题目
The Windows 2000 Server CD-ROM is unavailable. You want install Windows 2000 Server from source files that are located on a server on the network. You also want the entire hard disk of the new computer to be used for the system partition.
What should you do?
A.On another Windows 2000 computer, use Makebt32.exe to create installation startup disks. Start the new computer by using the first disk.
B.On another Windows 2000 computer, format a floppy disk. Copy NTLDR, Boot.ini, Ntdetect.com, Ntbootdd.sys to this disk. Start the new computer by using the disk.
C.Start the new computer by using a Windows 98 network boot disk. Connect to the network server. Run Dsclient.exe. Create and format a 20-GB FAT32 partition.
D.Start the new computer by using a Windows 98 network boot disk. Create and format a single FAT32 partition. Connect to the network server. Run Winnt.exe.
E.Start the computer by using a Windows 98 network boot disk. Create and format a single FAT32 partition. Start the new computer by using a Windows 2000 Emergency Repair Disk.
第1题
A. the Get-BPAModel cmdlet
B. the Invoke-BPAModel cmdlet
C. the Mrinfo tool
D. the Systeminfo tool
第2题
A.Configure the IPv6 protocol on the Windows 7 computers.
B.Configure the network shares on the Windows 7 computers to include the user names of all employees.
C.Configure the network shares on the Windows XP computers to include the user names of all employees.
D.Install the Link Layer Topology Discovery (LLTD) Responder on the Windows XP computers.
第3题
A. The login attempt is rejected.
B. The login attempt is automatically accepted after the authentication servers’ timeout value is reached, since there are no other authentication methods available.
C. The M120 automatically tries authenticating locally on the device after the authentication servers’ timeout value is reached.
D. The M120 automatically tries authenticating locally on the device before using external authentication.
第4题
You are the network administrator for Ezonexam.com.
You need to install Windows 2000 Professional on 75 new computers in your network. You use Setup Manager wizard to configure a fully automated installation script. file. You test the unattended installation using the fully automated installation script. file. When the installation completes you realize that the Windows 2000 Professional CD does not contain the driver for the Plug and Play video adapter used by the new computers.
You want to include the correct driver for the video adapter when installing Windows 2000 Professional.
What should you do? (Each correct presents part of the solution. Select three.)
A.Run sysprep.exe with the -pnp parameter.
B.In the UserData section of the fully automated installation script. file, specify the ProductID variable.
C.In the Unattended section of the fully automated installation script. file, set the Oem PnP Drivers Path property to the location of the video driver files.
D.In the Unattended section of the fully automated installation script. file, set the Oem Preinstall property to Yes.
E.Copy the video driver to the i386\$OEM$\$1\VidDriver.
F.Copy the video driver to the i386\$$\System32.
第5题
The objectives of early hackers are a far cry from the goals of today's hacker. The motivation of the new breed of hackers appears not to be curiosity, or a hunger for knowledge, as it used to be. Instead, most of today's hackers are driven by greed, power, revenge, or some other malicious intent, treating hacking as a game or sport, employing the tools that are readily available via the Internet.
The rate of security attacks is actually outpacing the growth of the Internet. This means that something besides the growth of the Internet is driving the rise in security attacks. Here are some realities you should know about: Operating systems and applications will never be secure. New vulnerabilities will be introduced into your environment every day. And even if you ever do get one operating system secure, there will be new operating systems with new vulnerabilities—phones, wireless devices, and network appliances. Employees will never keep up with security polices and awareness. It doesn't matter how much you train and educate your employees. If your employees disregard warnings about the hazards of opening questionable email attachments, how are you going to educate them about properly configuring firewalls and intrusion detection systems for their PCs? Managers have more responsibility than ever. And on top of the realities listed above. security managers are being asked to support increasing degrees of network availability and access.
There are some good security measures you can take: Employ a layer 7, full-inspection firewall. Automatically update your anti-virus at the gateway, server and client. Keep all of your systems and applications updated. Hackers commonly break into a Web site through known security holes, so make sure your servers and applications are patched and up to date. Turn off unnecessary network services. Eliminate all unneeded programs. Scan network for common backdoor services—Use intrusion detection systems, vulnerability scans, antivirus protection.
第31题:Which of the following statements of Steve Wozniak, Bill Gates and Linus Torvalds is TRUE?
[A] They are all good examples of today's computer users.
[B] They are driven by greed, power, revenge, or some other malicious intent.
[C] Their goal is to push programs beyond what they are designed to do.
[D] They are all dead.
第6题
A.Polymers Crosslinked with Itself
B.Hybrid Polymer Networks
C.Interpenetrating Polymer Networks
D.3D Polymer Network
第7题
A.device protection
B.wrapping protection
C.link protection
D.steering protection
第8题
A.network 0.0.0.0 255.255.255.255 area 0
B.network 0.0.0.0 0.0.0.0 area 0
C.network 255.255.255.255 0.0.0.0 area 0
D.network all-interfaces area 0
第9题
A.gateway
B.router
C.software
D.server
第10题
A.naming of subnet
B.naming of site
C.naming of hostname
D. naming of interface
第11题
A. It is complete as written
B. It should include a task that verifies that the interarea routes are using the proper MED
C. The plan should include a task that verifies that load sharing is active on the appropriate links
D. The plan should include a task that verifies end - to - end connectivity between the clients and the file server
为了保护您的账号安全,请在“赏学吧”公众号进行验证,点击“官网服务”-“账号验证”后输入验证码“”完成验证,验证成功后方可继续查看答案!