单选题Your network consists of a single Active Directory domain. User accounts for engineering department are located in an OU named Engineering. You need to create a password policy for the engineering department that is different from your domain password policy. What should you do()ACreate a new GPO. Link the GPO to the Engineering OU.BCreate a new GPO. Link the GPO to the domain. Block policy inheritance on all OUs except for the Engineering OU.CCreate a global security group and add all the user accounts for the engineering department to the group. Create a new Password Policy Object (PSO) and apply it to the group.DCreate a domain local security group and add all the user accounts for the engineering department to the group. From the Active Directory Users and Computer console, select the group and run the Delegation of Control Wizard.
单选题
Your network consists of a single Active Directory domain. User accounts for engineering department are located in an OU named Engineering. You need to create a password policy for the engineering department that is different from your domain password policy. What should you do()
A
Create a new GPO. Link the GPO to the Engineering OU.
B
Create a new GPO. Link the GPO to the domain. Block policy inheritance on all OUs except for the Engineering OU.
C
Create a global security group and add all the user accounts for the engineering department to the group. Create a new Password Policy Object (PSO) and apply it to the group.
D
Create a domain local security group and add all the user accounts for the engineering department to the group. From the Active Directory Users and Computer console, select the group and run the Delegation of Control Wizard.
参考解析
解析:
暂无解析
相关考题:
单选题胃、十二指肠溃疡的临床特点哪项正确?( )A慢性发病,阵发性腹痛和恶心呕吐B急性发病,发作无规律,腹痛C慢性发病,周期性发作和节律性上腹痛D腹痛、腹胀周期性发作E持续性腹胀、腹痛,周期性发作
单选题You are employed as the exchange administrator at Company.com.the Company.com network contains an exchange 2010 organization.you are responsible for managing an exchange server 2010 mailbox server named -ex01.You are in the process of implementing a policy that deletes e-mail messages automatically after 60 days.You receive an instruction from management to identify another location where users can store their messages after 60 days.However, administrators need to locate the e-mail messages in both locations when executing multi- mailbox searches. What should you do?()AYou should consider creating a Retention Policy.BYou should consider creating a.pst file for each user that is stored in a shared folder.CYou should consider creating a Personal Archive for each user.DYou should consider creating a journal rule.
单选题You need to recommend changes to the infrastructure to ensure that DFS meets the company’s security requirements. What should you include in the recommendation?()AUpgrade DFS2 to Windows Server 2008 R2.BImplement access-based enumeration (ABE).CImplement Authentication Mechanism Assurance.DConfigure the DFS namespace to use Windows Server 2008 mode.
单选题Your company has an Active Directory Domain S ervices (AD DS) domain. All client computers run Windows 7. You have a Remote Desktop Session Host (RD Session Host) server. You have the following requirements: H Local devices from remote desktop clients must be redirected to the RD Session Host server . H USB devices from remote desktop clients must not be redirected to the RD Session Host server . What should you do?()ADisable drive redirection on the remote desktop clients.BDisable drive redirection on the RD Session Host server.CEnable the Prevent installation of removable devices Group Policy setting on the remote desktop clients.DEnable the Prevent installation of removable devices Group Policy setting on the RD Session Host server.
单选题Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Microsoft Office Outlook to connect to their mailboxes.A Company.com employee named Rory Allen complains that he is unable to send encrypted e-mail messages to an external recipient client.Furthermore, both of these users use e-mail encryption certificates.Rory Allen needs to send encrypted e-mail messages to the external recipient client.What should you do?()AThe best option is to inform Rory Allen to change the sensitivity settings of the e-mail message.BThe best option is to inform the external recipient client to add a delegate.CThe best option is to inform the external recipient client to send a signed e-mail message to Rory Allen.DThe best option is to inform Rory Allen to send a signed e-mail message to the external recipient client.
单选题You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.You have to have the Application Identifier of xxx stored in a DNS record.The Application Identifier is used for the federated trust.What actions must you take on the DNS?()AYou must set up recipient filtering.BYou must set up a Host (A).CYou must use a TXT record.DYou must use a Pointer (PTR) record.EYou must use a Mail exchange (MX) record.
单选题You configure a Windows Server 2008 R2 Hyper-V server with several virtual machines (VMs). A software vendor releases a software update for an application that runs on only one of the VMs. You need to plan a strategy that enables you to install and test the update without interrupting application availability and without corrupting data. What should you do first?()ACreate a snapshot of the affected VMBEnable the Windows Volume Snapshot Service on the Hyper-V serverCExport the VMDEnable the Windows Volume Snapshot Service on the affected VM
单选题Your network contains a Virtualization environment that includes the following: - 10 hosts that run VMware ESX Server 4.0 - Microsoft System Center Virtual Machine Manager - 50 Hyper-V hosts that run Windows Server 2008 R2 Each virtualization host contains a minimum of 15 virtual machines (VMs). You need to ensure that network technicians can manage and create virtual networks on the Hyper-V hosts. The technicians must be prevented from configuring other Hyper-V settings. What should you include in the recommendation?()ASystem Center Virtual Machine Manager virtual-to-virtual machine (V2V) conversionBActive Directory Rights Management Services (AD RMS)CMicrosoft Application Virtualization (App-V) SequencerDAuthorization ManagerEVMM Self-Service PortalFMicrosoft Enterprise Desktop Virtualization (MED-V) Workspace PackagerGMicrosoft System Center Operations ManagerHSystem Center Virtual Machine Manager physical-to-virtual machine (P2V) conversionIMicrosoft System Center Data Protection ManagerJVirtual Machine Servicing Tool (VSMT)
单选题You need to document the following configurations of a server that runs Windows Server 2008 R2: System services Startup programs Hardware configuration Current CPU, network, disk, and memory utilization Which command should you run?()Amrinfo.exe localhostBmsinfo32.exeCperfmon.exe /reportDsysteminfo.exe
单选题You need to design the Service Broker queues that will be used to submit requests for long-running reports. Your solution must minimize complexity of using the queues by applications. What should you do?()ASpecify one queue for each client application that can submit report requests.BSpecify one queue for each of the two report-generation services.CSpecify one queue for all long-running report requests.DSpecify eight queues:One for each service, and one for each client application.
单选题You are employed as the enterprise exchange administrator at TestKing.com. The TestKing.com networkconsits of a single Active Directory site. TestKing.com makes use of Microsoft Exchange Servermessaging solution. You are in the process of planning the deployment of Exchange Server 2010. The CIO provides you withthe set criteria needed to deploy the Exchange Server 2010 servers. TestKing.com wants you to ensurethat: * The Mailbox servers belong to the database availability group (DAG). * The users are able to send and receive e-mail in the event of a single server failure. * The minimization of the amount of servers deployed. * The load balancing of MAPI connections form Outlook Clients using hardware load balancer.You need to plan the deployment to the Exchange Server 2010 servers to meet the above criteria. What should you do?()AYour plan should include deploying four servers.The Mailbox server role as well as the Hub Transport server role should be configured on two serversand the Client Access server role on the remaining two.Therafter a Client Access server array should be configured.BYour plan should include deploying two servers.The Mailbox server role, the Client Access server role as well as the Hub Transport server role shouldbe configured on the two servers there after a Client Access server array should be configured.CYour plan should include deploying four servers.The Mailbox server role should be deployed on two servers and the Client Access server role and theHub Transport server role on the remaining two.Therafter Outlook Anywhere should be enabled on both Client Accessservers.DYour plan should include deploying two servers.The Mailbox serve role, the Client Access server role as well as the Hub Transport server role shouldbe deployed on the two servers.Thereafter Outlook Anywhere should be enabled on both Client Access Servers.
单选题Critical services are running on CKD20, a domain controller. You have completed restructuring the organizational unit hierarchy for the domain and deleted the needless objects. What would you do to perform an offline defragmentation of the Active Directory database on CKD20 while ensuring that the critical services remain online()AOpen the Microsoft Management Console (MMC) and stop the Domain Controller service. After that,run the defrag toolBStart the domain controller in the Directory Service restore mode and run the Ntdsutil toolCStart the domain controller and then use the Defrag tool to start defragmentationDOpen the MMC and stop the Domain Controller service. After that, run the Ntdsutil tool.EAll of the above
单选题Your network contains a single Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. Server1 and Server2 are namespace servers for the //contoso.com/DFS1 namespace. You need to ensure that users only connect to the //contoso.com/DFS1 namespace on Server1 if Server2 is unavailable. How should you configure the //contoso.com/DFS1 namespace?()AFrom the properties of the //contoso.com/DFS1 namespace, modify the referrals settingsBFrom the properties of the //contoso.com/DFS1 namespace, modify the advanced settingsCFrom the properties of the //SERVER1/DFS1 namespace servers entry, modify the advanced settingsDFrom the properties of the //SERVER2/DFS1 namespace servers entry, modify the advanced settings
单选题Your network includes Windows Server 2008 R2 Hyper-V servers. Each Hyper-V server runs multiple virtual machines (VMs). You need to detect performance issues and generate an alert when Hyper-V server load exceeds specific thresholds. Which tool should you use?()AMicrosoft System Center Capacity Planner 2007BMicrosoft System Center Operations Manager 2007 R2CMicrosoft System Center Configuration Manager 2007 R2DMicrosoft System Center Virtual Machine Manager 2008 R2