Format the dynamic volume as a FAT32 partition.
Format the dynamic volume as a FAT16 partition.
Configure Disk 2 to use Encrypting File System (EFS).
Configure Disk 2 as a basic volume and format the volume as NTFS.
Configure Disk 2 as a basic volume and format the volume as FAT32.
第1题:
You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()
A.A
B.B
C.C
D.D
第2题:
You are the administrator of your company’s network. You run the English (US) edition of Windows 2000 Professional on all computers in your network. As your company continues to grow, and the number of computers is continually expanding, you decide that another domain is needed. Management asks you about what is required to accommodate this new domain. What should you answer the Management in this regard? ()
第3题:
You are the network administrator for Company. A user named Peter runs Windows 2000 Professional on his portable computer. Peter wants to be able to work at home with files that were created in the office on Company’s network. He mapsdrive X to a shared network folder and configures it to reconnect when he logs on to the network. Before Peter logs off the network and leaves the office, he attempts to make drive X available offline. Peter calls you and reports that he does not have the option to make his shared folder available offline. Peter needs to have the files in drive X available offline. What should you instructs Peter to do?()
第4题:
You are the administrator of Company's Windows 2000 network. You have been asked to rollout a Windows 2000 Professional service pack on all Windows 2000 Professional client computers in Company's main office. You create a shared folder named InstallFiles that contains the installation files for the service pack and connect to the shared folder. You want to prevent the user interface from being displayed during the installation. What should you do? ()
第5题:
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. You have to perform the backup of the default trace according to the requirement of your failure recovery plan. The default trace is contained in the subdirectory.You have to backup the subdirectory. Which SQL Server database engine subdirectory should be backed up?()
第6题:
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 cluster. According to the company requirement, the failover response of the cluster has to be tested. The company assigns this task to you. On the cluster, you have to implement a manual failover. What should you do? ()
第7题:
Configure a DNS suffix.
Configure a subnet mask.
Configure an LMHOSTS file.
Configure an Interface metric.
Configure at least one DNS address.
第8题:
msi
mst
zap
zip
第9题:
You should consider having a Sharing policy created.You should then have Rory Allen granted Modify permission to Dean Austin’s mailbox.
You should consider having a Sharing policy created.You should then have Rory Allen granted Full Mailbox permission to Dean Austin’s mailbox.
You should consider having Rory Allen removed as a delegate.You should then have Rory Allen granted Send As permission to Dean Austin’s Mailbox.
You should consider having Rory Allen removed as a delegate.You should then have Rory Allen granted Send on Behalf permission to Dean Austin’s mailbox.
第10题:
Configure a HOSTS file.
Configure a LMHOSTS file.
Configure a WINS server database.
Configure a DHCP server address.
Configure at least one DNS address.
第11题:
Run Rbfg.exe before installing the standard applications.
Run RIPrep.exe before installing the standard applications.
Copy the all users profile to the default users profile.
Copy the local administrator account profile to the default users profile
第12题:
The contents of a shared folder on the active node should be encrypted by using Encrypting File System (EFS)
You should restore a backup to the active node
You should get rid of the shared array from the active node
From the active node, you have to uplug the network cable(s)
第13题:
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently configured a user named Rory Allen as a Delegate for a user named Dean Austin.During the course of the business week you receive instruction from Company.com to ensurethat Rory Allen is able to add Dean Austin in the from field when sending messages whilst ensuring messages which contain Dean Austin in the From field should display Dean Austin s the message sender when the recipient receive the messages. What should you do?()
第14题:
You are the administrator of your company’s network. An employee named Mark is leaving the company. A new employee named Eric has been hired to replace him. Mark has a local user account on a Windows 2000 Professional computer. Mark has rights to multiple files and folders on the computer. You want Eric to have the same rights and permissions that Mark has. You want to ensure that Mark will no longer have access to the files and folders. You want to accomplish this with least administrative effort. What should you do?()
第15题:
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.The Company.com network users have been configured by Company.com to have the @Company.com email address suffix.During the course of the business week you receive instruction from Company.com to configure a public folder named KingPublic for the Internet users to post content by sending e-mail to KingPublic@Company.com. What should you do?()
第16题:
You are the network administrator for Company.You need to connect to Company’s network from your Windows 2000 Professional computer at home.You have a DSL line that is used for Internet connectivity. You create an L2TP virtual private network(VPN) connection and are able to connect successfully to Company’s network. While connected toCompany’s network, you are unable to access the Internet.You want to be able to access the Internet while connected to Company’s network.How should you configure the connection properties?()
第17题:
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. Today you notice that applications that run on the server have poor performances. You doubt that this has something to do with table scans. You have to capture the appropriate information by using an appropriate Windows System Monitor object. In the options below, which performance object should you use? ()
第18题:
On the Products table, you should create a view.
On the RadioSize column, you should create a clustered index
On the RadioSize column, you should create a filtered index
On the RadioSize column, you should create a unique clustered index
第19题:
Control Panel >> Data Sources (ODBC).
Control Panel >> System Tools >> Shared Folders.
Computer Management >> System Tools >> System Information.
Computer Management >> System Tools >> Shared Folders >> Open Files.
Computer Management >> System Tools >> Shared Folders >> Sessions.
Computer Management >> System Tools >> Shared Folders >> Shares.
第20题:
Configure the shared modem to use software handshaking
Configure the dial-up connection to enable on-demand dialing.
Configure the dial-up connection to enable the Internet connection sharing.
Configure all the other computers to have a dial-up connection that uses the shared modem.
Attach the modem to one of the Windows 2000 Professional computer, and create a dial-up connection to the ISP.
Attach the modem to one of the Windows 2000 Professional computers, and share the modem on the network.
第21题:
log.trc
default.trc
ERRORLOG
SQLAGENT
第22题:
The SetupUser profile
The Default User profile
The Administrator profile
The System profile
The All Users profile
第23题:
SQLServer:Buffer Manager
SQLServer:Access Methods
SQLServer:General Statistics
SQLServer:Exec Statistics
第24题:
Configure the Internet browser home page on all client computers to point to http: //windowsupdate.microsoft.com.
In the WSUS GPO, specify the Server Name property to be the server’s fully qualified domain name (FQDN).
On the WSUS server, configure the IIS Manager to require HTTP over SSL.
Enable communication over port 443 between all client computers and the WSUS server.