网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You need to recommend a BitLocker recovery method that meets the company’s technical requirements.   Which recovery method should you recommend?()
A

a data recovery agent

B

a recovery key

C

a recovery password printed and stored in a secure location

D

a recovery password stored in Active Directory


参考答案

参考解析
解析: 暂无解析
更多 “单选题You need to recommend a BitLocker recovery method that meets the company’s technical requirements.   Which recovery method should you recommend?()A a data recovery agentB a recovery keyC a recovery password printed and stored in a secure locationD a recovery password stored in Active Directory” 相关考题
考题 You are the network administrator at TestKing. You need to perform password recovery on Router TK1. What must you modify in the password recovery process?() A. Configuration registerB. NVRAMC. Boot flashD. CMOSE. Flash

考题 You are the network administrator at TestKing. You need to perform password recovery on Router TK1. What must you modify in the password recovery process?()A、Configuration registerB、NVRAMC、Boot flashD、CMOSE、Flash

考题 You need to recommend a NAP enforcement method that meets the companyˉs security requirements. Which method should you recommend?()A、802.1XB、DHCPC、IPSecD、VPN

考题 In your production database, users report that they are unable to generate reports on an important table because it does not contain any data. While investigating the reason, you realize that another user executed the TRUNCATE TABLE command, which accidentally caused the data to be lost. Now you want to recover the lost data of the table without affecting objects in other schemas. Which method must you use to recover the lost data?()A、Complete Recovery with online redo logB、Complete Recovery with archived redo logC、Tablespace Point-in-Time Recovery (TSPITR)D、Incomplete Recovery with system change number (SCN)

考题 A data file become corrupted in your database due to bad sectors on the disk. Because of corruption, you lost all the important tables in that data file. Which method would you use for recovery?()A、 Flash back all the tables in the data file, one by one.B、 Restore the data file to a new location and perform a media recovery.C、 Flash back the database, there is no need to restore the data file.D、 Restore the data file from the most recent backup and flash the database.

考题 You are performing a block media recovery on the tools01.dbf data file in the SALES database using RMAN. Which two statements are correct in this scenario?()A、 You must ensure that the SALES database is mounted or open.B、 You must restore a backup control file to perform a block media recovery.C、 You must take the tools01.dbf data file offline before you start a block media recovery.D、 You must put the database in NOARCHIVELOG mode to perform a block media recovery.E、 You can perform only a complete media recovery of individual blocks, point-in-time recovery of individual data blocks is not supported.

考题 You have an enterprise subordinate certification authority (CA) configured for key archival. Three key  recovery agent certificates are issued.   The CA is configured to use two recovery agents.   You need to ensure that all of the recovery agent certificates can be used to recover all new private keys.   What should you do()A、Add a data recovery agent to the Default Domain Policy.B、Modify the value in the Number of recovery agents to use box.C、Revoke the current key recovery agent certificates and issue three new key recovery agent certificates.D、Assign the Issue and Manage Certificates permission to users who have the key recovery agent  certificates.

考题 You need to test your disaster recovery solution. Which role should you transfer to the disaster recovery location during the test?()A、RID masterB、Schema masterC、PDC emulator masterD、Domain naming master

考题 You need to recommend a BitLocker recovery method that meets the company’s technical requirements.   Which recovery method should you recommend?()A、a data recovery agentB、a recovery keyC、a recovery password printed and stored in a secure locationD、a recovery password stored in Active Directory

考题 You need to recommend a solution for starting the servers in the San Francisco office from Windows Recovery Environment (Windows RE). The solution must meet the company’s security requirements.   What should you include in the recommendation?()A、an iSCSI initiatorB、the Multipath I/O featureC、Wake On LAND、Windows Deployment Services (WDS)

考题 You need to design Group Policy object (GPO) settings to support the use of the Encrypting File System (EFS). Your solution must meet business and security requirements. Which two actions should you perform?()A、Designate a data recovery agent and issue an EFS certificate to the data recovery agent. Export the private key and restrict access to the exported keyB、Make the data recovery agent a local administrator on all client computersC、Remove the default data recovery agent from the Default Domain Policy GPO. Then, include the new data recovery agent insteadD、Delete the Default Domain Policy GPO. Configure a new GPO linked to the domain that does not specify a data recovery agent

考题 You need to recommend a file recovery solution that meets the company's technical requirements. What should you include in the recommendation?()A、Distributed File System (DFS) ReplicationB、File Server Resource Manager (FSRM) active file screensC、shadow copiesD、Windows Storage Server 2008

考题 You need to recommend changes to the file server on the main campus that meet the company’s technical requirements.   What should you include in the recommendation?()A、Encrypting File System (EFS)  B、NTFS permissions  C、Syskey  D、Windows BitLocker Drive Encryption (BitLocker)

考题 You need to recommend a data management solution that meets the company’s technical requirements.   What should you include in the recommendation?()A、DFS ManagementB、File Server Resource Manager (FSRM)C、Share and Storage ManagementD、Storage Explorer

考题 单选题A customer wants to configure two resource groups and create the following shared filesystem structure:Resource GroupFilsystem Mount Point Rg1/app1 Rg2/app1/data Which of the following will ensure the proper mount order for these filesystems?()A Set filesystem recovery method to parallelB Set filesystem recovery method to sequentialC Set filesystem recovery method to parallel and configure a parent/child relationship for the resourcegroupsD Set filesystem recovery method to sequential and configure a parent/child relationship for the resourcegroups

考题 单选题You need to recommend a NAP enforcement method that meets the companyˉs security requirements. Which method should you recommend?()A 802.1XB DHCPC IPSecD VPN

考题 单选题You need to test your disaster recovery solution. Which role should you transfer to the disaster recovery location during the test?()A RID masterB Schema masterC PDC emulator masterD Domain naming master

考题 单选题You need to recommend a data management solution that meets the company’s technical requirements.   What should you include in the recommendation?()A DFS ManagementB File Server Resource Manager (FSRM)C Share and Storage ManagementD Storage Explorer

考题 单选题You have an enterprise subordinate certification authority (CA) configured for key archival. Three  key recovery agent certificates are issued.  The CA is configured to use two recovery agents.     You need to ensure that all of the recovery agent certificates can be used to recover all new  private keys.     What should you do()A Add a data recovery agent to the Default Domain Policy.B Modify the value in the Number of recovery agents to use box.C Revoke the current key recovery agent certificates and issue three new key recovery agent certificates.D Assign the Issue and Manage Certificates permission to users who have the key recovery agent certificates.

考题 单选题You need to recommend a file recovery solution that meets the company's technical requirements. What should you include in the recommendation?()A Distributed File System (DFS) ReplicationB File Server Resource Manager (FSRM) active file screensC shadow copiesD Windows Storage Server 2008

考题 单选题In your production database, users report that they are unable to generate reports on an important table because it does not contain any data. While investigating the reason, you realize that another user executed the TRUNCATE TABLE command, which accidentally caused the data to be lost. Now you want to recover the lost data of the table without affecting objects in other schemas. Which method must you use to recover the lost data?()A Complete Recovery with online redo logB Complete Recovery with archived redo logC Tablespace Point-in-Time Recovery (TSPITR)D Incomplete Recovery with system change number (SCN)

考题 单选题You need to recommend a solution for starting the servers in the San Francisco office from Windows Recovery Environment (Windows RE). The solution must meet the company’s security requirements.   What should you include in the recommendation?()A an iSCSI initiatorB the Multipath I/O featureC Wake On LAND Windows Deployment Services (WDS)

考题 多选题You are the network administrator at TestKing. You need to perform password recovery on Router TK1. What must you modify in the password recovery process?()AConfiguration registerBNVRAMCBoot flashDCMOSEFlash

考题 单选题Because of a logical corruption in your production database, you wanted to perform Tablespace Point in Time Recovery (TSPITR). But before you start the recovery, you queried the TS_PITR_OBJECTS_TO_BE_DROPPED view and realized that there are a large number of objects that would be dropped when you start the recovery by using this method.You want to preserve these objects. Which option must you use to perform TSPITR and preserve the object?()A Perform Export before TSPITR and Import after TSPITRB Move objects to another schema that has the same tablespace assignedC Perform Incomplete Recovery before TSPITR with the Log Sequence Number (LSN)D Perform Incomplete Recovery before TSPITR with the System Change Number (SCN)

考题 单选题You need to test your disaster recovery solution.  Which role should you transfer to the disaster recovery location during the test?()A  RID masterB  Schema masterC  PDC emulator masterD  Domain naming master

考题 单选题In your production database, users report that they are unable to generate reports on an important table because it does not contain any data. While investigating the reason, you realize that another user executed the TRUNCATE TABLE command, which accidentally caused the data to be lost. Now you want to recover the lost data of the table without affecting objects in other schemas.  Which method must you use to recover the lost data?()A  Complete Recovery with online redo logB  Complete Recovery with archived redo logC  Tablespace Point-in-Time Recovery (TSPITR)D  Incomplete Recovery with system change number (SCN)

考题 单选题You need to recommend changes to the file server on the main campus that meet the company’s technical requirements.   What should you include in the recommendation?()A Encrypting File System (EFS)  B NTFS permissions  C Syskey  D Windows BitLocker Drive Encryption (BitLocker)