Which of the following Microsoft encryption software provides the HIGHEST level of security for PCs running Windows Vista Enterprise or Ultimate Vista?()A、NTFSB、Windows Defender for VistaC、BitLocker drive encryptionD、EFS

Which of the following Microsoft encryption software provides the HIGHEST level of security for PCs running Windows Vista Enterprise or Ultimate Vista?()

  • A、NTFS
  • B、Windows Defender for Vista
  • C、BitLocker drive encryption
  • D、EFS

相关考题:

Which of the following tools can an administrator use to get a server baseline?() A. System Resource MonitorB. Microsoft Baseline Security Analyzer (MBSA)C. Replication MonitorD. Performance Monitor

Which of the following can support the claim that“Microsoft had no choice but to try something new?”( ) A.Apple is threatening Microsoft’s core business of selling“platforms” B.The differences between business and personal computing are disappearing C.Apple and Google are dominating mobile OS market,Microsoft is a latecomer D.All of above

Which of the following can support the claim that“Microsoft had no choice but to try something new?”( ) A.Apple is threatening Microsoft’s core business of selling“platforms”. B.The differences between business and personal computing are disappearing. C.Apple and Google are dominating mobile OS market,Microsoft is a latecomer. D.All of above.

Which of the following is NOT TRUE according to the passage?( ) A.Steve Jobs would be glad to see the launch of iPad mini. B.Windows 8 and Surface do not inherit the usual Microsoft style. C.Apple fears that something is going wrong with the Apple now. D.The future pictures for Apple and Microsoft are gloomy.

Which of the following Microsoft technologies allows for file replication between servers?()A、 SMSB、 SYSVOLC、 DFSD、 NTFS

Which of the following contains the user profile directory for Microsoft Windows 2000 and XP?()A、UsersB、My DocumentsC、Documents and SettingsD、Application Data

Which of the following file types can Microsoft servers package for remote installation by default?()A、 .exeB、 .iniC、 .msiD、 .dll

Which of the following commands should Jill, a technician, use to test a computer’s NIC forfunctionality?()A、ping netB、ping ipconfigC、ping localhostD、ping microsoft.com

After Microsoft Windows boots, a message appears stating that a service failed to start. Which of the following can be used to find more information about this error?()A、Disk ManagerB、Control PanelC、Start MenuD、Event Viewer

After a virus outbreak, which of the following can be used to deploy a hotfix in a Microsoft environment?()A、 WSUS自动更新服务器B、 Terminal servicesC、 Remote management cardsD、 Group policyE、 SNMP

In addition to AIX, which of the following operating systems is supported in a pSeries LPAR environment?()A、z/OSB、LinuxC、Sun Solaris 9D、Microsoft Windows 2003

A customer needs a new database server.  Their third-party application requires Microsoft SQL Server.  They have 100 users who will login to the network and store their data files on the network server.  They will also require the server to be an email server and to deploy a central antivirus solution.  Which of the following network operating systems would satisfy these requirements?()A、SuSE Linux Enterprise 9B、Red Hat Linux Advanced Server 3C、Microsoft Windows 2003 Server Web EditionD、Microsoft Windows 2003 Server Standard Edition

A customer requires management capabilities for installed pSeries systems via a Microsoft Windows system. Which of the following should be considered?()A、TSMB、PSSPC、WebSMD、LoadLeveler

A customer wants to implement a clustered database solution on their existing x445 servers.  A minimum of four nodes must participate in the cluster, and the customer wishes to use open standards.  Which of the following best satisfies their requirements?()A、Novell NetWare Cluster ServicesB、Red Hat Enterprise Linux Cluster SuiteC、Microsoft Windows 2003 Server with MSCSD、Microsoft Windows 2003 Enterprise Edition

You use Microsoft .NET Framework 4 to create a Windows Presentation Foundation (WPF) application. You need to ensure that the application meets the following requirements: Displays a menu that is specific to the control selected by the user. Displays the menu next to the control. Which control should you use? ()A、MenuB、PopUpC、ListBoxD、ContextMenu

If you choose Typical Settings, which of the following configurations are made during the Network Settings component of the Windows 2000 Professional installation?()A、Network connections for Client for Microsoft Networks.B、File and Print Sharing for Microsoft Networks.C、NetBEUI protocol with automatic addressing.D、TCP/IP protocol with automatically assigned IP address.E、Network connections for Client for Netware Networks.

Which of the following is the SMTP provider for Exchange 2010 and controls every component of message processing OUT?()A、Foreign connectorB、Microsoft Exchange Active Directory Topology serviceC、Routing tableD、Microsoft Exchange Transport service

You need to identify the data mining algorithm that meets the requirements of the credit department. Which algorithm should you use?()A、Microsoft ClusteringB、Microsoft Decision TreeC、Microsoft Nave BayesD、Microsoft Association

单选题During a printer driver installation, a message appears stating “The software being installed for this hardware has not passed Windows logo testing”. Which of the following is the SAFEST course of action for the administrator to take?()AContinue with installationBInstall .dll files needed for the printerCObtain a Microsoft certified driverDRestart the printer and try again

单选题You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.Which of the following options can be you in order to change the permissions settings for a public folder?()AYou must use the Active Directory Users and Computers.BYou must use the Microsoft Office Outlook.CYou must use the Mail Flow Troubleshooter.DYou must use the Exchange Server Jetstress 2010.

单选题Which of the following is typically collected during the server baselining process?()A The vendor documentation and knowledgebaseB Compliance of local lawsC Server performance statisticsD Microsoft Baseline Security Analyzer output

单选题Which of the following Microsoft encryption software provides the HIGHEST level of security for PCs running Windows Vista Enterprise or Ultimate Vista?()ANTFSBWindows Defender for VistaCBitLocker drive encryptionDEFS

单选题Which of the following file types can Microsoft servers package for remote installation by default?()A .exeB .iniC .msiD .dll

单选题Which of the following Microsoft technologies allows for file replication between servers?()A SMSB SYSVOLC DFSD NTFS

单选题A technician is searching a knowledge base for the correct method of removing a virus. The knowledge base states that the key: HKEY_LOCAL_MACHINE/MICROSOFT/SOFTWARE/CURRENTVERSION/PAK needs to be deleted. Which of the following should the technician use to delete the key?()AMSCONFIGBDEBUGCEVENTVIEWERDREGEDIT

单选题A second optical drive has been added to the computer and needs to be referenced as the R: drive by the Microsoft Windows operating system. Which of the following places in Microsoft Windows will BEST accomplish this task?()AAdministrative ToolsBDisk ManagementCDevice ManagerDEvent Viewer

单选题Which of the following file types can Microsoft servers package for remote installation by default?()A.exeB.IniC.msiD.dll

单选题Which of the following is the new permissions model in Microsoft Exchange Server 2010, which enables you to continuous levels, what administrators and end-users can do?()ARole Based Access ControlBAccess Control ListCDynamic distribution groupDUniversal distribution group