Which of the following statements are true about the Information Technology Infrastructure Library?
Which of the following statements are true about the Information Technology Infrastructure
Library? Each correct answer represents a complete solution. Choose all that apply.
What are the advantages of Dfs?
Mark works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008
R2 domain-based network. The network consists of Windows Server 2008 R2 member server,
Windows 7, and Windows Vista client computers. The company has distributed network shares. All
shares are distributed over numerous servers, due to which employees face problems in accessing
shares from different locations. To resolve this issue, Mark implements Distributed file system (Dfs).
What are the advantages of Dfs? Each correct answer represents a complete solution. Choose two.
Which of the following methods will you use to automate the deployment of Windows Server 2008 R2 and NLB clust
Which of the following methods will you use to automate the deployment of Windows Server 2008
R2 and NLB cluster hosts? Each correct answer represents a complete solution. Choose three.
What will you do to overcome this problem?
You have created a cloned copy of Windows Server 2008 R2 and applied this cloned copy to multiple
computers. Each cloned copy of Windows uses the same image with the same parameters, including
the computer name and security identifier. For these computers to operate properly without
conflicting on a network, all parameters should be unique. What will you do to overcome this
problem?
Which of the following boot.ini parameters will you use to accomplish the task?
You are working on a system with Windows Server 2008 R2 installed on it. You want to enable Data
Execution Prevention, which is a set of hardware and software technologies for preventing harmful
code from running in protected memory locations. Which of the following boot.ini parameters will
you use to accomplish the task?
Which of the following steps will you take to increase the virtual memory of the computer?
You work as a Network Administrator for Tech Perfect Inc. The company has a Windows-based
network. A computer running Windows 2000 Professional is displaying “Low Virtual Memory” error
message. Which of the following steps will you take to increase the virtual memory of the computer?
which uses most of the CPU time?
John works as a Consumer Support Technician for Web Tech Inc. The company provides
troubleshooting support to users. A user named Peter is working with Windows Vista. He reports
that when he installs a new application on his computer, Windows Task Manager displays that the
CPU use is constantly at 100 percent. However, when he checks the desktop and Task Manager, he
finds that no program is currently open. Which of the following tabs will John use to identify the
program which uses most of the CPU time?
Which of the following statements are true about Distributed File System Replication (DFSR)?
You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008
network environment. The network is configured as a Windows Active Directory-based single forest
single domain network. You use Distributed File System Replication (DFSR) to replicate SYSVOL.
Which of the following statements are true about Distributed File System Replication (DFSR)?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following server roles will you define?
You work as a Server Administrator for company Inc. While designing Windows Server 2008 R2 for
your organization, you need to define a server role that allows a user to run more than one
operating system simultaneously. Which of the following server roles will you define?
Which of the following statements are true about group nesting?
Which of the following statements are true about group nesting?
Each correct answer represents a complete solution. Choose all that apply.