网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
End users want to map a network drive on their PCs when they are connected to the Junos Pulse Access Control Service. The mapped drive must be removed when users disconnect their session.Which feature addresses this requirement?()
A

agent session scripts

B

preconfiguration installer

C

Junos Pulse component set

D

agent actions


参考答案

参考解析
解析: 暂无解析
更多 “单选题End users want to map a network drive on their PCs when they are connected to the Junos Pulse Access Control Service. The mapped drive must be removed when users disconnect their session.Which feature addresses this requirement?()A agent session scriptsB preconfiguration installerC Junos Pulse component setD agent actions” 相关考题
考题 You are configuring 5 computers to use both Windows NT workstation 4.0 and Windows 2000 Professional. Each computer has an 8GB hard disk. You configure that hard disk on each computer to have two 4GB partitions. Windows NT workstation is installed on drive C. Windows 2000 Professional is installed on drive D. In Windows 2000 Professional you configure a disk quota on drive D to prevent users from saving work files on the disk. You restart the computer and load Windows NT workstation.You notice that users can still save files to drive D.You want to prevent users from saving files to drive D in either operating system. You also want to ensure that users can access both drives using either operating system. What should you do on each computer?A.Use Windows 2000 Professional to configure drive D as a dynamic volume.B.Use Windows 2000 Professional to enable Encrypting File System (EFS) on drive D.C.Use Windows NT workstation to configure NTFS permission on drive D to deny the users write permission.D.Reinstall Windows NT workstation after configuring the disk code task.

考题 End users want to map a network drive on their PCs when they are connected to the Junos Pulse Access Control Service. The mapped drive must be removed when users disconnect their session.Which feature addresses this requirement?()A. agent session scriptsB. preconfiguration installerC. Junos Pulse component setD. agent actions

考题 When the DHCP server is unavailable for a network, how will PCs attempt to configure their NICs?() A. PCs will attempt to use the last address assigned to themB. PCs will pull from a static address poolC. PCs will use APIPAD. PCs will prompt the user for an address

考题 Which of the following should be implemented to allow a user to securely connect to a network driveremotely?() A. Enable file and print shareB. FTPC. VPND. Map a drive

考题 Why is it appropriate to use conditional label advertising when deploying MPLS? () A. to make CEF tables smallerB. to enable label switching on the frame mode interfaceC. to restrict MPLS availability to predefined time periodsD. to restrict label switching to a limited number of networksE. to restrict end users from seeing the routers in the MPLS network

考题 Why is it appropriate to use conditional label advertising when deploying MPLS? ()A、to make CEF tables smallerB、to enable label switching on the frame mode interfaceC、to restrict MPLS availability to predefined time periodsD、to restrict label switching to a limited number of networksE、to restrict end users from seeing the routers in the MPLS network

考题 Which of the following should be implemented to allow a user to securely connect to a network driveremotely?()A、Enable file and print shareB、FTPC、VPND、Map a drive

考题 After installing a network with one Samba server and several clients, users are complaining that they receive an Unable to browse the network error when trying to visit a public share. What is the most likely cause of this? ()A、 The user entered the wrong username and/or password.B、 The nmbd process is not running on the Samba server.C、 The user hasn’t mapped the share to a local drive letter yet.D、 The Samba server is not configured as a Domain Master Browser.

考题 When the DHCP server is unavailable for a network, how will PCs attempt to configure their NICs?()A、PCs will attempt to use the last address assigned to themB、PCs will pull from a static address poolC、PCs will use APIPAD、PCs will prompt the user for an address

考题 A user in your company has a laptop, which he uses both, on and off the network. You want to change the users profile to roaming but when you attempt to change the setting, the Roaming profile option is grayed out. How can you change the laptop users profile to roaming?()A、In Control Panel, System, User Profiles Tab, change profile to roaming.B、Have him log back into the network.C、Change the Profile to a Mandatory User Profile.D、Change the profile to a Mandatory Roaming Profile.

考题 When replacing a laptop’s hard drive, which of the following may need to be updated?()A、The CD driveB、The network driversC、The system OSD、The system BIOS

考题 When updated, which of the following will allow network access to new users?()A、Route listsB、ACLsC、FirmwareD、Definitions

考题 Which of the following commands will map a shared network drive?()A、SFCB、NSLOOKUPC、NET USED、IPCONFIG

考题 From your Windows 2000 Professional computer, you need to map drive G to the default administrative share on drive C of a server named AppSrv. What can you do to map the drive?()A、Run the net share C$=G:/// command.B、Run the net use G:// //AppSrv/C$ command.C、Browse to AppSrv in Windows Explorer, and map drive G to the C$ share.D、Browse to AppSrv in My Network Places, and map drive G to the C$ share.

考题 You are configuring 5 computers to use both Windows NT workstation 4.0 and Windows 2000 Professional. Each computer has an 8GB hard disk. You configure that hard disk on each computer to have two 4GB partitions. Windows NT workstation is installed on drive C. Windows 2000 Professional is installed on drive D.  In Windows 2000 Professional you configure a disk quota on drive D to prevent users from saving work files on the disk. You restart the computer and load Windows NT workstation. You notice that users can still save files to drive D. You want to prevent users from saving files to drive D in either operating system. You also want to ensure that users can access both drives using either operating system.  What should you do on each computer? ()A、Use Windows 2000 Professional to configure drive D as a dynamic volumeB、Use Windows 2000 Professional to enable Encrypting File System (EFS) on drive DC、Use Windows NT workstation to configure NTFS permission on drive D to deny the users write  permissionD、Reinstall Windows NT workstation after configuring the disk code task

考题 You use a Windows 2000 Professional computer.You are responsible for maintaining Company’s client contact list. You want other users on the networkto be able to read the client contact list. You use Windows Explorer to share the client contact list folderon the network.You want users touse the most current available information when contacting clients. You want toprevent users from enabling offline access for the network share that contains the client contact list.What should you do?()A、Use Synchronization Manager to configure synchronization not to occur when users are connected to the LAN connection.B、Use Windows Explorer to grant users Special access for the reports on the network share.C、Use Windows Explorer to disable caching for the reports on the network share.D、Use Windows Explorer to disable Offline files.

考题 单选题You need to design access to Microsoft Outlook Web Access for remote users. What should you do?()A Place all user mailboxes on back-end servers. Deploy Outlook Web Access on three front-end servers that are members of the Network Load Balancing clusterB Place all user mailboxes on back-end servers that are members of a Network Load Balancing cluster. Deploy Outlook Web Access on the back-end serversC Place mailboxes for remote users on one back-end server and place all mailboxes for main office users on another back-end server. Deploy Outlook Web Access on the back-end server that contains the mailboxes for remote usersD Place all user mailboxes on two back-end servers that are members of a Network Load Balancing cluster. Place mailboxes for remote users and mailboxes for main office users into separate storage groups. Deploy Outlook Web Access on three front-end servers. Configure the front-end servers to access only the back-end Network Load Balancing cluster

考题 单选题You are configuring five computers for Windows NT Workstation 4.0 and Windows 2000 Professional. Each computer has an 8 GB hard disk. You configure the hard disk on each computer to have two 4 GB partitions.  Windows NT Workstation is installed on drive C and Windows 2000 Professional on drive D. In Windows 2000 Professional, you configure a disk quota on drive D to prevent users from saving work files on the disk. You restart your computer and load Windows NT Workstation. You notice that users can save files to drive D.  You want to prevent users from saving the files to drive D in either operating system. You also want to ensure that users can access both drives while using either operating system.  What should you do?()A Use Windows 2000 Professional to configure drive D as a dynamic partitionB Use Windows 2000 Professional to enable encrypting file system on drive DC Use Windows NT workstation to configure NTFS permissions on drive D to deny the users  write permissionD Reinstall Windows NT Workstation after configuring disk quotas

考题 单选题Why is it appropriate to use conditional label advertising when deploying MPLS?()A to make CEF tables smallerB to enable label switching on the frame mode interfaceC to restrict MPLS availability to predefined time periodsD to restrict label switching to a limited number of networksE to restrict end users from seeing the routers in the MPLS network

考题 单选题You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()A Use Windows Explorer to receive the offline filesB Using the Windows Explorer, disable the cache for the reports on the network shareC Use the Windows NT explorer to grant the special access for the reports on the network  shareD Use the synchronization manager to configure synchronization not to occur when users are  connected to the LAN connection. 

考题 单选题You are the administrator of a Windows 2000 network. You are configuring eight computers to use both Windows NT Workstation 4.0 and Windows 2000 Professional. Each computer has a 10 GB hard disk. You configure the hard disk on each computer to have two 5 GB partitions. Windows NT Workstation is installed on drive D. Windows 2000 Professional is installed on drive C. In Windows 2000 Professional, you configure a disk quota on drive C to prevent users from saving work files on the disk. You restart the computers and load Windows NT Workstation 4.0. You notice that users can still save files to drive C. You want to prevent users from saving files to drive C in either operating system. You also want to ensure that users can access both drives while using either operating system. What should you do on each computer? ()A Reinstall Windows NT Workstation 4.0 after configuring the disk quotasB Use Windows 2000 Professional to configure drive C as a dynamic partitionC Use Windows 2000 Professional to enable Encrypting File System (EFS) on drive CD Use Windows NT Workstation 4.0 to configure NTFS permissions on drive C to deny the usersWrite permission

考题 单选题You use a Windows 2000 Professional desktop computer. The corporate product information is stored on this computer. You want other users on the network to be able to read the product information on your computer. You use Windows Explorer to share the product information folder on the network. You want Sales staff to be able to keep a copy of the product information on their portable computers when they travel. Other users should not be able to synchronize the product information.  What should you do?()A Use Synchronization manager to configure synchronization to occur when users are connected to the LAN connection.B Use Windows Explorer to grant Sales Staff Special access for the reports on the network share.C Use Windows Explorer to enable automatic caching for documents on the network share.D Create a new share for the Sales users only and enable caching on that share only.

考题 单选题After installing a network with one Samba server and several clients, users are complaining that they receive an Unable to browse the network error when trying to visit a public share. What is the most likely cause of this? ()A  The user entered the wrong username and/or password.B  The nmbd process is not running on the Samba server.C  The user hasn’t mapped the share to a local drive letter yet.D  The Samba server is not configured as a Domain Master Browser.

考题 单选题You configure the hard disk on each computer to have two 4-GB partitions. Windows NT  Workstation is installed on driver C.  Windows 2000 Professional is installed on drive D.   In Windows 2000 Professional, you configure a disk quota on drive D to prevent users from saving work files on the disk. You restart the computers and load Windows NT Workstation. You notice that users can still save files to drive D.   You want t prevent users from saving files to drive D in either operating system. You also want to ensure that users can access both drives while using either operating system.   What should you do on each computer?()A Use Windows 2000 Professional to configure drive D as a dynamic partitionB Use Windows 2000 Professional to enable Encrypting File System (EFS) on drive DC Use Windows NT Workstation to configure NTFS permissions on drive D to deny the users write permissionD Reinstall Windows NT Workstation after configuring the disk quotas

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers.   You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized.  You need to configure Server1 to log the details of access attempts by VPN users.   What should you do?  ()A  Configure the system event log to Do not overwrite.B  In IAS, in Remote Access Logging, enable the Authentication requests setting.C  Configure the Remote Access server to Log all events.D  Create a custom remote access policy and configure it for Authentication-Type.

考题 单选题You are the administrator of 15 Windows XP Professional portable computers in the sales department of your ompany. The company network uses DHCP to configure the IP addresses of the portable computers when the computers are used in the office. Company policy allows the company portable computers to be connected to users' home networks. The sales department reports that users who use home networks that have manually configured IP addresses are unable to connect the portable computers to their home networks. You want to ensure that users can connect portable computers to their home networks when they are at home and to the company network when they are in the office. You do not want to change the configuration of home computers on users' home networks. You do not want to change the administrative privileges of the sales department users. What should you do?()A Configure the network adapters of the portable computers to enable Internet Connection Sharing (ICS). B Configure the network adapters of the portable computers to enable Automatic Private IP Addressing (APIPA).C Add a script to the users' desktops that changes the IP configuration between dynamic and manual.D Configure the IP properties of the portable computers so that they have an alternate configuration. 

考题 单选题You manage 40 computers that run Microsoft Windows Vista.  You use Microsoft Windows Calendar to publish a calendar to a shared network location. You need to allow users to automatically view the most recent calendar updates.  What should you do? ()A Instruct all users to configure a calendar subscription that has an update interval of 15 minutes.B Instruct all users to perform calendar synchronization for all shared calendar subscriptions. C Instruct all users to map a network drive to the folder that holds the shared calendar. Import the .ics file for the shared calendar.D Use e-mail messages to deploy the .ics file for the shared calendar to each user. Instruct each user to import the .ics file that is attached to the e-mail message.