网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You are designing a group management strategy for users in the finance department. You need to  identify the appropriate changes that need to be made to the current group management strategy. You want to accomplish this goal by using the minimum number of groups.  What should you do?()
A

 Add the finance users to the financeData group to which the necessary permissions have been assigned.

B

 Add the finance users to the financeGG group to which the necessary permissions have been assigned.

C

 Add the finance users to the financeGG group. Then add the financeGG group to the financeData group to which the necessary permissions have been assigned.

D

 Add the finance users to the financeGG group. Add the financeGG group to the financeUG group to the financeDat group to which the necessary permissions have been assigned.


参考答案

参考解析
解析: 暂无解析
更多 “单选题You are designing a group management strategy for users in the finance department. You need to  identify the appropriate changes that need to be made to the current group management strategy. You want to accomplish this goal by using the minimum number of groups.  What should you do?()A  Add the finance users to the financeData group to which the necessary permissions have been assigned.B  Add the finance users to the financeGG group to which the necessary permissions have been assigned.C  Add the finance users to the financeGG group. Then add the financeGG group to the financeData group to which the necessary permissions have been assigned.D  Add the finance users to the financeGG group. Add the financeGG group to the financeUG group to the financeDat group to which the necessary permissions have been assigned.” 相关考题
考题 You create an intranet Web site for management of project documents. You need to enable all users to browse documents on the site. Only members of the administrators group must be able to upload files. Which code segment of the Web.config file should you use? ()A. allow verbs=GET users=* /deny verbs=POST users=* /allow verbs=POST roles=Administrators /B. allow roles=Administrators /deny users=* /C. allow u sers=Administrators /allow users=* /D. allow v erbs = POST roles=Administrators /deny verbs=POST users=* /allow verbs=GET users=* /

考题 You are the administrator of a Windows 2000 Server computer named Ezonexam1. A printer named PrinterColor is configured on Ezonexam1.You want to allow only users in the Administrators group and users in the Managers group to print to PrinterColor. You also want to allow users in the Managers group to pause and resume their print jobs, and you want to ensure that users in the Administrators group have full control permission for PrinterColor.What should you do?To answer, click the Simulation button and then perform. the appropriate actions in the simulation of the Printers folder.

考题 You are designing a strategy to allow users to have remote access to internal resources. Which service or services should you allow on the public interface of the NAT Server?()A、HTTPB、LDAPC、POP3D、SMTPE、VPN Gateway

考题 You are designing the NetBIOS domain naming strategy for the company. Which NetBIOS domain name or names should you use?()A、eastB、westC、quebecD、newyorkE、northamericaF、wideworldimporters

考题 You are designing a strategy for installing Windows server 2003 on the new domain controllers. Which method should you use?()A、Unattended installationB、Remote Installation Services (RIS)C、Automated Deployment Services (ADS)D、Microsoft Systems Management Server (SMS)

考题 You are the network administrator for your company. Your network consists of a single Active   Directory domain. Three security groups named Accountants, Processors, and Management are located in an organizational unit (OU) named Accounting. All of the user accounts that belong to these three  groups are also in the Accounting OU. You create a Group Policy object (GPO) and link it to the  Accounting OU. You configure the GPO to disable the display options under the User Configuration  section of the GPO. You need to achieve the following goals: You need to ensure that the GPO applies to  all user accounts that are members of the Processors group. You need to prevent the GPO fromapplying  to any user account that is a member of the Accountants group. You need to prevent the GPO from  applying to any user account that is a member of the Management group, unless the user account is also  a member of the Processors group. What should you do?()A、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants and Management security groups the Deny - Read and the Deny - Apply Group Policy permissions. Modify the DACL of the GPO to assign the users who are in both the Accountants and Management security groups the Allow - Read and the Allow - Apply Group Policy permissions.B、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants and Management security groups the Deny - Read and the Deny - Apply Group Policy permissions. Create a new security group named Mixed that contains all the user accounts from the Processors group and the specific user accounts from the Management group to which you want the GPO to apply. Modify the DACL of the GPO to assign the Mixed security group the Allow - Read and the Allow - Apply Group Policy permissions.C、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants security group the Deny - Read and the Deny - Apply Group Policy permissions. Modify the DACL settings of the GPO to remove the Authenticated Users special group. Modify the DACL settings of the GPO to add the Processors group and assign the Allow - Read and the Allow - Apply Group Policy permissions.D、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants security group the Deny - Read and the Allow - Apply Group Policy permissions. Modify the DACL settings of the GPO to assign the Management security group the Deny - Read and the Deny - Apply Group Policy permissions.

考题 You are the network administrator for Among other duties you administer a Windows 2003 server named TestKingB. You install Terminal Services on TestKingB. You add users from the TestKing support department to the Power Users group and to the Remote Desktop Users group on TestKingB. You notice that TestKingB is periodically unavailable. You open Event Viewer on TestKingB and discover that the server was restarted accidentally by users in the TestKing support department. You need to ensure that users in the TestKing support department can establish a Terminal Services session and can manage local user accounts on TestKingB. However, they should not have the ability to restart TestKingB. Which action or actions should you perform? Select all that apply.()A、Remove the TestKing Support department user accounts from the Power Users group.B、Remove the TestKing Support department user accounts from the Remote Desktop Users group.C、Remove the Power Users group from the Shut down the system user right.D、Add the Power Users group to the Deny log on locally user right.E、Modify the permission on the RDP-Tcp connection by using Terminal Services Configuration. Assign the Power Users group the Deny - Full Control permission

考题 You need to create a Password Settings object (PSO).     Which tool should you use()A、Active Directory Users and ComputersB、ADSI EditC、Group Policy Management ConsoleD、Ntdsutil

考题 You are designing a DHCP strategy for the new Active Directory environment.Which two groups have the necessary rights to authorize the DHCP servers?()A、IT staff in AtlantaB、IT staff in SeattleC、DHCP administrators in all officesD、DHCP administrators in Atlanta onlyE、Members of the Enterprise Admins group

考题 Your company has a single Active Directory Domain Services (AD DS) domain with Windows Server 2008 R2 member servers and 1,000 Windows 7 client computers. You are designing the deployment of a custom application.   You have the following requirements:   The application must be available to only users who need it. Minimize network traffic during deployment.   You need to design a deployment strategy that meets the requirements.   Which deployment method should you use?()A、RemoteApp and Desktop ConnectionsB、software installation in Group PolicyC、Microsoft Application Virtualization (App-V)D、Microsoft System Center Configuration Manager 2007

考题 Your network contains two servers that run the Server Core installation of Windows Server 2008 R2.  The two servers are part of a Network Load Balancing cluster. The cluster hosts a Web site.  Administrators use client computers that run Windows 7.   You need to recommend a strategy that allows the administrators to remotely manage the Network Load  Balancing cluster. Your strategy must support automation.  What should you recommend?()A、On the servers, enable Windows Remote Management (WinRM).B、On the servers, add the administrators to the Remote Desktop Users group.C、On the Windows 7 client computers,enable Windows Remote Management (WinRM).D、On the Windows 7 client computers,add the administrators to the Remote Desktop Users group.

考题 You create an intranet Web site for management of project documents. You need to enable all users to browse documents on the site. Only members of the administrators group must be able to upload files. Which code segment of the Web.config file should you use? ()A、allow verbs="GET" users="*" /deny verbs="POST" users="*" /allow verbs="POST" roles="Administrators" /B、allow role s="Administrators" /deny users="*" /C、allow u sers="Administrators" /allow users="*" /D、allow v erbs = "POST" roles="Administrators" /deny verbs="POST" users="*" /allow verbs="GET" users="*" /

考题 You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. TestKing.com has its headquarters in Stockholm where you arelocated. The TestKing.com network contains a Hub Transport server that has anti-spam agents installed. Youreceive instruction from management to assign the administration of the Exchange 201 organization to agroup named KingSecruity. To ensure productivity you need to make sure that users belonging to thisgroup are able to manage anti-spam setting in the organization. You should thus ensure that your solutionreduces the number of permissions that are assigned to KingSecurity. What should you do?()A、You should consider assigning the Organization Management role group.B、You should consider assigning the Server Management role group.C、You should consider assigning the Hygiene Management role group.D、You should consider assigning the Records Management role group.

考题 Your environment includes multiple Windows Server 2008 R2 Hyper-V servers. You are designing an administrative strategy for virtual machines (VMs). You need to ensure that members of the Security Compliance Active Directory Domain Services (AD DS) security group can monitor failed logon events on the VMs. What should you do?()A、Add the Security Compliance group to the local administrators group of each VMB、Add the Security Compliance group to the local administrators group of each Hyper-V serverC、In the InitialStore.xml file of each VM, define an access policy for the Security Compliance groupD、in the InitialStore.xml file of each Hyper-V server, define an access policy for the Security Compliance group

考题 You are designing a strategy for migrating to the new environment.  Which two factions from your current environment will affect your migration strategy?()A、 Trusts between domainsB、 Number of BDC s in each domainC、 Users and resources in each domainD、 Current hardware for domain controllersE、 Current amount of replication traffic over WAN links

考题 单选题You need to recommend a deployment strategy for App1. What should you recommend?()A Assign App1 to users by using a Group Policy.B Publish App1 to users by using a Group Policy.C Deploy App1 as a RemoteApp program by using an MSI file.D Deploy App1 as a RemoteApp program by using an RDP file.

考题 单选题You have an Exchange Server 2010 organization.  You have a group named Help Desk that contains all the help desk users in the organization.  You need to ensure that the Help Desk group can manage all the mailboxes and mail-enabled contacts in the organization.  The solution must minimize the number of permissions assigned to the Help Desk group.  Which management role should you assign to the Help Desk group?()A Mail RecipientsB Mail Recipient CreationC Organization Client AccessD Recipient Policies

考题 单选题You are designing a strategy to allow users to have remote access to internal resources. Which service or services should you allow on the public interface of the NAT Server?()A HTTPB LDAPC POP3D SMTPE VPN Gateway

考题 多选题You are designing a password management solution to meet the business and technical requirements.  Which two actions should you perform?hich two actions should you perform?()ADelegate the password management controls to the help desk staff.BDelegate the password management controls to the Domain Users group.CConfigure the Default Domain Policy to enforce password expiration settings.DConfigure the Default Domain Controller Policy to enforce password expiration settings.

考题 多选题You are designing a strategy of enforce the corporate security policy. Which action or actions should you perform?()AConfigure a password policy that requires strong passwordsBConfigure a password policy that requires all users to change their passwords once a month.CAllow users in the branch offices to log on between the hours of 8:00 AM and 5:00 PM, Monday through Friday.DAllow users in the retail outlets to log on between the hours of 6:00 AM and 11:00 PM, daily.EEnable a policy that forces users to log off when their logon hours expire.

考题 单选题You are designing a strategy for installing Windows server 2003 on the new domain controllers. Which method should you use?()A  Unattended installationB  Remote Installation Services (RIS)C  Automated Deployment Services (ADS)D  Microsoft Systems Management Server (SMS)

考题 多选题You are designing a DHCP strategy for the new Active Directory environment.  Which two groups have the necessary rights to authorize the DHCP servers?()AIT staff in AtlantaBIT staff in SeattleCDHCP administrators in all officesDDHCP administrators in Atlanta onlyEMembers of the Enterprise Admins group

考题 单选题You are designing a strategy to allow users to have remote access to internal resources.   Which service or services should you allow on the public interface of the NAT Server?()A  HTTPB  LDAPC  POP3D  SMTPE  VPN Gateway

考题 单选题You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. TestKing.com has its headquarters in Stockholm where you arelocated. The TestKing.com network contains a Hub Transport server that has anti-spam agents installed. Youreceive instruction from management to assign the administration of the Exchange 201 organization to agroup named KingSecruity. To ensure productivity you need to make sure that users belonging to thisgroup are able to manage anti-spam setting in the organization. You should thus ensure that your solutionreduces the number of permissions that are assigned to KingSecurity. What should you do?()A You should consider assigning the Organization Management role group.B You should consider assigning the Server Management role group.C You should consider assigning the Hygiene Management role group.D You should consider assigning the Records Management role group.

考题 多选题You are designing the NetBIOS domain naming strategy for the company. Which NetBIOS domain name or names should you use?()AeastBwestCquebecDnewyorkEnorthamericaFwideworldimporters

考题 单选题You are designing a new NETBIOS naming strategy for the corporate environment. Which domain name should you use?()A adB woodgroveadC woodgrovebankD woodgrovebank.com