[单选题]You want to install Windows 2000 Professional on 30 PXE-compliant computers and 35 non-PXE-compliant computers. All 65 computers are included on the current hardware compatibility list (HCL). You create a RIS image. You load the image on the RIS server. You then start the 65 computers.You find that the 30 PXE-Compliant computers can connect to the RIS server.
正确答案 :B
Run Rbfg.exe to create a Non-PXE-compliant startup disk.
解析:解析:Explanation: Non-PXE compliant clients need to use a network boot disk to be able to connect to the RIS server. This boot disk can be created using the RBFG.EXE utility (remote boot floppy generator).
[单选题]You are the network administrator for Ezonexam.Your Windows 2000 Server computer named Ezonexam1 contains two 36-GB hard disks. Disk 0 and Disk 1. Each disk is configured as a basic disc and has a single 36-GB NTFS partition. Both partitions are backed up to a tape each night. The partition on Disk 1 stores user data. Most users at Ezonexam encrypt their files. Disk 1 fails. You replace it with a new hard disk and create a single NTFS partition.
正确答案 :E
Restore the contents of Disk 1 from the most recent tape backup to the new partition on Ezonexam1. Instruct the users to verify the integrity of their files.
解析:解析:Explanation:VerifyDataAfterBackupisusedtoconfirmthatfilesarecorrectlybackedup.WindowsBackupcomparesthebackupdataandthesourcedatatoverifythattheyarethesame.Microsoftrecommendsthatyouselectthisoption.RestoringthecontentsofDisk1fromthemostrecentbackuptapetothenewpartitiononEzonexam1andinstructingtheuserstoverifytheintegrityoftheirfileswouldaccomplishthetaskathandthequickestandstillmaintainthesecurityofthefilesofDisk1.Incorrectanswers:A:Thereisnoneedtomakeuseofasecondfileserver.Thiswillnotaccomplishthetaskasquickaspossible.Besides,thisdoesnotmeanthatthesecurityonthefileswillbekeptintact.B:Thereisnoneedtomakeuseofasecondfileserver,neitherasarecoveryagentandthencopyingfilesfromthesecondfileservertothenewpartition.Thiswilltaketoolonginthiscase.D:Thefirstpartofthisoptioniscorrect;buttheciphercommandisusedtodecryptfiles.
查看原题 点击获取本科目所有试题