A.Wbadmin enable backup -addtarget:R: /quiet
B.Wbadmin enable backup addtarget:C: /quiet
C.Wbadmin start backup allCritical backuptarget:C:/quiet
D.Wbadmin start backup allCritical backuptarget:R:/quiet
您可能感兴趣的试卷
你可能感兴趣的试题
A. Configure NAT1 to forward port 389 to RDP1
B. Configure NAT1 to forward port 1432 to RDP1
C. Configure NAT1 to forward port 3339 to RDP1
D. Configure NAT1 to forward port 3389 to RDP1
A.Use Wbadmin to restore the system state from backup.
B.Run Wbadmin with the Get Versions option. Install WSS.
C.Run Wbadmin with the Start Recovery option. Install WSS.
D.Use Wbadmin to restore the application and the sites from backup.
deployed on the network. You need to ensure that NAP policies are enforced on portable computers taht
use a wireless connection to access the network. What should you do?()
A. Configure all access points to use 802.1X authentication
B. Configure all protable computers to use MS-CHAP v2 authentication
C. Use the Group Policy Management Console to access the wireless group policy settings, and enable the Prevent connections to ad-hoc networks option.
D. Use the Group Policy Management Console to access the wireless group policy settings, and disable the Prevent connections to infrastructure networks option.
A. Run dnscmd by using the ZoneResetMasters option.
B. Run dnscmd by using the ZoneResetSecondaries option.
C. Add the new DNS server to the Zone Transfers tab on one of the DNS servers in the main office.
D. Add the new DNS server to the DNSUpdateProxy Global security group in Active Directory Users and Computers.
You need to ensure that the system health policy is applied to all client computers that attempt VPN connections.What should you do?()
A. Reconfigure NPS1 as a radius client
B. Reconfigure VPN1 as a radius client
C. Add the NAP role to a domain controller
D. Add the NAP role to an Enterrpise Certificate server.
A. Pointer (PTR)
B. Host Info (HINFO)
C. Service Location (SRV)
D. Canonical Name (CNAME)
A.From the command prompt,run shadow.exe /v.
B.From the command prompt,run vssadmin.exe query reverts.
C.From Computer Management,click on the Shared Folders node and then click on Sessions.
D.From Computer Management,click on the Shared Folders node and then click on Open Files.
A.Enable the Optimize for scalability option.
B.Enable the Optimize for consistency option.
C.Set the Ordering method option to Lowest cost.
D.Set the Ordering method option to Random order.
A. Host Info (HINFO)
B. Service Location (SRV)
C. Canonical Name (CNAME)
D. Well-Known Service (WKS)
A.Run the dfscmd.exe \\FS1\dfs /restore command on FS1.
B.Configure the NTFS permissions for the C:\DFSroots\dfs folder on FS1. Set the Create folders/append data special permission to Deny for the Authenticated Users group. Set the Full Control permission to Allow for the Administrators group.
C.Start the Delegate Management Permissions Wizard for the DFS namespace named \\contoso.com\dfs. Remove all groups that have the permission type Explicit except the Administrators group.
D.Configure the \\FS1\dfs shared folder permissions. Set the permissions for the Authenticated Users group to Reader. Set the permissions for the Administrators group to Co-owner.
最新试题
Your company ahs an active direcotyr domain. The company also has a server named Server1 that runs Windows Server 2008. You install the file server role on Server1. you create a shared folder named AcctgShare on Server1 The permissions for the shared folder are configured as shown in the following table. ( missing again!) You need to ensure members of the Managers group can only view and open files in the shared folder. What should you do()?
Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP. what should you do()?
Your company has a network that has 100 servers. You install a new server that runs Windows Server 2008 R2. The server has the Web Server (IIS) server role installed. After a week, you discover that the Reliability Monitor has no data, and that the Systems Stability chart has never been updated.You need to configure the server to collect the Reliability Monitor data.What should you do?()
Your company runs Windows Server Update Services (WSUS) on a server named Server1. Server1runs Windows Server 2008 R2. Server1 is located on the company intranet. You configure the WSUS Web site to use SSL.You need to configure a Group Policy object (GPO) to specify the intranet update locations.Which URLs should you use?()
You deploy Windows Server 2008 VPN server behind a firewall. Remote users connect to the VPN by using portable computers that run Windows Vista with the latest service pack. The firewall is configured to allow only secured web communications. You need to enable remote users to connect as securely as possible. you must achieve this goal without opening any additional ports on the firewall. What should you do ()?
Your company has an active directory domain that has two domain controllers named DC1 and DC2. You prepare both servers to support event subscriptions. On DC1, you create a new default subscription for DC2. You need to review system events for DC2. Which event log should you select()?
Your company has a network that has 100 servers. A server named Server1 is configured as a file server. Server1 is connected to a SAN and has 15 logical drives. You want to automatically run a data archiving script if the free space on any of the logical drives is below 30 percent. You need to automate the script execution.You create a new Data Collector Set. What should you do next?()
You have a file server that runs Windows Server 2008. A user restores a large file by using the Previous Versions tab. You need to view the progress of the file restoration what should you do()?
You perform a security audit of a server named CRM1. You want to build a list of all DNS requests that are initiated by the server. You install the Microsoft Network Monitor 3.0 application on CRM1. You capture all local traffic on CRM1 for 24 hours. You save the capture file as data.cap. You find that the size of the file is more than 1 GB. You need to create a file named DNSdata.cap from the existing capture file that contains only DNS-related data.What should you do? ()
Your company has a server named FS1. FS1 hosts the domain-based DFS namespace named \\contoso. com\dfs all domain users store their data in subfolders within the DFS namespace. You need to prevent all users except administrators, from creating new folders or new files at the root of the \\contoso.com\dfs share. What should you do()?