the Network Monitor buffer size setting.
    • D、Decrease the Network Monitor buffer size setting.
    • E、Increase the Network Monitor frame size setting.
    • F、Decrease the Network Monitor frame size setting.

    正确答案:C,F

  • 第15题:

    You are a network administrator for your company. The network consists of a single Active Directory domain. All domain controllers and member servers run Windows Server 2003, Enterprise Edition. All client computers run Windows XP Professional.   The company has one main office and one branch office. The two offices are connected by a T1 WAN connection. There is a hardware router at each end of the connection. The main office contains 10,000 client computers, and the branch office contains 5,000 client computers.   You need to use DHCP to provide IP addresses to the Windows XP Professional computers in both offices. You need to minimize network configuration traffic on the WAN connection. Your solution needs to prevent any component involved in the DHCP architecture from becoming a single point of failure.   What should you do?  ()

    • A、 At the main office, configure two Windows Server 2003 computers as a DHCP server cluster. Configure the branch office router as a DHCP relay agent.
    • B、 At the main office, configure two Windows Server 2003 computers as a DHCP server cluster. At the branch office, configure a Windows Server 2003 computer as a DHCP relay agent.
    • C、 At the main office, configure two Windows Server 2003 computers as a DHCP server cluster. At the branch office, configure two Windows Server 2003 computers as a DHCP server cluster.
    • D、 At the main office, configure two Windows Server 2003 computers as DHCP servers. Configure one DHCP server to handle 80 percent of the IP address scope and the other DHCP server to handle 20 percent. Configure the branch office router as a DHCP relay agent.

    正确答案:C

  • 第16题:

    单选题
    You are a security administrator for your company. The network consists of a single Active Directory domain. All client computers run Windows XP Professional. All servers run Windows Server 2003. All computers on the network are members of the domain.    Traffic on the network is encrypted by IPSec. The domain contains a custom IPSec policy named Lan Security that applies to all computers in the domain. The Lan Security policy does not allow unsecured communication with non-lPSec-aware computers. The company’s written security policy states that the configuration of the domain and the configuration of the Lan Security policy must not be changed. The domain contains a multihomed server named Server1. Server1 isconnected to the company network, and Server1 is also connected to a test network. Currently, the Lan Security IPSec policy applies to network traffic on both network adapters in Server1. You need to configure Server1 so that it communicates on the test network without IPSec security. Server1 must still use the Lan Security policy when it communicates on the company network.  How should you configure Server1?()
    A

     Configure a packet filter for the network adapter on the test network to block the Internet Key Exchange (IKE) port.

    B

     Configure the network adapter on the test network to disable IEEE 802.1x authentication.

    C

     Configure the network adapter on the test network to enable TCP/IP filtering, and then permit all traffic.

    D

     Use the netsh command to assign a persistent IPSec policy that permits all traffic on the network adapter on the test.

    E

     Assign an IPSec policy in the local computer policy that permits all traffic on the network adapter on the test.


    正确答案: A
    解析: 暂无解析

  • 第17题:

    单选题
    You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains 25 Windows Server 2003 computers and 6,000 Windows XP Professional computers.The written company security policy states that network traffic to Web servers must be audited on a regular basis. A server named Server1 is configured as a Web server on the company’s intranet. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on Server1.You run Network Monitor on Server1 for three hours. When you stop the network capture, you see that Network Monitor captured over 40,000 frames. As you look at the captured frames, you notice that an extremely large number of TCP connection requests have all come from the 131.107.0.1 IP address.In Network Monitor, you need to view only the frames for network traffic that are captured between Server1 and the 131.107.0.1 IP address.  What should you do?()
    A

    Create an Address Capture filter for all network traffic between Server1 and the 131.107.0.1 IP address.

    B

    Create a Find Frame Expression filter for network traffic captured between Server1 and the 131.107.0.1 IP address.

    C

    Create an Address Display filter for all network traffic captured between Server1 and the 131.107.0.1 IP address.

    D

    Create a Pattern Match capture trigger for the 131.107.0.1 IP address.


    正确答案: B
    解析: 暂无解析

  • 第18题:

    单选题
    You are the network administrator for ExamSheet. Your network consists of one Windows NT Server 4.0 domain and 35 Windows 2000 Professional computers. The network consists of five interconnected TCP/IP subnets. All of the computers use TCP/IP as the only network protocol. You are adding 15 Windows 2000 Professional computers to the network. You configure each of the new computers to use DHCP. The computers can communicate with each other but are unable to communicate outside their own subnet. You run the ipconfig command to examine the IP address on one of the new computers. The IP address is 169.254.101.72 You want to enable the Windows 2000 Professional computers to communicate outside their own subnet. What should you do?()
    A

    Install a DHCP server.

    B

    Install a WINS server. Configure each computer to use WINS.

    C

    Create an Lmhost file on each computer.

    D

    Create a Hosts file on each computer.


    正确答案: B
    解析: 暂无解析

  • 第19题:

    单选题
    You need to design a method to automate the deployment of critical updates and security patches that are supplied by Microsoft as these updates and security patches are released. Your solution must meet technical requirements. What should you do?()
    A

    Deploy a Windows Server 2003 computer running SUS in the test network. Deploy SUS servers in each child domain to download administrator-approved updates from the test network SUS server

    B

    Deploy a Windows Server 2003 computer running SUS in the test network Use autoupdate policies in each child domain to download and deploy updates from the test network SUS server

    C

    Install MBSA on a Windows Server 2003 computer in the network network. Deploy MBSA as a Windows Installer package to all computers in the child domains, and configure MBSA to scan for updates from the server in the test network

    D

    Install IIS on a Windows Server 2003 computer in the test network. Create a Web site named Updates on this server. Configure an autoupdate policy in each child domain to download and deploy updates from the Updates Web site


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers.   You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized.  You need to configure Server1 to log the details of access attempts by VPN users.   What should you do?  ()
    A

     Configure the system event log to Do not overwrite.

    B

     In IAS, in Remote Access Logging, enable the Authentication requests setting.

    C

     Configure the Remote Access server to Log all events.

    D

     Create a custom remote access policy and configure it for Authentication-Type.


    正确答案: C
    解析: 暂无解析