找考题网-背景图
单项选择题

A.Open the backup log for each day. Begin by opening th……

You are the network administrator for TestKing. The network contains a Windows
Server 2003 computer named Testking1.
You back up the data folders on Testking1 by using the following schedule:
1. Normal backup every Monday.
2. Incremental backups every Tuesday, Wednesday, Thursday, and Friday.
After the backup on Friday is completed, a user accidentally deletes a file from a
data folder on Server1. The user reports that he modified the file in the past week,
but he does not know which day he modified the file. You do not know when the file
was last backed up.
You need to restore the latest copy of the file as quickly as possible.
What should you do?()



A.Open the backup log for each day. Begin by opening the log for Monday, and then work forward through the logs for each day of the week. In each log, search for a backup of the file. Restore the first backup that you find.
B.Open the backup log for each day. Begin by opening the log for Tuesday, and then work forward through the logs for each day of the week. In each log, search for a backup of the file. Restore the first backup that you find.
C.Open the backup log for each day. Begin by opening the log for Friday, and then work backward through the logs for each day of the week. In each log, search for a backup of the file. Restore the first backup that you find.
D.Restore the file from the Monday, Tuesday, Wednesday, Thursday, and Friday backups, in that order.
E.Restore the file from the Monday backup, and then from the Friday backup.

热门试题

多项选择题You are the network administrator for The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. All confidential company files are stored on a file server named TestKing1. The written company security states that all confidential data must be stored and transmitted in a secure manner. To comply with the security policy, you enable Encrypting File System (EFS) on the confidential files. You also add EFS certificates to the data decryption field (DDF) of the confidential files for the users who need to access them. While performing network monitoring, you notice that the confidential files that are stored on TestKing1 are being transmitted over the network without encryption. You must ensure that encryption is always used when the confidential files on TestKing1 are stored and transmitted over the network. What are two possible ways to accomplish this goal?() (Each correct answer presents a complete solution. Choose two)

A. Enable offline files for the confidential files that are stored on TestKing1, and select the Encrypt offline files to secure data check box on the client computers of the users who need to access the files.
B. Use IPSec encryption between TestKing1 and the client computers of the users who need to access the confidential files.
C. Use Server Message Block (SMB) signing between TestKing1 and the client computers of the users who need to access the confidential files.
D. Disable all LM and NTLM authentication methods on TestKing1.
E. Use IIS to publish the confidential files. Enable SSL on the IIS server. Open the files as a Web folder.