问题:Your network consists of a single Active Directory domain. You have a member server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).You need to record all attempts by domain users and local users to log on to Server1. What should you do?()A、In the Default Domain Controller Policy, enable success and failure for the Audit logon events policy setting.B、In the Default Domain Controller Policy, enable success and failure for the Audit account logon events policy setting.C、In the Local Security Policy on Server1, enable success and failure for the Audit logon events policy.D、In the Local Security Policy on Server1, enable success and failure for the Audit account logon events policy setting.
查看答案
问题:Network access protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The command policy required confidentiality of data when is in transmit between the portable computers and the servers. You need to ensure that users can access network resources only from computers that comply with the company policy. What should you do?()A、Create an Ipsec enforcement network policy.B、Create an 802.1xenforcemen tnetwork policy.C、Createa wired network(IEEE802.3)Group policy.D、Create an extensible authentication protocol(EAP)enforcement network policy.
问题:You have a computer that runs Windows 7. You need to configure the monitor on the computer to turn off after 30 minutes of inactivity. What should you do? ()A、From Personalization,change the theme.B、From Display,change the display settings.C、From Action Center,change the Action Center settings.D、From Power Options,change the current power plan settings.
问题: You need to provide an administrator the ability to view and interact with your current logon session. What should you do?()A、At the command prompt, run Psr.exe.B、At the command prompt, run Winrm.exe quickconfig.C、From the Start menu, open Remote Desktop Connection.D、From the Start menu, open Windows Remote Assistance.
问题:You are designing a DHCP solution to meet the business and technical requirements. What should you do?()A、Increase the default lease time on all DHCP servers.B、Split all address ranges across multiple DHCP servers.C、Configure duplicate scopes on at least two DHCP servers. D、Force client computers to obtain an IP address from Automatic Private IP Addressing (APIPA).
问题: You have a computer that runs Windows 7. Windows Backup is configured to store backups on an externaldrive. You create a new NTFS volume on the computer. You need to configure Windows Backup to includethe files on the new volume as part of regularly scheduled backups. What should you do?()A、From Backup and Restore, select Change settings.B、From Backup and Restore, select Create a system image.C、From the System Protection tab, create a restore point.D、From the System Protection tab, enable system protection for the new volume.
问题:Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). You have two servers named Server1 and Server2. Both servers have Windows Server Update Services (WSUS) 3.0 installed. You need to configure WSUS so that Server2 uses Server1 as the upstream server. What should you do on Server2?()A、From the command prompt, run wuauclt.exe.B、From the command prompt, run wsusutil.exe.C、From the Update Services console, run the WSUS Server Configuration Wizard.D、From the Local Computer Policy, specify the location on the intranet for the Microsoft update service.
问题: You are a network administrator for All servers run Windows Server 2003. A network server named Testking1 functions as the main file server. Testking1 is backed up each night by using the Backup utility. You perform a test restoration of Testking1 by using the Backup utility. You discover that files that are open during the backup process are not being backed up. You need to ensure that open files are backed up successfully. What should you do?()A、Enable volume shadow copies on the partitions that are being backed up.B、Disable volume shadow copies on the partitions that are being backed up.C、Select the Verify data after backup check box in the Advanced backup options of the backup job.D、Clear the Disable volume shadow copy check box in the Advanced backup options of the backup job.
问题: You need to deploy a WSUS server in the branch office that meets the company’s technical requirements. What should you deploy?()A、an autonomous WSUS server that is configured to download updates from Microsoft UpdateB、an autonomous WSUS server that is configured to download updates from the WSUS server in the main officeC、a WSUS server running in replica mode that is configured to download updates from Microsoft UpdateD、a WSUS server running in replica mode that is configured to download updates from the WSUS server in the main office
问题: You manage 20 servers that run Windows Server 2008. The Terminal Services role and the Microsoft Windows System Resource Manager (WSRM) feature are installed on all the servers. You create and configure a resource-allocation policy that has the required custom settings on a server named TS01. You need to configure the WSRM settings on all the servers to match the WSRM settings on TS01. What should you do?()A、Use the Windows Backup tool to back up only the System State data on TS01. Use the Windows Backup tool to restore the System State data on each server.B、Use the WSRM console on each server to enable the Accounting function. Configure the Remote WSRM accounting option to TS01 on each server.C、Use the WSRM console on TS01 to export the WSRM information to a shared folder. Use the WSRM console to import the WSRM information from the shared folder.D、Use the regedit tool to export the HKLM/SYSTEM/CurrentControlSet/Services/WSRM registry key on TS01 to a shared folder. On each server, delete this registry key and use the regedit tool to import the registry key from the shared folder.
问题: You need to deploy a read-only domain controller (RODC) that runs Windows Server 2008 R2. What is the minimal forest functional level that you should use()A、Windows Server 2008 R2B、Windows Server 2008C、Windows Server 2003D、Windows 2000
问题:You want to consolidate some of the databases onto existing SQL Server computers until additional hardware can be purchased.You need to identify which of the servers, in its current configuration, can support additional databases. You need to ensure that your solution fulfills the company’s securiy requirements while allowing for future database growth requirements. Which server and database combination can be used?()A、SQL3 with the OnlineReadOnly and HR databasesB、SQL4 with the TravelOnline and Storefront databasesC、SQL2 with the Storefront and TravelOnline databasesD、SQL2 with the Storefront and HR databases
问题:你正在开发一个 Web 控件。这个 Web 控件在 Web 应用中用来获取用户地址信息。你创建了一个从 CompositeControl 继承的、名为 AddressControl 的类。这个控件由多个子控件组成。你需要确保所有子控件都能正确的输出到浏览器。而且,使用你控件的开发人员必须能够为标签提示设置适当的文本。另外,在整个 postback 的过程中,开发人员都能够从用户地址信息关联的文本框中读取信息。你应该如何做?()A、重载(Override)基类的方法EnsureChildControls。增加子控件到base container。B、重载(Override)基类的方法CreateControlCollection。增加子控件到 ControlCollection 类。C、重载(Override)基类的方法CreateChildControls。增加子控件到base container。D、重载(Override)基类的方法DataBindChildren。增加子控件到 ControlCollection 类。
问题: Your company named Contoso, Ltd. has a Web server named WEB1. The Web server runs Windows Server 2008. The fully qualified domain name of WEB1 is web1.contoso.com. The public DNS server has an alias record named owa.contoso.com that maps to web1.contoso.com. Users access WEB1 from the Internet by using http://owa.contoso.com. The new company security policy states that the owa.contoso.com site must be available for Internet users only through secure HTTP (HTTPS) protocol. The security policy also states that users must not get security warnings when they connect to the site. You need to request a certificate from a public certification authority (CA). Which Common Name should you use?()A、Contoso, Ltd.B、owa.contoso.comC、WEB1D、web1.contoso.com
问题: You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005.You work as a database administrator for your company. Your job is to manage a SQL Server 2005 database, and there are several indexes in the SQL Server 2005. A stored procedure should be written, and the procedure should be utilized to check the indexes for fragmentation. From the following four Transact-SQL statements, which one should be utilized achieve the goal?()A、To achieve the goal, DBCC DBREINDEX should be utilized.B、To achieve the goal, SELECT * FROM sys.indexes should be utilized.C、To achieve the goal, SELECT * FROM sys.dm_db_index_physical_stats should be utilized.D、To achieve the goal, DBCC INDEXDEFRAG should be utilized.
问题: You need to configure Microsoft Windows Fax and Scan to send and receive faxes. What should you do? ()A、Create a new fax account.B、Configure the fax settings to require manual receipt of faxes.C、Configure the fax security settings to permit Send and Receive.D、Configure the Transmitting Subscriber ID (TSID) of the fax with the correct phone number.
问题: You have an Exchange Server 2010 organization. You have a global security group named Legal that contains all the members of your companys legaldepartment. The companys security policy states that the Legal group must be able to search all mailboxes for e-mailmessages that contain specific keywords. You need to recommend a solution for the organization that complies with the security policy. What should you include in the solution?()A、a Discovery Management role groupB、a legal holdC、administrator audit loggingD、Mailbox journaling
问题: Your company has an Active Directory Domain Services (AD DS) domain. All server s run Windows Server 2008 R2. All client computers run Windows 7. You use Microsoft Enterprise Desktop Virtualization (MED - V) to support client virtualization requirements. You need to ensure that all MED - V virtual machine (VM) images can be centrally stor ed and are available to all client computers. What should you do?()A、Install and configure IIS on a member server.B、Configure a shared folder on a member server.C、Create a single workspace for all client computers.D、Install and configure Microsoft SQL Se rver 2008 on a member server.
问题:您的网络包含一个IPv4子网。该子网包含 20 台运行Windows 7 的计算机。您将一台名为 Computer1 的新计算机添加到该子网中。您发现 Computer1 有一个169.254.34.12 的 IP 地址。您无法连接到网络上的其他计算机。网络上的其他计算机可以互相连接。您需要确保可以连接到网络上的所有计算机。您应该怎么做?()A、关闭“Windows 防火墙”B、运行Ipconfig.exe /renewC、配置一个静态TCP/IP地址D、运行Netsh.exe interface ipv4 install
问题:您安装了一台运行 Windows Server 2008 的新服务器,名为 MediaSrv2。该服务器上安装了流媒体服务角色。所有客户端计算机都运行 Windows Vista,并使用 Windows Media Player 11 应用程序。您配置了一个发布点,并分配了含有视频媒体的内容源。用户无法暂停和倒回媒体播放器。您需要确保用户能够控制流媒体的播放。该怎么做?()A、将发布点重新配置为点播发布点B、将 MediaSrv2 配置为只使用实时流协议 (RTSP)C、将 MediaSrv2 配置为只使用超文本传输协议 (HTTP)D、在发布点上启用发布点 ACL 授权