网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which policy determines what happens to local data and to the BIOS settings on a server during the discovery process and when the server is disassociated from a service profile?()
A

 boot policy and BIOS policy

B

 disk scrub and boot policy

C

 BIOS setting scrub, boot policy, and BIOS policy

D

 disk scrub and BIOS setting scrub


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which policy determines what happens to local data and to the BIOS settings on a server during the discovery process and when the server is disassociated from a service profile?()A  boot policy and BIOS policyB  disk scrub and boot policyC  BIOS setting scrub, boot policy, and BIOS policyD  disk scrub and BIOS setting scrub” 相关考题
考题 What happens to the 66.66.66/24 route when it is evaluated by this policy? () A. The route does not match this policy.B. The route is rejected.C. The route is accepted.D. The route is accepted, then rejected.

考题 ______is well known,data under-determines theories.A.As B.That C.What D.Which

考题 A receiving host computes the checksum on a frame and determines that the frame is damaged.The frame is then discarded.At which OSI layer did this happen?()A、sessionB、networkC、physicalD、data linkE、transport

考题 Regarding disk scrub, which two of these occur to the data on any local drives upon disassociation? ()A、 If disk scrub is enabled, all BIOS settings for the server are erased.B、 If disk scrub is enabled, all the data access on any local drives is destroyed.C、 If disk scrub is enabled, the LSI active RAID is destroyed but data is still preserved.D、 If disk scrub is disabled, all data on any local drives is preserved, including the local storage configuration.E、 If disk scrub is enabled, all data on any local drives is preserved, including the local storage configuration.

考题 Which of the following BEST describes a hub?()A、Determines the best route to transmit dataB、Inspects traffic and accepts or declines transmissionC、Broadcasts data to specific network devicesD、Broadcasts data to all network devices

考题 If there is a conflict in policy for data retention, which of the following should the technician adhere to FIRST?()A、Industry best practicesB、Company policyC、International standardsD、Local legal requirements

考题 What is the objective of the aaa authentication login console-in local command?()A、It specifies the login authentication method list named console-in using the local user database on the routerB、It specifies the login authorization method list named console-in using the local RADIUS username-password data baseC、It specifies the login authentication list named console-in using the local username- password data base on the routerD、It specifies the login authorization method list named console-in using the local username- password data base on the router

考题 You have a computer that runs Windows 7. You need to record when an incoming connection is allowedthrough Windows firewall. What should you do?()A、In Local Group Policy, modify the audit policy.B、In Local Group Policy, modify the system audit policy.C、From the Windows Firewall with Advanced Security properties, set the logging settings to Log successfulconnections.D、From the Windows Firewall with Advanced Security properties, set the Data Protection (Quick Mode)IPSec settings to Advanced.

考题 Which policy determines what happens to local data and to the BIOS settings on a server during the discovery process and when the server is disassociated from a service profile?()A、 boot policy and BIOS policyB、 disk scrub and boot policyC、 BIOS setting scrub, boot policy, and BIOS policyD、 disk scrub and BIOS setting scrub

考题 Which of the following does an astronomical time clock do?()A、Determines the ambient light at night with a photocell.B、Calculates sunset and sunrise times based on geographical area.C、Determines the start and end of each of the seasons.D、Synchronizes the local time displayed with the official world time.

考题 When disposing of data, which of the following should be considered FIRST?()A、Company policy requirementsB、Local legal requirementsC、Storage requirementsD、Disposal requirements

考题 Which test checks the transmitter and receiver of a local modem?()A、data parityB、analog loop backC、local digital loop backD、remote digital loop back

考题 You executed the following command to create a tablespace called SALES_DATA: SQL CREATE TABLESPACE sales_data DATAFILE SIZE 100M SEGMENT SPACE MANAGEMENT AUTO; Which two statements are true about the SALES_DATA tablespace()A、The database automatically determines the extent-sizing policy for the tablespace.B、The segments are automatically shrunk when the contents are removed from them.C、The allocation of extents within the tablespace is managed through the dictionary tables.D、The space utilization description of the data blocks in segments is recorded in bitmap blocks.E、The space utilization description of the data blocks in segments is managed through free lists.

考题 You need to recommend a strategy for managing Windows Firewall that meets the companys technical requirements. What should you include in the recommendation?()A、domain-based Group Policy objects (GPOs)B、local Group Policy objects (GPOs)C、Starter Group Policy objects (GPOs)D、System Starter Group Policy objects (GPOs)

考题 Your network consists of a single Active Directory domain. The network contains a Terminal Server that runs Windows Server 2008, and client computers that run Windows Vista. All computers are members of the domain.   You deploy an application by using the TS RemoteApp Manager. The Terminal Servers security layer is set to Negotiate.  You need to ensure that domain users are not prompted for credentials when they access the application. What should you do?()A、On the server, modify the Password Policy settings in the local Group Policy.B、On the server, modify the Credential Delegation settings in the local Group Policy.C、On all client computers, modify the Password Policy settings in the local Group Policy.D、On all client computers, modify the Credential Delegation settings in the local Group Policy.

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system.You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services,and configuring aweb services infrastructure. There is a single Active Directory domain in your network. The networkcontains a Terminal Server that runs Windows Server 2008, and client computers that run Windows Vista.All computers are members of the domain. You use the TS RemoteApp Manager to deploy an application.The Terminal Servers security layer is set to Negotiate. You have to make sure that domain users are notprompted for credentials when they access the application.  What action should you perform to make sureof this?()A、The Credential Delegation settings in the local Group Policy should be modified on the server.B、The Password Policy settings in the local Group Policy should be modified on the server.C、The Credential Delegation settings in the local Group Policy should be modified on all client computers.D、The Password Policy settings in the local Group Policy should be modified on all client computers.

考题 单选题You have enabled backup optimization in RMAN. You issue the following RMAN command to configure a redundancy-based retention policy: CONFIGURE RETENTION POLICY TO REDUNDANCY 3; Which statement is true?()A The command fails because you cannot configure a redundancy-based retention policy when backup optimization is enabledB Backup optimization is performed, but RMAN considers the redundancy-based retention policy when it determines which datafiles should be backed upC Backup optimization is permanently disabledD Backup optimization is temporarily disabled because a redundancy-based retention policy is specified

考题 单选题You have a standalone computer that runs Windows 7. Multiple users share the computer. You need toensure that you can read the content of all encrypted files on the computer.  What should you do?()A Run the Certificates Enrollment wizard and then run Certutil.exe importpfx.B Run the Certificates Enrollment wizard and then run Certutil.exe installcert.C Run Cipher.exe /r and then add a data recovery agent from the local security policy.D Run Cipher.exe /rekey and then import a security template from the local security policy.

考题 多选题You have a share on your local computer. Someone has been intentionally damaging your files.  You want to be able to know which account is doing this. What do you do? ()ATurn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.BTurn on auditing for objects in the Local Security Policy and Select 'Object Access'.CUse Windows Explorer to turn on auditing for the specific files.DHave the administrator for domains log you on as an administrator and enable auditing for a  specific file.ETurn on auditing for objects in the Local Security Policy and Select 'Account Management'.FAllow only one account at a time to log on to your shared folder. Check the event viewer to  see who logged on.

考题 单选题What is the procedure for announcing routes leared from RIP to ISIS neighbors?()A Apply an import policy to RIP which announces the routes to ISIS.B Apply an export policy to ISIS which announces the routes to ISIS.C Apply an export policy to RIP which announces the routes to ISIS.D Apply an import policy to ISIS which imports the routes into ISIS.

考题 单选题What is the default export routing policy for RIP?()A Accept all local routesB Accept all RIP routesC Accept no routesD Accept all direct routes

考题 单选题An administrator is creating a new data retention policy. Which of the following is the MOST important consideration?()A Compile technical requirements for new policyB Comply with applicable laws and regulationsC Destroy the old data retention policyD Have hard copies of the new policy stored offsite

考题 多选题You executed the following command to create a tablespace called SALES_DATA:   CREATE TABLESPACE sales_data DATAFILE SIZE 100M SEGMENT SPACE MANAGEMENT AUTO;  Which two statements are true about the SALES_DATA tablespace ()AThe database automatically determines the extent-sizing policy for the tablespace.BThe segments are automatically shrunk when the contents are removed from them.CThe allocation of extents within the tablespace is managed through the dictionary tables.DThe space utilization description of the data blocks in segments is recorded inbitmapblocks.EThe space utilization description of the data blocks in segments is managed through free lists.MANUAL

考题 多选题You need to design Group Policy object (GPO) settings to support the use of the Encrypting File System (EFS). Your solution must meet business and security requirements. Which two actions should you perform?()ADesignate a data recovery agent and issue an EFS certificate to the data recovery agent. Export the private key and restrict access to the exported keyBMake the data recovery agent a local administrator on all client computersCRemove the default data recovery agent from the Default Domain Policy GPO. Then, include the new data recovery agent insteadDDelete the Default Domain Policy GPO. Configure a new GPO linked to the domain that does not specify a data recovery agent

考题 多选题Regarding disk scrub, which two of these occur to the data on any local drives upon disassociation? ()AIf disk scrub is enabled, all BIOS settings for the server are erased.BIf disk scrub is enabled, all the data access on any local drives is destroyed.CIf disk scrub is enabled, the LSI active RAID is destroyed but data is still preserved.DIf disk scrub is disabled, all data on any local drives is preserved, including the local storage configuration.EIf disk scrub is enabled, all data on any local drives is preserved, including the local storage configuration.

考题 单选题You have a portable computer that runs Windows 7. The computer is joined to a domain. Multiple users logon to the computer. You need to prevent the computer from displaying the username of the last user whologged on. What should you do?()A From Control Panel, modify the User Profiles settings.B From Control Panel, modify the Personalization settings.C From the local computer policy, add a policy template.D From the local computer policy, modify the local security policy.

考题 单选题You have a computer that runs Windows 7. You need to record when an incoming connection is allowedthrough Windows firewall. What should you do?()A In Local Group Policy, modify the audit policy.B In Local Group Policy, modify the system audit policy.C From the Windows Firewall with Advanced Security properties, set the logging settings to Log successfulconnections.D From the Windows Firewall with Advanced Security properties, set the Data Protection (Quick Mode)IPSec settings to Advanced.