重要提示: 请勿将账号共享给其他人使用,违者账号将被封禁!
查看《购买须知》>>>
当前位置: 首页 > 计算机类考试 > 微软认证
网友您好, 请在下方输入框内输入要搜索的题目:
搜题

题目

[主观题]

Your network includes Windows 98 computers and Windows 2000 Server computers. You are addi

ng a new computer to the network, and you plan to install Windows 2000 Server on the new computer. The computer has one 20-GB hard disk with no partitions defined.

The Windows 2000 Server CD-ROM is unavailable. You want install Windows 2000 Server from source files that are located on a server on the network. You also want the entire hard disk of the new computer to be used for the system partition.

What should you do?

A.On another Windows 2000 computer, use Makebt32.exe to create installation startup disks. Start the new computer by using the first disk.

B.On another Windows 2000 computer, format a floppy disk. Copy NTLDR, Boot.ini, Ntdetect.com, Ntbootdd.sys to this disk. Start the new computer by using the disk.

C.Start the new computer by using a Windows 98 network boot disk. Connect to the network server. Run Dsclient.exe. Create and format a 20-GB FAT32 partition.

D.Start the new computer by using a Windows 98 network boot disk. Create and format a single FAT32 partition. Connect to the network server. Run Winnt.exe.

E.Start the computer by using a Windows 98 network boot disk. Create and format a single FAT32 partition. Start the new computer by using a Windows 2000 Emergency Repair Disk.

查看参考答案
更多“Your network includes Windows 98 computers and Windows 2000 Server computers. You are addi”相关的问题

第1题

Your network contains a server that runs Windows Server 2008 R2.You need to create a script to identify known configuration issues.What should you include in the script?()

A. the Get-BPAModel cmdlet

B. the Invoke-BPAModel cmdlet

C. the Mrinfo tool

D. the Systeminfo tool

点击查看答案

第2题

Your company has client computers that run Windows 7 and client computers that run Windows
XP Professional. You enable the Network Discovery feature on the Windows 7 computers. You discover that the Windows XP computers do not appear on the network map. You need to ensure that all client computers appear on the network map. What should you do?()

A.Configure the IPv6 protocol on the Windows 7 computers.

B.Configure the network shares on the Windows 7 computers to include the user names of all employees.

C.Configure the network shares on the Windows XP computers to include the user names of all employees.

D.Install the Link Layer Topology Discovery (LLTD) Responder on the Windows XP computers.

点击查看答案

第3题

The authentication order configuration on your M120 includes the settings tacplus and radi
us (in that order), but does not include the password parameter. You attempt to log in to the device, but the network containing the authentication servers is currently down.Which statement is true about your login attempt?()

A. The login attempt is rejected.

B. The login attempt is automatically accepted after the authentication servers’ timeout value is reached, since there are no other authentication methods available.

C. The M120 automatically tries authenticating locally on the device after the authentication servers’ timeout value is reached.

D. The M120 automatically tries authenticating locally on the device before using external authentication.

点击查看答案

第4题

You are the network administrator for Ezonexam.com.You need to install Windows 2000 Profes

You are the network administrator for Ezonexam.com.

You need to install Windows 2000 Professional on 75 new computers in your network. You use Setup Manager wizard to configure a fully automated installation script. file. You test the unattended installation using the fully automated installation script. file. When the installation completes you realize that the Windows 2000 Professional CD does not contain the driver for the Plug and Play video adapter used by the new computers.

You want to include the correct driver for the video adapter when installing Windows 2000 Professional.

What should you do? (Each correct presents part of the solution. Select three.)

A.Run sysprep.exe with the -pnp parameter.

B.In the UserData section of the fully automated installation script. file, specify the ProductID variable.

C.In the Unattended section of the fully automated installation script. file, set the Oem PnP Drivers Path property to the location of the video driver files.

D.In the Unattended section of the fully automated installation script. file, set the Oem Preinstall property to Yes.

E.Copy the video driver to the i386\$OEM$\$1\VidDriver.

F.Copy the video driver to the i386\$$\System32.

点击查看答案

第5题

Text 3 The first big-name hackers include Steve Wozniak, Bill Gates and Linus Torvalds, al
l now highly recognizable names behind many of the computer technologies used today. These early hackers had a love of technology and a compelling need to know how it all worked, and their goal was to push programs beyond what they were designed to do. Back then, the word "hacker" didn't have the negative connotation it has today. The original hacker ethic, rooted out of simple curiosity and a need to be challenged, appears to be dead.

The objectives of early hackers are a far cry from the goals of today's hacker. The motivation of the new breed of hackers appears not to be curiosity, or a hunger for knowledge, as it used to be. Instead, most of today's hackers are driven by greed, power, revenge, or some other malicious intent, treating hacking as a game or sport, employing the tools that are readily available via the Internet.

The rate of security attacks is actually outpacing the growth of the Internet. This means that something besides the growth of the Internet is driving the rise in security attacks. Here are some realities you should know about: Operating systems and applications will never be secure. New vulnerabilities will be introduced into your environment every day. And even if you ever do get one operating system secure, there will be new operating systems with new vulnerabilities—phones, wireless devices, and network appliances. Employees will never keep up with security polices and awareness. It doesn't matter how much you train and educate your employees. If your employees disregard warnings about the hazards of opening questionable email attachments, how are you going to educate them about properly configuring firewalls and intrusion detection systems for their PCs? Managers have more responsibility than ever. And on top of the realities listed above. security managers are being asked to support increasing degrees of network availability and access.

There are some good security measures you can take: Employ a layer 7, full-inspection firewall. Automatically update your anti-virus at the gateway, server and client. Keep all of your systems and applications updated. Hackers commonly break into a Web site through known security holes, so make sure your servers and applications are patched and up to date. Turn off unnecessary network services. Eliminate all unneeded programs. Scan network for common backdoor services—Use intrusion detection systems, vulnerability scans, antivirus protection.

第31题:Which of the following statements of Steve Wozniak, Bill Gates and Linus Torvalds is TRUE?

[A] They are all good examples of today's computer users.

[B] They are driven by greed, power, revenge, or some other malicious intent.

[C] Their goal is to push programs beyond what they are designed to do.

[D] They are all dead.

点击查看答案

第6题

The crosslinked hydrogel formations include: ().

A.Polymers Crosslinked with Itself

B.Hybrid Polymer Networks

C.Interpenetrating Polymer Networks

D.3D Polymer Network

点击查看答案

第7题

Which of the following does ring network protection of PTN devices include?()

A.device protection

B.wrapping protection

C.link protection

D.steering protection

点击查看答案

第8题

What OSPF command, when configured, will include all interfaces into area 0?()

A.network 0.0.0.0 255.255.255.255 area 0

B.network 0.0.0.0 0.0.0.0 area 0

C.network 255.255.255.255 0.0.0.0 area 0

D.network all-interfaces area 0

点击查看答案

第9题

The main goals of Network are sharing computer resources .The resources include hardware,
data and

A.gateway

B.router

C.software

D.server

点击查看答案

第10题

Which of the following does PTN network's naming plan include?()

A.naming of subnet

B.naming of site

C.naming of hostname

D. naming of interface

点击查看答案

第11题

Refer to the exhibit. ROUTE.com is planning to implement a secure OSPF network to support
traffic between clients on the 172.16.10.0/24 network and the file server on the 172.16.20./24 network. You have been asked to review the implementation and verification plans. Which statement about the plan is true?()

Refer to the exhibit. ROUTE.com is planning to imp

A. It is complete as written

B. It should include a task that verifies that the interarea routes are using the proper MED

C. The plan should include a task that verifies that load sharing is active on the appropriate links

D. The plan should include a task that verifies end - to - end connectivity between the clients and the file server

点击查看答案
赏学吧APP
TOP
重置密码
账号:
旧密码:
新密码:
确认密码:
确认修改
购买搜题卡查看答案
购买前请仔细阅读《购买须知》
请选择支付方式
微信支付
支付宝支付
点击支付即表示你同意并接受《服务协议》《购买须知》
立即支付
搜题卡使用说明

1. 搜题次数扣减规则:

功能 扣减规则
基础费
(查看答案)
加收费
(AI功能)
文字搜题、查看答案 1/每题 0/每次
语音搜题、查看答案 1/每题 2/每次
单题拍照识别、查看答案 1/每题 2/每次
整页拍照识别、查看答案 1/每题 5/每次

备注:网站、APP、小程序均支持文字搜题、查看答案;语音搜题、单题拍照识别、整页拍照识别仅APP、小程序支持。

2. 使用语音搜索、拍照搜索等AI功能需安装APP(或打开微信小程序)。

3. 搜题卡过期将作废,不支持退款,请在有效期内使用完毕。

请使用微信扫码支付(元)
订单号:
遇到问题请联系在线客服
请不要关闭本页面,支付完成后请点击【支付完成】按钮
遇到问题请联系在线客服
恭喜您,购买搜题卡成功 系统为您生成的账号密码如下:
重要提示: 请勿将账号共享给其他人使用,违者账号将被封禁。
发送账号到微信 保存账号查看答案
怕账号密码记不住?建议关注微信公众号绑定微信,开通微信扫码登录功能
警告:系统检测到您的账号存在安全风险

为了保护您的账号安全,请在“赏学吧”公众号进行验证,点击“官网服务”-“账号验证”后输入验证码“”完成验证,验证成功后方可继续查看答案!

- 微信扫码关注赏学吧 -
警告:系统检测到您的账号存在安全风险
抱歉,您的账号因涉嫌违反赏学吧购买须知被冻结。您可在“赏学吧”微信公众号中的“官网服务”-“账号解封申请”申请解封,或联系客服
- 微信扫码关注赏学吧 -
请用微信扫码测试
温馨提示
每个试题只能免费做一次,如需多次做题,请购买搜题卡
立即购买
稍后再说
赏学吧