网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You need to design the deployment of antivirus software. What should you do?()
A

Install the antivirus software on each mailbox storage server

B

Install the antivirus software on each Outlook Web Access server

C

Install the antivirus software on one Outlook Web Access server at each office

D

Install the antivirus software on a back-end server that contains no mailboxes


参考答案

参考解析
解析: 暂无解析
更多 “单选题You need to design the deployment of antivirus software. What should you do?()A Install the antivirus software on each mailbox storage serverB Install the antivirus software on each Outlook Web Access serverC Install the antivirus software on one Outlook Web Access server at each officeD Install the antivirus software on a back-end server that contains no mailboxes” 相关考题
考题 Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows Vista computers.  You are planning to deploy Windows 7 and a custom application.   You have the following requirements:   The application must be available to only a specific group of users. You must be able to monitor application usage.   You need to design a deployment method for the custom application that meets the requirements.  Which deployment method should you use in your design?()A、software installation in Group PolicyB、startup scripts in Group PolicyC、Microsoft Application Virtualization (App-V)D、baseline Windows 7 image that includes the custom application

考题 You are deploying an ASP.NET Web application to a remote server. You need to choose a deployment method that will ensure that all IIS settings, in addition to the Web content, will deploy to the remote server. Which deployment method should you choose?()A、the XCOPY command-line toolB、the Copy Web Site toolC、the Web Deployment toolD、the Publish Web Site utility

考题 As part of your design, you are evaluating whether a second-level organizational unit (OU) structure is required.  Which factor necessitates the need for a second-level OU structure?()A、 Audit policy settingsB、 Software deployment needsC、 Client operating systems in useD、 Delegation of administrative authority

考题 You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. TestKing.com is configured to run an exchange 2010 environment.  You are planning to design the installation of numerous Mailbox servers. TestKing.com Service LevelAgreement (SLA) requires the following: * The servers need to support 1,500 concurrent connections to mailboxes.* The servers need to maintain a latency of less than 20 milliseconds. You ensure deployment success you need to ensure that your design comply with the Service LevelAgreement (SLA) of TestKing.com. What should you do?()A、The best option is to use the Exchange Server User Monitor (ExMon) tool to check if your design meets the requirements.B、The best option is to use the Exchange Server Load Generator (LoadGen) 2010 tool to check if your design meets the requirements.C、The best option is to use the Exchange Server Connectivity Analyzer (ExRCA) tool to check if your design meets the requirements.D、The best option is to use the Exchange Server Jetstress 2010 tool to check if you design meets there quirements.

考题 You have an Exchange Server 2010 organization. You design a deployment of multiple Mailbox servers.  Your companys Service Level Agreement (SLA) states that servers must support 1,000 concurrent connections to mailboxes while maintaining an RPC latency of less than 20 milliseconds.  You need to verify that your design meets the requirements of the SLA before you deploy servers in the production environment.  Which tool should you use?()A、Exchange Server Jetstress 2010B、Exchange Server User Monitor (ExMon)C、Exchange Server Load Generator (LoadGen) 2010D、Exchange Server Remote Connectivity Analyzer (ExRCA)

考题 You are designing a Windows 7 deployment image.   You receive a baseline image over the network, from a different geographic location.   You need to verify that the baseline image is valid.   Which tool should you use?()A、ImageXB、Windows Compatibility EvaluatorC、Windows System Image Manager (Windows SIM)D、the Deployment Image Servicing and Management (DISM) tool

考题 Your company has a single Active Directory Domain Services (AD DS) domain with Windows Server 2008 R2 member servers and 1,000 Windows 7 client computers. You are designing the deployment of a custom application.   You have the following requirements:   The application must be available to only users who need it. Minimize network traffic during deployment.   You need to design a deployment strategy that meets the requirements.   Which deployment method should you use?()A、RemoteApp and Desktop ConnectionsB、software installation in Group PolicyC、Microsoft Application Virtualization (App-V)D、Microsoft System Center Configuration Manager 2007

考题 As part of your design, you are evaluating whether a second-level organizational unit (OU) structure is required. Which factor necessitates the need for a second-level OU structure?()A、Audit policy settingsB、Software deployment needs  C、Client operating systems in useD、Delegation of administrative authority

考题 An administrator named Admin1 plans to implement the planned App-V deployment. You need to recommend which protocol to use for the App-V deployment. Which protocol should you recommend?()A、SMBB、HTTPSC、CIFSD、RTSPS

考题 You are planning a Windows 7 deployment infrastructure. You have the following requirements:   Enable network deployments of WIM images or VHDs.   Support multicast with the use of multiple stream transfer functionality. Allow drivers to be stored centrally,and use dynamic driver provisioning.    You need to design an infrastructure that meets the requirements.   Which deployment method should you recommend?()A、Microsoft Deployment Toolkit (MDT) 2008B、Microsoft Deployment Toolkit (MDT) 2010C、Deployment Image Servicing and Management (DISM)D、Windows Deployment Services in Windows Server 2008 R2

考题 单选题You have a server that runs Windows Server 2008 You need to configure the server as a VPN server. What should you install on the server()A Windows Deployment Services role and Deployment Server role serviceB Windows Deployment Services role and Deployment transport role serviceC Network Policy and Access services role and routing and remote access services role serviceD Network Policy and access services and host credential authorization protocol role service

考题 单选题You have a server that runs Windows Server 2008. You need to configure the server as a VPN server. What should you installed on the server()?A Windows Deployment Serivces role and Deployment Server role serviceB Windows Deployment Services role and Deployment Transport Role ServiceC Network Policy and Access Services role and Routing and Remote Access Services role service.D Network Policy and Access Services role and Routing and Host Credential Authorization Protocolr ole service.

考题 单选题You are deploying an ASP.NET Web application to a remote server. You need to choose a deployment method that will ensure that all IIS settings, in addition to the Web content, will deploy to the remote server. Which deployment method should you choose?()A the XCOPY command-line toolB the Copy Web Site toolC the Web Deployment toolD the Publish Web Site utility

考题 单选题You are planning to upgrade Internet Explorer.   You have the following requirements:   Create a report that identifies which computers are successfully upgraded. Do not install additional software on the client computers.   You need to design a deployment method that meets the requirements.   What should you do?()A Use Internet Explorer Administration Kit (IEAK) and Group Policy.B Use Microsoft System Center Configuration Manager.C Use Windows Server Update Services (WSUS).D Use Microsoft System Center Essentials.

考题 单选题All client computers in your network run Windows XP. Some of the computers are part of a secure network. Some of the computers connect to the network by using virtual private networking (VPN). You are planning to deploy Windows 7.   You have the following requirements:   Use a dedicated server for deployment.  Use a single operating system image for deployment.   Ensure that you can use removable media to deploy the image.   Ensure that you can select which applications are installed onto a client computer at the time of deployment.   You need to design a deployment strategy that meets the requirements.   What should you do?()A  Using a Windows PE boot media, use ImageX to apply the image from a network share to the client computers.B  Use System Center Configuration Manager 2007 R2 to perform a zero-touch installation.C  Use the Microsoft Deployment Toolkit to perform a lite-touch installation.D  Use Windows Deployment Services on a network server to deploy Windows 7 by using an install image.

考题 单选题Your company has 1,000 client computers. Each client computer has 1 GB of RAM. You are planning to deploy Windows 7 Enterprise.   You need to design a zero-touch deployment strategy to increase the number of client computers that can be imaged at one time.   What should you do?()A Increase the amount of RAM on the client computers.B Change from unicast to multicast deployment of images.C Change from multicast to unicast deployment of images.D Decrease the trivial file transfer protocol (TFTP) block size on the TFTP server.

考题 单选题You are designing a Windows 7 virtual desktop infrastructure.You have the following requirements:   Provide access to Remote Desktop Services RemoteApp sources from multiple remote desktop servers.  Support network load balancing.  Support reconnection to existing sessions on virtual desktops.    You need to specify a design that meets the requirements.   What should you include in your design?()A Remote Desktop GatewayB Remote Desktop Connection BrokerC Windows Deployment ServicesD Windows Virtual PC and Windows XP Mode

考题 单选题A technician finished installing antivirus software. Which of the following should the technician perform NEXT?()A Run a full scan on the local disk.B Remove infected files.C Update antivirus signatures.D Quarantine infected files

考题 单选题You are planning a Windows 7 deployment infrastructure for a new company.   You have the following requirements:   Three domains  10,000 client computers No user interaction   You need to recommend a deployment infrastructure.   What should you recommend?()A Deploy Microsoft Deployment Toolkit (MDT) 2010. Design a zero-touch installation.B Deploy Microsoft System Center Virtual Machine Manager. Design a lite-touch installation.C Deploy Microsoft System Center Operations Manager 2007 R2. Design a lite-touch installation. D Deploy Microsoft System Center Configuration Manager 2007 R2. Design a zero-touch installation.

考题 单选题Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers.  You are planning to deploy Windows 7 Enterprise to the client computers.    You need to design a zero-touch installation strategy.()A unattended installationB custom Windows 7 image on DVDC Windows Deployment Services (WDS)D Microsoft System Center Configuration Manager 2007 R2

考题 单选题Your company has an Active Directory Domain Services (AD DS) forest with a single domain.  A server has the Windows Deployment Services (WDS) role installed. You create a Windows 7 image.  You plan to use the Lite Touch Installation deployment method to deploy the Windows 7 image.    You need to design a deployment strategy that will install an image on unknown client computers only if administrative approval is granted.   What should you do?()A Create a multicast transmission for the Windows 7 image.B Create a unicast transmission for the Windows 7 image.C Use DHCP rogue detection on the WDS server.D Use an Auto-Add policy on the WDS server.

考题 单选题Your network has 1,000 client computers that run Windows XP. You are planning to deploy Windows 7.  You plan to use the Microsoft Deployment Toolkit Lite Touch Installation deployment method to deploy the Windows 7 image.   You have the following requirements:   Migrate 20 computers at a time.  Ensure that you conserve network bandwidth.   You need to design a deployment strategy that meets the requirements.   What should you do?()A Configure multicast transmission on the deployment point.B Configure unicast transmission on the deployment point.C Compress the contents of the distribution folder.D Distribute the image by using Background Intelligent Transfer Service (BITS).

考题 单选题As part of your design, you are evaluating whether a second-level organizational unit (OU) structure is required.  Which factor necessitates the need for a second-level OU structure?()A  Audit policy settingsB  Software deployment needsC  Client operating systems in useD  Delegation of administrative authority

考题 单选题You are planning a Windows 7 deployment infrastructure. You have the following requirements:   Enable network deployments of WIM images or VHDs.   Support multicast with the use of multiple stream transfer functionality. Allow drivers to be stored centrally,and use dynamic driver provisioning.    You need to design an infrastructure that meets the requirements.   Which deployment method should you recommend?()A Microsoft Deployment Toolkit (MDT) 2008B Microsoft Deployment Toolkit (MDT) 2010C Deployment Image Servicing and Management (DISM)D Windows Deployment Services in Windows Server 2008 R2

考题 单选题You need to recommend which protocol to use for the planned App-V deployment. Which protocol should you recommend?()A SMBB RTSPSC CIFSD HTTPS