单选题You install a third-party application on your computer. The application uses port 80 to negotiate a listening port. After establishing the listening port, the application uses dynamic ports above 6000.  You need to configure Microsoft Windows Firewall to allow traffic for the application.  What should you do? ()AAdd a port exception for port 80.BDisable the Core Networking exception.CRestore the Windows Firewall defaults.DAdd a program exception for the new application.

单选题
You install a third-party application on your computer. The application uses port 80 to negotiate a listening port. After establishing the listening port, the application uses dynamic ports above 6000.  You need to configure Microsoft Windows Firewall to allow traffic for the application.  What should you do? ()
A

Add a port exception for port 80.

B

Disable the Core Networking exception.

C

Restore the Windows Firewall defaults.

D

Add a program exception for the new application.


参考解析

解析: 暂无解析

相关考题:

You want to connect your Windows 2000 Professional computer to a new color laser printer. The printer is Plug and Play compliant. The printer is included on the current Hardware Compatibility List (HCL).You are a member of the Sales organizational unit (OU). You want to share the printer with other users in the Sales Organizational Unit.You plug the printer into the LPT port on the back of the computer. You then attempt to install the 32-bit application printer software that came with the printer. During the installation you receive an error message as shown in the exhibit.What should you do before you share the printer to other users in the Sales OU?A.Change the LPT port settings to enable legacy Plug and Play detection on your computer.B.Change the LPT port setting to bidirectional in the BIOS on your computer. Then reinstall the printer software.C.Connect the printer to another computer in the Sales Organizational Unit. Then install the device drivers for the printer.D.Obtain and install WDM-compliant device drivers and printing software for the printer.

Protective softwares are always efficient as long as you install them in your computer.()

Your computer runs Microsoft Windows XP Professional. You share your computer with two other co-workers. You purchase a new computer. You install Microsoft Windows Vista on the new computer. You need to migrate the following content from the old computer to the new computer:All system and program settingsAll users settingsOnly the content in the C:\Appdata folderWhich tool should you use?()A.AB.BC.CD.D

You install a TV tuner card on your computer. You need to record two different TV shows that runon two different channels at the same time.What should you do?() A.AB.BC.CD.D

You administer your company‘s network. All client computers run Microsoft Windows Vista. A standard user reports that they are unable to install an application. You need to install the applicatin.What should you do?()A.AB.BC.CD.D

You install a custom application on a computer that runs Microsoft Windows XP. The application stores each user’s data in the %programfiles%\app1\data folder on the computer. You install the custom application on a computer that runs Windows Vista.On the Windows Vista computer, you back up the %programfiles%\app1\data folder and notice that the backup contains no data.You need to back up the application’s user data on the Windows Vista computer.What should you do?()A.AB.BC.CD.D

Your company has a main office in New York and branch offices in Chicago and Los Angeles. You plan to use Microsoft Application Virtualization (App-V) 4.5 with SP1.  You install an Application Virtualization Management Server in the New York office. You need to provide application virtualization with active upgrade support in the Chicago and Los Angeles offices. You must design your App-V solution so that it minimizes WAN traffic.  What should you do?()A、Install Application Virtualization Streaming Servers in the Chicago and Los Angeles officesB、Install Application Virtualization Management Servers in the Chicago and Los Angeles officesC、Install the Application Virtualization /CONTENT folder on file shares in the Chicago and Los Angeles officesD、Install the Application Virtualization /CONTENT folder on IIS 7 servers in the Chicago and Los Angeles offices

You install a third-party application on your computer. The application uses port 80 to negotiate a listening port. After establishing the listening port, the application uses dynamic ports above 6000.  You need to configure Microsoft Windows Firewall to allow traffic for the application.  What should you do? ()A、Add a port exception for port 80.B、Disable the Core Networking exception.C、Restore the Windows Firewall defaults.D、Add a program exception for the new application.

You recently installed an application on your computer. The application is configured to automatically start. This application might cause your computer to run slower.  You need to prevent the application from auto starting without uninstalling the application.  What should you do?()A、Use the Microsoft Windows Task Manager application to end the task for the application.B、Use the Control Panel application to uninstall the application. Reboot the computer.C、Use the Software Explorer application to disable the application. Reboot the computer.D、Use the Services application to disable the Application Experience service, and then launch the application.

Your company has an internal Web application that uses a self-signed SSL certificate.  The company has an internal certification authority (CA) with autoenrollment.When users attempt to start the Web application, Internet Explorer displays an error message that recommends closing the Web page rather than continuing to the application.    You need to ensure that Internet Explorer does not display the error message.   What should you do?()A、Issue a certificate from the internal CA and install it on the application serverB、Install the Web application’s certificate into the computer store on each client computerC、Install the Web application’s certificate into the personal store on each client computer. Add the application’s URL to the Trusted Sites zone in Internet ExplorerD、Purchase a commercial certificate and install it on the internal CA

You are administering a Windows 2000 Professional, single Pentium II 400Mhz processor computer. You need to install a new accounting software application.  The software manufacturer recommends that you use a dual-processor configuration. First, you install a second identical processor in your computer. You need to ensure that you will be able to install the new software.  What should you do next?()A、 Update the HAL to support multiple processors.B、 In Device Manager, disable the direct memory access controller.C、 Use the Add/Remove Hardware Wizard to detect and install the driver for the new processor. D、 Reinstall Windows 2000 Professional to support a multi-processor configuration.

You are the network administrator for ExamSheet.net.  You install Windows 2000 Professional on your portable computer. You use a docking station for your portable computer when you are in the office. You install a ISA-based network adapter in your docking station. You insert your computer into the docking station and start the computer. The network adapter is not detected during the startup process. You obtain a disk that contains the supported driver from the network adapter manufacturer. You want to allow Windows 2000 Professional to use the network adapter. What should you do?()A、Restart the computer in the docking station.B、Run the Add/Remove Hardware wizard.C、Use Device Manager to scan for hardware changes.D、Copy the network adapter driver to the Winnt/Driver Cache/i386 folder.E、Install the new network adapter driver.

You create Windows Forms application by using the .Net FrameWork 3.5 You plan to deploy a new application to client computers that use the Windows Vista operating system. You need to ensure that the user can install the application without being prompted fore elevated permission.What should you do?()A、Sign the deployment manifest by using an Authenticode certificate.Publish the application to a CD-ROM.Install the application on each client computer from the CD-ROMB、Sign the deployment manifest by using an Authenticode certificate.Publish the application to a server on the network.Install the application on each client computer.C、Add the requestedExecutionLevel="highestAvailable" attribute to the deployment.Publish the application to a server on the network.Install the application on each client computer.D、Add the requestedExecutionLevel="requiresAdministrator" attribute to the deployment.Publish the application to a server on the network.Install the application on each client computer.

Your computer runs Microsoft Windows XP Professional. You share your computer with two other co-workers.  You purchase a new computer. You install Microsoft Windows Vista on the new computer.  You need to migrate the following content from the old computer to the new computer: All system and program settings  All users settings  Only the content in the C:///Appdata folder  Which tool should you use? ()A、File and Settings Transfer wizardB、Application Compatibility toolkitC、Windows Automated Installation toolkitD、Microsoft Windows Easy Transfer wizard

You use Microsoft .NET Framework 4 to create a Windows application. You use ClickOnce technology to install the application on computers that run Windows 7 with User Access Control (UAC) enabled. The application requires access to environment variables on each computer. You need to ensure that users who do not have administrative permissions can install the application. Which deployment method should you use? ()A、Start from Web.B、Install from Web.C、Start from network shareD、Install from network share.

ou work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now for a new application, a SQL Server 2008 instance has to be installed on an existing server. The server contains a default SQL Server 2005 instance. Your company CIO wants their corresponding certified third-party applications can access to both database instances. The company assigns this task to you. You must achieve this by using as little database administrative effort as possible, and never change the existing application environments. What should you do? () A、You should install SQL Server 2008 as the default instance, and configure the new application to use the default instance B、You should upgrade the SQL Server 2005 application to use SQL Server 2008 C、You should upgrade the SQL Server 2005 instance to a SQL Server 2008 instance D、You should install SQL Server 2008 as a named instance, and make the new application use the new instance.

Your company purchases a new application to deploy on 200 computers. The application requires  that you modify the registry on each target computer before you install the application.     The registry modifications are in a file that has an .adm extension.     You need to prepare the target computers for the application.     What should you do()A、Import the .adm file into a new Group Policy Object (GPO). Edit the GPO and link it to an organizational unit that computer.B、Create a Microsoft Windows PowerShell script to copy the .adm file to the startup folder of each target computer.C、Create a Microsoft Windows PowerShell script to copy the .adm file to each computer. Run the REDIRUsr CONTAID、Create a Microsoft Windows PowerShell script to copy the .adm file to each computer. Run the REDIRCmp CONTA

Your network has client computers that run Windows XP.  All users access a custom line-of- business application.   The line-of-business application is not compatible with Windows 7. You are planning to deploy Windows 7.   You have the following requirements:   The application must run on all client computers.   The application executable must reside on each client computer.    You need to manage application compatibility to meet the requirements.   What should you do?()A、Install the application on a Remote Desktop Services server.B、Install a shim for the application on each client computer.C、Install the Windows Compatibility Evaluator on each client computer.D、Virtualize the application by using Microsoft Application Virtualization (App-V).

You have a computer that runs Windows 7. You have a third-party application. You need to ensure that onlya specific version of the application runs on the computer. The solution must ensure that all applicationrestrictions are based on the application vendor s digital signature.  What should you do?()A、From Application Control Policies, configure a path rule.B、From Application Control Policies, configure a publisher rule.C、From Software Restriction Policies, configure a path rule.D、From Software Restriction Policies, configure a certificate rule.

You work in a company which uses SQL Server 2008. You are the administrator of the company database. In your company there is a server which contains a default SQL Server 2005 instance. For a new application, you have to install a SQL Server 2008 instance on the server. Your company CIO assigns a task to you. You must make sure that the respective certified third-party applications have access to both database instances. You have to achieve this goal without changing the existing application environments. So what should you do to achieve this by using as little database administrative effort as possible?()A、You should install SQL Server 2008 as a named instance, and make the new application to use the new instance. B、You should install SQL Server 2008 as the default instance, and make the new application to use the default instance. C、You should upgrade the SQL Server 2005 application to use SQL Server 2008. D、You should upgrade the SQL Server 2005 instance to a SQL Server 2008 instance.

单选题Your company purchases a new application to deploy on 200 computers. The application requires that you modify the registry on each target computer before you install the application. The registry modifications are in a file that has an .adm extension. You need to prepare the target computers for the application. What should you do()AImport the .adm file into a new Group Policy Object (GPO). Edit the GPO and link it to an organizational unit that contains the target computers.BCreate a Microsoft Windows PowerShell script to copy the .adm file to the startup folder of each target computer.CCreate a Microsoft Windows PowerShell script to copy the .adm file to each computer. Run the REDIRUsr CONTAINER-DN command on each target computer.DCreate a Microsoft Windows PowerShell script to copy the .adm file to each computer. Run the REDIRCmp CONTAINER-DN command on each target computer.

单选题Your company has an internal Web application that uses a self-signed SSL certificate.  The company has an internal certification authority (CA) with autoenrollment.When users attempt to start the Web application, Internet Explorer displays an error message that recommends closing the Web page rather than continuing to the application.    You need to ensure that Internet Explorer does not display the error message.   What should you do?()AIssue a certificate from the internal CA and install it on the application serverBInstall the Web application’s certificate into the computer store on each client computerCInstall the Web application’s certificate into the personal store on each client computer. Add the application’s URL to the Trusted Sites zone in Internet ExplorerDPurchase a commercial certificate and install it on the internal CA

单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. In your company there is a server which contains a default SQL Server 2005 instance. For a new application, you have to install a SQL Server 2008 instance on the server. Your company CIO assigns a task to you. You must make sure that the respective certified third-party applications have access to both database instances. You have to achieve this goal without changing the existing application environments. So what should you do to achieve this by using as little database administrative effort as possible?()AYou should install SQL Server 2008 as a named instance, and make the new application to use the new instance. BYou should install SQL Server 2008 as the default instance, and make the new application to use the default instance. CYou should upgrade the SQL Server 2005 application to use SQL Server 2008. DYou should upgrade the SQL Server 2005 instance to a SQL Server 2008 instance.

单选题You use Microsoft .NET Framework 4 to create a Windows application. You use ClickOnce technology to install the application on computers that run Windows 7 with User Access Control (UAC) enabled. The application requires access to environment variables on each computer. You need to ensure that users who do not have administrative permissions can install the application. Which deployment method should you use? ()AStart from Web.BInstall from Web.CStart from network shareDInstall from network share.

单选题You have a computer that runs Windows XP Professional. Multiple users share the computer. You log on to the computer by using the local administrator account and install a custom application. You need to add an application shortcut to the desktop of all new users who use the computer. The shortcut must appear on the desktop of new users only. What should you do?()ACopy the shortcut to %systemdrive%/documents and settings/default user/desktop/.BCopy the shortcut to %systemdrive%/documents and settings/all users/desktop/.CCopy the shortcut to your desktop. Modify the %comspec% system environment variable. DCopy the shortcut to the guest user’s desktop. Assign the Everyone group Read permission to the guest user profile.

单选题You are using windows installer to deploy an application to 750 Windows 2000 Professional computers on your network. The network includes organizational unit (OU) named sales. A Group Policy object (GPO) is created for the Sales OU. You want to deploy that application in such a way that the shortcuts of that application should be created on the used desktop as well as in start-menu. When a user first click on the shortcut or try to open any file whose extension is associated with that application, then that application should automatically install on the computer. What should you do to accomplish this task?()AUsing GPO, publish that application at user levelBUsing GPO, assign that application at the user levelCUsing GPO, publish that application at computer levelDUsing GPO, assign that application at the computer level.

单选题You are administering a Windows 2000 Professional, single Pentium II 400Mhz processor computer. You need to install a new accounting software application.  The software manufacturer recommends that you use a dual-processor configuration. First, you install a second identical processor in your computer. You need to ensure that you will be able to install the new software.  What should you do next?()A Update the HAL to support multiple processors.B In Device Manager, disable the direct memory access controller.C Use the Add/Remove Hardware Wizard to detect and install the driver for the new processor. D Reinstall Windows 2000 Professional to support a multi-processor configuration.

单选题You develop a service application that needs to be deployed. Your network administrator creates a specific user account for your service application.You need to configure your service application to run in the context of this specific user account. What should you do?()APrior to installation,set the StartType property of the ServiceInstaller class.BPrior to installation,set the Account,Username,and Password properties of theServiceProcessInstaller class.CUse the CONFIG option of the net.exe command-line tool to install the service.DUse the installutil.exe command-line tool to install the service.