网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You need to provide an administrator the ability to view and interact with your current logon session. What should you do?()
A

At the command prompt, run Psr.exe.

B

At the command prompt, run Winrm.exe quickconfig.

C

From the Start menu, open Remote Desktop Connection.

D

From the Start menu, open Windows Remote Assistance.


参考答案

参考解析
解析: 暂无解析
更多 “单选题You need to provide an administrator the ability to view and interact with your current logon session. What should you do?()A At the command prompt, run Psr.exe.B At the command prompt, run Winrm.exe quickconfig.C From the Start menu, open Remote Desktop Connection.D From the Start menu, open Windows Remote Assistance.” 相关考题
考题 What is necessary for your query on an existing view to execute successfully? () A. The underlying tables must have data.B. You need SELECT privileges on the view.C. The underlying tables must be in the same schema.D. You need SELECT privileges only on the underlying tables.

考题 You send a remote assistance invitation for help.You need to open a personal document without allowing the help desk to view the document. You also need to ensure that the remote assistance session remains connected.What should you do?()A.AB.BC.CD.D

考题 You are the network administrator for TestKing. All network servers run Windows Server 2003.A server named TestKing18 functions as a domain controller. You back up TestKing18 and generate a detailed backup log.You need to view the full backup log.What should you do?()A. Run the ntbackup command with the /L option.B. Run the ntbackup command with the /F option.C. Open the Backup utility. On the Tools menu, click Report.D. Open Event Viewer. In the application log, view Ntbackup events

考题 You share your computer with other users.  You install a new Microsoft Windows Internet Explorer add-on to view videos on the computer. You discover that this add-on conflicts with existing add-ons that other users frequently require. You need to ensure that you are able to view videos without affecting other users.  What should you do?()A、Uninstall the new Windows Internet Explorer add-on.B、Log on as an administrator and disable the new Windows Internet Explorer add-on.C、Direct other users to log on and disable the new Windows Internet Explorer add-on.D、Select the Turn off Automatic Website Checking option for the Phishing filter.

考题 What is necessary for your query on an existing view to execute successfully?()A、The underlying tables must have data.B、You need SELECT privileges on the view.C、The underlying tables must be in the same schema.D、You need SELECT privileges only on the underlying tables.

考题 .Your companys virtual environment includes Windows Server 2008 R2 Hyper-V servers. You manage the environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to provide a user with the ability to perform only the Create, Delete, Start, Stop, Pause, Resume, and Shut Down virtual machine (VM) management tasks on your host servers .  What should you do?()A、In VMM,create a Self-Service user role.B、In VMM,create a Delegated Administrator user role.C、In VMM,assign the Local Administrator permission for the host servers to the user.D、In Authorization Manager, create a role on the users client computer and add the user to this role.

考题 You have an Exchange Server 2010 organization.You need to use Role Based Access Control (RBAC) to provide a user the ability to manage recipients in a specific organizational unit (OU).  What should you do first?()A、Create a new direct role assignment.B、Create a new management role assignment policy.C、Create a new management scope.D、Modify the default management scope.

考题 You need to use the Event Viewer window to review the event logs for only critical and error events. You also need the maximum amount of detail for each of these events. What should you do? ()A、Edit the filter for the Administrative Events view.B、Create a custom view. Enable the Critical, Error, and Information level events. Select all logs.C、Create a custom view. Select the Critical checkbox, Error checkbox, and Verbose checkbox. Select all logs.D、Search for the Critical or Error string by using the Find option of the Administrative Events view.

考题 You are the enterprise administrator for an Exchange Server 2010 organization. All users run Microsoft Office Outlook 2010.  You are designing a sharing solution for your organization and a partner organization. The partner organization also uses Exchange Server 2010.  You need to recommend a strategy for sharing information with the partner organization to meet thefollowing requirements: .Provide cross-organizational access to user contacts  .Provide cross-organizational access to free/busy information What should you recommend?()A、Creating cross-forest trustsB、Implementing Federated SharingC、Implementing Microsoft Identify Lifecycle Manager (ILM) 2007D、Running the Microsoft Exchange Inter-Organization Replication tool

考题 You have a server that runs Windows Server 2008. The server has the Web Server (IIS) server role installed and all the Web Server role services installed.  You need to provide a user the ability to administer a Web site. Which feature should you configure?()A、Net RolesB、Net UsersC、AuthenticationD、IIS Manager Permissions

考题 You have a computer that runs Windows 7. You need to provide standard users the ability to update thedrivers for display adapters.  What should you modify from the Local Group Policy?()A、device installation settings for the computer.B、display settings for the user.C、driver installation settings for the computer.D、driver installation settings for the user.

考题 You need to identify potential security threats. Which of the following security breaches might occur under the current IT and security practices?(Choose all that apply)()A、A virus that infects an IT administrator’s client computer could gain domain administrator privilegesB、Couriers could gain access to domain administrator privilegesC、Business office staff could discover couriers’ passwords and use them to access couriers’ informationD、All users could use their user accounts to gain the ability to install untested security patches on their client computers

考题 You have an Exchange Server 2010 organization.  You plan to provide users with the ability to schedule meetings.  You need to recommend a scheduling solution that meets the following requirements: .Ensures that users can schedule conference rooms for meetings .Ensures that conference room owners can change the settings of meetings scheduled by users  What should you include in the solution?()A、Managed Folder AssistantB、public foldersC、resource mailboxesD、room list distribution groups

考题 You need to provide an administrator the ability to view and interact with your current logon session. What should you do?()A、At the command prompt, run Psr.exe.B、At the command prompt, run Winrm.exe quickconfig.C、From the Start menu, open Remote Desktop Connection.D、From the Start menu, open Windows Remote Assistance.

考题 单选题ou are developing an ASP.NET MVC 2 application. You create a view that will be returned by action methods in multiple controllers. You need to place the view in the appropriate folder. To which subfolder within the Views folder should you add the view?()A MasterB DefaultC SharedD Common

考题 单选题You manage Hyper-V host servers and virtual machines (VMs) by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You grant a user the Delegated Administrator user role. You need to provide the user with the ability to manage VMs through the VMM Self-Service Portal. What should you do?()A In VMM, grant the user the Self-Service user role.B In VMM, grant the user the Administrator user role.C Enable the Integrated Windows Authentication option for the VMM Self-Service Portal.D Enable the Single sign-on for Terminal Services option for the VMM Self-Service Portal.

考题 单选题You are creating a view to join the Customers and Orders tables in a SQL Server 2005 database. You need to ensure that the view cannot be affected by modifications to underlying table schemas. You want to accomplish this goal by using the least possible amount of overhead. What should you do?()A Create CHECK constraints on the tables. B Create a DDL trigger to roll back any changes to the tables if the changes affect the columns in the view. C Create the view, specifying the WITH SCHEMABINDING option. D Create the view, specifying the WITH CHECK option. 

考题 单选题Your network contains a server named Server1 that runs Windows Server 2008 R2. You need to ensure that an administrator is notified by e-mail if the Event Viewer logs any error. What should you do from the Event Viewer console?()A Create a custom view, and then click the Filter Current Custom View action.B Create a custom view, and then click the Attach Task to This Custom View action.C From the System log, click the Filter Current Log action.D From the System log, select an Error event, and then click the Attach Task to This Event action.

考题 单选题You are a network administrator for your company. The network contains a Windows Server 2003 computernamed Server3. Server3 functions as a file server. Six users in the accounting department use an accounting software application to open files that are stored in a shared folder on Server3. The users keep these files open for an extended period of time. You need to restart Server3. You need to find out if any files on Server3 are open before you restart the computer. What should you do? ()A Use Computer Management to view existing connections.B Use the netsend command to send a message to all domain members.C Use Task Manager to monitor processes started by all users.D Use System Monitor to monitor the Server object in Report view.

考题 单选题You need to perform certain data manipulation operations through a view called EMP_DEPT_VU, which you previously created. You want to look at the definition of the view (the SELECT statement on which the view was created.) How do you obtain the definition of the view?()A Use the DESCRIBE command on the EMP_DEPT_VU view.B Use the DEFINE VIEW command on the EMP_DEPT_VU view.C Use the DESCRIBE VIEW command on the EMP_DEPT_VU view.D Query the USER_VIEWS data dictionary view to search for the EMP_DEPT_VU view.E Query the USER_SOURCE data dictionary view to search for the EMP_DEPT_VU view.F Query the USER_OBJECTS data dictionary view to search for the EMP_DEPT_VU view.