单项选择题
A. Use the relog command-line utility to configure a connection to your SQL database.
B. Use Add or Remove programs to install Connection Point Services. Configure a connection to your SQL database.
C. Use the logman command-line utility with the create switch to configure a connection to your SQL database.
D. Use Data Sources (ODBC) to configure a connection to your SQL database.
单项选择题 You are a network administrator for your company. The network contains a Windows Server 2003 computernamed Server3. Server3 functions as a file server. Six users in the accounting department use an accounting software application to open files that are stored in a shared folder on Server3. The users keep these files open for an extended period of time. You need to restart Server3. You need to find out if any files on Server3 are open before you restart the computer. What should you do? ()
单项选择题 You are a network administrator for your company. The network contains a Windows Server 2003 computer named Print1 that functions as a print server. Print1 contains a printer named MarketingPrinter. Users report that print jobs they submit to the MarketingPrinter take a long time to print. You immediately examine Print1 and conclude that the server is performing at acceptable levels. You need to identify the problem. What should your next step be? ()
单项选择题 You are a network administrator for your company. All servers run Windows Server 2003. A server named Server34 runs an application named App1. Users report that App1 is performing slowly. You suspect that an unauthorized application is installed on Server34. You run the netstat command and examine the output, as shown in the exhibit. (Click the Exhibit button.) You need to identify the unauthorized application by using the output from the netstat command. Which tool should you use to identify the application? ()