An administrator wants to mirror an important filesystem between two disks without mirroring the entire volume group. Which command should be used?()
You are a network administrator of your network. You want to install Windows 2000 professional on 100 computers from a central location. You want to copy a customized application with theinstallation process to all the 100 computers. What should you do to copy that application during the installation process to the computers.()A、 It cannot be done.B、 Copy the application to the temp folder of the distribution server.C、 Create a folder named $OEM$ as a sub folder in the distribution folder of source files.D、 Create a folder named $COPYDIR$ as a sub folder in the distribution folder of source files.
点击查看答案
You are a network administrator of an organization. Maria and John are your network assistant. You have grant then the rights to modify the user properties in the computer management. You want to audit the modification in user accounts. What should you do?()A、Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.B、Turn on auditing for objects in the Local Security Policy and Select 'Object Access'. C、Use Windows Explorer to turn on auditing for the specific files.D、Have the administrator for domains log you on as an administrator and enable auditing for a specific file.E、Turn on auditing for objects in the Local Security Policy and Select 'Account Management'.F、Allow only one account at a time to log on to your shared folder. Check the event viewer to see who logged on.
You are a network administrator for ExamSheet.net's Windows 2000 network. You use a user account named User1 to log on tot a Windows 2000 Professional computer. The computer is used by different students in a classroom. User1 does not have administrative rights. However, you prefer to use this account for your daily activities. Using the Task Scheduler you schedule a task to run a command file named AddUsers.cmd that automatically adds six more student user accounts. You configure the task to run as the administrator account. After the task was scheduled to have run you open the Task Scheduler and discover a status of "Could not start" for the task. You also discover account logon failure audit events in the computer's Security log.You want the scheduled task to successfully run AddUsers.cmd. You want to accomplish this with the least amount of administrative effort. What should you do?()A、Schedule the task using theATcommand.B、Reenter the password for the administrator account using the Task Scheduler.C、Log on with an administrative account and reschedule the task.D、Log on by using the local Administrator account. Then schedule the task to run under User1.
单选题An administrator is configuring an application monitor. Upon encountering an unrecoverable error the administrator does not want the resource group to failover. How can the application monitor be configured toachieve this?()A Configure the application monitor with a restart count of 0B Configure the application monitor with a monitor mode of NotifyC Configure the application monitor with a notify method of MonitorD Configure the application monitor with a failure action of Notify
单选题You are an administrator for a corporate network. At a branch office,you want to deploy Windows Vista to21 client computers and Windows Server 2008 to four servers. For which operating systems is the branchoffice eligible for KMS licensing?()A Windows VistaB Windows Server 2008C Both Windows Vista and Windows Server 2008D Neither Windows Vista nor Windows Server 2008
多选题You are the administrator of a network supporting Windows 2000 Professional computers. You want to configure Tom’s computer to run the Magnifier each time he logs on to his computer. Which two interfaces can you use?()AUtility ManagerBAccessibility WizardCAccessibility Options icon in Control PanelDUsers and Passwords icon in Control Panel
单选题A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in azone called UNTRUST to the address book entry Server in a zone called TRUST.However, the administrator does not want the server to be able to initiate any type of traffic from the TRUSTzone to the UNTRUST zone. Which configuration would correctly accomplish this task?()AABBCCDD