单选题You are designing a strategy to enable the ATC application to successfully resolve computer names. Which name resolution method should you use?()A DNSB WINSC Hosts fileD Lmhosts file
单选题
You are designing a strategy to enable the ATC application to successfully resolve computer names. Which name resolution method should you use?()
A
DNS
B
WINS
C
Hosts file
D
Lmhosts file
参考解析
解析:
暂无解析
相关考题:
You are developing a Web application. Your code restricts access to some pages based on the users credentials. You need to configure IIS to supply the user‘s Windows credentials to your Web application. These credentials must be encrypted.What should you do? ()A. Enable Anonymous access. Enable Integrated Windows authentication.B. Enable Anonymous access. Enable Basic authentication.C. Disable Anonymous access. Enable Integrated Windows authentication.D. Disable Anonymous access. Enable Basic authentication.
The company is evaluating using a new Active Directory domain to contain all customer user accounts. You need to design a monitoring or logging strategy that meets business and security requirements for the new Web-based ordering application. Your solution must minimize overhead on existing domain controllers and servers. What should you do?()A、Enable logon auditing in both the new and the existing domainsB、Enable logon auditing only in the existing domainC、Enable logon auditing only in the new domainD、Enable logon auditing on only the Web server
You are designing a DNS strategy to meet the business and technical requirements. Which two actions should you perform?()A、Create a dynamic reverse lookup zone for each subnet.B、Create a dynamic forward lookup for each domain.C、Install caching-only DNS servers in the branch offices.D、Enable the BIND secondaries option for each DNS server.
You are designing the NetBIOS domain naming strategy for the company. Which NetBIOS domain name or names should you use?()A、eastB、westC、quebecD、newyorkE、northamericaF、wideworldimporters
You need to design a strategy to increase security for the client computers in the finance department. Which two actions should you perform?()A、Enable automatic certificate enrollmentB、Enforce smart card logonsC、Enable Encrypting File System (EFS) for offline filesD、Enable a screen saver password
You are designing an IP addressing strategy for your VPN solution. How many public addresses should you use?()A、1B、25C、50D、255
You are designing a Windows Azure web application. The application will be accessible at a standard cloudapp.net URL. You need to recommend a DNS resource record type that will allow you to configure access to the application through a custom domain name. Which type should you recommend?()A、 AB、 CNAMEC、 MXD、 SRV
You are designing a strategy to meet the security and financial requirements related to the Manifest application. What should you do? ()A、 Configure a VPN server in Sydney.B、 Configure a VPN server in each branch office.C、 Configure a dial-up server in SydneyD、 Configure a dial-up server in each branch office.
You are designing a strategy to perform inplace upgrade of domain controller in Boston and San Diego. Which method should you use?()A、adprepB、sysprepC、Answer FileD、Remote Installtion Services (RIS)
You configure a Windows Server 2008 R2 Hyper-V server with several virtual machines (VMs). A software vendor releases a software update for an application that runs on only one of the VMs. You need to plan a strategy that enables you to install and test the update without interrupting business operations and without corrupting data. What should you do first?()A、Export the VMB、Create a snapshot of the affected VMC、Enable the Windows Volume Snapshot Service on the affected VMD、Enable the Windows Volume Snapshot Service on the Hyper-V server
Your company has a single Active Directory Domain Services (AD DS) domain with Windows Server 2008 R2 member servers and 1,000 Windows 7 client computers. You are designing the deployment of a custom application. You have the following requirements: The application must be available to only users who need it. Minimize network traffic during deployment. You need to design a deployment strategy that meets the requirements. Which deployment method should you use?()A、RemoteApp and Desktop ConnectionsB、software installation in Group PolicyC、Microsoft Application Virtualization (App-V)D、Microsoft System Center Configuration Manager 2007
You are designing a DNS implementation strategy for the network. Which two zone types should you use?()A、Reverse lookup zonesB、Standard primary zonesC、Standard secondary zonesD、Active Directory-integrated zones
You are designing a strategy to install the new scheduling application. Which two actions should you perform?()A、Assign the scheduling application package to the Instructor OU.B、Publish the scheduling application package to the Instructor OU.C、Ensure that the scheduling application can install across slow WAN links.D、Prevent the scheduling application from installing across slow WAN links.
You are designing an upgrade strategy for a Windows Azure application that includes one web role with one instance. You have the following requirements: - Test the application on the Windows Azure platform. - Ensure that application upgrades can be rolled back. - Ensure that upgrade and rollback processes do not cause downtime. You need to recommend an approach for upgrading the application. What should you recommend?()A、 Deploy to the Production slot. Test the application, and then perform a VIP swap.B、 Deploy to the Staging slot. Test the application, and then perform a VIP swap.C、 Deploy to the Staging slot. Test the application, and then perform a manual in-place upgrade to the Production slot.D、 Deploy to the Staging slotTest the application, and then perform an automatic in-place upgrade to the Production slot.
You are designing a security strategy for the public Web server. You solution must address the chief security officer’s concerns. What should you do?()A、Install a Web server certificate on WEB1B、Enable Internet Connection Firewalll (ICF) on WEB1C、Configure IIS on WEB1 to operate in IIS 5.0 isolation modeD、Install and configure the URLScan ISAPI filer on WEB1
You configure a Windows Server 2008 R2 Hyper-V server with several virtual machines (VMs). A software vendor releases a software update for an application that runs on only one of the VMs. You need to plan a strategy that enables you to install and test the update without interrupting application availability and without corrupting data. What should you do first?()A、Create a snapshot of the affected VMB、Enable the Windows Volume Snapshot Service on the Hyper-V serverC、Export the VMD、Enable the Windows Volume Snapshot Service on the affected VM
You are designing an automated deployment process for a Windows Azure application. The process must deploy the application to Windows Azure without any user interaction. You need to recommend a deployment strategy. What should you recommend?()A、 Use the Service Management API to deploy the application package.B、 Use the cspack and csrun command-line utilities and pass the cloud project as an argument.C、 Publish the cloud project to a local directory and upload the application package to Windows Azure Blob storage.D、 Publish the cloud project to a localdirectory and use the Windows Azure Developer Portal to upload the application.
单选题You are designing a strategy to meet the security and financial requirements related to the Manifest application. What should you do? ()A Configure a VPN server in Sydney.B Configure a VPN server in each branch office.C Configure a dial-up server in SydneyD Configure a dial-up server in each branch office.
单选题You are designing a Windows Azure web application. The application will be accessible at a standard cloudapp.net URL. You need to recommend a DNS resource record type that will allow you to configure access to the application through a custom domain name. Which type should you recommend?()A AB CNAMEC MXD SRV
单选题You are designing an automated deployment process for a Windows Azure application. The process must deploy the application to Windows Azure without any user interaction. You need to recommend a deployment strategy. What should you recommend?()A Use the Service Management API to deploy the application package.B Use the cspack and csrun command-line utilities and pass the cloud project as an argument.C Publish the cloud project to a local directory and upload the application package to Windows Azure Blob storage.D Publish the cloud project to a localdirectory and use the Windows Azure Developer Portal to upload the application.
单选题You are designing a new NETBIOS naming strategy for the corporate environment. Which domain name should you use?()A adB woodgroveadC woodgrovebankD woodgrovebank.com
多选题You are designing the NetBIOS domain naming strategy for the company. Which NetBIOS domain name or names should you use?()AeastBwestCquebecDnewyorkEnorthamericaFwideworldimporters
单选题You are developing a Windows Presentation Foundation (WPF) application. You are implementing a test strategy for the application. You need to ensure that the test class can repeat user input. From which base class should the test class inherit?()AAutomationElementIdentifierBAutomationPeerCKeyboardDUICues
单选题You are designing an IP addressing strategy for your VPN solution. How many public addresses should you use?()A1B25C50D255
单选题You are designing a strategy to enable the ATC application to successfully resolve computer names. Which name resolution method should you use?()ADNSBWINSCHosts fileDLmhosts file
单选题You are designing a new NETBIOS naming strategy for the corporate environment. Which domain name should you use?()AadBwoodgroveadCwoodgrovebankDwoodgrovebank.com
单选题You are designing a strategy to enable the ATC application to successfully resolve computer names. Which name resolution method should you use?()A DNSB WINSC Hosts fileD Lmhosts file