• [单选题]You are the administrator of a 12 SQL Server 2000 computers. These servers are located in company offices throughout the world.You configure a multiserver job on the server in your company's New York City office. You configure this server as a master server, and designate the remaining 11 servers as target servers.
  • 正确答案 :C
  • On the New York City server, defect all 11 target servers. On the JobMaster server, enlist the 12 servers as target servers.

  • 解析:解析:Explanation:Whensettingupanewmasterserver,theoldmasterservermustdefectallitstargetservers.Whenanewlydesignatedmasterserverreplacesanexistingmasterserver,thetargetserversmustbedefectedfromtheexistingmasterserver.Thetargetserverscanthenbeenlistedonthenewmasterserver.Thiscanincludetheexistingtargetserver.Note:InSQLServer2000EnterpriseEdition,multiserveradministrationisusedtoautomatetheadministrationofmultipleinstancesofSQLServer2000.Itcanbeusedtomanagetwoormoreserversandtoscheduleinformationflowsbetweenenterpriseserversfordatawarehousing.Withmultiserveradministration,theremustbeatleastonemasterserverandatleastonetargetserver.Amasterserverdistributesjobstoandreceiveseventsfromtargetservers.Amasterserverstoresthecentralcopyofjobdefinitionsforjobsrunontargetservers.Targetserversconnectperiodicallytotheirmasterservertoupdatetheirlistofjobstoperform.Ifanewjobexists,thetargetserverdownloadsthejobanddisconnectsfromthemasterserver.Afterthetargetservercompletesthejob,itreconnectstothemasterserverandreportsthestatusofthejob.WithSQLServer2000EnterpriseEdition,masterserverscanenlisttargetserversandcandefecttargetservers.IncorrectAnswers:B:ThissolutiondoesnotaddresstheneedtodemotetheNewYorkCityserver.Itisthusstillamasterserver.C:InthissolutiontheJobMasterserverisenlistedasatargetserveroftheNewYorkCityserver.ThissolutionalsodoesnotaddresstheneedtodemotetheNewYorkCityserver.Itisthusstillamasterserver.D:InthissolutiontheNewYorkCityserverisnotatargetserveroftheJobMasterserverasithasbeendefectedfromtheJobMasterserver.

  • [单选题]Ezonexam.com's network contains two domain controllers and approximately 500 client computers. The domain controllers run Windows 2000 Server. The client computers run Windows 2000 Professional. The majority of users have mobile computers. Users in Ezonexam often travel with their mobile computer for extended periods of time and do not have remote access to Ezonexam.com's network.You want to configure the domain controllers so that DNS only contains entries for computers that are active on the network. You also want to ensure that when users return you do not have to manually create or delete DNS entries.
  • 正确答案 :D
  • Configure both domain controllers with Active Directory integrated primary zones for the domain and enable scavenging and dynamic updates for the zone.

  • 解析:解析:Explanation: Scavenging is a process whereby a DNS server periodically checks it's dynamically created records to see how long it's been since they were registered (or reregistered). Then, if the scavenger finds records that haven't been registered or reregistered in a long time, it deletes them from the zone file.

  • [多选题]You recently upgraded all Windows NT Workstation 4.0 computers to Windows 2000 Professional. You want to give a new employee named Maria the ability to back up files, share resources, and install programs on a client computer that she shares with other users. You do not want Maria to be able to read other users' files.What should you do to accomplish these goals? (Choose all that apply)
  • 正确答案 :CE
  • Add Maria's user account to the Power Users group.

    Add Maria's user account to the Backup Operators group.

  • 解析:解析:Explanation: By adding Maria's user account to the Power Users group Maria will inherit the ability to share resources and install programs on the computer. To grant Maria the ability to backup files she must be added to the Backup Operators group, which has the permissions to backup files. As a member of this group Maria will be able to backup files as she will inherit those rights by virtue of being a member of that group. Maria will not have permissions to read the users' files as neither the Power Users group nor the Backup Operators group have the permissions to read other users' files.

  • [单选题]You are the administrator responsible for security and user desktop settings on your network. You need to configure a custom registry entry for all users. You want to add the custom registry entry into a Group Policy object (GPO) with the least amount of administrative effort.What should you do?
  • 正确答案 :A
  • Configure an ADM template and add the template to the GPO.

  • 解析:解析:Explanation: It is recommended that we should use the supplied Administrative Templates where possible. Administrative Templates propagate registry settings to a large number of computers without requiring us to have detailed knowledge of the registry. However, the administrator can create custom .adm files if the supplied templates are inadequate. In Windows 2000, we use Group Policy to set registry-based policies. In Windows NT 4.0, we used the System Policy Editor (Poledit.exe) to set System Policy.

  • [多选题]You are the administrator of several SQL Server 2000 computers. A data Transformation Services (DTS) package uses native OLE DB providers to transfer data between the servers. Connection details for the servers are specified in .udl files. The .udl files are frequently updated as connection details change.You want to distribute the DTS package as a file to developers in your company. You want to make sure connection details are available to developers who receive the DTS package.
  • 正确答案 :BF
  • Enable the Always read properties from UDL file option in the Connection Properties dialog box.

    Make the .udl files available on a network share.

  • 解析:解析:Explanation:

  • [多选题]You are the administrator of a SQL Server 2000 computer. The server contains a Data Transformation Services (DTS) package that queries multiple databases and writes the results to a text file. You run this package by using a Microsoft Windows batch file. The batch file uses the dtsrun utility to execute the DTS package.You want to ensure that connection properties, such as login names and passwords, cannot be read or modified by users. Which two actions should you take? (Each correct answer represents part of the solution. Choose two.)
  • 正确答案 :AC
  • Save the DTS package so that it has an owner password.

    Encrypt the DTS package details in the command line of the dtsrun utility.

  • 解析:解析:Explanation: In this scenario we will use a windows batch file with the owner password for maximum security.

  • [单选题]You are the administrator of your company's network. An employee named Mark is leaving the company. A new employee named Eric has been hired to replace him.Mark has a local user account on a Windows 2000 Professional computer. Mark has rights to multiple files and folders on the computer.
  • 正确答案 :C
  • Rename Mark's user account to Eric and change the account password.

  • 解析:解析:Explanation: A user account and the permission and rights attached to them can easily be transferred to another user by renaming the account and changing the password. By renaming Mark's user account and by changing the password, Eric will have the same rights and permissions as Mark had, and Mark will not be able to use his old account. This provides the solution with least amount of administrative effort.

  • [单选题]You want to upgrade 400 computers from Windows 95 to Windows 2000 Professional. Most of the computers in your company use the same hardware. However, several different peripheral devices are used throughout the company.You want to verify that the hardware in use is compatible with Windows 2000 Professional. You want to accomplish this with least amount of administrative effort.
  • 正确答案 :E
  • Use Setup Manager to create a Setup.inf file. Add the entryReportOnly=Yes to the [Win9xUpg] section of the answer file. RunWinnt32.exe /Unattended:Setup.infon all of the different computer configurations.

  • 解析:解析:Explanation: Winnt32.exe /unattended:setup.inf will start an unattended installation using the answer file setup.inf. When ReportOnly=Yes is added in the [Win9xUpg] section of the answer file, the installation only generates an upgrade report and then exits without making any changes to the current Windows 95 or Windows 98 installation. The upgrade report contains a list of hardware and software incompatibilities and is saved to the root of the system drive if the SaveReportTo key is not specified.

  • [单选题]You want to upgrade a Windows NT Server 4.0 computer to Windows 2000 Server. The system partition uses the FAT file system.You start the Setup program by starting the computer from the Windows 2000 Server CD-ROM.
  • 正确答案 :E
  • Restart the computer, and then run Winnt32.exe from the Windows NT Server 4.0 environment.

  • 解析:解析:Explanation:WhenupgradingearlierversionsofWindowstoWindows2000wemustusewinnt32.exeandmustlaunchitfromwithintheWindowsenvironment.Incorrectanswers:A:Windows2000canbeinstalledorupgradedonadiskorpartitionthatisformattedwiththeFATfilesystem.ThereisthusnoneedtoconvertthefilesystemtoNTFS.B:TheAdvancedConfigurationandPowerInterfaceisusedforpowermanagementanddoesnotaffecttheinstallationorupgradeprocess.ItwouldthusnotbenecessarytodisableACPI.D:ThesetupfloppydisksuseWinnt.exetoinstallWindows2000.WehowevercanonlyusethesetupfloppydiskstoinstallacleancopyofWindows2000onthecomputer.WecannotupgradetheoperatingsystemtoWindows2000usingthesetupfloppydisks.Wemustusewinnt32.exetoupgradeearlierversionsofWindowstoWindows2000.

  • [单选题]You need to create a web share on your Windows 2000 Professional computer named Admin01. You create a folder named reports. Then you configure web sharing on Reports. You name the share WebReports and allow Read permissions on the share.You test the web share by pointing to http://admin01/WebReports from another computer. You receive the following error message, 'You are not authorized to view this page.'
  • 正确答案 :D
  • In the IIS console, enable anonymous access to WebReports.

  • 解析:解析:Explanation: The proper NTFS permissions, read permission, have already been granted. To access the folder through Internet Explorer the folder must be published in Internet Information Services (IIS), and authentication through IIS must be provided. By enabling anonymous access in the IIS console the folder would be accessible through Internet Explorer.

  • 查看原题

    推荐下载科目: 计算机二级 计算机三级 Linux认证 JAVA认证 软考初级 通信工程师 计算机操作员中级 计算机操作员高级 计算机辅助设计 LTE认证
    @2019-2026 不凡考网 www.zhukaozhuanjia.com 蜀ICP备20012290号-2