网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
You discover that a particular group of settings named UserPreferences changes.You need to store the UserPreference settings to prevent affecting other applications. Which two actions should you perform?()
A

Use the Properties.USerPreferences object

B

Use the Properties.Settings.Default.Userprefences object

C

Use the ConfigurationManager.AppSettings object during runtime

D

Create the settings by using Application scope

E

Create the settings by using User scope


参考答案

参考解析
解析: 暂无解析
更多 “多选题You discover that a particular group of settings named UserPreferences changes.You need to store the UserPreference settings to prevent affecting other applications. Which two actions should you perform?()AUse the Properties.USerPreferences objectBUse the Properties.Settings.Default.Userprefences objectCUse the ConfigurationManager.AppSettings object during runtimeDCreate the settings by using Application scopeECreate the settings by using User scope” 相关考题
考题 You have an Exchange Server 2010 organization named contoso.com that contains a mail-enabled group named Group1. Users from outside the organization report that e-mail messages sent to group1@contoso.com generate a non-delivery report (NDR).You need to ensure that users outside the organization can successfully send e-mail to group1 @ contoso.com. What should you modify?()A、the authentication settings for the Client Receive connectorB、the message delivery restrictions for Group1C、the moderation settings for Group1D、the remote IP address range for the Client Receive connector

考题 You are the network administrator for your company. Your network consists of a single Active   Directory domain. Three security groups named Accountants, Processors, and Management are located in an organizational unit (OU) named Accounting. All of the user accounts that belong to these three  groups are also in the Accounting OU. You create a Group Policy object (GPO) and link it to the  Accounting OU. You configure the GPO to disable the display options under the User Configuration  section of the GPO. You need to achieve the following goals: You need to ensure that the GPO applies to  all user accounts that are members of the Processors group. You need to prevent the GPO fromapplying  to any user account that is a member of the Accountants group. You need to prevent the GPO from  applying to any user account that is a member of the Management group, unless the user account is also  a member of the Processors group. What should you do?()A、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants and Management security groups the Deny - Read and the Deny - Apply Group Policy permissions. Modify the DACL of the GPO to assign the users who are in both the Accountants and Management security groups the Allow - Read and the Allow - Apply Group Policy permissions.B、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants and Management security groups the Deny - Read and the Deny - Apply Group Policy permissions. Create a new security group named Mixed that contains all the user accounts from the Processors group and the specific user accounts from the Management group to which you want the GPO to apply. Modify the DACL of the GPO to assign the Mixed security group the Allow - Read and the Allow - Apply Group Policy permissions.C、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants security group the Deny - Read and the Deny - Apply Group Policy permissions. Modify the DACL settings of the GPO to remove the Authenticated Users special group. Modify the DACL settings of the GPO to add the Processors group and assign the Allow - Read and the Allow - Apply Group Policy permissions.D、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants security group the Deny - Read and the Allow - Apply Group Policy permissions. Modify the DACL settings of the GPO to assign the Management security group the Deny - Read and the Deny - Apply Group Policy permissions.

考题 You have an Exchange Server 2010 organization.You create a distribution group for all users in your company.You need to ensure that new users can add their mailboxes to the distribution group.What should you do?()A、Modify the group scope of the distribution group.B、Modify the approval mode of the distribution group.C、Modify the security settings of the distribution group.D、Modify the authentication settings of the ECP virtual directory.

考题 You have a single Active Directory directory service domain. You use a Group Policy object (GPO) to apply security settings to your client computers. You configure the startup type for system services settings in a new GPO, and you link the GPO to an organizational unit (OU).  You discover that the startup type for system services on one of the client computers has not been updated. You need to ensure that the Group Policy settings are applied to the client computer. What should you do?()A、  Restart the client computer.B、 Instruct the user to log off and then log on to the client computer.C、 On the client computer, run the Gpupdate.exe command with the /Force parameter.D、 On the client computer, run the Gpupdate.exe command with the /Target:computer parameter.

考题 Your network contains an Active Directory domain named contoso.com. All user accounts are in an organizational unit (OU) named Employees. You create a Group Policy object (GPO) named GP1.You link GP1 to the Employees OU.You need to ensure that GP1 does not apply to the members of a group named Managers. What should you configure?()A、The Security settings of EmployeesB、The WMI filter for GP1C、The Block Inheritance option for EmployeesD、The Security settings of GP1

考题 You have a computer that runs Windows XP Professional. Many users share the computer. You install a local print device on the computer. You need to ensure that only members of a local group named Engineering can print documents to the local print device. Which settings should you modify on the printer?() A、portB、priorityC、securityD、share

考题 You have an Exchange Server 2010 organization named Contoso.com that contains a mail-enabled Domain Local group named Group1.Users from outside the organization report that all e-mail messages sent to group1@contoso.com generate a non-delivery-report (NDR).You need to ensure that users from outside the organization send e-mail to group1@contoso.com. What should you modify for group1?()A、Advanced settingsB、Group scopeC、Group typeD、The mail flow settings

考题 You create a Password Settings object (PSO).   You need to apply the PSO to a domain user named User1.   What should you do()A、Modify the properties of the PSO.B、Modify the account options of the User1 account.C、Modify the security settings of the User1 account.D、Modify the password policy of the Default Domain Policy Group Policy object (GPO).

考题 You discover that a particular group of settings named UserPreferences changes.You need to store the UserPreference settings to prevent affecting other applications. Which two actions should you perform?()A、Use the Properties.USerPreferences objectB、Use the Properties.Settings.Default.Userprefences objectC、Use the ConfigurationManager.AppSettings object during runtimeD、Create the settings by using Application scopeE、Create the settings by using User scope

考题 You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently created a distribution group for the network users.During the course of the business week you receive instruction from Company.com to ensure that the newly added users are able to add their mailboxes to the distribution group.What should you do?()A、You should consider having the security settings of the distribution group modified.B、You should consider having the authentication settings of the ECP virtual directory modified.C、You should consider having the group scope of the distribution group modified.D、You should consider having the approval mode of the distribution group modified.

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system.You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services,and configuring aweb services infrastructure. There is a single Active Directory domain in your network. The networkcontains a Terminal Server that runs Windows Server 2008, and client computers that run Windows Vista.All computers are members of the domain. You use the TS RemoteApp Manager to deploy an application.The Terminal Servers security layer is set to Negotiate. You have to make sure that domain users are notprompted for credentials when they access the application.  What action should you perform to make sureof this?()A、The Credential Delegation settings in the local Group Policy should be modified on the server.B、The Password Policy settings in the local Group Policy should be modified on the server.C、The Credential Delegation settings in the local Group Policy should be modified on all client computers.D、The Password Policy settings in the local Group Policy should be modified on all client computers.

考题 Your network contains an Active Directory domain named contoso.com. All client computer accounts are in an organizational unit (OU) named AllComputers. Client computers run either Windows 7 or Windows 8.You create a Group Policy object (GPO) named GP1. You link GP1 to the AllComputers OU.You need to ensure that GP1 applies only to computers that have more than 8 GB of memory. What should you configure?()A、The Security settings of AllComputersB、The Security settings of GP1C、The WMI filter for GP1D、The Block Inheritance option for AllComputers

考题 Your company has an Active Directory Domain Services (AD DS) forest with a single domain.  Domain controllers are located in the company’s offices in New York and Boston.  You deploy a group policy at the domain level that includes security filtering.   You discover that Group Policy object(GPO) settings are being applied to computers in the New York office, but not to computers in the Boston office.   You need to find out which settings are being applied to computers in the Boston office.   What should you do?()A、Run a Group Policy Modeling report against computers in the Boston office.B、Run a Group Policy Results report against computers in the Boston office.C、Use the GpoTool.exe command-line tool.D、Use the RepAdmin.exe command-line tool.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. The domain includes an organizational unit (OU) named Processing. There are 100 computer accounts in the Processing OU. You create a Group Policy object (GPO) named NetworkSecurity and link it to the domain. You configure NetworkSecurity to enable security settings through the Computer Configuration section of the Group Policy settings. You need to ensure that NetworkSecurity will apply only to the computers in the Processing OU. You need to minimize the number of GPO links.  What should you do?()A、 Link NetworkSecurity to the Processing OU. Disable the User Configuration section of NetworkSecurity.B、 Link NetworkSecurity to the Processing OU. Remove the link from NetworkSecurity to the domain.C、 Modify the discretionary access control list (DACL) for NetworkSecurity to assign all computer accounts in the Processing OU the Allow - Read and the Allow - Apply Group Policy permissions.D、 Modify the discretionary access control list (DACL) for NetworkSecurity to assign the Authenticated Users group the Deny - Apply Group Policy permission and to assign all of the computer accounts in the Processing OU the Allow - Read and the Allow - Apply Group Policy permissions.

考题 单选题You have an Exchange Server 2010 organization named Contoso.com that contains a mail-enabled Domain Local group named Group1.Users from outside the organization report that all e-mail messages sent to group1@contoso.com generate a non-delivery-report (NDR).You need to ensure that users from outside the organization send e-mail to group1@contoso.com. What should you modify for group1?()A Advanced settingsB Group scopeC Group typeD The mail flow settings

考题 单选题You have a hosted Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack l (SP1) installed.The organization contains a distribution group named Group1.You need to ensure that a user named User1 can review and approve all messages sent to Group1. What should you do?()A Modify the Managed By list for Group1.B Create a new journal rule and specify User1 as the journal recipient.C Modify the mail flow settings for User1.D Modify the mail flow settings for Group1.

考题 单选题Your network contains an Active Directory domain named contoso.com. All user accounts are in an organizational unit (OU) named Employees. You create a Group Policy object (GPO) named GP1.You link GP1 to the Employees OU.You need to ensure that GP1 does not apply to the members of a group named Managers. What should you configure?()A The Security settings of EmployeesB The WMI filter for GP1C The Block Inheritance option for EmployeesD The Security settings of GP1

考题 单选题Your network consists of a single Active Directory domain. The relevant portion of the Active Directory domain is configured as shown in the following diagram. The Staff organizational unit (OU) contains all user accounts except for the managers user accounts. The Managers OU contains the managers user accounts and the following global groups    èSales èFinance èEngineering   You create a new Group Policy object (GPO) named GPO1, and then link it to the Employees OU. Users from the Engineering global group report that they are unable to access the Run commandon the Start menu. You discover that the GPO1 settings are causing the issue.   You need to ensure that the users from the Engineering global group are able to access the Run  command on the Start menu. What should you do?()A Configure GPO1 to use the Enforce Policy option.B Configure Block Inheritance on the Managers OU.C Configure Group Policy filtering on GPO1 for the Engineering global group.D Create a new child OU named Engineering under the Employees OU. Move the Engineering global group to the new Engineering child OU.

考题 单选题Your network contains an Active Directory domain named contoso.com. All client computer accounts are in an organizational unit (OU) named AllComputers. Client computers run either Windows 7 or Windows 8.You create a Group Policy object (GPO) named GP1. You link GP1 to the AllComputers OU.You need to ensure that GP1 applies only to computers that have more than 8 GB of memory. What should you configure?()A The Security settings of AllComputersB The Security settings of GP1C The WMI filter for GP1D The Block Inheritance option for AllComputers

考题 多选题Your network consists of a single Active Directory forest that contains two domains named contoso.com and EU.contoso.com. All network servers run Windows Server 2003 Service Pack 2 (SP2). The contoso.com domain contains a domain local group named Contoso-HR. The EU.contoso.com domain contains a domain local group name EU-HR. On a server named Server1 in the contoso.com domain, you create a shared folder named Share1. You assign the Contoso-HR group the Read permission for Share1. You discover that you cannot assign permissions on Share1 to the EU-HR group. You need to ensure that the members of the EU-HR group have the Read permission on Share1. Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two.)AAdd the EU-HR group to Contoso-HR.BChange the scope of the EU-HR group to global.CChange the scope of the Contoso-HR group to universal.DConfigure a shortcut trust between the EU and the Contoso domains.

考题 多选题You are the network administrator for Southridge Video. The network consists of a single Active  Directory domain named southridgevideo.com. The domain contains one domain controller. All servers  run Windows Server 2003. All client computers run Windows XP Professional. The company uses Group  Policy objects (GPOs) to configure user and computer settings. The Active Directory database and the  SYSVOL shared folder are stored on separate hard disks. The hard disk containing the SYSVOL folder  fails. Some Group Policy settings are still applied, but new users do not receive the Group Policy settings. You replace the failed disk. You discover that there are no valid backups of the SYSVOL folder. You have  a list of GUIDs and friendly names for each GPO. On the new disk, you create a new shared folder named  SYSVOL in the same location as the previous SYSVOL folder. You need to configure the network so that the user and computer settings will be applied to all users.  Which three courses of action should you take?()AIn the SYSVOL folder, create a folder named southridgevideo.com. In the southridgevideo.com folder, create a folder named Policies.BIn the SYSVOL folder, create a folder named System State. In the System State folder, create a folder named Policies.CIn the Policies folder, create a folder for each GPO. Name the folders by using the friendly name of each GPO. In the folder for each GPO, create a folder named MACHINE and a folder named USER.DIn the Policies folder, create a folder for each GPO. Name the folders by using the GUID of each GPO. In the folder for each GPO, create a folder named MACHINE and a folder named USER.EUse Active Directory Users and Computers to open each GPO. Close each GPO without changing any settings.FUse Active Directory Users and Computers to open each GPO. Change at least one setting in each GPO before closing it.

考题 单选题You are the network administrator for In particular you administer a Windows 2003 server named TestKing3. TestKing3 functions as an application server and runs IIS. You discover that one of the IIS sites on TestKing3 is corrupted. You need to recover the IIS site settings. You want to achieve this goal by using the minimum amount of administrative effort. What should you do?()A Restore the IIS configuration settings by running the iisweb.vbs /create command.B Open IIS Manager, and restore a previous version of the site.C Restore the IIS configuration settings by running the iisback.vbs /restore command.D Restore the IIS configuration settings by running the iisback.vbs /backup command.

考题 多选题You have a single Active Directory directory service forest named contoso.com. You create baseline  security settings for a group of computers, and you store the settings in a database. You deploy thebaseline security settings. You need to confirm that the security settings on one of the computers are  applied correctly.  What are two possible commands that you can run to achieve this goal?()AseceditBgpupdateCnetdomDscwcmd

考题 单选题You install a local printer on a computer. You share the printer. You need to ensure that only members of alocal group named Group1 can print documents on the printer. Which settings should  you modify on theprinter?()A Printing preferencesB PriorityC SecurityD Share

考题 单选题Your company has a single Active Directory Domain Services (AD DS) forest with a single domain named PassGuide.com.   All client computers run Windows 7.   All client computer accounts are located in the Computers container in the PassGuide.com domain.   You discover that multiple client computers were automatically shut down because the security log was full.   You need to ensure that client computers are not shut down when the security log becomes full.  What should you do?()A Configure an Event Viewer subscription.B Increase the maximum log size.C Modify the event log policy settings in the Default Domain Policy Group Policy object (GPO).D Modify the event log policy settings in the Default Domain Controllers Policy Group Policy object(GPO).

考题 多选题Your network contains an Active Directory domain named contoso.com. The domain contains 20 computer accounts in an organizational unit (OU) named OU1. A user account named User1 is in an OU named OU2.You are configuring a Group Policy object (GPO) named GPO1. You need to assign User1 the Backup files and directories user right to all of the computer accounts in OU1.Which two actions should you perform?()ALink GPO1 to OU1BLink GPO1 to OU2.CModify the Delegation settings of GPO1.DFrom User Configuration in GPO1, modify the security settings.EFrom Computer Configuration in GPO1, modify the security settings

考题 单选题You have an Exchange Server 2010 organization named contoso.com that contains a mail-enabled group named Group1. Users from outside the organization report that e-mail messages sent to group1@contoso.com generate a non-delivery report (NDR).You need to ensure that users outside the organization can successfully send e-mail to group1 @ contoso.com. What should you modify?()A the authentication settings for the Client Receive connectorB the message delivery restrictions for Group1C the moderation settings for Group1D the remote IP address range for the Client Receive connector