Use Windows Backup to archive and remove old files on the server.
Compress the files in the user’s home folder to allow additional files to be saved.
Move some of the files from the user’s home folder to the PROGRESS share folder.
Log on the network as a Recovery Agent. Decrypt all of the user’s files in his home folder.
Lon on to the network by using the domain Administrator account. Grant the user Full Control permission to his home folder.
第1题:
You connect your computer to a wireless network. You discover that this new connection fails to show in the Connect to a network window.You need to view this connection in the Connect to a network window.What should you do?()
A.A
B.B
C.C
D.D
第2题:
You are the network administrator for Company. Company’s network consists of 200 Windows 2000 Professional computers. CompanyW1 is a Windows 2000 Server computer that hosts Company’s intranet site. CompanyP1 is a computer running Microsoft Proxy Server that is used by all computers on the network to access the Internet. You discover that CompanyP1 is experiencing performance degradation due to large number of requests to authenticate with the proxy server. You want to minimize the number of authentication requests to the proxy server. What should you do on each computer?()
第3题:
You administer your company‘s network. All client computers run Microsoft Windows Vista. A standard user reports that they are unable to install an application. You need to install the applicatin.What should you do?()
A.A
B.B
C.C
D.D
第4题:
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the day a network user named Mia Hamm reports that certain meetings are missing from her calendar.Company.com requested that you recover the missing calendar items for Mia Hamm whilst ensuring your solution recovers the missing items automatically.What should you do?()
第5题:
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently configured a user named Rory Allen as a Delegate for a user named Dean Austin.During the course of the business week you receive instruction from Company.com to ensurethat Rory Allen is able to add Dean Austin in the from field when sending messages whilst ensuring messages which contain Dean Austin in the From field should display Dean Austin s the message sender when the recipient receive the messages. What should you do?()
第6题:
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of an internal network and perimeter network.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently deployed a new server to the perimeter network which runs Microsoft Windows Server 2008 R2.During the course of the business week you receive instruction from Company.com to install the Microsoft Exchange Server Edge Transport server role on the server in the perimeter network. What should you do?()
第7题:
You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a server named S01 that runs Windows Server 2008 and Hyper-V inyour company. Three virtual machines are hosted on S01. According to the requirement of company policy,the virtual machines must not connect to the company network. All of the virtual machines need to beconfigured to connect to each other. You must meet the company policy. Which should you do?()
第8题:
You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()
A.A
B.B
C.C
D.D
第9题:
You administer Company's network that consists of 20 Windows 2000 Professional computers configured with default networking settings. Company can not for the moment afford a permanent Internet connection for the network so you do have a single dial-up account to a local Internet Service Provider (ISP). A client computer named Company1 has a 56-Kbps modem installed. You configure a dial-up connection to the ISP on Company1. You want all of the computers to be able to access the Internet when Web resources are requested. What should you do? ()
第10题:
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to ensure that a newly created room mailbox automatically accepts meeting requests.What should you do?()