站内搜索
微软认证考试 问题列表
问题 你是 TestKing.com 的一位安全管理人。网络由一个独立的名叫 testking.com的活动目录域组成。所有的服务器运行Windows Server 2003 ,而所有的客户计算机运行Windows XP Professional。你正计划一个安全补丁管理的基础构造(infrastructure)。你在一台名为TestKing2的服务器上安装Software Update Services (SUS)。你设置客户计算机来使用TestKing2。所有的客户计算机运行有TestKing.com发展的自定义(custom)应用程序。你需要为TestKing.com发展的应用程序配置自定义安全补丁。你应该怎么做?()A、当客户计算机启动时,设置一个GPO来安装自定义安全补丁B、数位地签署自定义安全补丁,然后复制文件到TestKing2上的Content文件夹C、更新带有关于自定义安全补丁信息的Mssecure.xml文件,然后运行带有以更新的MSsecure.xml文件的Microsoft Baseline Security Analyzer (MBSA)D、复制自定义安全补丁到TestKing2上的Content文件夹。运行Mbsacli.exe,然后设置Mbsacli.exe使用TestKing2E、复制TestKing2上的Content文件夹到一个新的Web服务器。添加自定义安全补丁到这个文件夹。在客户计算机上设置Automatic Updates使用新的Web服务器

问题 You are developing a Windows Communication Foundation (WCF) service that allows customers to update financial data. The service contract is defined as follows. (Line numbers are included for reference only) 01 [ServiceContract] 02 public interface IDataUpdate 03 { 04 [OperationContract] 05 [TransactionFlow(TransactionFlowOption.Mandatory)] 06 void Update(string accountNumber, double amount); 07 } 08 09 class UpdateService : IDataUpdate 10 { 11 [OperationBehavior(TransactionScopeRequired = true, TransactionAutoComplete = false)] 12 public void Update(string accountNumber, double amount) 13 { 14 ... 15 } 16 } 17 You need to ensure that the service is invoked within the transaction. What should you do?()A、Replace line 01 with the following code [ServiceContract(SessionMode = SessionMode.NotAllowed)]B、Replace line 01 with the following code [ServiceContract(SessionMode = SessionMode.Required)]C、Call the Invoke method of the form and supply a delegate.D、Call the BeginInvoke method of the form and supply a delegate.

问题 You are the network administrator for You administer a Windows Server 2003 computer named TestKing3. A user needs to share documents that are stored in a folder on TestKing3 with other users in his department. When she attempt to share the folder, she discovers that the Sharing tab is missing. You need to ensure that the user can share the documents on TestKing3. You need to ensure that you grant the user the minimum amount of permissions required. What should you do?()A、Instruct the user to move the documents to the Shared Folders folder.B、Add the user's user account to the local Power Users group.C、Add the user's user account to the Network Configuration Operators group.D、Add the user's user account to the local Adminstrators group.

问题 Your SQL Server 2005 database contains a table that has 500 million rows of data. Some of the data is historical and some is current. You need to partition the data on a single server to increase performance and optimize maintenance. What should you do?()A、Implement horizontal partitioning.B、Implement vertical partitioning.C、Implement a raw partition.D、Implement distributed partitioning.

问题 正在基于一个为客户提供银行信息的SQL SERVER 2005数据库进行着工作。你想让客户看到银行报表。已知,这个报表的数据是由数据库中提取的数据和从一个第三方的Web Service获得的实时投资数据组合而成。要求,当报表执行的时候获得的投资信息必须是当前的,为此,你需要在数据库中创建合适的对象去支持这个报表,你应该怎么做?()A、使用FOR XML AUTO 子句发布数据库数据为XML Web serviceB、为每个客户创建一个存储银行信息的表。然后为表创建一个Inserted触发器,在触发器被激活时通过Web Service获得相应数据一并插入表中C、创建一个SQL存储过程,它用临时表存储每个客户的银行信息。然后用Web Service的值更新这个表的值D、让开发人员创建一个调用Web Service的类库。然后用这个类库创建一个CLR函数。调用CLR函数并和数据库中的银行信息进行合并后得出结果

问题 You are the administrator of 15 Windows XP Professional portable computers in the sales department of your ompany. The company network uses DHCP to configure the IP addresses of the portable computers when the computers are used in the office. Company policy allows the company portable computers to be connected to users' home networks. The sales department reports that users who use home networks that have manually configured IP addresses are unable to connect the portable computers to their home networks. You want to ensure that users can connect portable computers to their home networks when they are at home and to the company network when they are in the office. You do not want to change the configuration of home computers on users' home networks. You do not want to change the administrative privileges of the sales department users. What should you do?()A、Configure the network adapters of the portable computers to enable Internet Connection Sharing (ICS). B、Configure the network adapters of the portable computers to enable Automatic Private IP Addressing (APIPA).C、Add a script to the users' desktops that changes the IP configuration between dynamic and manual.D、Configure the IP properties of the portable computers so that they have an alternate configuration. 

问题 Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. Remote client computers are not members of the domain. Your environment includes a Remote Desktop Gateway (RD Gateway) server. You install an application on a Remote Desktop Session Host (RD Session Host) server. You need to ensure that remote users can run the application. What should you do?()A、On each remote client computer, configure the Remote Desktop Connection client to connect to the RD Gateway server.B、On each remote client computer, configure the Remote Desktop Connection client to connect without warning if server authe ntication fails.C、On the RD Session Host server, configure the Remote Desktop Connection client to connect to the RD Gateway server.D、On the RD Gateway server, add the Guests local group to the Remote Desktop Users local group.

问题 你是 TestKing.com 的一位安全管理人。网络由一个独立的名叫 testking.com活动目录域组成。所有的服务器运行Windows Server  2003。一个名为TestKing3的服务器不是这个域的成员。其他的所有服务器都是这个域的成员。TestKing.com的书面安全策略要求:所有的服务器必须有确定的安全设置,包括详细的事件日志设置和注册许可设置。被要求的安全设置在一个名为TestKing.inf的安全模板中被详细说明。你需要应用来自TestKing.inf安全模板的设置到TEstKing3。你应该怎么做?()A、在TEstKing3上,从Administrative Tools菜单中打开Local Security Policy,然后使用Import Policy指令来输入TestKing.infB、在TEstKing3上,打开Local Security Policy,然后选择Security Settings。使用Import Policy指令来输入TestKing.infC、在TEstKing3上,打开Security Configuration and Analysis。使用Import Template指令来输入TestKing.inf,然后运行Configure Computer Now指令D、在TEstKing3上,复制TestKing.inf到Systemroot/Security/Templates文件夹E、在TEstKing3上,复制TestKing.inf到Systemroot/System32/组Policy/Machine 文件夹

问题 You are using the ASP.NET membership APIs to manage user accounts for a Web site. The Web.config file contains the definition for the membership provider. After modifying the Web.config file to enable password recovery, you create a PasswordReset.aspx file.? You need to enable users to reset their passwords online. The new passwords must be sent to them by e-mail after they have logged on through the Login.aspx page. In addition, users must be required to answer their secret questions before resetting their passwords. Which code logic should you use?()A、Add a PasswordRecovery element to the PasswordReset.aspx file and configure it.B、Modify the Page_Load to set the Membership.EnablePasswordReset to True in the PasswordReset.aspx file.C、Add a ChangePassword element to the PasswordReset.aspx file and configure it.D、Modify the Login.aspx form to include a Required Field validator on the secret question answer text box. Then redirect users to the PasswordReset.aspx file.

问题 Your network contains an Active Directory forest.All domain controllers run Windows Server 2008. You need to ensure that you can install an Exchange Server 2010 server in the Active Directory forest. What should you do?()A、From the Exchange Server 2010 installation media, run setup /ps.B、From the Exchange Server 2010 installation media, run setup /NewProvisionedServer.C、From the Windows Server 2008 installation media, run adprep.exe /forestprep.D、From the Windows Server 2008 installation media, run adprep.exe /domainprep.

问题 You have a server that runs Windows Server 2003 Service Pack 2 (SP2) and is configured as a domain controller. You run Windows Update and install a number of device drivers. You restart the server. During the startup process, the server stops. You receive the following stop error message: “0x000000D1 (0x0000000c, 0x00000002, 0x00000000, 0xf27b4e8e) IRQL_NOT_LESS_OR_EQUAL.” You need to identify which device or service is causing the error. What should you do? ()A、Restart the server by using the Safe Mode option. Review the contents of the ntbtlog.txt file.B、Restart the server by using the Last Known Good Configuration option. Review the spupdsvc.log file.C、Restart the server by using the Directory Services Restore Mode option. Review the contents of the ntdtcsetup.log file.D、Restart the server by using the Safe Mode with Networking option. Review the contents of the WindowsUpdate.log file.

问题 You have an Exchange Server 2010 organization named contoso.com.You have a Client Access server named cas1.contoso.com that is accessible on the Internet.You access cas1.contoso.com on the Internet by using the following domain names:  (1)mail.contoso.com  (2)autodiscover.contoso.com  You need to ensure that mobile devices can use Auto discover on the Internet.What should you do?()A、Set the external URL for Microsoft-Server-ActiveSync to $NULL.B、Set the external URL for Microsoft-Server-ActiveSync to https:// cas1.contoso.com/Microsoft Server ActiveSync .C、Set the external URL for Microsoft-Server-ActiveSync to https://mail.contoso.com /Microsoft- Server- ActiveSync.D、Set the external URL for Microsoft-Server-ActiveSync to http://autodiscover.contoso.com /Microsoft- Server- ActiveSync.

问题 您在计算机系统上执行 Windows Defender 扫描,扫描结果发现其中一个应用程序具有潜在不必要的行为。但您仍然需要使用该应用程序,而且也要让 Windows Defender 停止发出有关此应用程序的警讯。 这时应该使用 Windows Defender 的哪一个选项?()A、 略过B、 移除C、 隔离D、 自动允许

问题 Your company has a Microsoft Hyper-V Server 2008 R2 environment. You manage the environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You attempt to migrate child partitions through a firewall by using network migration. The migration fails. You need to ensure that you can successfully complete the migration. Which firewall port should you open?()A、80B、135C、445D、8554

问题 You use Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 to manage virtual machines (VMs). You need to deploy a cloned VM and automatically assign it a different name.  Where should you deploy the cloned VM?()A、to the same host as the source VMB、to a different host from the source VMC、to the same library as the source VMD、to a different library from the source VM