A. In the Performance console, create a counter log to track processor usage.
B. In Event View, open and review the application log for Performance events.
C. In Windows Reliability and Performance Monitor, use the Resource View to see the percentage of processor capacity used by each application.
D. In Windows Reliability and Performance Monitor, create an alert that will be triggered when processor usage exceeds 80 percent for more than five minutes on Server1.
您可能感兴趣的试卷
你可能感兴趣的试题
A. From File Server Resource Manager, create a File Screen
B. From File Server Resource Manager, create a Storage Management report.
C. From the command prompt, run dirquota.exe quota list.
D. From the properties of each volume, review the Quota Entries list.
A. Decrease the Retry Interval setting in the Start of Authority (SOA) record for the zone.
B. Decrease the Refresh Interval setting in the Start of Authority (SOA) record for the zone.
C. Increase the Refresh Interval setting in the Start of Authority (SOA) record for the zone.
D. Disable the netmask ordering option in the properties of the DNS Master server for the zone.
A. Use Wbadmin to restore the system state from backup
B. Run Wbadmin with the Get Versions option. Install WSS
C. Run Wbadmin with the Start Recovery option. Install WSS
D. Use Wbadmin to restore the application and the sites from backup
A. From the command prompt, run shadow.exe
B. From the command prompt, run vssadmin.exe query reverts
C. From Computer Management, click on the Shared Folders node and then click on Sessions.
D. From Computer Management, click on the Shared Folders node and then click on Open Files
A. Configure a secondary zone on the DNS server in the branch office.
B. Configure a stub zone on the DNS server in the branch office.
C. Configure a stub zone on the DNS server in the main office.
D. Configure a primary zone on the DNS server in the branch office.
A. Modify the share permissions for the Managers group to Reader.
B. Modify the share permissions for the Accounting Users group to Contributer
C. Modify the NTFS permissions for the Managers group to Modify
D. Modify the NTFS permissions for the Authenticated Users group to Modify and the share permissions to contributer
A. Add the user to the DNSUpdateProxy Global security group.
B. Add the user to the DNSAdmins Domain Local security group.
C. Grant the user permissions on the zone.
D. Grant the user permissions on the DNS server.
A. Enable WINS-R lookup in DNS.
B. Create Service Location (SRV) records for the single name resources.
C. Create an Active Directory-integrated zone named LegacyWINS. Create host (A) records for the single name resources.
D. Create an Active Directory-integrated zone named GlobalNames. Create host (A) records for the single name resources.
A. Enable the Optimize for scalibity option
B. Enable the optimize for consistency option
C. Set the Ordering method option to Lowest cost
D. Set the Ordering method option to Random order
A. Install the Internet Printing server role on SRV1.
B. Install the Line Printer Daemon (LPD) Services role service on SRV1
C. Configure the printers on SRV1 to use Line Printer Remote printing
D. Install the File Server role on SRV1 and activate the services for the NFS Role Service option.
最新试题
Your company has an Active Directory domain that has two domain controllers named DC1 and DC2.You prepare both servers to support event subscriptions. On DC1, you create a new default subscription for DC2. You need to review system events for DC2.Which event log should you select?()
You perform a security audit of a server named CRM1. You want to build a list of all DNS requests that are initiated by the server. You install the Microsoft Network Monitor 3.0 application on CRM1. You capture all local traffic on CRM1 for 24 hours. You save the capture file as data.cap. You find that the size of the file is more than 1 GB. You need to create a file named DNSdata.cap from the existing capture file that contains only DNS-related data.What should you do? ()
Your company ahs an active direcotyr domain. The company also has a server named Server1 that runs Windows Server 2008. You install the file server role on Server1. you create a shared folder named AcctgShare on Server1 The permissions for the shared folder are configured as shown in the following table. ( missing again!) You need to ensure members of the Managers group can only view and open files in the shared folder. What should you do()?
Your company has a server named Printer1 that runs Windows Server 2008 R2. Printer1 has the Print and Document Services server role installed.You need to reduce the number of events registered in the system log on Printer1. What should you do?()
Your company has a network that has an Active Directory domain. The domain has two servers named DC1 and DC2. You plan to collect events from DC2 and transfer them to DC1. You configure the required subscriptions by selecting the Normal option for the Event delivery optimization setting and by using the HTTP protocol.You discover that none of the subscriptions work.You need to ensure that the servers support the event collectors.Which three actions should you perform?()
Your company has a server named FS1. FS1 hosts the domain-based DFS namespace named \\contoso. com\dfs all domain users store their data in subfolders within the DFS namespace. You need to prevent all users except administrators, from creating new folders or new files at the root of the \\contoso.com\dfs share. What should you do()?
Your company has a server named DC1 that runs Windows Server 2008. DC1 has the DHCP server role installed. You find taht a desktop computer named SALES4 is unable to obtain an IP configuration from the DHCP server. You install the Microsoft Network Monitor 3.0 application on DC1. You enable P-mode in the Network Monitor application configuration. You plan to capture only the DHCP server-related traffic between DC1 and SALES4 The network interface configuration for the two computers is shown in the following table. (missing again wow). You need to build a filter int he Network Monitor application to capture the DHCP traffic between DC1 and SALES4 Which filter should you use()?
You perform a security audit of a server named CRM1. You want to build a list of all DNS requests that are initiated by the server. You install the Microsoft Network Monitor 3.0 application on CRM1. You capture all local traffic on CRM1 for 24hours. You save the capture file as data.cap. you find that the size of this file is more tahn 1GB. you need to create a file named DNSdata.cap from the existing capture file taht contains only dNS -related data What should you do()?
You perform a security audit of a server named DC1. You install the Microsoft Network Monitor 3.0 application on DC1.You plan to capture all the LDAP traffic that comes to and goes from the server between 20:00 and 07:00 the next day and save it to the E:\data.cap file. You create a scheduled task. You add a new Start a program action to the task.You need to add the application name and the application arguments to the new action.What should you do?()
You have a server that runs Windows Server 2008. you create a new quota template. you apply quotas to 100 folders by using the quota template. you nede to modify the quota settings for al 100 folders. You must achive this goal by using the minimum amount of administrative effort. What should you do()?