-
You encrypt your files to ensure the security of the files. You want to make a backup copy of the files and maintain their security settings. You have the option of backing up to either the network or floppy disk. What should you do?()
A . Copy the files to a network share on an NTFS volume and do nothing further.
B . Copy the files to a network share on a FAT 32 volume and do nothing further.
C . Copy the files to a floppy disk that has been formatted by using Windows 2000 Professional.
D . Place the files in an encrypted folder, and then copy the folder to floppy disk.
-
You have an enterprise subordinate certification authority (CA). The CA is configured to use a hardware security module. You need to back up Active Directory Certificate Services on the CA. Which command should you run()
A . certutil.exe backup
B . certutil.exe backupdb
C . certutil.exe backupkey
D . certutil.exe store
-
Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2008 R2. You need to capture all replication errors from all domain controllers to a central location. What should you do()
A . Configure event log subscriptions.
B . Start the System Performance data collector set.
C . Start the Active Directory Diagnostics data collector set.
D . Install Network Monitor and create a new capture.
-
Which files will you need to perform a full recovery of a database backed up in NOARCHIVELOG mode?()
A . Database datafiles
B . Control files
C . Archived redo logs
D . Online redo logs
E . Flashback log
-
You encrypt three files to ensure the security of the files. You want to make a backup copy of these three files and maintain their security settings. You have the option of backing up to either the network or a floppy disk. What should you do?()
A . Copy the files to a network share on an NTFS volume. Do nothing further.
B . Copy the files to a network share on a FAT32 volume. Do nothing further.
C . Copy the files to a floppy disk that has been formatted by using Win2000 Professional. Do nothing further.
D . Place the files in an encrypted folder. Then copy the folder to a floppy disk.
-
You have a file server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You use Windows Backup to back up Server1. You need to view all the backup jobs that are scheduled to run on Server1. What should you do? ()
A . From Administrative Tools, run Services.
B . From Administrative Tools, run File Server Manager.
C . From Windows System Tools, run Scheduled Tasks.
D . From Windows System Tools, run System Information.
-
You need to back up the existing data on a computer before you install a new application. You also need to ensure that you are able to recover individual user files that are replaced or deleted during the installation. What should you do?()
A . Create a System Restore point.
B . Perform an Automated System Recovery (ASR) backup and restore.
C . In the Backup and Restore Center window, click the Back up files button.
D . In the Backup and Restore Center window, click the Back up computer button.
-
You need to restore some files from a file system. The file system was backed up from a snapshot. Which command will correctly restore these files?()
A . fssnap -i
B . fssnap -r
C . ufsrestore -i
D . snaprestore -i
-
Your network consists of a single Active Directory domain All domain controllers run WIndows Server 2008. You need to capture all replication errors from all domain controllers to a central localion What should you do()
A . configure event log subscriptions.
B . Start the System Performance data collector set.
C . start the Active Directory Diagnostics data collector set.
D . Install Network Monitor and create a new a new capture.
-
You need to back up all of the group policies in a domain. The solution must minimize the size of the backup. What should you use()
A . the Add-WBSystemState cmdlet
B . the Group Policy Management console
C . the Wbadmin tool
D . the Windows Server Backup feature
-
You are working on an existing Web site. You need to secure the Web site by redirecting all users to the logon page, Login.aspx. After logging on, users must be sent back to the page that they originally requested. Which code segment should you use?()
A .https://assets.asklib.com/images/image2/2018072714005024244.jpg
B .https://assets.asklib.com/images/image2/201807271401023676.jpg
C .https://assets.asklib.com/images/image2/2018072714010645375.jpg
D .https://assets.asklib.com/images/image2/2018072714011271828.jpg
-
You need to back up your Encrypting File System (EFS) certificate. You must achieve this goal in theminimum amount of time. What should you do?()
A . Run Cipher.exe /x.
B . Run Ntbackup.exe /p.
C . From Backup and Restore,click Back up now.
D . From Backup and Restore,click Create a system image.
-
Your company has a Microsoft Hyper-V Server 2008 R2 environment. You need to manually back up a child partition while it is turned off. Which two elements should you back up?()
A . the system state
B . the InitialStore.xml file
C . the child .vhd files
D . the child .xml configuration file
-
You are working on an existing Web site. You need to secure the Web site by redirecting all users to the logon page, Login.aspx. After logging on, users must be sent back to the page that they originally requested. Which code segment should you use? ()
A . In the Web.config file: <authorization> <deny users="?" /></authorization> On each page in the Web site: Protected Sub Page_Load(ByVal sender As Object, _ ByVal e As System.EventArgs) Handles Me.Load FormsAuthentication.Initialize() End Sub
B . On each page in the Web site: Protected Sub Page_Load(ByVal sender As Object, _ ByVal e As System.EventArgs) Handles Me.Load FormsAuthentication RedirectToLoginPage("login.aspx") End Sub
C . On each page in the Web site: Protected Sub Page_Load(ByVal sender As Object, _ ByVal e As System.EventArgs) Handles Me.Load Response.Redirect("login.aspx") End Sub
D . In the Web.config file: <authentication mode="Forms"> <forms name=".ASPXUSERDEMO" loginUrl="login.aspx" protection="All" timeout="60" /></authentication>
-
You need to verify whether your computer can obtain all of the latest operating system updates. What should you do? ()
A . Confirm that your computer has a Microsoft Windows Experience Index base score above 3.0.
B . Run Microsoft Windows Vista Upgrade Advisor.
C . Configure Windows Defender to detect updates before scanning.
D . Validate your Windows installation from the Microsoft Windows Genuine Advantage Web page.
-
Your data recovery strategy must meet the following requirements: Back up all data files and folders in C:\Data. Restore individual files and folders in C:\Data. Ensure that data is backed up to and restored from external media. What should you do?()
A . Use the Previous Versions feature to restore the files and folders.
B . Use the System Restore feature to perform backup and restore operations.
C . Use the NTBackup utility to back up and restore individual files and folders.
D . Use the Backup and Restore Center to back up and restore files.
-
While setting up an Oracle database for one of your critical applications, you want to ensure that the database is backed up at regular intervals without your intervention.What should you do to achieve the objective?()
A . configure the database to run in ARCHIVELOG mode
B . configure the Flash Recovery Area to enable automatic database backup
C . schedule the database backup using DBMS_JOB package after creating the database
D . schedule the database backup using Recovery Manager (RMAN)commands after creating the database
E . schedule the database backup using Database Configuration Assistant (DBCA)while creating the database
-
You need to create a servlet filter that stores all request headers to a database for all requests to the webapplication’s home page "/index.jsp". Which HttpServletRequest method allows you to retrieve all of therequest headers?()
A . String[] getHeaderNames()
B . String[] getRequestHeaders()
C . java.util.Iterator getHeaderNames()
D . java.util.Iterator getRequestHeaders()
E . java.util.Enumeration getHeaderNames()
-
You are the network administrator for The network consists of a single ActiveDirectory domain named All domain controllers run Windows Server 2003, and each one has a locally attached tape device.You need to back up each domain controller. Your backup process must fulfil the following requirements:System recovery must be possible in the event of server failure.The system configuration and all current dynamic disk configurations must be backed up.Other data partitions do not need to be backed up.What should you do?()
A. Use the Backup utility to back up the system files and to create an Automated System Recovery (ASR) disk.
B. Use the Backup utility to back up the contents of all mounted drives.
C. Use the Backup utility to back up only the System State data.
D. Use the Copy command to copy C:\windows and its subfolders to a shared folder on the network.
E. Use the Xcopy command to copy C:\windows and its subfolders to a shared folder on the network.
-
You are the network administrator for The network consists of asingle Active Directory domain named All domain controllers runWindows Server 2003, and all client computers run Windows XP Professional. Eachdomain server has a locally attached tape device.You need to back up each domain controller. Your backup process must fulfil thefollowing requirements:a. System recovery must be possible in the event of server failure.b. The system configuration and all current dynamic disk configurations must bebacked up.c. Other data partitions do not need to be backed up.What should you do?()
A. Use the Backup utility to back up the system files and to create an Automated System Recovery (ASR) disk.
B. Use the Backup utility to back up the contents of all mounted drives.
C. Use the Backup utility to back up only the System State data.
D. Use the Copy command to copy C:\windows and its subfolders to a shared folder on the network.
E. Use the Xcopy command to copy C:\windows and its subfolders to a shared folder on the network.
-
Your network consists of a single Active Directory domain.You install a new backup program. The backup program requires a service account.You create a service account in the domain.You need to ensure that the service account can back up all member servers and client computers in the domain.You must ensure that the service account cannot be used to restore files and folders.What should you do?()
A. Add the service account to the domain Backup Operators group.
B. Add the service account to the Backup Operators group on every server and every client computer.
C. Assign the Back up files and directories user right by using a Group Policy object (GPO).
D. Assign the Impersonate a client after authentication user right by using a Group Policy object (GPO).
-
You are working on an existing Web site. You need to secure the Web site by redirecting all users to the logon page, Login.aspx. After logging on, users must be sent back to the page that they originally requested.Which code segment should you use?()
A.<img src='https://img2.soutiyun.com/shangxueba/ask/64260001-64263000/64260017/31ddc27d6b5afe8bae451bdd794657cf.jpg' />
B.<img src='https://img2.soutiyun.com/shangxueba/ask/64260001-64263000/64260017/19ad18c2d6af540e3af3cc6cf5e26d31.jpg' />
C.<img src='https://img2.soutiyun.com/shangxueba/ask/64260001-64263000/64260017/c6671967b4ef53d8df6205db1b9bc9dc.jpg' />
D.<img src='https://img2.soutiyun.com/shangxueba/ask/64260001-64263000/64260017/f2dbfcb0e5210e6a8f01932d905b2566.jpg' />
-
You are the network administrator for your company. The network consists of a single Active Directorydomain. All network servers run Windows Server 2003, and all client computers run Windows XPProfessional.A user named Peter uses a client computer named Client1. This computer has a locally attached tapedevice.You grant Peter the necessary permissions to perform backups of a member server named Server1. Peter runs the Backup utility on Client1 to back up the files located on Server1.You need use your client computer to view the most recent backup logs for Server1.What should you do? ()
A. Use Notepad to view the contents of the backup report located on Server1.
B. Use Notepad to view the contents of the backup report located on Client1.
C. Use Event Viewer to view the contents of the application log located on Server1.
D. Use Event Viewer to view the contents of the application log located on Client1.