单项选择题
You are the network administrator for You administer a Windows Server 2003 computer named TestKing2. User profiles are stored on TestKing2.
A user named Sandra reports that she accidentally deleted a folder named
TestKingStuff from her user profile. She needs to have her TestKingStuff folder
restored. Other users are accessing TestKing2, and you do not want to negatively
affect their work. You locate the latest backup that contains the files that you need
to restore.
You need to restore Sandra's TestKingStuff folder. You want to achieve this goal by
using the minimum amount of administrative effort.
What should you do?()
A. Restore Sandra's TestKingStuff folder, and clear the Restore junction points, but not the folders and the file data they reference check box.
B. Restore the Documents and Settings folder that contains the TestKingStuff folder.
C. Restore Sandra's TestKingStuff folder, and choose an alternate location for the restoration.
D. Restore Sandra's TestKingStuff folder, and choose the original location for the restoration.
相关考题
-
单项选择题
You are the network administrator for The network contains a Windows Server 2003 computer named TestKing7. TestKing7 contains two NTFS volumes named Data and TestKingFiles. The volumes are located on separate hard disks. The Data volume is allocated the drive letter D. The Data volume is shared as \\TestKing7\Data. The TestKingfiles volume is mounted on the Data volume as volume mount point. The TestKingFiles volume is displayed as the D:\TestKingFiles folder when you view the local disk drives by using Windows Explorer on TestKing7. The D:\TestKingfiles folders is shared as \\TestKing7\TestKingfiles The files on the TestKingFiles volume change every day. Users frequently ask you to provide them with previous versions of files. You enable and configure Shadow Copies of the Data volume. You schedule shadow copies to be created once a day. Users report that they cannot recover previous versions of the files on the TestKingFiles volume. What should you do?()
A. Assign Drive E to TestKingFiles. Enable Shadow Copies on the TestKingFiles volume.
B. Convert the disk that contains the Data volume to a dynamic disk.
C. Convert the disk that contains the TestKingfiles volume to a dynamic disk.
D. Instruct users to connect to \\TestKing7\Data when they attempt to access previous versions of files in the D:\TestKingFiles folder.
E. Instruct users to connect to \\TestKing7\D$ when they attempt to access previous versions of files on the Data volume. -
单项选择题
You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. All user files are stored in home folders on a member server named Testking3. Full backups are performed on Testking3 every day. A user named Mark leaves the company. A technical support specialist deletes Marks user account and his files. You need to restore certain files from Marks folder and enable another user named Anne to access them. What should you do?()
A. Clear the Restore security check box. Use the Backup utility to restore Mark's files to the original location.
B. Select the Restore security check box. Use the Backup utility to restore Mark's files to the original location.
C. Clear the Restore security check box. Use the Backup utility to restore Mark's files to Anne's home folder.
D. Select the Restore security check box. Use the Backup utility to restore Mark's files to Anne's home folder. -
单项选择题
You are a network administrator for You manage a Windows Server 2003 computer named Testking1. Folder Redirection is enabled for the users My Documents folders. A user named Peter deletes all the files and folders in his My Documents folder before he leaves TestKing. Peters manager asks you to recover documents. You do not know if Peter made modifications to the permissions on the files. You need to restore Peters My Documents folder so that his manager can access the files. You want to achieve this goal by using the minimum amount of administrative effort. What should you do?()
A. Perform a default restoration.
B. Run the Automated System Recover (ASR) wizard.
C. Perform a restoration, and enable the Restore security option.
D. Perform a restoration, and disable the Restore security option
