不凡考网

微软认证2022考试题6

来源: 不凡考网    发布:2022-01-07     [手机版]    
  • 下载次数:
  • 支持语言:
  • 738次
  • 中文简体
  • 文件类型:
  • 支持平台:
  • pdf文档
  • PC/手机

导读

不凡考网发布微软认证2022考试题6相关信息,更多微软认证2022考试题6的相关资讯请访问不凡考网计算机类考试频道。

1. [多选题]You are the administrator of a SQL Server 2000 computer. Your company purchased an accounting application from a vendor. The application stores its data in a database named Accounting on the server. The tables in this database contain columns that function as primary keys, but PRIMARY KEY and FOREIGN KEY constraints are not used.You need to replicate data from this database to another SQL Server computer. This server will use the replicated data to generate reports. Most reports will run each month, but the accounting department needs to have the ability to run reports at any time. Reports should be accurate through the last full working day.

A. You cannot make any changes to the database, but you need to implement replication. Which two actions should you take? (Each correct answer presents part of the solution. Choose two)
B. Implement merge replication.
C. Implement snapshot replication.
D. Implement transactional replication.
E. Schedule replication to run continuously.
F. Schedule replication to run during off-peak hours.


2. [多选题]The network consists of a single domain named Ezonexam.com that includes 20 Windows NT workstation 4.0 client computers. All other client computers are Windows 2000 Professional computers. You install Terminal Services on one of the Windows Server computers and Terminal Services Client on the 20 Windows NT Workstation 4.0 client computers. You create a system policy on the server that is configured as the terminal server. This system policy denies access to Network Neighborhood. You find that the users of the terminal server can still browse the network when they open My Network Places from Windows 2000 Professional computer or when they open Network Neighborhood from Windows NT Workstation 4.0 computers.You want to prevent all users from browsing the network.

A. What should you do? (Each correct answer presents a complete solution. Choose two.)
B. Create a Windows Group Policy that denies user access to My Network Places.
C. Copy the Windows NT policy file to the 20 Windows NT Workstation 4.0 computers.
D. Create a Windows NT 4.0 default user policy on the Windows 2000 Server computer that is configured as the PDC emulator.
E. Modify the Windows NT policy template file so that you can restrict access to both My Network Places and Network Neighborhood. Save the policy file on the terminal server.
F. Configure the terminal server to use Application server mode. Select the Permissions compatible with Terminal Server 4.0 Users option.


3. [单选题]You have 17GB of private files on drive D on your Windows 2000 Professional computer. You have shared the files as private_files. You do not want other users to see this share name in the browse list.You want all other share names to continue to appear in the browser list.What should you do?

A. Stop the computer browser service, and disable the startup state.
B. Change the comment for the share to hidden:Yes
C. Change the share name to private_files$.
D. Add a hidden entry to the HKLMSystem\currentcontrolset\services\larmanserver\shares\private_files registry value entry.


4. [单选题]You are the administrator of two SQL Server 2000 computers. One of these servers contains a 4-GB database named marketing. You want to remove the marketing database from one server and add it to the other as quickly as possible.What should you do?

A. Detach the database from the original server by using the sp_detach_db stored procedure. Copy the database and the transaction log files to the new server, and attach them by using the sp_attach_db stored procedure.
B. Use the DTS export wizard to transfer all database objects from the original server to the new server. Drop the database from the original server.
C. Run a full backup of the database on the original server. Create a new database named marketing on the new server. Restore the backup in the new marketing database. Drop the database from the original server.
D. Shut down the original server. Copy the database and the transaction log files to the new server. Use the DISK INIT and DISK REFIT statements to attach the data file to the new server. Drop the database from the original server.


5. [单选题]You are the administrator of your company's network. A user named Paul in the service department has a Windows 2000 Professional computer. Paul needs to access the files that are in a shared folder on his computer. A local group named Sales has permissions to access the data. Paul is a member of the Sales local group but he cannot access the file he needs.What should you do?

A. Grant Paul NTFS permission so that he can access any parent folder to files in the shared folder.
B. Share the Sales folder and grant Paul shared folder permission to access the shared Sales folder.
C. Remove Paul from any other group that has been explicitly denied access to the Sales folder.
D. Delete the Sales local group and recreate it. Add individual user accounts from the Sales department back into Sales local group.


6. [单选题]You are the administrator of Ezonexam.com's Windows 2000 network.Your computer is configured to use both Windows 2000 Professional and Windows NT Workstation 4.0 Service Pack 3. Your computer has three hard disks: Disk 0, Disk1, and Disk2. Windows NT Workstation 4.0 is installed on Disk 0. Windows 2000 Professional is installed on Disk1. You want to store your project files on Disk2. You configure Disk2 as a basic volume and format the volume as NTFS in Windows 2000 Professional. You then start Windows NT Workstation 4.0. You find that you cannot access your project files.

A. You want to be able to access your project files when using either of the operating systems.
B. What should you do?
C. Upgrade Windows NT Workstation 4.0 to Service Pack 4 or later.
D. Configure Disk 2 as a dynamic volume then format as an NTFS partition.
E. Configure Disk 2 to use Encrypting File System (EFS).
F. Configure Disk 2 as a basic volume and format the volume as FAT32.


7. [单选题]You are the administrator of a SQL Server 2000 computer. The server contains a database that stores financial data. You want to use Data Transformation Services packages to import numeric data from other SQL server computers. The precision and scale values of this data are not defined consistently on the other servers.You want to prevent any loss of data during the import operations. What should you do?

A. Use the ALTER COLUMN clause of the ALTER TABLE statement to change data types in the source tables. Change the data types so that they will use the lowest precision and scale values of the data that will be transferred.
B. Use the ALTER COLUMN clause of the ALTER TABLE statement to change data types in the destination tables. Change the data types to reflect the highest precision and scale values involved in data transfer.
C. Set a flag on each DTS transformation to require an exact match between source and destination columns.
D. Set the maximum error count for each DTS transformation task equal to the number of rows of data you are importing. Use an exception file to store any rows of data that generate errors.
E. Write Microsoft ActiveX script. for each DTS transformation. Use the script. to recast data types to the destinations precision and scale values.


8. [单选题]You want to configure a multiboot system with Windows NT Workstation and Windows 2000 Professional.What should you do?

A. When installing Windows 2000 Professional run chkdisk in Windows NT Workstation.
B. Disable the disk compression in Windows NT Workstation.
C. Install service pack four or later in Windows NT Workstation.
D. Install the distributed file system client on the Windows NT Workstation.


9. [单选题]You are upgrading computer1 and computer2 from Windows NT Workstation 4.0 to Windows 2000 Professional. You successfully upgrade computer1. During the upgrade of computer2, a series of power outages interrupts the upgrade.You discover that the upgrade of computer2 is incomplete. Furthermore, you find that computer2 can no longer run Windows NT workstation 4.0. Computer2 does not support booting from the Windows 2000 Professional CD-ROM. You decide to use computer1 to help recover the failed upgrade.

A. What should you do?
B. On computer1, copy the CD-ROM driver and system files named ntdetect, ntbootdd.sys, Ntdll.dll and Setupldr.bin to a formatted floppy disk. On computer2, restart the computer by using the floppy disk. Then run WinNT32/debug from the Windows 2000 Professional CD-ROM.
C. From computer1, copy the CD-ROM driver and system files named Ntdetect, Ntbootdd.sys, Ntdll.dll, and Setupldr.bin to a formatted floppy disk. On the computer2, restart the upgrade by using the floppy disk. Then run WinNT32/rx from the Windows 2000 Professional CD-ROM.
D. On the computer1, run Makebt32.exe from the Bootdisk folder on the Windows 2000 Professional CD-ROM. On computer2, restart the upgrade by using the newly created floppy disks.
E. On computer1, perform. a remote installation from a network share. On computer2, when the text portion of setup has completed, resume the installation by using the Setup Manager.


10. [单选题]You are the network administrator for Ezonexam. You are planning to upgrade 35 Windows NT Server 4.0 computers to Windows 2000 Server. You want to accomplish the upgrades by using a distribution server. The Windows NT Server 4.0 computers support a tight production schedule that requires them to be online from 8:00

A. M. to midnight, seven days a week. You schedule the upgrade to run during non-business hours. Because of the limited amount of time the upgrades must be performed as quickly as possible.You want to complete the upgrades before production begins in the morning.
B. What should you do?
C. Perform. an unattended installation by running the winnt32 command and the /cmdcons switch.
D. Perform. an unattended installation by running the winnt32 command and specify the use of a .txt file and a uniqueness database file.
E. Perform. an unattended installation by running the winnt command and specify the use of a .txt file and a uniqueness database file.
F. Perform. an unattended installation by using a Winnt.sif file with a commands section that initiates the Update.exe command in quiet mode.


  • 查看答案&解析 点击获取本科目所有试题

  • 本文链接:https://www.zhukaozhuanjia.com/download/j3e4xv.html
    推荐阅读
    @2019-2026 不凡考网 www.zhukaozhuanjia.com 蜀ICP备20012290号-2