网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

You have three computers that run Windows 7. You use Windows PowerShell to perform remote administration tasks on all three computers. You need to remotely administer all three  computers by usingPowerShell.  Which PowerShell cmdlet should you use?()

  • A、Enable-PSRemoting
  • B、Enable-PSSessionConfiguration
  • C、New-PSDrive
  • D、New-PSSession

参考答案

更多 “ You have three computers that run Windows 7. You use Windows PowerShell to perform remote administration tasks on all three computers. You need to remotely administer all three  computers by usingPowerShell.  Which PowerShell cmdlet should you use?()A、Enable-PSRemotingB、Enable-PSSessionConfigurationC、New-PSDriveD、New-PSSession” 相关考题
考题 You plan to use Windows PowerShell scripts to configure system settings when you deploy Windows 7.   You need to ensure that Windows PowerShell scripts will run on the client computers during initial setup.   What should you do?()A、Set the script execution policy to RemoteSigned.B、Set the script execution policy to AllSigned.C、Set the script execution policy to Restricted.D、Use Group Policy preferences.

考题 All servers on your companys network run Windows Server 2008 R2. All users have thin client computers. You need to recommend a virtualization solution that allows users to use applications that run only on Windows 7.  Which technology should you recommend?()A、Windows Virtual PCB、Microsoft Application Virtualization (App-V)C、Microsoft Virtual Desktop Infrastructure (VDI)D、Microsoft Enterprise Desktop Virtualization (MED-V)

考题 Your company has 10 servers that run Windows Server 2008. The servers have Remote Desktop Protocol (RDP) enabled for server administration. RDP is configured to use default security settings. All administrators’ computers run Windows Vista. You need to ensure the RDP connections are as secure as possible.Which two actions should you perform? ()A、Set the security layer for each server to the RDP Security Layer.B、Configure the firewall on each server to block port 3389.C、Acquire user certificates from the internal certification authority.D、Configure each server to allow connections only to Remote Desktop client computers that use Network Level Authentication.

考题 Your company has client computers that run Windows 7 and client computers that run Windows XP Professional. You enable the Network Discovery feature on the Windows 7 computers. You discover that the Windows XP computers do not appear on the network map. You need to ensure that all client computers appear on the network map. What should you do?()A、Configure the IPv6 protocol on the Windows 7 computers.B、Configure the network shares on the Windows 7 computers to include the user names of all employees.C、Configure the network shares on the Windows XP computers to include the user names of all employees.D、Install the Link Layer Topology Discovery (LLTD) Responder on the Windows XP computers.

考题 Your network has a single domain with 1,000 client computers that run Windows Vista. All client computers are members of the domain.   You are planning to deploy Windows 7.   You need to create a report that shows hardware and device compatibility on all client computers.    You need to perform this action without installing any additional software on the client computers.   Which tool should you use?()A、System Center Capacity PlannerB、System Center Configuration ManagerC、Microsoft Assessment and Planning ToolkitD、Windows Performance Monitor Data Collector Sets

考题 Your network consists of 1,000 client computers that run Windows XP. The computers do not have access to the Internet.   You plan to migrate 200 of the computers immediately to Windows 7. The remainder will be migrated over the next several months.   You need to plan the most efficient method for activating all of the computers.   What should you do?()A、 Use the Key Management Service (KMS) for all the computers.B、 Use Multiple Activation Key (MAK) Independent for all the computers.C、 Use Multiple Activation Key (MAK) Proxy for the first 200 computers, and then use the Key Management Service(KMS) for the remaining computers.D、 Use Multiple Activation Key (MAK) Independent for the first 200 computers, and then use Multiple Activation Key(MAK) Proxy for the remaining computers.

考题 Your network has a single domain with 1,000 client computers that run Windows Vista. You are planning a deployment of Windows 7. Your company has multiple departments.   Only the sales department will use the existing target computers to run Windows 7.   You have the following requirements:Migrate the user state for each user.  Preserve the file system and existing applications for only the sales department computers.    You need to recommend the deployment method that is appropriate for the environment.    Which combination of deployment scenarios should you recommend?()A、 Use the Refresh Computer method for the sales department computers. Use the New Computer method for all other computers.B、 Use the Refresh Computer method for the sales department computers. Use the Replace Computer method for all other computers.C、 Use the Upgrade Computer method for the sales department computers. Use the Refresh Computer method for all other computers.D、 Use the Upgrade Computer method for the sales department computers. Use the Replace Computer method for all other computers.

考题 You work as a network administrator at ABC.com.The ABC.com network consists of a single domain named ABC.com.  All servers on the ABC.com network have Windows Server 2012 R2 installed and all client computers have Windows 8 installed.The ABC.com network contains a domain controller named ABC_DC04 and member server named ABC_SR11.ABC_SR11 runs a Core Installation of Windows Server 2012 R2.How would you configure THESABCING_DC04 to remotely view the event log on ABC_SR11?()A、You should use the Windows Powershell to run the Get-NetFirewallRule command.B、You should use the Windows Powershell to run the Set-NetFirewallProfile commandC、You should use the Windows Powershell to run the New-NetIPsecRule command.D、You should use the Windows Powershell to run the Show-NetIPsecRule command.

考题 You work as an administrator at ABC.com. The ABC.com network consists of two Active Directory  forests, named ABC.com and test.com. There is no trust relationship configured between the forests.A backup of Group Policy object (GPO) from the test.com domain is stored on a domain controller in the ABC.com domain. You are informed that a GPO must be created in the ABC.com domain, and must be based on the settings of the GPO in the test.com domain. You start by creating the new GPO using the New-GPO Windows PowerShell cmdlet.You want to complete the task via a Windows PowerShell cmdlet.  Which of the following actions should you take?()A、You should consider making use of the Invoke-GPUpdate Windows PowerShell cmdlet.B、You should consider making use of the Copy-GPO Windows PowerShell cmdlet.C、You should consider making use of the New-GPLink Windows PowerShell cmdlet.D、You should consider making use of the Import-GPO Windows PowerShell cmdlet.

考题 You administer 80 computers that run Windows 7. The computers have static IP addresses. You need tochange the static IP addresses on all the computers by using a startup script.  Which command should youinclude in the startup script ?()A、Ipconfig.exeB、Nbtstat.exeC、Netstat.exeD、Netsh.exe

考题 You are planning to deploy Windows 7 to all client computers in your network.    You need to ensure that domain administrators can manage domain Group Policy objects (GPOs) from their Windows 7 computers.   What should you provide to the domain administrators?()A、Administration Tools PackB、GPOAccelerator ToolC、Local Group Policy EditorD、Remote Server Administration Tools

考题 All client computers in your network run Windows 7 with default firewall settings.   You have a server-based application that requires an agent to be installed on all client computers.   You need to use Group Policy to allow the application to initiate installation of the agent on all client computers.   What should you do?()A、Create inbound port rules.B、Create inbound program rules.C、Create connection security rules.D、Create Windows service hardening rules.

考题 Your company has client computers that run Windows Vista and client computers that run Windows 7.   The client computers connect directly to the Microsoft Update Web site once per week and automatically install all available security updates.  Microsoft releases a security update for Windows 7.   You have the following requirements:   Create a report of all Windows 7 computers that are currently connected to the network and that do not have the security update installed. Use the least amount of administrative effort.  You need to manage the software update process to meet the requirements.   What should you do?()A、 Deploy Microsoft Windows Server Update Services (WSUS). Approve the security update for installation,and forcea detection cycle on the client computers.B、 Deploy Microsoft Windows Server Update Services (WSUS). Approve the security update for detection, and force adetection cycle on the client computers.C、 Use the Microsoft Baseline Security Analyzer (MBSA) to scan the client computers.Configure MBSA to use the Microsoft Update site catalog.D、 Use the Microsoft Baseline Configuration Analyzer (MBCA) to scan the client computers.

考题 You have a single server that has a Server Core Installation of Windows Server 2012 R2. How would you install the graphical user interface (GUI) to this server?()A、You should use Windows PowerShell to run the Enable-NetFirewallRule command.B、You should use Windows PowerShell to run the Add-WindowsPackage command.C、You should use Windows PowerShell to run the Install-WindowsFeature command.D、You should use Server Manager console on to add the User Interfaces.E、You should use Server Manager console to add the Infrastructure feature.F、You should use Server Manager console to add the Windows feature.

考题 Your workgroup contains computers that run Microsoft Windows Vista and Microsoft Windows XP Professional.  Employees that use Windows XP Professional do not appear in the Invite people list of a Microsoft Windows Meeting Space meeting.  You need to ensure that all employees are invited to Windows Meeting Space meetings.  Which two actions should you perform? ()A、Instruct all employees to sign in to the People Near Me feature.B、Install Service Pack 2 on all computers that run Windows XP Professional.C、Launch the Ease of Access Center window on all computers in the workgroup.D、Upgrade all computers that run Windows XP Professional to Windows Vista.E、Configure Microsoft NetMeeting on the computers that run Windows XP Professional to connect to the meeting.

考题 You are the network administrator for The network consists of a single Active Directory domain named Servers run either Windows 2000 Server or Windows Server 2003. Client computers run either Windows 2000 Professional Service Pack 2 or Windows XP Professional. You need to implement a new software update infrastructure. You discover that security patches, critical updates, and service packs have never been installed on any client computer on the network. You install Software Update Services (SUS) on a Windows Server 2003 computer named Testking5. You must ensure that all client computers receive all Microsoft security patches, critical updates, and service packs. You want to achieve this goal as quickly as possible. Which three actions should you perform? ()(Each correct answer presents part of the solution. Choose three)A、Install the Automatic Updates client on all Windows 2000 Professional client computers.B、Install the Automatic Updates client on all Windows XP Professional client computers.C、Install SUS on a Windows 2000 Server computer.D、Modify the Windows Update settings of the Default Domain Controller organizational unit (OU) Group Policy object (GPO) to point client computers to http://testking5.E、Modify the Windows Update settings of the Default Domain Policy Group Policy object (GPO) to point client computers to http://testking5.F、Upgrade all Windows 2000 Professional client computers to Windows XP Professional.

考题 All client computers in your network run Windows XP. Some of the computers are part of a secure network. Some of the computers connect to the network by using virtual private networking (VPN). You are planning to deploy Windows 7.   You have the following requirements:   Use a dedicated server for deployment.  Use a single operating system image for deployment.   Ensure that you can use removable media to deploy the image.   Ensure that you can select which applications are installed onto a client computer at the time of deployment.   You need to design a deployment strategy that meets the requirements.   What should you do?()A、 Using a Windows PE boot media, use ImageX to apply the image from a network share to the client computers.B、 Use System Center Configuration Manager 2007 R2 to perform a zero-touch installation.C、 Use the Microsoft Deployment Toolkit to perform a lite-touch installation.D、 Use Windows Deployment Services on a network server to deploy Windows 7 by using an install image.

考题 Your company has 10 servers that run Windows Server 2008 R2. The servers have Remote Desktop Protocol (RDP) enabled for server administration. RDP is configured to use default security settings. All administrators' computers run Windows 7. You need to ensure the RDP connections are as secure as possible. Which two actions should you perform?()A、Set the security layer for each server to the RDP Security Layer.B、Configure the firewall on each server to block port 3389.C、Acquire user certificates from the internal certification authority.D、Configure each server to allow connections only to Remote Desktop client computers that use Network Level Authentication.

考题 All client computers on your company network run Windows XP and are members of an Active Directory Domain Services domain. You plan to migrate all computers to Windows 7. You also plan to deploy a new VPN server to support remote network access for the computers. You need to ensure that all computers will be supported for remote access during the migration to Windows 7. What should you do?()A、Set the VPN server to Layer 2 Tunneling Protocol.B、Set the VPN server to Secure Socket Tunneling Protocol.C、Set the VPN server to Internet Key Exchange version 2.D、Configure the Direct Access feature on the VPN server.

考题 单选题You work as a network administrator at ABC.com.The ABC.com network consists of a single domain named ABC.com.  All servers on the ABC.com network have Windows Server 2012 R2 installed and all client computers have Windows 8 installed.The ABC.com network contains a domain controller named ABC_DC04 and member server named ABC_SR11.ABC_SR11 runs a Core Installation of Windows Server 2012 R2.How would you configure THESABCING_DC04 to remotely view the event log on ABC_SR11?()A You should use the Windows Powershell to run the Get-NetFirewallRule command.B You should use the Windows Powershell to run the Set-NetFirewallProfile commandC You should use the Windows Powershell to run the New-NetIPsecRule command.D You should use the Windows Powershell to run the Show-NetIPsecRule command.

考题 单选题You plan to use Windows PowerShell scripts to configure system settings when you deploy Windows 7.   You need to ensure that Windows PowerShell scripts will run on the client computers during initial setup.   What should you do?()A Set the script execution policy to RemoteSigned.B Set the script execution policy to AllSigned.C Set the script execution policy to Restricted.D Use Group Policy preferences.

考题 单选题Your network consists of 1,000 client computers that run Windows XP. The computers do not have access to the Internet.   You plan to migrate 200 of the computers immediately to Windows 7. The remainder will be migrated over the next several months.   You need to plan the most efficient method for activating all of the computers.   What should you do?()A  Use the Key Management Service (KMS) for all the computers.B  Use Multiple Activation Key (MAK) Independent for all the computers.C  Use Multiple Activation Key (MAK) Proxy for the first 200 computers, and then use the Key Management Service(KMS) for the remaining computers.D  Use Multiple Activation Key (MAK) Independent for the first 200 computers, and then use Multiple Activation Key(MAK) Proxy for the remaining computers.

考题 单选题Your network has a single domain with 1,000 client computers that run Windows Vista. All client computers are members of the domain.   You are planning to deploy Windows 7.   You need to create a report that shows hardware and device compatibility on all client computers.    You need to perform this action without installing any additional software on the client computers.   Which tool should you use?()A System Center Capacity PlannerB System Center Configuration ManagerC Microsoft Assessment and Planning ToolkitD Windows Performance Monitor Data Collector Sets

考题 单选题You configure and deploy a Group Policy object (GPO) that contains AppLocker settings.  You need to identify whether a specific application file is allowed to run on a computer.   Which Windows PowerShell cmdlet should you use()A Get-AppLockerFileInformationB Get-GPOReportC Get-GPPermissionsD Test-AppLockerPolicy

考题 单选题You administer 80 computers that run Windows 7. The computers have static IP addresses. You need tochange the static IP addresses on all the computers by using a startup script.  Which command should youinclude in the startup script ?()A Ipconfig.exeB Nbtstat.exeC Netstat.exeD Netsh.exe

考题 单选题You have three computers that run Windows 7. You use Windows PowerShell to perform remote administration tasks on all three computers. You need to remotely administer all three  computers by usingPowerShell.  Which PowerShell cmdlet should you use?()A Enable-PSRemotingB Enable-PSSessionConfigurationC New-PSDriveD New-PSSession

考题 单选题All servers on your companys network run Windows Server 2008 R2. All users have thin client computers. You need to recommend a virtualization solution that allows users to use applications that run only on Windows 7.  Which technology should you recommend?()A Windows Virtual PCB Microsoft Application Virtualization (App-V)C Microsoft Virtual Desktop Infrastructure (VDI)D Microsoft Enterprise Desktop Virtualization (MED-V)