最新活动:
Testinside考题大师权威Microsoft、Cisco、SUN、CIW、IBM、Nortel、HP、Oracle等各大IT认证题库,最新考题售价仅180元起。(时间有限!)
机会不容错过!需要的朋友一定要抓住这个机会!下面开始我们的正文! 70-218考试资料
Managing a Microsoft Windows 2000 Network Environment
科目编号:70-218
科目名称:Managing a Microsoft Windows 2000 Network Environment 语言(s): 英语 考生: IT专业人士 技术: 微软视窗2000 类型: 监考考试
相关分类:MCSE 2000 Security
70-218 考试是 Microsoft 公司的 Managing a Microsoft Windows 2000 Network Environment 认证考试官方代号,Managing a Microsoft Windows 2000 Network Environment 认证作为全球IT领域专家 Microsoft 热门认证之一,是许多大中IT企业选择人才标准的必备条件。
下面是由Testinside考题大师带来的70-218考试相关资料分享:
考生简介:
Candidates for this exam work in medium-sized to very large computing environments that use Microsoft Windows 2000 network and directory services. Candidates have at least six months of experience administering and supporting Windows 2000 server and client operating systems that use Active Directory directory services in environments that have the following characteristics. Supported users range from 200 to 26,000. Physical locations range from 2 to 100.
Typical network services and resources include messaging, file and print, proxy server or firewall, Internet and intranet, remote access, and client computer management.
Connectivity needs include connecting branch offices and individual users at remote locations to the corporate network and connecting corporate networks to the Internet.
Credit Toward Certification
When you pass Exam 70-218: Managing a Microsoft Windows 2000 Network Environment, you complete the requirements for the following certification(s): Microsoft Certified Professional (MCP)
Exam 70-218: Managing a Microsoft Windows 2000 Network Environment: counts as credit toward the following certification(s):
Core credit toward Microsoft Certified System Administrator on Windows 2000 certification
Elective credit toward Microsoft Certified Systems Engineer on Windows 2000 certification
70-218考试知识点:
Skills Being Measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. Create, configure, manage, secure, and troubleshoot file, print, and Web resources Publish resources in Active Directory. Types of resources include printers and shared folders.
Perform a search in Active Directory Users and Computers. Configure a printer object.
Manage data storage. Considerations include file systems, permissions, and quotas. Implement NTFS and FAT file systems. Enable and configure quotas.
Implement and configure Encrypting File System (EFS). Configure volumes and basic and dynamic disks. Configure file and folder permissions.
Manage a domain-based distributed file system (DFS). Manage file and folder compression.
Create shared resources and configure access rights. Shared resources include printers, shared folders, and Web folders. Share folders and enable Web sharing. Configure shared folder permissions. Create and manage shared printers. Configure shared printer permissions.
Configure and troubleshoot Internet Information Services (IIS). Configure virtual directories and virtual servers. Troubleshoot Internet browsing from client computers.
Troubleshoot intranet browsing from client computers. Configure authentication and SSL for Web sites. Configure FTP services.
Configure access permissions for intranet Web servers.
Monitor and manage network security. Actions include auditing and detecting security breaches.
Configure user-account lockout settings.
Configure user-account password length, history, age, and complexity. Configure Group Policy to run logon scripts. Link Group Policy objects. Enable and configure auditing.
Monitor security by using the system security log file.
Configure, administer, and troubleshoot the network infrastructure
Troubleshoot routing. Diagnostic utilities include the tracert command, the ping command, and the ipconfig command.
Validate local computer configuration by using the ipconfig, arp, and route commands.
Validate network connectivity by using the tracert, ping, and pathping commands. Configure and troubleshoot TCP/IP on servers and client computers. Considerations include subnet masks, default gateways, network IDs, and broadcast addresses. Configure client computer TCP/IP properties.
Validate client computer network configuration by using the winipcfg, ipconfig, and arp commands.
Validate client computer network connectivity by using the ping command. Configure, administer, and troubleshoot DHCP on servers and client computers. Detect unauthorized DHCP servers on a network.
Configure authorization of DHCP servers.
Configure client computers to use dynamic IP addressing. Configure DHCP server properties. Create and configure a DHCP scope.
Configure, administer, and troubleshoot DNS. Configure DNS server properties.
Manage DNS database records such as CNAME, A, and PTR. Create and configure DNS zones.
Troubleshoot name resolution on client computers. Considerations include WINS, DNS, NetBIOS, the Hosts file, and the Lmhosts file. Configure client computer name resolution properties.
Troubleshoot name resolution problems by using the nbtstat, ipconfig, nslookup, and netdiag commands.
Create and configure a Hosts file for troubleshooting name resolution problems. Create and configure an Lmhosts file for troubleshooting name resolution problems. Manage, secure, and troubleshoot servers and client computers Install and configure server and client computer hardware. Verify hardware compatibility by using the qualifier tools. Configure driver signing options.
Verify digital signatures on existing driver files.
Configure operating system support for legacy hardware devices.
Troubleshoot starting servers and client computers. Tools and methodologies include Safe Mode, Recovery Console, and parallel installations. Interpret the startup log file.
Repair an operating system by using various startup options.
Repair an operating system by using the Recovery Console.
Recover data from a hard disk in the event that the operating system will not start. Restore an operating system and data from a backup.
Monitor and troubleshoot server health and performance. Tools include System Monitor, Event Viewer, and Task Manager.
Monitor and interpret real-time performance by using System Monitor and Task Manager.
Configure and manage System Monitor alerts and logging. Diagnose server health problems by using Event Viewer. Identify and disable unnecessary operating system services.
Install and manage Windows 2000 updates. Updates include service packs, hot fixes, and security hot fixes.
Update an installation source by using slipstreaming. Apply and reapply service packs and hot fixes. Verify service pack and hot-fix installation. Remove service packs and hot fixes.
Configure, manage, secure, and troubleshoot Active Directory organizational units and Group Policy
Create, manage, and troubleshoot User and Group objects in Active Directory. Create and configure user and computer accounts for new and existing users. Troubleshoot groups. Considerations include nesting, scope, and type.
Configure a user account by using Active Directory Users and Computers. Settings include passwords and assigning groups.
Perform a search for objects in Active Directory. Use templates to create user accounts. Reset an existing computer account.
Manage object and container permissions.
Use the Delegation of Control wizard to configure inherited and explicit permissions.
Configure and troubleshoot object permissions by using object access control lists (ACLs).
Diagnose Active Directory replication problems. Diagnose problems related to WAN link connectivity.
Diagnose problems involving replication latency. Problems include duplicate objects and the LostandFound container.
Deploy software by using Group Policy. Types of software include user applications, antivirus software, line-of-business applications, and software updates. Use Windows Installer to deploy Windows Installer packages. Deploy updates to installed software including antivirus updates. Configure Group Policy to assign and publish applications. Troubleshoot end-user Group Policy.
Troubleshoot Group Policy problems involving precedence, inheritance, filtering, and the No Override option. Manually refresh Group Policy.
Implement and manage security policies by using Group Policy. Use security templates to implement security policies.
Analyze the security configuration of a computer by using the secedit command and Security Configuration and Analysis.
Modify domain security policy to comply with corporate standards. Configure, secure, and troubleshoot remote access
Configure and troubleshoot remote access and virtual private network (VPN) connections.
Configure and troubleshoot client-to-server PPTP and L2TP connections.
Manage existing server-to-server PPTP and L2TP connections. Configure and verify the security of a VPN connection. Configure client computer remote access properties.
Configure remote access name resolution and IP address allocation. Troubleshoot a remote access policy.
Diagnose problems with remote access policy priority.
Diagnose remote access policy problems caused by user account group membership and nested groups.
Create and configure remote access policies and profiles. Select appropriate encryption and authentication protocols. Implement and troubleshoot Terminal Services for remote access.
Configure Terminal Services for remote administration or application server mode. Configure Terminal Services for local resource mapping. Configure Terminal Services user properties.
Configure and troubleshoot Network Address Translation (NAT) and Internet Connection Sharing.
Configure Routing and Remote Access to perform NAT.
Troubleshoot Internet Connection Sharing problems by using the ipconfig and ping commands. 70-218考试题库: Exam : Microsoft 70-218
Title : Managing a Microsoft Windows 2000 Network Environment
1. You are the desktop administrator for your company. Each of the company's desktop computers has been upgraded from Windows NT Workstation 4.0 to Windows 2000 Professional. The hard disk on each computer has one NTFS partition.
One of the desktop computers has an application that stores its large data files on drive C. Recently the user of this computer has been running out of disk space on drive C. However, the computer's hard disk still contains unallocated space. You need to increase available disk space on drive C on this computer. What should you do?
A. Create a partition by using unallocated space, and configure this partition as a mount point on drive C.
B. Create a stripe set that includes unallocated space and drive C. C. Upgrade the hard disk from a basic disk to a dynamic disk. D. Extend drive C by using unallocated space. Answer: A
2. You are the administrator of a Windows 2000 file server named ServerA. ServerA is a member server in a Windows 2000 domain. You create a folder named
H:EmployeeHandbook on a volume that is formatted as NTFS. You share the folder as EmployeeHandbook$.
You want users of Windows 2000 Professional computers to be able to search the network for the share by name. You want the users to be able to find the share without needing to know the name of the server. What should you do?
A. Run the net share EmployeeHandbook$ command on a domain controller. B. Publish the share in Active Directory by using Active Directory Users and Computers.
C. Run the dcpromo command on ServerA.
D. Create a virtual directory for the folder with an alias of EmployeeHandbook. Answer: B
3. You are the administrator of some of your company's file servers. Peter is hired as an intern in the human resources (HR) department. Peter needs access to some HR files. He also needs to be able to read the file named Handbook.doc, but he must not be able to make changes to it.
Handbook.doc exists in a folder named HRResources. Peter needs to have Read and Modify permissions for the other files in the HRResources folder.
Peter is a member of the Domain Users group and the HR group. The permissions on the HRResources folder are shown in the following table
You need to ensure that Peter can access the appropriate files and that he cannot make changes to Handbook.doc. What should you do? A. Set the hidden and system attributes on Handbook.doc. B. Disable permissions inheritance on Handbook.doc.
C. Assign Peter the Allow - Read permission for Handbook.doc. D. Assign Peter the Deny - Write NTFS permission for Handbook.doc. Answer: D
4. You are a network administrator for your company. The company has 10 branch offices and has plans to add at least 25 more branch offices during the next 12 months. The network is configured as shown in the exhibit. (Click the Exhibit button.) Each branch office has only one server. These servers are multifunction servers that are domain controllers and application-based Terminal servers. The users of the remote client computers connect to these servers by using Terminal Services over the Internet so that they can access a financial application.
You need to ensure that remote users can log on to the Terminal servers and not to any other domain controllers at the main office. You must also ensure that remote users cannot log on to any other domain controller that is not an application-based Terminal server. When new application-based Terminal servers are added to the domain, you want the servers to automatically configure settings to meet these requirements. You create a new group named Terminal-Server-Users, and you make the user accounts of all the users who need access to these application-based Terminal servers members of this group.
What should you do next?
A. Create a new Group Policy object (GPO) and link it to the domain level. Configure this GPO by assigning the Terminal-Server-Users group the Log on locally right. B. Create a new Group Policy object (GPO) and link it to the Domain Controllers organizational unit (OU). Configure this GPO by assigning the Terminal-Server-Users group the Log on locally right.
C. Create a new OU and move all Terminal servers into this organizational unit (OU). Create a Group Policy object (GPO) and link it to this new OU. Configure this GPO by assigning the Terminal-Server-Users group the Log on locally right.
D. Modify the local security policy on all of the application-based Terminal servers by assigning the Terminal-Server-Users group the Log on locally right.
E. Modify the Domain Controller security policy on one of the application-based Terminal servers by assigning the Terminal-Server-Users group the Log on locally right. Answer: C
5. You are the network administrator for your company. The network contains a Windows 2000 Server computer named ServerA, which runs Internet Information Services (IIS). The network also contains a DNS server. The default Web site is the only Web site on ServerA. Company employees access the default Web site by using the URL http://servera.
The manager of the marketing department asks you to create a new Web site. The new Web site will be used to publish information about marketing projects. The manager wants all company employees to be able to access the new Web site by using a URL. You create a new Web site named Marketing on ServerA, and you use the default settings. However, when you try to start the new Web site, you receive the following error message: \"The service could not be started because it is not correctly configured.\" You verify that the default Web site is functioning correctly. You need to start the Marketing Web site and ensure that company employees can access the Marketing Web site by using a URL. You also need to ensure that the default Web site continues to function correctly. What should you do?
A. On ServerA, stop and restart the World Wide Web Publishing service. Then, start the Marketing Web site and the default Web site. Instruct company employees to access the Marketing Web site by using the URL http://marketing.
B. On ServerA, add an additional IP address to ServerA's TCP/IP configuration. Configure the Marketing Web site to use only the new IP address. Instruct company employees to access the Marketing Web site by using the URL http://marketing. C. On ServerA, configure the Marketing Web site to use a host header named Marketing. On the company's DNS server, create a CNAME (canonical name) record for a host named Marketing that points to ServerA's IP address. Instruct company employees to access the Marketing Web site by using the URL http://marketing.
D. On ServerA, configure the Marketing Web site to use port 81. On the company's DNS server, create a CNAME (canonical name) record for a host named Marketing that points to ServerA's IP address. Instruct company employees to access the Marketing Web site by using the URL http://marketing. Answer: C
最新活动:
Testinside考题大师权威Microsoft、Cisco、SUN、CIW、IBM、Nortel、HP、Oracle等各大IT认证题库,最新考题售价仅180元起。(时间有限!)
机会不容错过!需要的朋友一定要抓住这个机会!下面开始我们的正文! 70-218考试资料
Managing a Microsoft Windows 2000 Network Environment 科目编号:70-218
科目名称:Managing a Microsoft Windows 2000 Network Environment 语言(s): 英语 考生: IT专业人士 技术: 微软视窗2000 类型: 监考考试
相关分类:MCSE 2000 Security
70-218 考试是Microsoft公司的 Managing a Microsoft Windows 2000 Network Environment 认证考试官方代号,Managing a Microsoft Windows 2000 Network Environment 认证作为全球IT领域专家 Microsoft 热门认证之一,是许多大中IT企业选择人才标准的必备条件。
下面是由Testinside考题大师带来的70-218考试相关资料分享:
考生简介:
Candidates for this exam work in medium-sized to very large computing environments that use Microsoft Windows 2000 network and directory services. Candidates have at least six months of experience administering and supporting Windows 2000 server and client operating systems that use Active Directory directory services in environments that have the following characteristics. Supported users range from 200 to 26,000. Physical locations range from 2 to 100.
Typical network services and resources include messaging, file and print, proxy server or firewall, Internet and intranet, remote access, and client computer management. Connectivity needs include connecting branch offices and individual users at remote locations to the corporate network and connecting corporate networks to the Internet.
Credit Toward Certification
When you pass Exam 70-218: Managing a Microsoft Windows 2000 Network Environment, you complete the requirements for the following certification(s):
Microsoft Certified Professional (MCP) Exam 70-218: Managing a Microsoft Windows 2000 Network Environment: counts as credit toward the following certification(s):
Core credit toward Microsoft Certified System Administrator on Windows 2000 certification
Elective credit toward Microsoft Certified Systems Engineer on Windows 2000 certification
70-218考试知识点:
Skills Being Measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. Create, configure, manage, secure, and troubleshoot file, print, and Web resources Publish resources in Active Directory. Types of resources include printers and shared folders.
Perform a search in Active Directory Users and Computers. Configure a printer object.
Manage data storage. Considerations include file systems, permissions, and quotas. Implement NTFS and FAT file systems. Enable and configure quotas.
Implement and configure Encrypting File System (EFS). Configure volumes and basic and dynamic disks. Configure file and folder permissions.
Manage a domain-based distributed file system (DFS). Manage file and folder compression.
Create shared resources and configure access rights. Shared resources include printers, shared folders, and Web folders. Share folders and enable Web sharing. Configure shared folder permissions. Create and manage shared printers. Configure shared printer permissions.
Configure and troubleshoot Internet Information Services (IIS). Configure virtual directories and virtual servers. Troubleshoot Internet browsing from client computers.
Troubleshoot intranet browsing from client computers. Configure authentication and SSL for Web sites. Configure FTP services.
Configure access permissions for intranet Web servers.
Monitor and manage network security. Actions include auditing and detecting security breaches.
Configure user-account lockout settings.
Configure user-account password length, history, age, and complexity. Configure Group Policy to run logon scripts. Link Group Policy objects. Enable and configure auditing.
Monitor security by using the system security log file.
Configure, administer, and troubleshoot the network infrastructure
Troubleshoot routing. Diagnostic utilities include the tracert command, the ping command, and the ipconfig command.
Validate local computer configuration by using the ipconfig, arp, and route commands.
Validate network connectivity by using the tracert, ping, and pathping commands. Configure and troubleshoot TCP/IP on servers and client computers. Considerations include subnet masks, default gateways, network IDs, and broadcast addresses. Configure client computer TCP/IP properties.
Validate client computer network configuration by using the winipcfg, ipconfig, and arp commands.
Validate client computer network connectivity by using the ping command. Configure, administer, and troubleshoot DHCP on servers and client computers. Detect unauthorized DHCP servers on a network.
Configure authorization of DHCP servers.
Configure client computers to use dynamic IP addressing. Configure DHCP server properties. Create and configure a DHCP scope.
Configure, administer, and troubleshoot DNS. Configure DNS server properties.
Manage DNS database records such as CNAME, A, and PTR. Create and configure DNS zones.
Troubleshoot name resolution on client computers. Considerations include WINS, DNS, NetBIOS, the Hosts file, and the Lmhosts file. Configure client computer name resolution properties.
Troubleshoot name resolution problems by using the nbtstat, ipconfig, nslookup, and netdiag commands.
Create and configure a Hosts file for troubleshooting name resolution problems. Create and configure an Lmhosts file for troubleshooting name resolution problems. Manage, secure, and troubleshoot servers and client computers Install and configure server and client computer hardware. Verify hardware compatibility by using the qualifier tools. Configure driver signing options.
Verify digital signatures on existing driver files.
Configure operating system support for legacy hardware devices.
Troubleshoot starting servers and client computers. Tools and methodologies include Safe Mode, Recovery Console, and parallel installations. Interpret the startup log file.
Repair an operating system by using various startup options.
Repair an operating system by using the Recovery Console.
Recover data from a hard disk in the event that the operating system will not start. Restore an operating system and data from a backup.
Monitor and troubleshoot server health and performance. Tools include System Monitor, Event Viewer, and Task Manager.
Monitor and interpret real-time performance by using System Monitor and Task Manager.
Configure and manage System Monitor alerts and logging. Diagnose server health problems by using Event Viewer. Identify and disable unnecessary operating system services.
Install and manage Windows 2000 updates. Updates include service packs, hot fixes, and security hot fixes.
Update an installation source by using slipstreaming. Apply and reapply service packs and hot fixes. Verify service pack and hot-fix installation. Remove service packs and hot fixes.
Configure, manage, secure, and troubleshoot Active Directory organizational units and Group Policy
Create, manage, and troubleshoot User and Group objects in Active Directory. Create and configure user and computer accounts for new and existing users. Troubleshoot groups. Considerations include nesting, scope, and type.
Configure a user account by using Active Directory Users and Computers. Settings include passwords and assigning groups.
Perform a search for objects in Active Directory. Use templates to create user accounts. Reset an existing computer account.
Manage object and container permissions.
Use the Delegation of Control wizard to configure inherited and explicit permissions.
Configure and troubleshoot object permissions by using object access control lists (ACLs).
Diagnose Active Directory replication problems. Diagnose problems related to WAN link connectivity.
Diagnose problems involving replication latency. Problems include duplicate objects and the LostandFound container.
Deploy software by using Group Policy. Types of software include user applications, antivirus software, line-of-business applications, and software updates. Use Windows Installer to deploy Windows Installer packages. Deploy updates to installed software including antivirus updates. Configure Group Policy to assign and publish applications. Troubleshoot end-user Group Policy.
Troubleshoot Group Policy problems involving precedence, inheritance, filtering, and the No Override option. Manually refresh Group Policy.
Implement and manage security policies by using Group Policy. Use security templates to implement security policies.
Analyze the security configuration of a computer by using the secedit command and Security Configuration and Analysis.
Modify domain security policy to comply with corporate standards. Configure, secure, and troubleshoot remote access
Configure and troubleshoot remote access and virtual private network (VPN) connections.
Configure and troubleshoot client-to-server PPTP and L2TP connections.
Manage existing server-to-server PPTP and L2TP connections. Configure and verify the security of a VPN connection. Configure client computer remote access properties.
Configure remote access name resolution and IP address allocation. Troubleshoot a remote access policy.
Diagnose problems with remote access policy priority.
Diagnose remote access policy problems caused by user account group membership and nested groups.
Create and configure remote access policies and profiles. Select appropriate encryption and authentication protocols. Implement and troubleshoot Terminal Services for remote access.
Configure Terminal Services for remote administration or application server mode. Configure Terminal Services for local resource mapping. Configure Terminal Services user properties.
Configure and troubleshoot Network Address Translation (NAT) and Internet Connection Sharing.
Configure Routing and Remote Access to perform NAT.
Troubleshoot Internet Connection Sharing problems by using the ipconfig and ping commands. 70-218考试题库: Exam : Microsoft 70-218
Title : Managing a Microsoft Windows 2000 Network Environment
1. You are the desktop administrator for your company. Each of the company's desktop computers has been upgraded from Windows NT Workstation 4.0 to Windows 2000 Professional. The hard disk on each computer has one NTFS partition.
One of the desktop computers has an application that stores its large data files on drive C. Recently the user of this computer has been running out of disk space on drive C. However, the computer's hard disk still contains unallocated space. You need to increase available disk space on drive C on this computer. What should you do?
A. Create a partition by using unallocated space, and configure this partition as a mount point on drive C.
B. Create a stripe set that includes unallocated space and drive C. C. Upgrade the hard disk from a basic disk to a dynamic disk. D. Extend drive C by using unallocated space. Answer: A
2. You are the administrator of a Windows 2000 file server named ServerA. ServerA is a member server in a Windows 2000 domain. You create a folder named
H:EmployeeHandbook on a volume that is formatted as NTFS. You share the folder as EmployeeHandbook$.
You want users of Windows 2000 Professional computers to be able to search the network for the share by name. You want the users to be able to find the share without needing to know the name of the server. What should you do?
A. Run the net share EmployeeHandbook$ command on a domain controller. B. Publish the share in Active Directory by using Active Directory Users and Computers.
C. Run the dcpromo command on ServerA.
D. Create a virtual directory for the folder with an alias of EmployeeHandbook. Answer: B
3. You are the administrator of some of your company's file servers. Peter is hired as an intern in the human resources (HR) department. Peter needs access to some HR files. He also needs to be able to read the file named Handbook.doc, but he must not be able to make changes to it.
Handbook.doc exists in a folder named HRResources. Peter needs to have Read and Modify permissions for the other files in the HRResources folder.
Peter is a member of the Domain Users group and the HR group. The permissions on the HRResources folder are shown in the following table
You need to ensure that Peter can access the appropriate files and that he cannot make changes to Handbook.doc. What should you do? A. Set the hidden and system attributes on Handbook.doc. B. Disable permissions inheritance on Handbook.doc.
C. Assign Peter the Allow - Read permission for Handbook.doc. D. Assign Peter the Deny - Write NTFS permission for Handbook.doc. Answer: D
4. You are a network administrator for your company. The company has 10 branch offices and has plans to add at least 25 more branch offices during the next 12 months. The network is configured as shown in the exhibit. (Click the Exhibit button.) Each branch office has only one server. These servers are multifunction servers that are domain controllers and application-based Terminal servers. The users of the remote client computers connect to these servers by using Terminal Services over the Internet so that they can access a financial application.
You need to ensure that remote users can log on to the Terminal servers and not to any other domain controllers at the main office. You must also ensure that remote users cannot log on to any other domain controller that is not an application-based Terminal server. When new application-based Terminal servers are added to the domain, you want the servers to automatically configure settings to meet these requirements. You create a new group named Terminal-Server-Users, and you make the user accounts of all the users who need access to these application-based Terminal servers members of this group.
What should you do next?
A. Create a new Group Policy object (GPO) and link it to the domain level. Configure this GPO by assigning the Terminal-Server-Users group the Log on locally right. B. Create a new Group Policy object (GPO) and link it to the Domain Controllers organizational unit (OU). Configure this GPO by assigning the Terminal-Server-Users group the Log on locally right.
C. Create a new OU and move all Terminal servers into this organizational unit (OU). Create a Group Policy object (GPO) and link it to this new OU. Configure this GPO by assigning the Terminal-Server-Users group the Log on locally right. D. Modify the local security policy on all of the application-based Terminal servers by assigning the Terminal-Server-Users group the Log on locally right. E. Modify the Domain Controller security policy on one of the application-based Terminal servers by assigning the Terminal-Server-Users group the Log on locally right. Answer: C
5. You are the network administrator for your company. The network contains a Windows 2000 Server computer named ServerA, which runs Internet Information Services (IIS). The network also contains a DNS server. The default Web site is the only Web site on ServerA. Company employees access the default Web site by using the URL http://servera.
The manager of the marketing department asks you to create a new Web site. The new Web site will be used to publish information about marketing projects. The manager wants all company employees to be able to access the new Web site by using a URL. You create a new Web site named Marketing on ServerA, and you use the default settings. However, when you try to start the new Web site, you receive the following error message: \"The service could not be started because it is not correctly configured.\" You verify that the default Web site is functioning correctly. You need to start the Marketing Web site and ensure that company employees can access the Marketing Web site by using a URL. You also need to ensure that the default Web site continues to function correctly. What should you do?
A. On ServerA, stop and restart the World Wide Web Publishing service. Then, start the Marketing Web site and the default Web site. Instruct company employees to access the Marketing Web site by using the URL http://marketing.
B. On ServerA, add an additional IP address to ServerA's TCP/IP configuration. Configure the Marketing Web site to use only the new IP address. Instruct company employees to access the Marketing Web site by using the URL http://marketing. C. On ServerA, configure the Marketing Web site to use a host header named Marketing. On the company's DNS server, create a CNAME (canonical name) record for a host named Marketing that points to ServerA's IP address. Instruct company employees to access the Marketing Web site by using the URL http://marketing.
D. On ServerA, configure the Marketing Web site to use port 81. On the company's DNS server, create a CNAME (canonical name) record for a host named Marketing that points to ServerA's IP address. Instruct company employees to access the Marketing Web site by using the URL http://marketing. Answer: C
本文来自于:70-218考试指南及考题分享
因篇幅问题不能全部显示,请点此查看更多更全内容