单选题You are the desktop administrator for one of your company's branch offices. The network in your branch office contains 100 Windows XP Professional computers. The computers are configured with the Compatws.inf security template. One of the network administrators in the company's main office creates a new security template named CompanySec.inf. The new template is designed to be applied to each of the company's Windows XP Professional computers. The users in your branch office have different security requirements from the users in the main office. You need to find out whether the new security template will violate the security requirements of the users in the branch office. What should you do?()ARun the Secedit.exe command in validation mode and specify the new security template.BRun the Secedit.exe command in configuration mode and specify the new security template. CUse the Security Configuration and Analysis console to import both templates into a security database, and then perform an Analyze operation. DUse the Security Configuration and Analysis console to import both templates into a security database, and then perform a Configure operation.

单选题
You are the desktop administrator for one of your company's branch offices. The network in your branch office contains 100 Windows XP Professional computers. The computers are configured with the Compatws.inf security template. One of the network administrators in the company's main office creates a new security template named CompanySec.inf. The new template is designed to be applied to each of the company's Windows XP Professional computers. The users in your branch office have different security requirements from the users in the main office. You need to find out whether the new security template will violate the security requirements of the users in the branch office. What should you do?()
A

Run the Secedit.exe command in validation mode and specify the new security template.

B

Run the Secedit.exe command in configuration mode and specify the new security template. 

C

Use the Security Configuration and Analysis console to import both templates into a security database, and then perform an Analyze operation. 

D

Use the Security Configuration and Analysis console to import both templates into a security database, and then perform a Configure operation. 


参考解析

解析: 暂无解析

相关考题:

You have two desktop computers at your home. You establish a remote desktop connection from one computer to the other.The remote session fails to show the desktop background of the remote computer. You need to view the desktop background when you establish a remote session.What should you do?()A.AB.BC.CD.D

All servers on your company’s network run Windows Server 2008 R2. All client computers run Windows Vista.  The company is planning to virtualize an application that is CPU intensive and that runs only on Windows Vista and Windows 7. You need to recommend a virtualization solution that minimizes the use of CPU resources on the server.    Which technology should you recommend?()A、Remote Desktop Services (RDS)B、Microsoft Application Virtualization (App-V)C、Microsoft Virtual Desktop Infrastructure (VDI)D、Microsoft Enterprise Desktop Virtualization (MED-V)

You are the administrator of your company’s network. You run the English (US) edition of Windows 2000 Professional on all computers in your network. As your company continues to grow, and the number of computers is continually expanding, you decide that another domain is needed. Management asks you about what is required to accommodate this new domain. What should you answer the Management in this regard? ()A、WINS, DHCP and DNSB、At least one domain controller and one DNS server.C、At least one domain controller, Active Directory and DNS server.D、Nothing more is needed.E、Nothing more is needed, we can just subnet the network.

You are a desktop administrator for your company. A company user reports that he is unable to use his Bluetooth-enabled mobile phone with his Bluetooth-enabled Windows XP Professional computer. He is trying to play audio from the phone through the speakers on his computer. You verify that other Bluetooth devices work properly with the user’s computer. You test the speakers to make sure they are in working order. You also verify that the mobile phone can send output to a computer. You then discover that the phone cannot detect the computer.You need to ensure that the user can use the phone with his computer. What should you do?()A、Place the phone in Bluetooth discovery mode.B、Place the user’s computer in Bluetooth discovery mode.C、Add the phone and the computer to the same Bluetooth Personal Area Network (PAN).D、Install mobile phone synchronization software on the user’s computer.

You are the desktop administrator for one of your company's branch offices. The network in the branch office consists of a single network segment, which contains a domain controller, a DHCP server, 10 Windows 2000 Server computers, and 50 Windows 2000 Professional computers. All servers and client computers are members of the company's Active Directory domain. You purchase 50 new client computers for the branch office. Each new client computer contains a built-in PXE-compliant network adapter. You install and configure RIS on one of the Windows 2000 Server computers that is on the network in the branch office. You create a Windows XP Professional RIS image on the Windows 2000 Server computer. You connect the new client computers to the network in the office, and you turn on each computer. Each computer displays a message stating that it cannot contact a PXE boot server. You verify that the RIS server is connected to the network. You need to ensure that the new client computers can connect to the RIS server and can begin installing Windows XP Professional. What should you do?()A、Ask a domain administrator to authorize the RIS server. B、Grant the Everyone group Allow - Read NTFS permission on the RIS image.C、Install RIS on the domain controller. Copy the RIS image to the domain controller.D、Add a reservation for the RIS server to the DHCP server.

All servers on your company’s network run Windows Server 2008 R2. All client computers run Windows Vista.  The company is planning to virtualize an application that runs only on Windows 2000 Professional. You need to recommend a virtualization solution that enables users to run the virtualized application while their computers are disconnected from the corporate network.    Which technology should you recommend?()A、Remote Desktop Services (RDS)B、Microsoft Application Virtualization (App-V)C、Microsoft Virtual Desktop Infrastructure (VDI)D、Microsoft Enterprise Desktop Virtualization (MED-V)

Your company runs Remote Desktop Services. You have a Remote Desktop Session Host (RD Session Host) server. You need to select a digital certificate for signing Remote Desktop Protocol (.rdp) files. Which two certificate types can you use to achieve this goal?()A、Trusted third party SSL certificateB、Authenticated SessionC、Workstation AuthenticationD、Remote Desktop Protocol (RDP) Signing

You use Windows 2000 Professional on your desktop computer Company1. You use Company1 to runautomated reports and retrieve performance data from Windows 2000 Server computers.You configure Scheduled Tasks to notify you of failed tasks. Three days later, you notice that none ofyour tasks was started and you never received notification. You view the list of scheduled tasks as shownin the exhibit. You want to enable your tasks to start and then to receive notification of failed tasks. What should you do? ()A、Use Scheduled Tasks to configure the tasks to run under the security context of a local      Administrator account. B、Configure the Task Scheduler service account to use a local Administrator account and password.  C、Use Computer Management to start the Messenger service and to configure the Messenger service to start automatically. D、Use Computer Management to start the Task Scheduler service and to configure the Task Scheduler service to start automatically.

You are the desktop administrator for your company. Your company’s software developers use Windows XP Professional and IIS on their client computers to develop Web-based applications. All client computers use Microsoft Internet Explorer 6. 0 or later as their Web browser. One of the developers reports that he can no longer access the Web-based application on his desktop by using his Web browser. When you attempt to access the application by using your Web browser, you receive the following error message: “Cannot find server or DNS Error.” You verify that the World Wide Web Publishing Service is started on the developer’s computer. You also verify that you are using the correct URL to access the developer’s computer by using your Web browser. You need to ensure that the developer can access the Web application by using his Web browser. How should you configure the developer’s computer?() A、Start the default Web site.B、Start the IIS Admin Service.C、Run the IPconfig /registerdns command.D、In the default Web site properties,disable the host header setting.

You install Windows 2000 Professional on your computer at home. You create a new dial-up connection to connect to your company’s remote access server. You configure the connection to use both of your external modems and to use multilink to bind the modems together. You start the dial-up connection and connect to the remote access server. You notice that only one of the modems is connected to the remote access server. What should you do?()A、Configure the dial-up connection to use a SLIP connection.B、Configure the company’s remote access server to accept multilink connections.C、Replace your modems with new modems that support multilink.D、Grant your user account multilink permission on the company’s remote access.

You are the desktop administrator for your company's sales department. The IT manager for the sales department creates a custom policy that will apply to a custom application that is loaded on the department's Windows XP Professional computers. He deploys this policy by using Group Policy. When you inspect the sales department's computers, you find out that the application has not been modified by the policy. You want to examine Windows XP Professional to find out whether the custom policy is affecting the correct location in the Registry. Which command should you run?()A、Msinfo32. exeB、Gpresult.exeC、Gpedit.mscD、Rsop.msc

You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as a database administrator for your company. You utilize the SP:Recompile event class to run SQL Server Profiler. You find that a great amount of recompiles occurring. The possible causes of the large number of recompiles should be identified.  From the flowing four options, which one is the most possible cause of the problem?()A、The sp_executesql batches are not being recovered from the procedure cache.B、A database administrator executed UPDATE STATISTICS statements on all tables, and the most common stored procedures reference all the tables.C、One new stored procedure is created by a database administrator.D、Ad hoc batches are not being recovered from the procedure cache.

You are the network administrator for Company.You need to connect to Company’s network from your Windows 2000 Professional computer at home.You have a DSL line that is used for Internet connectivity. You create an L2TP virtual private network(VPN) connection and are able to connect successfully to Company’s network. While connected toCompany’s network, you are unable to access the Internet.You want to be able to access the Internet while connected to Company’s network.How should you configure the connection properties?()A、Configure the DSL connection to use PPTP instead of L2TP. B、Enable Internet Connection Sharing for the DSL connection properties. C、CLEAR THE Use default gateway on remote network check box. D、Clear the Require data encryption check box.

单选题You are the desktop administrator for your company. Your company’s software developers use Windows XP Professional and IIS on their client computers to develop Web-based applications. All client computers use Microsoft Internet Explorer 6. 0 or later as their Web browser. One of the developers reports that he can no longer access the Web-based application on his desktop by using his Web browser. When you attempt to access the application by using your Web browser, you receive the following error message: “Cannot find server or DNS Error.” You verify that the World Wide Web Publishing Service is started on the developer’s computer. You also verify that you are using the correct URL to access the developer’s computer by using your Web browser. You need to ensure that the developer can access the Web application by using his Web browser. How should you configure the developer’s computer?()AStart the default Web site.BStart the IIS Admin Service.CRun the IPconfig /registerdns command.DIn the default Web site properties,disable the host header setting.

问答题Practice 11  ● You are the Manager of a small printing company. A new employee, Mark McCabe, is joining your company on 10th May.  ● Write a short memo to your office administrator.  ● Saying who is starting work and when;  ● Telling him what Mark McCabe’s desk should be put;  ● Suggesting where Mark McCabe’s job will be.  ● Write 30—40 words on your answer sheet.

单选题You are the administrator of your company’s network. Using Windows Installer packages, you want to install customized versions of Microsoft Excel on different departments in the company. Which type of file should you apply to the installation database?()AmsiBmstCzapDzip

单选题You have a computer that runs Windows XP Professional. Multiple users share the computer. You log on to the computer by using the local administrator account and install a custom application. You need to add an application shortcut to the desktop of all new users who use the computer. The shortcut must appear on the desktop of new users only. What should you do?()ACopy the shortcut to %systemdrive%/documents and settings/default user/desktop/.BCopy the shortcut to %systemdrive%/documents and settings/all users/desktop/.CCopy the shortcut to your desktop. Modify the %comspec% system environment variable. DCopy the shortcut to the guest user’s desktop. Assign the Everyone group Read permission to the guest user profile.

多选题You are the administrator of a Windows 2000 Professional computer, which has a 56 Kbps modem, connected to itself. You want the users on your company’s network to be able to connect to the Internet using your computer. But, you do not want to allow any other operations than HTTP and FTP. Which ports will you allow through this connection? ()APort 80BPort 21CPort 25DPort 81

多选题Your company runs Remote Desktop Services. You have a Remote Desktop Session Host (RD Session Host) server. You need to select a digita l certificate for signing Remote Desktop Protocol (.rdp) files. Which two certificate types can you use to achieve this goal?()ATrusted third party SSL certificateBAuthenticated SessionCWo rkstation AuthenticationDRemote Desktop Protocol (RDP) Signing

问答题Practice 5  ● You are on a business trip to one of your company’s factories in Paris to inspect some machines in trouble. You are asked to report to your Department Manager about your work progress there.  ● Write a memo  ● telling him what you have done so far,  ● stating what the trouble is,  ● saying what you are going to do next.  ● Write 40—50 words on the opposite page.

单选题You are the administrator of your company’s network. Your company is based in Russia and conducts the majority of its business in Russian. Users in your company create, view, and edit documents in English (US), French, and Spanish to communicate weight vendors internationally. Users run the Russian localized edition of Windows 2000 Professional on their desktop and portable computers. A user named Katrin wants to create a word processing documents in both English and Spanish by using Notepad in Windows 2000 Professional. She requests your assistance in enabling English and Spanish on her computer. What should you do?()AInstruct Katrin to select the desired input local for either English or Spanish within NotepadBInstruct Katrin to select the input local indicator on the taskbar and select either English or  SpanishCInstruct Katrin to use Regional Options in Control Panel to add input Locales and keyboard  layouts/IME for both English and SpanishDCreate a Local Computer Policy for Katrin's computer to include both English and Spanish.

单选题You need to recommend an RD Gateway configuration that meets the company’s technical requirements.   What should you recommend?()ACreate two Remote Desktop connection authorization policies (RD CAPs) and one Remote Desktop resource authorization policy (RD RAP).BCreate one Remote Desktop connection authorization policy(RD CAP)and two Remote Desktop  resource authorization policies (RD RAPs).CCreate one Remote Desktop resource authorization policy(RD RAP)and deploy the Remote Desktop Connection Broker(RD Connection Broker) role service.DCreate one Remote Desktop connection authorization policy(RD CAP) and deploy the Remote  Desktop Connection Broker (RD Connection Broker) role service.

单选题You want to install Windows 2000 Professional on 45 new computers on your company’s network. You first install Windows 2000 Professional on one of the new computers. You log on to the computer by using the local administrator account.  You install Microsoft Office 97, a virus scanner, and other company-standard applications. You then create a RIS image of the computer you configured. You want to configure the RIS image so that the standard applications will be accessible to the user when the user first logs on to the network.  What should you do?()ARun Rbfg.exe before installing the standard applications. BRun RIPrep.exe before installing the standard applications. CCopy the all users profile to the default users profile.DCopy the local administrator account profile to the default users profile

单选题All servers on your company’s network run Windows Server 2008 R2. Client computers run a Windows, Mac, or Linux operating system. The company is planning to virtualize an enterprise application. You need to recommend a virtualization solution that allows the virtualized application to be accessed from all of the client computers. Which technology should you recommend?()AWindows Virtual PCBRemote Desktop Services (RDS)CMicrosoft Application Virtualization (App-V)DMicrosoft Enterprise Desktop Virtualization (MED-V)

单选题You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005.You work as a database administrator for your company. A SQL Server 2005 database is utilized in your company. And a table named Inventory is contained by the database. A column named Price is included by the table. According to the company policy, you cannot reduce more than 10 percent the value in the Price column in any single database operation. Through many kinds of method, the company makes updates to the Price column. For instance, the utilization of ad hoc queries is one of the methods. Since you are the database administrator, you should confirm that this company policy takes its effect. Which action should be performed?()AA stored procedure should be created, and changes are disallowed by the procedure to the Price column that violates company policy.BOn the Price column, a check constraint should be created, and a specified minimum value is required by the check constraint.CA trigger should be created, and changes are rolled back by the trigger to the Price column that violates company policy.DOn the Price column, a foreign key constraint is created to a table that valid prices are included.

单选题You are the network administrator for your company. All network servers run Windows Server 2003. All client computers run Windows XP Professional. A member server named Server1 is located at a branch office that does not permit the use of Remote Desktop Protocol. Another administrator uses the Backup utility to create a scheduled backup job on Server1. The backup job performs a normal backup of an application server. The application server is removed from the network. You need to use a client computer to remove the backup job from Server1. You cannot travel to the branch office. What should you do? ()AUse the RUNAS feature to run the at /delete command as the Server1/Administrator account.BLog on by using your Administrator account and run the ntbackup /D command.CLog on by using your Administrator account and run the schtasks /delete command.DUse the RUNAS feature to run the taskkill command as the Server1/Administrator account.

单选题You are the desktop administrator for your company's sales department. The IT manager for the sales department needs to distribute a custom application to the Windows XP Professional computers in the sales department. He deploys the software by using Group Policy. Susan is a user in the sales department. She reports that the custom application is not available. You examine her computer, and you verify that the application is not present on her computer. You want to ensure that the software is deployed the next time Susan logs on. Which command should you run?()ASecedit /refreshpolicy user_policy /enforceBSecedit /refreshpolicy machine_policy /enforceCGpupdate /target:computer /syncDGpupdate /target:user /sync