考题
This question is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. Start of repeated scenarioYou are an enterprise desktop support technician for Humongous Insurance. Active Directory ConfigurationThe company has two offices named Office1 and Office2. The network contains an Active Directory forest named humongousinsurance.com. An Active Directory site exists for each office. The sites are named Site1 and Site2. Server ConfigurationAll servers run Windows Server 2008 R2 and are joined to the domain. The relevant servers are configured as shown in the following table.The corporate security policy states that all domain controllers must have only the following roles. AD DSDNS serverDHCP server Network ConfigurationSite1 and Site2 connect to each other by using a WAN link. Client Computer ConfigurationAll client computers run Windows 7 Enterprise and are members of the domain. Some client computers are portable computers and some are desktop computers. The computers do not support hardware virtualization. All computers are configured to receive Windows Updates from WSUS1. Remote Access ConfigurationUsers can connect to NPAS1 from the Internet by using all of the VPN protocols that are supported by Windows Server 2008 R2. Fabrikam, Inc. is a customer of Humongous Insurance. Several Humongous Insurance users work at the Fabrikam office and access resources on the Humongous Insurance network by using direct VPN connections to NPAS1. Fabrikam contains several wireless access points. Application Configuration All computers in the finance department run a custom application suite named App1. Several users in the sales department install an application named App2. App2 runs as a service and logs on by using the credentials of the user who installed the application. End of repeated scenario Several users in the sales department report that their user accounts are locked out shortly after they change their user passwords. You need to minimize the number of account lockouts that occur after the users change their passwords. What should you instruct the users to do?()
考题
You have a computer that runs Windows XP Professional. Two users named User1 and User2 share the computer. User1 and User2 encrypt files on the computer. User1 encrypts a file named file1. doc. You need ensure that both User1 and User2 can view the contents of file1. doc. What should you instruct User1 to do?() A、Add the certificate of User2 to file1. doc. B、Assign User2 the Full Control NTFS permission on file1. doc. C、Copy file1. doc the %systemroot%/documents and settings/all users/ folder.D、Move file1. doc to the %systemroot%/documents and settings/all users/ folder.
考题
You are the network administrator for .Your network consists of a single Active Directory domain named . The Default Domain Group Policy object (GPO) uses all default settings. The network contains five servers running Windows Server 2003 and 800 client computers. Half of the client computers are portable computers. The other half are desktop computers. Users of portable computers often work offline, but users of desktop computers do not. You install Windows XP Professional on all client computers with default settings. Then you configure user profiles and store them on the network. Some users of portable computers now report that they cannot log on to their computers. Other users of portable computers do not experience this problem. You need to ensure that all users of portable computers can log on successfully,whether they are working online or offline. What should you do?()A、Configure all portable computers to cache user credentials locally.B、Ensure that all users of portable computers log on to the network at least once before working offline.C、In all portable computers, rename Ntuser.dat to Ntuser.man.D、For all portable computers, configure the Loopback policy setting.
考题
You upgrade 11 computers in the accounting department from Windows NT Workstation 4.0 to Windows 2000 Professional. All of the upgraded computers are configured to have the default security settings. After the upgrade, users in the accounting department report that they can no longer run any financial or credit applications on their computers. You want all accounting department users to be able to run these applications. You want to allow only the rights that allow users to run the applications. What should you do?()A、Add each user account to the Power Users group on that user’s computer.B、Configure the financial and credit applications to run as services on the computers in the accounting department.C、Apply the Compatws.inf security template to the local security policy of the computers in the accounting department.D、Use the Computer Management console to configure separate memory spaces for each financial and credit application on the accounting department computers.
考题
You are using windows installer to deploy an application to 750 Windows 2000 Professional computers on your network. The network includes organizational unit (OU) named sales. A Group Policy object (GPO) is created for the Sales OU. The application is successfully installed on the 740 out of 750 computers. The ten computers are unable to install the application what should you do to install that application on all the computers in the sales OU.What should you do?()A、Repackage and re-deploy the application's .msi file to the Sales OUB、Repackage and re-deploy the application's .mst file to the Sales OUC、Re-deploy the application by using the Group Policy object (GPO for the Sales OU)D、Restart Windows Installer service on the ten computers.
考题
Your network has client computers that run Windows XP. Users do not have administrative rights to their local computers. You use Windows Server Update Services (WSUS) to manage software updates. You are planning to deploy Windows 7. Your company uses a custom application that is not compatible with Windows?7. You need to ensure that all users are able to run the custom application. What are two possible ways to achieve this goal?()A、Deploy and register the compatibility-fix database file to the client computers by using a user startup script.B、Deploy and register the compatibility-fix database file to the client computers by using a computer startup script.C、Install and register a shim on the client computers by using Group Policy.D、Install and register a shim on the WSUS server.
考题
You are a security administrator for your company. The network consists of a single Active Directory domain. Servers run either Windows Server 2003 or Windows 2000 Server. All client computers run Windows XP Professional. The company’s written security policy states that user accounts must be locked if an unauthorized user attempts to guess the users, passwords. The current account policy locks out a user after two invalid password attempts in five minutes. The user remains locked out until the account is reset by an administrator. Users frequently call the help desk to have their account unlocked. Calls related to account lockout constitute 25 percent of help desk calls. You need to reduce the number of help desk calls related to account lockout. What should you do?()A、 Modify the Default Domain Controllers Policy Group Policy object(GPO). Increase the maximum lifetime for serviceB、 Modify the Default Domain Policy Group Policy object(GPO). Configure an account lockout threshold of 10.C、 Modify the Default Domain Controllers Policy Group Policy object(GPO). Disable the enforcement of user logon resD、 Modify the Default Domain Policy Group Policy object(GPO). Increase the minimum password age.
考题
You are the network administrator for Blue Yonder Airlines. You plan to create an Active Directory domain named blueyonderairlines.com that will have a functional level of Windows Server 2003. Your company has one main office and four branch offices, which are all located in one country. A central security department in the main office is responsible for creating and administering all user accounts in all offices. Each office has a local help desk department that is responsible for resetting passwordswithin the individual department’s office only. All user accounts are located in the default Users container. You need to create an organizational unit (OU) structure to support the delegation of authority requirements. You want to minimize the amount of administrative effort required to maintain the environment. What should you do?()A、 Create a toplevel OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a separate child OU for each office under BlueYonderAirlines_Users. Move the user accounts of all employees in each office to the child OU for that office.B、 Create a toplevel OU named Main_Office under the blueyonderairlines.com domain. Move the user accounts of all users in the main office to the Main_Office OU.Create a separate child OU for each branch office under the Main_Office OU. Move the user accounts of all users in each branch office to the child OU for that office.C、 Create a toplevel OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a child OU named Central_Security under BlueYonderAirlines_Users. Move the user accounts of the central security department users to the Central_Security OU.Create a child OU named Help_Desk under BlueYonderAirlines_Users. Move the user accounts of the help desk users to the Help_Desk OU.D、 Create a toplevel OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a child OU named Central_Security under BlueYonderAirlines_Users. Move the user accounts of the central security department users to the Central_Security OU.Create a separate child OU under BlueYonderAirlines_Users for each office. Move the user accounts of the help desk users in each office to the child OU for that office.
考题
You are the network administrator for your company. The network consists of a single Active Directorydomain. All domain controllers run Windows Server 2003. All client computers run Windows XP Professional with default settings. Some users have portable computers, and the rest have desktop computers.You need to ensure that all users are authenticated by a domain controller when they log on.How should you modify the local security policy? ()A、Require authentication by a domain controller to unlock the client computer.B、Cache zero interactive logons.C、Cache 50 interactive logons.D、Grant the Log on locally user right to the Users group.
考题
You are the help desk manager for your company. The company network consists of a single Active Directory domain. All client computers run Windows XP Professional. All help desk technicians are members of the Help Desk Technicians group. They use Remote Assistance to remotely control user sessions to provide online support and training to users. The users currently use Windows Messenger to submit Remote Assistance invitations to the help desk technicians. You want to reduce the time required for help desk technicians to respond to Remote Assistance requests. To accomplish this goal, you want to configure the client computers to allow help desk technicians to establish a Remote Assistance session with a client computer without requiring an invitation from a user. What should you do?() A、In the Default Domain Policy, set the Remote Assistance - Solicited Remote Assistance policy setting to Disabled. B、In the Default Domain Policy, set the Remote Assistance - Offer Remote Assistance policy setting to Enabled and add the Help Desk Technicians group to the Helpers list. C、In each computer's Local Security Policy, grant the Help Desk Technicians group the Allow logon through Terminal Services user right. D、In the System properties for each computer, select the Allow users to connect remotely to this computer option, and add the Help Desk Technicians group to the list of allowed users.
考题
You are the administrator of Company’s network.You install 50 new Windows 2000 Professional computers in the marketing department. Two weeks later,users report that five of the computers have stopped responding. You troubleshoot the five computers.You find that some users have installed unsigned device drivers that are not supported by Windows 2000Professional.You want to determine which drivers were installed by users.What should you do?()A、Run the chkdsk /f command on all drives on the computers.B、Configure Windows 2000 Professional to enable driver signing verification.C、Run the File Signature Verification tool on the computers.D、Run the System File Checker utility on the computers.
考题
Your network contains a computer that runs Windows XP Professional. Multiple users share the computer. You create a custom user profile on the computer. You need to ensure that all new users of the computer receive the custom user profile. What should you do?() A、Run the Files and Settings Transfer Wizard.B、At the command prompt, run scanstate.exe. C、Use the Copy To function from the User Profiles settings. D、Rename the folder that contains the custom user profile to winnt_user.
考题
You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run either Windows 2000 Professional with Service Pack 4 or Windows XP Professional. You install Windows Server Update Services (WSUS) on a computer named Server2. You create a Group Policy object (GPO) that configures all client computers to receive software updates from Server2. One week later, you run Microsoft Baseline Security Analyzer (MBSA) on all client computers to find out whether all updates are being applied. You discover that all of the Windows 2000 Professional client computers receive updates, but the Windows XP Professional client computers do not receive updates. You verify that the GPO setting was applied on all Windows XP Professional computers. You need to ensure that the Windows XP Professional client computers receive their updates from Server2. What should you do?()A、Make all users of Windows XP Professional client computers members of the Administrators local group.B、On all Windows XP Professional client computers, install the latest service pack.C、On all Windows XP Professional client computers, use the gpupdate /force command.D、On all Windows XP Professional client computers, delete the NoAutoUpdate value under HKEY_LOCAL_MACHINE/SOFTWARE/Policies/Microsoft/Windows/WindowsUpdate/AU.
考题
You are the network administrator for . The network consists of a single Active Directory domain named . All servers run Windows Server 2003. All client computers run Windows XP Professional. The network contains a domain controller named TestKing3. You create a preconfigured user profile on a client computer named TKClient1. You need to ensure that all users receive the preconfigured user profile when they log on to the network for the first time. All users must still be able to personalize their desktop environments. What should you do?()A、From TKClient1, copy the user profile to //TestKing3/netlogon/Default User.B、From TKClient1, copy the user profile to //TestKing3/netlogon/Default User. Change the User Profile path for all users in the Active Directory to //TestKing3/netlogon/Default. User.C、From TKClient1, copy the user profile to the C:/Documents and Settings/Default User folder. Share the Default User profile on the network.D、Create a Folder Redirection policy in Active Directory.
考题
Your company network consists of a single Active Directory domain named testking.com. The functional level of the domain is Windows 2000 Native. The network contains 20 member servers running Windows 2000 and 5 domain controllers running Windows Server 2003. The user accounts for employees in the Finance department are members of a global distribution group named Finance_Users. You create a shared folder named Finance_Docs on a Windows 2000 member server. You need to enable the Finance users to access the Finance_Docs folder. What should you do?()A、Change Finance_Users to a security group.B、Change the scope of Finance_Users to Universal.C、Change the scope of Finance_Users to Domain Local.D、Raise the domain functional level to Windows Server 2003.
考题
You upgrade five computers in the Finance organizational unit (OU) from Windows NT Workstation 4.0 to Windows 2000 Professional. The computers are used by members of the Finance OU to run financial Applications. All five computers are configured to have the default security settings. A user named Helene reports that she can no longer log run the financial applications on her Windows 2000 Professional computer. Prior to the upgrade, Helene was able to run the financial applications on her computer. Helene is a member of the local Users group. You want the financial applications to run on her computer. What should you do?()A、 Use Computer Management to configure separate memory space for each financial application on Helene’s computer.B、 Use Security Templates to edit the Security Policy to include the financial application onHelene’s computer. Then add Helene’s user account to the Power Users group on Helene’s computer.C、 Use Security Configuration and Analysis to reconfigure the default security policy .inf to allow financial applications to run on Helene’s computer.D、 Use Secedit.exe to apply the Compatws.inf security template on Helene’s Security Policy toloosen the permissions for the local Users group on Helene’s computer.
考题
You are the network administrator for . The network consists of a single Active Directory domain named . All client computers run Windows XP Professional. The finance deparment uses a specific naming process to audit users and their computers. The process requires that each user's client computer has an account in Active Directory and that each client computer name corresponds to a specific user account. A user name Marie is a member of only the Domain Users security group. She reports that the hardware on her computer fails. She receives a new computer. You need to add Marie's new computer to the domain. You need to comply with the finance department naming process. What should you do?()A、Instruct Marie to run the ipconfig /flushdns command on her new computer and to add the new computer to the domain by using the same computer name as her failed computer.B、Assign Marie permissions for adding computer accounts to the default container named Computers. Instruct Marie to add her new computer to the domain.C、Reset the computer account for Marie's failed computer. Instruct Marie to add her new computer to the domain by using the same name as her failed computer.D、Configure the IP address of Marie's new computer to be the same as the failed computer. Instruct Marie to add the new computer to the domain.
考题
You are the desktop administrator for your company. All users in the network have Windows XP Professional computers. Users in the research department have dual-processor computers. Users in the research department report that when they run 16-bit Windows programs, their computer performance becomes very slow. You use System Monitor to monitor the users’ computers. You discover that when the users are running their 16-bit applications, one processor shows a sustained utilization of more than 90 percent while the other processor only shows utilization of less than 10 percent. You need to improve application performance for the users in the research department. What should you do?()A、Configure each application to run in a separate memory space.B、Configure each application to run in AboveNormal priority class.C、For each application, set the compatibility mode to Windows 95. D、Configure processor affinity for each application to allow it to run on both processors.
考题
You are the desktop administrator for Contoso, Ltd. The company's network contains 1,000 Windows XP Professional computers, which are members of a single Active Directory domain. The computers' hard disks are formatted as NTFS. The company's software developers release a new custom application. The application uses a .dll file named AppLib.dll, which is installed in a folder named /Program Files/Contoso/OpsApp. The company's help desk technicians report that several users experience problems when they use the application because the AppLib.dll file was deleted on their client computers. The company's software developers recommend that you modify the file permissions on AppLib.dll so that users have only Read permission on the file. You need to ensure that all users have only Read permission on the AppLib.dll file on all 1,000 Windows XP Professional computers. What should you do?() A、Write a logon script that moves the AppLib.dll file into the %systemroot%/System32 folder.B、Ensure that Windows File Protection is enabled on all 1,000 Windows XP Professional computers.C、Apply the logon script to all domain user accounts. D、Use the Security Configuration and Analysis console to create a new security template that modifies the file permissions on AppLib.dll. E、Use Active Directory Group Policy to import and apply the template to all 1,000 Windows XP Professional computers. F、Repackage the custom application in a Windows Installer package.
考题
You are the network administrator for The network consists of a sing Active Directory domain named All domain controllers run Windows Server 2003. All client computers run Windows XP Professional with default settings. Some users have portable computers, and the rest have desktop computers. You need to ensure that all users are authenticated by a domain controller whenthey log on. How should you modify the local security policy?()A、Require authentication by a domain controller to unlock the client computer.B、Cache zero interactive logons.C、Cache 50 interactive logons.D、Grant the Log on locally user right to the Users group.
考题
You are responsible for migrating client computers from Windows 98 and Windows NT Workstation 4.0 to Windows 2000 Professional. You have installed Windows 2000 Professional and reinstalled the necessary application on 10 computers. You have returned these computers to their users. The users of these computers report that their word processing application will not start. What should you do?()A、Set the permission on the application to Execute.B、Add the application to the Run key in the registry.C、Apply the Securews.inf security template on the users’ computers.D、Apply the compatws.inf security template on the users’ computers.
考题
Ten users at your office run an accounting application on their Windows NT Workstation 4.0 computers. The application stores its data in a shared network folder named Accdata on a Windows 2000 Server computer named Server1. You upgrade all 10 computers to Windows 2000Professional and verify that all applications are compatible with Windows 2000. After the upgrade,some users report that they are receiving intermittent data-corruption error messages. They are also receiving data file-version mismatch error messages. When these errors occur, your only method of recovery is to restore the entire contents of the Accdata folder from a known good backup copy. You need to prevent these errors from occurring in the future. What should you do?()A、Configure Accdata folder to allow a maximum of one user.B、Configure the Accdata folder to disable client caching.C、Create a group policy that removes the Bypass Traverse Checking user right on server1.D、Create a group policy that increases the amount of idle time required before a session disconnects on server1.
考题
You have a computer that runs Windows XP Professional. Multiple users share the computer. You log on to the computer by using the local administrator account and install a custom application. You need to add an application shortcut to the desktop of all new users who use the computer. The shortcut must appear on the desktop of new users only. What should you do?()A、Copy the shortcut to %systemdrive%/documents and settings/default user/desktop/.B、Copy the shortcut to %systemdrive%/documents and settings/all users/desktop/.C、Copy the shortcut to your desktop. Modify the %comspec% system environment variable. D、Copy the shortcut to the guest user’s desktop. Assign the Everyone group Read permission to the guest user profile.
考题
Your network consists of a single Active Directory domain. All servers run Windows Server 2003 ServicePack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3).A user named User1 frequently logs on to several different computers.You need to ensure that the documents and shortcuts User1 stores on his desktop are available on the desktop of each computer he uses.Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two.)A、From Active Directory Users and Computers, modify the properties of the User1 account.B、From Active Directory Users and Computers, modify the properties for each computer account used by User1.C、On a file server, create a shared folder named Profiles and assign the Change share permission to Everyone group.D、On a file server, create a shared folder named Profiles and assign the Full Control share permission to the Everyone group.
考题
单选题You are the network administrator for Blue Yonder Airlines. You plan to create an Active Directory domain named blueyonderairlines.com that will have a functional level of Windows Server 2003. Your company has one main office and four branch offices, which are all located in one country. A central security department in the main office is responsible for creating and administering all user accounts in all offices. Each office has a local help desk department that is responsible for resetting passwordswithin the individual department’s office only. All user accounts are located in the default Users container. You need to create an organizational unit (OU) structure to support the delegation of authority requirements. You want to minimize the amount of administrative effort required to maintain the environment. What should you do?()A
Create a toplevel OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a separate child OU for each office under BlueYonderAirlines_Users. Move the user accounts of all employees in each office to the child OU for that office.B
Create a toplevel OU named Main_Office under the blueyonderairlines.com domain. Move the user accounts of all users in the main office to the Main_Office OU.Create a separate child OU for each branch office under the Main_Office OU. Move the user accounts of all users in each branch office to the child OU for that office.C
Create a toplevel OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a child OU named Central_Security under BlueYonderAirlines_Users. Move the user accounts of the central security department users to the Central_Security OU.Create a child OU named Help_Desk under BlueYonderAirlines_Users. Move the user accounts of the help desk users to the Help_Desk OU.D
Create a toplevel OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a child OU named Central_Security under BlueYonderAirlines_Users. Move the user accounts of the central security department users to the Central_Security OU.Create a separate child OU under BlueYonderAirlines_Users for each office. Move the user accounts of the help desk users in each office to the child OU for that office.
考题
单选题You are the network administrator for The network consists of a sing Active Directory domain named All domain controllers run Windows Server 2003. All client computers run Windows XP Professional with default settings. Some users have portable computers, and the rest have desktop computers. You need to ensure that all users are authenticated by a domain controller whenthey log on. How should you modify the local security policy?()A
Require authentication by a domain controller to unlock the client computer.B
Cache zero interactive logons.C
Cache 50 interactive logons.D
Grant the Log on locally user right to the Users group.