多选题You need to design the configuration on one Windows Server 2003 terminal server that hosts the SalesForceMax application to meet security requirements. Which three actions should you take?()AConfigure the terminal server so that users log on by using local user accountsBConfigure the terminal server so that users log on by using domain accountsCConfigure the server to run SalesForceMax in a dedicated window when a user logs on to the terminal serverDConfigure the server to allow each user to have a Windows desktop when the user logs on to the terminal serverEUse software restriction polices in Group Policy objects (GPOs) that apply to the terminal serverFUse Appsec.exe to restrict applications on the terminal server

多选题
You need to design the configuration on one Windows Server 2003 terminal server that hosts the SalesForceMax application to meet security requirements. Which three actions should you take?()
A

Configure the terminal server so that users log on by using local user accounts

B

Configure the terminal server so that users log on by using domain accounts

C

Configure the server to run SalesForceMax in a dedicated window when a user logs on to the terminal server

D

Configure the server to allow each user to have a Windows desktop when the user logs on to the terminal server

E

Use software restriction polices in Group Policy objects (GPOs) that apply to the terminal server

F

Use Appsec.exe to restrict applications on the terminal server


参考解析

解析: 暂无解析

相关考题:

You have a print server named Server1 that runs Windows Server 2003 Service Pack (SP2). Server1 isconfigured as shown in the following table.All the hard disks are 136 GB and are connected to a SCSI controller.You need to identify which disk configuration will provide the best performance for printing.Which disk configuration should you implement? ()A. one RAID-0 volumeB. one RAID-1 volumeC. one RAID-5 volumeD. two RAID-1 volumes

You want to debug the Windows Communication Foundation (WCF) client and server interaction through message and application tracing.You need to correlate traces generated on the client and the server. Which XML segment should you add to the system.diagnostics configuration element in the client and server application configuration file?()A.B.C.D.

Your organization includes two servers named Server1 and Server2 that run Windows Server 2003 ServicePack 2 (SP2).Server1 and Server2 host the same Web sites.You need to back up the server configuration on Server1 every hour and then apply the configuration to Server2.Which command should you use? ()A. IISBack.vbs /backupB. IISBack.vbs /listC. IISCnfg.vbs /copyD. IISCnfg.vbs /save

You need to design phase one of the new authentication strategy. Your solution must meet business requirements.What should you do?()A、Install a Windows Server 2003 enterprise root CA, Configure certificate templates for autoenrollmentB、Install a Windows Server 2003 enterprise subordinate CA, Configure certificate templates for autoenrollmentC、Install a Windows Server 2003 stand-alone subordinate CA, Write a logon script for the client computers in the HR department that contains the Certreq.execommandD、Install a Windows Server 2003 stand-alone root CA,Write a logon script for the client computers in the HR department that contains the Certreq.execommand

Your network consists of a single Active Directory site that includes two network segments. Thenetwork segments connect by using a router that is RFC 1542 compliant. You plan to use Windows Deployment Services (WDS) to deploy Windows Server 2008 R2 servers. All new servers support Pre-Boot Execution Environment (PXE).  You need to design a deployment strategy to meet the following requirements: èSupport Windows Server?2008 R2   èDeploy the servers by using WDS in both network segments èMinimize the number of servers used to support WDS What should you include in your design?() A、Deploy one server. Install WDS and DHCP on the server. Configure the IP Helper tables on therouterbetween the network segments.B、Deploy two servers. Install WDS and DHCP on both servers. Place one server on each of the network segments. Configure both servers to support DHCP option 60.C、Deploy two servers. Install WDS and DHCP on both servers. Place one server on each of the network segments. Configure both servers to support DHCP option 252.D、Deploy two servers. Install WDS and DHCP on one server. Install DHCP on the other server. Place one server on each of the network segments. Configure both servers to support DHCP option60.

You need to design the consolidation plan for SQL1, SQL2, and SQL3. You need to identify the appropriate combination of SQL Server instances and SQL Server 2005 computers that are needed to fulfill the company’s consolidation plans and security requirements.Which combination should you use?()A、one SQL Server 2005 computer with one instanceB、two SQL Server 2005 computers, each with two instancesC、two SQL Server computers, one with one instance and one with three instancesD、one SQL Server 2005 computer with two instances

You need to design an administrative model that meets the business and technical requirements. What should you do?()A、Assign permissions to manage Mailbox and Exchange Server configuration to the server-admins groupB、Assign permissions to manage Mailbox and Exchange Server configuration to the domain-admins groupC、Assign permissions to manage Mailboxes to the server-admins group. Assign permissions to manage Exchange Servers configuration to the domain-admins groupD、Assign permissions to manage Mailboxes to the domain-admins group. Assign permissions to manage Exchange Servers configuration to the server-admins group

You need to design a strategy for identifying the number of instances that any one SQL Server 2005 computer will support. What should you do?()A、Specify that each server must have one instance for each customer.B、Specify that each server must each have only one instance.C、Specify that each server must have one instance for each database that is hosted on that server.D、Specify that each server must have one instance for each customer who has one or more databases that are hosted on that server.

You are designing the loan application process for the customer terminals. You need to design a Transact-SQL stored procedure that fulfills the business and technical requirements. Which type of Transact-SQL stored procedure should you use?()A、one that uses an internal SQL Server Web service endpointB、one that runs a SQL Server Integration Services (SSIS) packageC、one that uses Service BrokerD、one that runs a user-defined function

You have a server that runs Windows Server 2003 Service Pack 2 (SP2). You create an Automated System Recovery (ASR) backup of the server. You restart the server and receive a critical error. You need to restore the server by using ASR. What should you do first? ()A、Start the computer by using Safe mode.B、Start the server by using the ASR floppy disk.C、Start the computer by using the Last Known Good Configuration option.D、Start the server by using the Windows Server 2003 SP2 installation media.

You have a server that runs Windows Server 2003 Service Pack 2 (SP2). The server contains one volume. You install Certificate Services. You need to back up the Certificates Services database by using the minimum amount of storage space. Which tool should you use? ()A、Certification Authority snap-inB、Certificates snap-inC、Certificate Templates snap-inD、Windows Backup

You are designing a strategy for migrating domain user accounts to the new Windows Server 2003 Active Directory environment. You want to identify the minimum number of trust relationships that need to be manually created to perform this operation.  Which design should you use?()A、one external trust relationshipB、two external trust relationshipsC、six external trust relationshipsD、twelve external trust relationshipsE、one two-way cross-forest trust relationship

You have a server that runs Windows Server 2003 Service Pack 2 (SP2).You need to compare the current security settings of the server to a security template. Which tool should you use?()A、Security Templates snap-in B、Group Policy Management Console C、Security Configuration and Analysis snap-in D、Microsoft Baseline Security Analyzer (MBSA)

You need to design the configuration on one Windows Server 2003 terminal server that hosts the SalesForceMax application to meet security requirements. Which three actions should you take?()A、Configure the terminal server so that users log on by using local user accountsB、Configure the terminal server so that users log on by using domain accountsC、Configure the server to run SalesForceMax in a dedicated window when a user logs on to the terminal serverD、Configure the server to allow each user to have a Windows desktop when the user logs on to the terminal serverE、Use software restriction polices in Group Policy objects (GPOs) that apply to the terminal serverF、Use Appsec.exe to restrict applications on the terminal server

You have 10 servers that run Windows Server 2008. The servers have the Web Server (IIS) server role installed. The servers are members of a Web server farm. The servers host the same Web site. You need to configure the servers to meet the following requirements:  Allow changes to the Web server configurations that are made on one server to be made on all servers in the farm.  Minimize administrative effort to perform the configuration changes. What should you do?()A、On all servers, configure the Shared Configuration settings.B、On one server, configure the Shared Configuration setting.C、On one server, create a scheduled task that copies the Intepub folder to the other servers.D、Create a DFS Namespace. On each server configure the Inetpub folder as the target of the DFS Namespace.

You have two stand-alone servers named Server1 and Server2. Both servers run Windows Server 2003 Service Pack 2 (SP2).On Server1, you save the local security policy as a template. You need to import the template to Server2. What should you run on Server2?()A、the Security Templates snap-inB、the Security Configuration WizardC、the Microsoft Baseline Security AnalyzerD、the Security Configuration and Analysis snap-in

Your network contains a server that runs Windows Server 2008 R2.You need to create a script to identify known configuration issues. What should you include in the script?() A、the Get-BPAModel cmdletB、the Invoke-BPAModel cmdletC、the Mrinfo toolD、the Systeminfo tool

单选题Your organization includes two servers named Server1 and Server2 that run Windows Server 2003 Service Pack 2 (SP2). Server1 and Server2 host the same Web sites. You need to back up the server configuration on Server1 every hour and then apply the configuration to Server2. Which command should you use? ()AIISBack.vbs /backupBIISBack.vbs /listCIISCnfg.vbs /copyDIISCnfg.vbs /save

单选题You have 10 servers that run Windows Server 2008. The servers have the Web Server (IIS) server role installed. The servers are members of a Web server farm. The servers host the same Web site. You need to configure the servers to meet the following requirements:  Allow changes to the Web server configurations that are made on one server to be made on all servers in the farm.  Minimize administrative effort to perform the configuration changes. What should you do?()AOn all servers, configure the Shared Configuration settings.BOn one server, configure the Shared Configuration setting.COn one server, create a scheduled task that copies the Intepub folder to the other servers.DCreate a DFS Namespace. On each server configure the Inetpub folder as the target of the DFS Namespace.

单选题You have two stand-alone servers named Server1 and Server2. Both servers run Windows Server 2003 Service Pack 2 (SP2).On Server1, you save the local security policy as a template. You need to import the template to Server2. What should you run on Server2?()Athe Security Templates snap-inBthe Security Configuration WizardCthe Microsoft Baseline Security AnalyzerDthe Security Configuration and Analysis snap-in

单选题You have a Windows Server 2008 R2 Hyper-V failover cluster with a single iSCSI logical unit number (LUN) and one highly available virtual machine (HAVM). You manage the virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You monitor the environment by using Microsoft System Center Operations Manager 2007 R2. You configure a new virtual machine (VM) by deploying a VHD from the VMM library and placing the VHD on the existing iSCSI LUN. You create a HAVM configuration, and you attach the VHD to the configuration. VMM reports the status of the VMs as Unsupported Cluster Configuration. You need to be able to manage the VMs by using VMM. What should you do?()AMove the VHD of one HAVM to a new iSCSI LUN.BMove the VHD of one HAVM to the system volume of a cluster node.CConfigure Performance and Resource Optimization (PRO) on the Windows Server 2008 R2 cluster nodes.DConfigure Windows System Resource Manager (WSRM) on the Windows Server 2008 R2 cluster nodes.

单选题You need to design a configuration for the mailbox servers. What should you do?()ACreate two Exchange Server 2003 computers. Place the mailboxes for main office users on one server, and place the mailboxes for remote users on the other serverBCreate a Network Load Balancing cluster that contains two Exchange Server 2003 computers. Place half of the user mailboxes on one server, and place half of the user mailboxes on the other serverCCreate a Microsoft Cluster Server cluster that contains two Exchange Server 2003 computers. Place all of the user mailboxes on one server and configure the other server as a failover nodeDCreate a Microsoft Cluster Server cluster that contains two Exchange Server 2003 computers. Place half of the user mailboxes on one server, and place half of the user mailboxes on the other server

单选题You need to design the consolidation plan for SQL1, SQL2, and SQL3. You need to identify the appropriate combination of SQL Server instances and SQL Server 2005 computers that are needed to fulfill the company’s consolidation plans and security requirements.Which combination should you use?()Aone SQL Server 2005 computer with one instanceBtwo SQL Server 2005 computers, each with two instancesCtwo SQL Server computers, one with one instance and one with three instancesDone SQL Server 2005 computer with two instances

单选题You need to design a method to monitor the security configuration of the IIS server to meet the requirements in the written security policy. What should you do?()ALog on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the IIS server computer accountBRun the Microsoft Baseline Security Analyzer (MBSA) on the IIS server and scan for vulnerabilities in Windows and IIS checksCRun Security Configuration and Analysis to analyze the IIS server’s security settings by using a custom security templateDOn the IIS server, run the gpresult command from a command prompt and analyze the output

单选题You have two servers named Server1 and Server2 that run Windows Server 2003 Service Pack 2 (SP2). Server1 is configured as a DHCP server. You plan to decommission the DHCP service on Server1. You need to move the DHCP server configuration to Server2. The configuration must include all configured scopes, leases, and DHCP options. What should you do first? ()AFrom the DHCP snap-in, export list.BFrom the DHCP snap-in, back up the server.CFrom Windows Explorer, copy the %systemroot%/System32/Dhcp/DHCP.mdb file.DFrom Windows Explorer, copy the %systemroot%/System32/Dhcp/backup/dhcpcfg file.

单选题Your organization includes two servers named Server1 and Server2 that run Windows Server 2003 Service Pack 2 (SP2). Server1 and Server2 host the same Web sites. You need to back up the server configuration on Server1 every hour and then apply the configuration to Server2. Which command should you use? ()AIISBack.vbs /backupBIISBack.vbs /listCIISCnfg.vbs /copyDIISCnfg.vbs /save

单选题You have a Terminal Server that runs Windows Server 2008.   You need to configure the server to end any sessions that are inactive for more than one hour. What should you do?()AFrom Terminal Services Manager, create a new group.BFrom Terminal Services Manager, delete the inactive sessions.CFrom Terminal Services Configuration, modify the RDP-Tcp settings.DFrom Terminal Services Configuration, modify the User logon mode setting.