网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Your network consists of a single Active Directory domain. All servers run Windows Server 2008 R2.   All client computers run Windows 7. Users store all of their files in their Documents folder. Many users store large files.   You plan to implement roaming user profiles for all users by using Group Policy.You need to recommend a solution that minimizes the amount of time it takes users to log on and log off of the computers that use the roaming user profiles. What should you recommend?()

  • A、Modify the Group Policy object (GPO) to include folder redirection.
  • B、Modify the Group Policy object (GPO) to include Background Intelligent Transfer Service (BITS) settings.
  • C、On the server that hosts the roaming user profiles, enable caching on the profiles share.  
  • D、On any server, install and configure the Background Intelligent Transfer Service (BITS) server  extensions.

参考答案

更多 “ Your network consists of a single Active Directory domain. All servers run Windows Server 2008 R2.   All client computers run Windows 7. Users store all of their files in their Documents folder. Many users store large files.   You plan to implement roaming user profiles for all users by using Group Policy.You need to recommend a solution that minimizes the amount of time it takes users to log on and log off of the computers that use the roaming user profiles. What should you recommend?()A、Modify the Group Policy object (GPO) to include folder redirection.B、Modify the Group Policy object (GPO) to include Background Intelligent Transfer Service (BITS) settings.C、On the server that hosts the roaming user profiles, enable caching on the profiles share.  D、On any server, install and configure the Background Intelligent Transfer Service (BITS) server  extensions.” 相关考题
考题 Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2).You need to provide a user named User1 the required permissions to reset passwords in the domain. What should you do?()A、Install and run the Security Configuration Wizard (SCW).B、From the Authorization Manager snap-in, modify the authorization store type.C、From Active Directory Sites and Services, run the Delegation of Control Wizard.D、From Active Directory Users and Computers, run the Delegation of Control Wizard.

考题 Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3). All servers and client computers are members of the domain.You need to configure Automatic Updates on all computers to meet the following requirements:  (1)Install updates automatically on all computers.  (2)Prevent users from modifying the Automatic Update settings.  What should you do?()A、From the Default Domain Policy, modify the Windows Update settings.B、On each client computer, run wuauclt.exe /resetauthorization.C、On each client computer, modify the Automatic Updates settings from Control Panel.D、On a server, install and configure Windows Server Updates Services (WSUS) 3.0.

考题 Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3). You need to ensure that locked out user accounts remain locked out until an administrator unlocks the accounts. What should you do? ()A、In the Default Domain Policy, set the Account lockout duration to 0.B、In the Default Domain Policy, set the Account lockout duration to 99999.C、From Active Directory Users and Computers, select the Account is trusted for delegation option for all user accounts.D、From Active Directory Users and Computers, select the Account is sensitive and cannot be delegated option for all user accounts.

考题 You network consists of a single Active Directory domain. All domain controllers run Windows  Server 2008 R2.     You need to reset the Directory Services Restore Mode (DSRM) password on a domain  controller.     What tool should you use()A、dsmodB、ntdsutilC、Local Users and Groups snap-inD、Active Directory Users and Computers snap-in

考题 All servers on your companys network run Windows Server 2008 R2. All users have thin client computers. You need to recommend a virtualization solution that allows users to use applications that run only on Windows 7.  Which technology should you recommend?()A、Windows Virtual PCB、Microsoft Application Virtualization (App-V)C、Microsoft Virtual Desktop Infrastructure (VDI)D、Microsoft Enterprise Desktop Virtualization (MED-V)

考题 Your network consists of a single Active Directory domain. The domain contains a server named Server1 that runs Windows Server 2008.All client computers run Windows Vista. All computers are members of the Active Directory domain. You assign the Secure Server (Require Security) IPsec policy to Server1 by using a Group Policy object(GPO). Users report that they fail to connect to Server1.You need to ensure that users can connect to Server1. All connections to Server1 must be encrypted. What should you do? ()A、Restart the IPsec Policy Agent service on Server1.B、Assign the Client (Respond Only) IPsec policy to Server1.C、Assign the Server (Request Security) IPsec policy to Server1.D、Assign the Client (Respond Only) IPsec policy to all client computers.

考题 Your network contains an Active Directory domain. All domain controllers run Windows Server 2008  R2. Client computers run either Windows XP Service Pack 3 (SP3) or Windows Vista.  You need to ensure that all client computers can apply Group Policy preferences.   What should you do()A、Upgrade all Windows XP client computers to Windows 7.B、Create a central store that contains the Group Policy ADMX files.C、Install the Group Policy client-side extensions (CSEs) on all client computers.D、Upgrade all Windows Vista client computers to Windows Vista Service Pack 2 (SP2).

考题 Your network consists of a single Active Directory domain. All servers run Windows Server 2008 R2.   All client computers run Windows 7. Some users have laptop computers and work remotely from home.   You need to plan a data provisioning infrastructure to secure sensitive files. Your plan must meet the following requirements:   èFiles must be stored in an encrypted format.   èFiles must be accessible by remote users over the Internet.   èFiles must be encrypted while they are transmitted over the Internet. What should you include in your plan?()A、Deploy one Microsoft SharePoint Foundation 2010 site. Require users to access the SharePoint site by using a Secure Socket Transmission Protocol (SSTP) connection.B、Deploy two Microsoft SharePoint Foundation 2010 sites.Configure one site for internal users. Configure the other site for remote users. Publish the SharePoint sites by using HTTPS.C、Configure a Network Policy and Access Services (NPAS) server to act as a VPN server. Require remote users to access the files by using an IPsec connection to the VPN server.D、Store all sensitive files in folders that are encrypted by using Encrypting File System (EFS). Require  remote users to access the files by using Secure Socket Transmission Protocol (SSTP).

考题 You are the network administrator for . The network consists of a single Active Directory domain named All network servers run Windows Server 2003. All client computers run Windows XP Professional. Multiple users share the same client computer. A server named TestKing2 functions as a file and print server. You set the profile path for all user accounts to //TestKing2/Profiles/username. Some domain users were added to the local Administrators group on the Windows XP Professional computers. A user reports that other users can log on to client computers that he has previously used and gain access to files stored in his My Documents folder on the local hard disk. You need to permanently prevent users from being able to access the My Documents folder of other domain users on the client computers. What should you do?()A、In Active Directory, modify the Default Domain Policy. Disable the Do not check for user ownership of Roaming Profile Folders setting.B、In Active Directory, modify the Default Domain Policy. Enable the Delete cached copies of roaming profiles setting.C、Log on to all client computers and delete all user profiles from the local hard disks.D、Log on to all client computers and configure the Number of previous logons to cache setting to 0.

考题 You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all client computers run Windows XP Professional. You create a shared folder named TestKing Docs on a member server named TestKing3. TestKing Docs will store project documents. You need to ensure that users can access previous version of the documents in TestKing Docs. What should you do?()A、Modify the Offline Settings option for TestKing Docs to make all files available offline.B、Configure shadow copies of the volume containing TestKing Docs.C、Use Task Scheduler to create a job that uses the Copy command to copy all changed documents to another folder every day.D、Use the Backup utility to schedule a backup of all changed documents every hou

考题 Your network consists of a single Active Directory domain. You have a domain controller and a   member server that run Windows Server 2008 R2. Both servers are configured as DNS servers. Client  computers run either Windows XP Service Pack 3 or Windows 7.   You have a standard primary zone on the domain controller. The member server hosts a secondary copy  of the zone.You need to ensure that only authenticated users are allowed to update host (A) records in the DNS zone.   What should you do first()A、On the member server, add a conditional forwarder.B、On the member server, install Active Directory Domain Services.C、Add all computer accounts to the DNSUpdateProxy group.D、Convert the standard primary zone to an Active Directory-integrated zone.

考题 You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all client computers run Windows XP Professional. You create a shared folder named Client Docs on a member server named TestKing13. Client Docs will store project documents. You configure shadow copies for the volume containing Client Docs. You need to enable client computers to access previous version of the documents in Client Docs. What should you do?()A、Create a Group Policy object (GPO) to enable Offline Files on all client computers.B、On each client computer, customize the view for Client Docs to use the Documents (for any file type) folder template.C、Create a Group Policy object (GPO) that installs the Previous Versions client software on all client computers.D、Assign the Allow - Full Control permission on Client Docs to all users.E、On each client computer, install the Backup utility and schedule a daily backup.

考题 Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2008 R2. The network contains 100 servers and 5,000 client computers. The client computers run either Windows XP Service Pack 1 or Windows 7. You need to plan a VPN solution that meets the following requirements:   èStores VPN passwords as encrypted text  èSupports Suite B cryptographic algorithms èSupports automatic enrollment of certificates   èSupports client computers that are configured as members of a workgroup What should you include in your plan?() A、Upgrade the client computers to Windows XP Service Pack 3. Implement a stand-alone certification authority (CA). Implement an IPsec VPN that uses certificate-based authentication.B、Upgrade the client computers to Windows XP Service Pack 3. Implement an enterprise certification authority (CA) that is based on Windows Server?2008 R2. Implement an IPsec VPN that uses Kerberos  authentication.C、Upgrade the client computers to Windows 7. Implement an enterprise certification authority (CA) that is  based on Windows Server 2008 R2. Implement an IPsec VPN that uses pre-shared keys.D、Upgrade the client computers to Windows 7. Implement an enterprise certification authority (CA) that is  based on Windows Server 2008 R2. Implement an IPsec VPN that uses certificate-based authentication.

考题 Your network consists of a single Active Directory domain. All domain controllers run Windows Server  2008 R2.   You need to plan an auditing strategy that meets the following requirements: èAudits all changes to Active Directory Domain Services (AD?DS) èStores all auditing data in a central location. What should you include in your plan?()A、Configure an audit policy for the domain. Configure Event Forwarding.B、Configure an audit policy for the domain controllers. Configure Data Collector Sets.C、Implement Windows Server Resource Manager (WSRM) in managing mode.D、Implement Windows Server Resource Manager (WSRM) in accounting mode.

考题 Your network consists of an Active Directory domain. The domain controllers run Windows Server 2008 R2. Client computers run Windows 7.   You need to implement Encrypting File System (EFS) for all client computers. You want to achieve this goal while meeting the following requirements:   èYou must minimize the amount of data that is transferred across the network when a user logs on to or off from a client computer.   èUsers must be able to access their EFS certificates on any client computers. èIf a client computer s disk fails, EFS certificates must be accessible    What should you do?()A、Enable credential roaming.B、Enable roaming user profiles.C、Enable a Data Recovery Agent.D、Issue smart cards to all users.

考题 You network consists of a single Active Directory domain. All domain controllers run Windows Server 2008. You need to reset the Directory Services Recovery Mode (DSRM) password on a domain controller. What tool should you use()A、dsmodB、ntdsutilC、Local Users and Groups snap-inD、Active Directory Users and Computers snap-in

考题 Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2008 R2. All servers run Windows Server 2008 R2. All client computers run Windows 7.   You need to generate a monthly report on the status of software updates for the client computers.  Your solution must meet the following requirements:   èDisplay all of the operating system updates that installed successfully  èDisplay all of the Microsoft application updates that installed successfully  èDisplay all of the operating system updates that failed to install   èDisplay all of the Microsoft application updates that failed to install èMinimize administrative effort  èMinimize costs What should you do?()A、Install Microsoft System Center Essentials (Essentials) 2007. Deploy management agents on all client  computers.B、Install Microsoft System Center Configuration Manager (SysMgr) 2007. Deploy management agents  on all client computers.C、Install Windows Server Update Services(WSUS)3.0SP2.Configure Windows Update byusing a Group Policy object (GPO).D、Deploy Microsoft Baseline Security Analyzer (MBSA) 2.1 on the client computers. Run MBSA on each client computer, and save the report to a shared folder on the network.

考题 Your network consists of a single Active Directory domain. The network contains a Terminal Server that runs Windows Server 2008, and client computers that run Windows Vista. All computers are members of the domain.   You deploy an application by using the TS RemoteApp Manager. The Terminal Servers security layer is set to Negotiate.  You need to ensure that domain users are not prompted for credentials when they access the application. What should you do?()A、On the server, modify the Password Policy settings in the local Group Policy.B、On the server, modify the Credential Delegation settings in the local Group Policy.C、On all client computers, modify the Password Policy settings in the local Group Policy.D、On all client computers, modify the Credential Delegation settings in the local Group Policy.

考题 Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. You use Microsoft Enterprise Desktop Virtualization (MED-V) to support client virtualization requirements. You need to ensure that all MED-V virtual machine (VM) images can be centrally stored and are available to all client computers. What should you do?()A、Install and configure IIS on a member server.B、Configure a shared folder on a member server.C、Create a single workspace for all client computers.D、Install and configure Microsoft SQL Server 2008 on a member server.

考题 Your network consists of a single Active Directory domain. Your network contains 10 servers and 500 client computers. All domain controllers run Windows Server 2008 R2. A Windows Server 2008 R2 server  has Remote Desktop Services installed. All client computers run Windows XP Service Pack 3.  Youplan to deploy a new line-of-business application. The application requires desktop themes to be  enabled.   You need to recommend a deployment strategy that meets the following requirements: èOnly authorized users must be allowed to access the application.   èAuthorized users must be able to access the application from any client computer. èYour strategy must minimize changes to the client computers.  èYour strategy must minimize software costs. What should you recommend?()A、Migrate all client computers to Windows 7. Deploy the application to all client computers by using a Group Policy object (GPO).B、Migrate all client computers to Windows 7. Deploy the application to the authorized users by using a Group Policy object (GPO).C、Deploy the Remote Desktop Connection (RDC) 7.0 software to the client computers. Install the  application on the Remote Desktop Services server. Implement Remote Desktop Connection Broker (RD Connection Broker).D、Deploy the Remote Desktop Connection (RDC) 7.0 software to the client computers. Enable the  Desktop Experience feature on the Remote Desktop Services server. Install the application on the  Remote Desktop Services server.

考题 Your network consists of a single Active Directory domain. The domain contains a server named Server1 that runs Windows Server 2008 R2. All client computers run Windows 7. All computers are members of the Active Directory domain.You assign the Secure Server (Require Security) IPsec policy to Server1 by using a Group Policy object(GPO).Users report that they fail to connect to Server1.You need to ensure that users can connect to Server1. All connections to Server1 must be encrypted.What should you do?()A、Restart the IPsec Policy Agent service on Server1.B、Assign the Client (Respond Only) IPsec policy to Server1.C、Assign the Server (Request Security) IPsec policy to Server1.D、Assign the Client (Respond Only) IPsec policy to all client computers.

考题 Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2008 R2. All client computers run Windows 7. All user accounts are stored in an organizational unit (OU) named Staff. All client computer accounts are stored in an OU named Clients.  You plan to deploy a new application. You need to ensure that the application deployment meets the following requirements: èUsers must access the application from an icon on the Start menu. èThe application must be available to remote users when they are offline. What should you do?()A、Publish the application to users in the Staff OU.B、Publish the application to users in the Clients OU.C、Assign the application to computers in the Staff OU.D、Assign the application to computers in the Clients OU.

考题 Your network consists of a single Active Directory domain. The domain contains a server named Server1 that runs Windows Server 2008 R2. All client computers run Windows 7. All computers are members of the Active Directory domain. You assign the Secure Server (Require Security) IPsec policy to Server1 by using a Group Policy object (GPO). Users report that they fail to connect to Server1. You need to ensure that users can connect to Server1. All connections to Server1 must be encrypted. What should you do?()A、Restart the IPsec Policy Agent service on Server1.B、Assign the Client (Respond Only) IPsec policy to Server1.C、Assign the Server (Request Security) IPsec policy to Server1.D、Assign the Client (Respond Only) IPsec policy to all client computers.

考题 单选题Your network consists of a single Active Directory domain. All servers run Windows Server 2008 R2.   All client computers run Windows 7. Some users have laptop computers and work remotely from home.   You need to plan a data provisioning infrastructure to secure sensitive files. Your plan must meet the following requirements:   èFiles must be stored in an encrypted format.   èFiles must be accessible by remote users over the Internet.   èFiles must be encrypted while they are transmitted over the Internet. What should you include in your plan?()A Deploy one Microsoft SharePoint Foundation 2010 site. Require users to access the SharePoint site by using a Secure Socket Transmission Protocol (SSTP) connection.B Deploy two Microsoft SharePoint Foundation 2010 sites.Configure one site for internal users. Configure the other site for remote users. Publish the SharePoint sites by using HTTPS.C Configure a Network Policy and Access Services (NPAS) server to act as a VPN server. Require remote users to access the files by using an IPsec connection to the VPN server.D Store all sensitive files in folders that are encrypted by using Encrypting File System (EFS). Require  remote users to access the files by using Secure Socket Transmission Protocol (SSTP).

考题 单选题You network consists of a single Active Directory domain. All domain controllers run Windows  Server 2008 R2.     You need to reset the Directory Services Restore Mode (DSRM) password on a domain  controller.     What tool should you use()A dsmodB ntdsutilC Local Users and Groups snap-inD Active Directory Users and Computers snap-in

考题 单选题Your network consists of a single Active Directory domain. All servers run Windows Server 2008 R2.   All client computers run Windows 7. Users store all of their files in their Documents folder. Many users store large files.   You plan to implement roaming user profiles for all users by using Group Policy.You need to recommend a solution that minimizes the amount of time it takes users to log on and log off of the computers that use the roaming user profiles. What should you recommend?()A Modify the Group Policy object (GPO) to include folder redirection.B Modify the Group Policy object (GPO) to include Background Intelligent Transfer Service (BITS) settings.C On the server that hosts the roaming user profiles, enable caching on the profiles share.  D On any server, install and configure the Background Intelligent Transfer Service (BITS) server  extensions.

考题 单选题You network consists of a single Active Directory domain. All domain controllers run Windows Server 2008. You need to reset the Directory Services Recovery Mode (DSRM) password on a domain controller. What tool should you use()A dsmodB ntdsutilC Local Users and Groups snap-inD Active Directory Users and Computers snap-in