单选题You are designing a remote administration solution that meets business requirements. You need to specify client or server software that will be required. What should you do?()AEnsure that all client computers have a graphical Telnet client installedBEnsure that all client computers have the Remote Desktop Connection client software installedCEnsure that all server computers have RCONSOLE installed and that it is configured to start automaticallyDEnsure that all server computers have Remote Administration (HTML) installed

单选题
You are designing a remote administration solution that meets business requirements. You need to specify client or server software that will be required. What should you do?()
A

Ensure that all client computers have a graphical Telnet client installed

B

Ensure that all client computers have the Remote Desktop Connection client software installed

C

Ensure that all server computers have RCONSOLE installed and that it is configured to start automatically

D

Ensure that all server computers have Remote Administration (HTML) installed


参考解析

解析: 暂无解析

相关考题:

You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()A、IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsB、a list of the customer requirementsC、detailed security device specificationsD、results from pilot network testing

You have been recently hired as a database administrator. Your senior manager asks you to study the production database server and submit a report on the settings done by the previous DBA.  While observing the server settings, you find that the following parameter has been set in the parameter file of the database:  REMOTE_OS_AUTHENT = TRUE  What could have been the reason to set this parameter as TRUE?()A、to enable operating system authentication for a remote clientB、to restrict the scope of administration to identical operating systemsC、to allow the start up and shut down of the database from a remote clientD、to enable the administration of the operating system from a remote clientE、to disable the administration of the operating system from a remote client

You are designing the placement of the PDC emulator role to meet the business and technical requirements. In which location should you place the PDC emulator role?()A、Los AngelesB、ParisC、SydneyD、LisbonE、Barcelona

You are designing a remote administration solution that meets business requirements. You need to specify client or server software that will be required. What should you do?()A、Ensure that all client computers have a graphical Telnet client installedB、Ensure that all client computers have the Remote Desktop Connection client software installedC、Ensure that all server computers have RCONSOLE installed and that it is configured to start automaticallyD、Ensure that all server computers have Remote Administration (HTML) installed

Your company has 300 portable computers that run Microsoft Office Enterprise 2007. The company participates in the Microsoft Software Assurance program.  You are designing a solution that enables remote employees to use Office and to access their Home folders. You plan to implement a Remote Desktop Services (RDS) infrastructure, and you plan to deploy Office Enterprise 2007 as a virtual application on the RDS servers. You need to choose the appropriate licenses.  Which licensing solution should you choose?()A、1 Office Enterprise 2007 license and 300 App-V for Terminal Services licensesB、300 Office Enterprise 2007 licenses and 300 App-V for Terminal Services licensesC、300 Office Enterprise 2007 licenses and 300 Microsoft Desktop Optimization Pack (MDOP)licensesD、300 Windows Server 2008 R2 RDS client access licenses (CALs)

You deploy a Microsoft Exchange mobile messaging solution that uses Microsoft Windows Mobile 5.0 with Microsoft Messaging and Security Feature Pack.   The messaging infrastructure is configured to support the remote wipe feature.   When an administrator attempts to perform a remote wipe of a Windows Mobilebased device, the administrator receives a 401 error message.   You need to ensure that the administrator is authorized to perform remote wipes only.   What should you do?()A、Grant the administrator membership in the Domain Administrators group.B、Grant the administrator membership in the Exchange Administrators group.C、Add the new administrator account to the Discretionary Access Control List (DACL) of the Microsoft Exchange ActiveSync Administration folder.D、Select the Directory Security tab of the Exchange Server administration Web site, and then configure Read, Write, and Directory Browsing permissions.

You need to identify which tool the help desk users must use to perform administrative tasks.  Which tool should you identify?()A、RemoteAppB、Remote AssistanceC、Remote DesktopD、Remote Server Administration Tools (RSAT)

You are designing a remote access strategy to meet the business and technical Requirement.  What should you do?()A、 Configure each server running Routing and Remote Access as a RADIUS Client.B、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.C、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.D、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.

You are designing a remote access strategy to meet the business  technical requirements. Which authentication mechanism should you use?()A、MS-CHAP v2.B、Internet Authentication service (IAS).C、Multilink  Bandwidth Allocation Protocol (BAP).D、Remote access policies on all servers running Routing  Remote Access.

You need to recommend a solution for managing all of the servers. The solution must meet the  company’s technical requirements.What should you include in the recommendation?()A、Remote Server Administration Tools (RSAT)B、the Administration Tools Pack (adminpak.msi)C、the Remote Desktop Gateway (RD Gateway) role serviceD、the Remote Desktop Web Access (RD Web Access) role service

You need to design a remote administration solution for servers on the internal network. Your solution must meet business and security requirements. What should you do?()A、Permit administrators to use an HTTP interface to manage servers remotelyB、Permit only administrators to connect to the servers’ Telnet serviceC、Permit administrators to manage the servers by using Microsoft NetMeetingD、Require administrators to use Remote Desktop for Administration connections to manage the servers

You are designing the Active Directory infrastructure to meet the business and technical requirements. You run ADSizer, and find that it provides a solution that contains only one domain controller for Amsterdam.  What should you do?()A、 Place at least two domain controllers in Amsterdam.B、 Configure the domain controller as a bridgehead server.C、 Configure the domain controller as a global catalog server.D、 Distribute the users among sites in ADSizer and recalculate the number of domain controllers.

You are designing an access control strategy for WEB2. Your solution must meet business requirements. What should you do?()A、Install the Terminal Services Advanced Client Web client on WEB2B、Modify the Winreg registry key on WEB2C、Install the RPC over HTTP service on WEB2D、Modify the RestrictAnonymous registry key on WEB2

You are designing the security for dial-up remote access to meet the business and technical requirements.   Which two mechanisms should you use? ()A、 EAP-TLS authenticationB、 MS-CHAP v2 authenticationC、 a stand-alone certification serverD、 an enterprise certification serverE、 MPPE 56-bit encryption

You need to recommend a management solution for the corporate Web sites that meets the museum’s security policy    What should you include in the recommendation?()A、Internet Information Services (IIS) ManagerB、Remote Desktop Services (RDS)C、Remote Server Administration Tools (RSAT)D、Windows PowerShell 2.0

单选题You are designing a remote access strategy to meet the business and technical Requirement.  What should you do?()A Configure each server running Routing and Remote Access as a RADIUS Client.B Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.C Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.D Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.

单选题You are designing the placement of the PDC emulator role to meet the business and technical requirements. In which location should you place the PDC emulator role?()ALos AngelesBParisCSydneyDLisbonEBarcelona

单选题You have been recently hired as a database administrator. Your senior manager asks you to study the production database server and submit a report on the settings done by the previous DBA.  While observing the server settings, you find that the following parameter has been set in the parameter file of the database:  REMOTE_OS_AUTHENT = TRUE  What could have been the reason to set this parameter as TRUE?()Ato enable operating system authentication for a remote clientBto restrict the scope of administration to identical operating systemsCto allow the start up and shut down of the database from a remote clientDto enable the administration of the operating system from a remote clientEto disable the administration of the operating system from a remote client

单选题You are designing a remote access strategy to meet the business  technical requirements.  Which authentication mechanism should you use?()A MS-CHAP v2.B Internet Authentication service (IAS).C Multilink  Bandwidth Allocation Protocol (BAP).D Remote access policies on all servers running Routing  Remote Access.

单选题You are designing a forest structure to meet the business and technical requirements.  How many forests should you create?()A OneB TwoC ThreeD Four

单选题You are designing a forest structure to meet the business and technical requirements. How many forests should you create?()AOneBTwoCThreeDFour

单选题You are designing a DHCP solution to meet the business and technical requirements. What should you do?()AIncrease the default lease time on all DHCP servers.BSplit all address ranges across multiple DHCP servers.CConfigure duplicate scopes on at least two DHCP servers.  DForce client computers to obtain an IP address from Automatic Private IP Addressing (APIPA).

单选题You are the network administrator for All servers run Windows Server 2003. You manage a server named Testking2. IIS is installed on Testking2. Testking2 hosts TestKing's public Web site. You need to configure Testking2 to allow remote administration of all Web sites. In addition, you must be able to view the system and application event logs remotely. The remote administration must be done by using a Web browser. The procedure for remote administration must be encrypted. What should you do?()AEnable Remote Desktop.BInstall the Remote Administration (HTML) Windows component.CInstall the Remote Desktop Web Connection Windows component.DConfigure the startup type of the Telnet service to Automatic and start the Telnet service.

多选题You are designing the security for dial-up remote access to meet the business and technical requirements.   Which two mechanisms should you use? ()AEAP-TLS authenticationBMS-CHAP v2 authenticationCa stand-alone certification serverDan enterprise certification serverEMPPE 56-bit encryption

单选题You are designing a remote access strategy to meet the business  technical requirements. Which authentication mechanism should you use?()AMS-CHAP v2.BInternet Authentication service (IAS).CMultilink  Bandwidth Allocation Protocol (BAP).DRemote access policies on all servers running Routing  Remote Access.

单选题You are designing a DHCP solution to meet the business and technical requirements.  What should you do?()A Increase the default lease time on all DHCP servers.B Split all address ranges across multiple DHCP servers.C Configure duplicate scopes on at least two DHCP servers.D Force client computers to obtain an IP address from Automatic Private IP Addressing (APIPA).

多选题You need to connect to your computer by using the Remote Desktop Connection client.  Which two actions should you perform?()AEnable Remote Desktop in the System Properties dialog box.BEnable Remote Assistance in the System Properties dialog box.CEnable the Remote Desktop exception in Microsoft Windows Firewall.DEnable the Remote Assistance exception in Microsoft Windows Firewall.EEnable the Remote Administration exception in Windows Firewall.