网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

You are a systems administrator responsible for configuring a Windows Server 2008 SMTP server. Yourorganization is currently using the default SMTP virtual server for sending order notifications from a single Web application called ContosoOrderManagement. Recently, you have noticed that a largenumber of messages have been sent to the SMTP virtual server from other computers and users. Which two methods can you use to prevent unauthorized access to the SMTP server?()

  • A、Enable Basic Authentication.
  • B、Configure a smart host for use by the SMTP virtual server.
  • C、Add Connection Control entries to limit which IP addresses can use the SMTP server.
  • D、Modify settings on the Security tab of the properties of the SMTP virtual server.

参考答案

更多 “ You are a systems administrator responsible for configuring a Windows Server 2008 SMTP server. Yourorganization is currently using the default SMTP virtual server for sending order notifications from a single Web application called ContosoOrderManagement. Recently, you have noticed that a largenumber of messages have been sent to the SMTP virtual server from other computers and users. Which two methods can you use to prevent unauthorized access to the SMTP server?()A、Enable Basic Authentication.B、Configure a smart host for use by the SMTP virtual server.C、Add Connection Control entries to limit which IP addresses can use the SMTP server.D、Modify settings on the Security tab of the properties of the SMTP virtual server.” 相关考题
考题 It is a kind of online service system, on which you can publish and exchange information with others who also are the members of the system.On which you can paste your articles and answer the questions asked by the members of the system and you can also look for help here.It isA.BBSB.WWWC.E-mailD.TELNET

考题 Only in this way ____ to make improvements in the operating system. A.you can hopeB.you did hopeC.can you hope

考题 You have a server that runs Windows Server 2003 Service Pack 2 (SP2). The server is configured as shown in the following table.You need to ensure that you can restore the server and all its data in the event of a complete system failure.You perform an Automated System Recovery (ASR) backup.What else should you backup? ()A.volume CB.volume DC.volume ED.the system state

考题 You have a computer that runs Windows XP Professional. You run a background application named app1. exe. The application becomes unresponsive. You need to forcibly shut down the application. You must achieve this goal without restarting the computer.Which tool should you use?() A、System Configuration UtilityB、System InformationC、Task ManagerD、tasklist.exe

考题 How do you know the system loading PAK version

考题 You are the administrator of your Windows 2000 Professional computer. You share severalfolders on your computer, which are accessible to all the users on your company’s network. You want to ensure that you have correctly assigned the appropriate permissions to all the shares.Where can you view all the shares in use on your computer, so as to verify the permissions as quickly as possible? ()A、Control Panel  Data Sources (ODBC).B、Control Panel  System Tools  Shared Folders.C、Computer Management  System Tools  System Information.D、Computer Management  System Tools  Shared Folders  Open Files.E、Computer Management  System Tools  Shared Folders  Sessions.F、Computer Management  System Tools  Shared Folders  Shares.

考题 You are evaluating the implementation of two Hyper-V hosts for the Web servers. You need to design a solution that will move the Web servers automatically between the Hyper-V hosts based on the physical resources available. Which software should you include in the design?()A、Microsoft System Center Operations ManagerB、Microsoft System Center Virtual Machine ManagerC、Microsoft System Center Data Protection ManagerD、Microsoft System Center Configuration Manager

考题 You have a computer that runs Windows 7. You need to configure system image backups to meet thefollowing requirements: Automatically create a system image every day without user  intervention Retain multiple copies of the system image. Which type of backup destination should you use?( )A、external hard disk driveB、network locationC、USB flash driveD、writeable DVD

考题 You have a computer that runs Windows 7. Windows Backup is configured to store backups on an externaldrive. You create a new NTFS volume on the computer. You need to configure Windows Backup to includethe files on the new volume as part of regularly scheduled backups.  What should you do?()A、From Backup and Restore, select Change settings.B、From Backup and Restore, select Create a system image.C、From the System Protection tab, create a restore point.D、From the System Protection tab, enable system protection for the new volume.

考题 You need to identify a type that meets the following criteria:          Is always a number.          Is not greater than 65,535.  Which type should you choose?()A、System.UInt16B、intC、System.StringD、System.IntPtr

考题 You have a computer that runs Windows 7. You perform regular data backups and system image backups.The computer experiences a hard disk failure. You replace the failed hard disk. You need to recover thecomputer to the previous Windows 7 environment. You start the computer from the Windows 7 installationmedia. Which recover option should you select?()A、Command PromptB、Startup RepairC、System Image RecoveryD、System Restore

考题 You work as the exchange administrator at TestKing.com. The TestKing.com network contains anExchange Server 2010 Organization. The Active Directory Rights Management Services (AD RMS) isinstalled within the organization. You receive an instruction from the CIO to recommend a messaging security solution that will make surethat a disclaimer is applied to all e-mail messages and that all e-mail messages from the Financedepartment is unable to be printed. What should you do?()A、You should recommend that Secure/Multipurpose Internet Mail Extensions (S/MIME) be included in the system.B、You should recommend that Transport Protection Rules be included in the system.C、You should recommend that Retention policies be included in the system.D、You should recommend that Journal Report Decryption be included in the system.

考题 You need to ensure that you can recover system configuration and data if your computer hard disk fails.  What should you do? ()A、Create a system restore point.B、Create a backup of all file categories.C、Create a Complete PC Backup and Restore image.D、Perform an Automated System Recovery (ASR) backup.

考题 单选题You have a computer that runs Windows 7. You add a new hard disk drive to the computer and create anew NTFS partition. You need to ensure that you can use the Previous Versions feature on the new drive. What should you do?()A From Disk Management, convert the new disk to a dynamic disk.B From System Properties, configure the System Protection settings.C From System and Security, enable BitLocker Drive Encryption (BitLocker).D From the properties of the new drive, create a share and modify the caching settings.

考题 单选题You have a computer that runs Windows 7. The computer has System Protection enabled. You need toretain only the last System Protection snapshot of the computer. All other snapshots must be deleted.  Whatshould you do?()A Run Disk Cleanup for Programs and Features.B Run Disk Cleanup for System Restore and Shadow Copies.C From the System Protection Restore settings, select Turn off System Restore.D From the System Protection Restore settings, select Only restore previous versions of files.

考题 单选题You are the network administrator for You currently automate backups of the System State data on the servers in your network by using NTBackup. Your manager instructs you to document the procedure for restoring a server from a backup of the System State data. You need to select the correct method for performing a restoration of a backup of the System State data. What should you do?()A Run the following command: ntbackup.exe backup /F {FileName}B Run the following command: ntbackup.exe backup systemstate /F {FileName}C In Control Panel, open System, and configure the Startup and Recovery settings on the Advanced tab.D Use NTBackup interactively.

考题 单选题You are the administrator of your Windows 2000 Professional computer. You share severalfolders on your computer, which are accessible to all the users on your company’s network. You want to ensure that you have correctly assigned the appropriate permissions to all the shares.Where can you view all the shares in use on your computer, so as to verify the permissions as quickly as possible? ()A Control Panel  Data Sources (ODBC).B Control Panel  System Tools  Shared Folders.C Computer Management  System Tools  System Information.D Computer Management  System Tools  Shared Folders  Open Files.E Computer Management  System Tools  Shared Folders  Sessions.F Computer Management  System Tools  Shared Folders  Shares.

考题 单选题You are the administrator of your company's network. You are preparing to deploy 20 new Windows 2000 Professional computers on your network. You want to be able to recover from disk failures and corrupt system files on the new computers. You want to configure the computers to automatically update their system configuration and emergency repair files on a scheduled bases.   What should you do?()A Use the at command to schedule a weekly job to back up the boot partition.B Use the at command to schedule a weekly job to run the system file checker.C Use Windows backup to schedule a backup of the System State Data.D Use Windows backup to schedule a backup of the system partition and the boot partition.

考题 单选题You need to increase the size of a paging file. What should you do? ()A From Disk Management, shrink the boot partition.B From Disk Management, shrink the system partition.C From System, modify the Advanced system settings.D From System, modify the System protection settings.

考题 单选题You are a network administrator for The network contains a Windows Server 2003 computer named Testking1. You need to install an application on Testking1. The installation will cause several changes to the registry. You plan to use the Backup utility to create a backup that will enable you to restore the registry. TestKing requirements for network management state that all backups must be performed during an eight-hour period at night. Because of this time constraint, you need to ensure that the backup can be recovered as quickly as possible. You need to create a backup that meets the requirements. What should you do?()A Create a backup of the system partition.B Create a backup of the boot partition.C Create a backup of the System State.D Create an Automated System Recovery (ASR) backup.E Create a backup of the Systemroot/System32/Config folder.

考题 多选题You are asked to free up disk space so you can update your version of the Junos OS.Which two commands display the files that will be removed?()Auser@router request system storage cleanupBuser@router show system storageCuser@router request system storage cleanup dry-runDuser@router show system storage detail

考题 多选题You are evaluating the implementation of two Hyper-V hosts for the application servers. You need to design a solution that will move the application servers automatically between the Hyper-V hosts based on the physical resources available. The solution must minimize the number of Microsoft System Center products deployed to the network. Which software should you include in the design?()AMicrosoft System Center Operations ManagerBMicrosoft System Center Virtual Machine ManagerCMicrosoft System Center Data Protection ManagerDMicrosoft System Center Configuration Manager

考题 单选题You have a computer that runs Windows 7. You install a second internal hard disk drive in the computer.You attempt to create a system image and discover that the new disk is not listed as a backup destination.You need to ensure that you can use the new disk as a backup destination for system images.  What should you do?()A Create a NTFS partition.B Create a mirrored volume.C Create a system repair disc.D Log on to the computer by using a different account.

考题 单选题How can you verify that you have correctly configured SSH access to your Junos device?()A user@router# show system servicesB user@router show configuration servicesC user@router# show configuration system servicesD user@router# show system login

考题 多选题Which two commands allow you to return to a previous version of software on the device?()Arequest system software addBrequest system software downgradeCrequest system software replaceDrequest system software rollback

考题 单选题From the V$SESSION_LONGOPS view, you find that some of the database users have long-running queries and are consuming a lot of CPU time. This causes problems for you when you try to log on as the system user and perform small maintenance tasks. You would like to ensure that users SYS and SYSTEM get priority over all other users.   Which method would you use to achieve this objective?()A create a plan directive in the SYS_GROUPB create the pending area for the consumer groupC activate the provided SYSTEM_PLAN in Resource ManagerD set the TIMED_STATISTICS parameter to TRUE in the parameter fileE set the execution time limit for all users, except SYS and SYSTEM, in their profiles