单选题You are a systems administrator responsible for deploying Windows SharePoint Services (WSS) for accessby users from an external business partner. You have installed the appropriate server role and have verified that the SharePoint Web site loads properly from the local server computer. All options are usingtheir installation default values. External users report that they cannot log on to the site. Which of thefollowing changes should you make to resolve the problem?()ACreate a new site within an existing site collection for the external users.BCreate a new site collection for the external users.CChange the authentication mode for the Web application to Forms authentication.DModify the User Permissions For Web Applications settings.

单选题
You are a systems administrator responsible for deploying Windows SharePoint Services (WSS) for accessby users from an external business partner. You have installed the appropriate server role and have verified that the SharePoint Web site loads properly from the local server computer. All options are usingtheir installation default values. External users report that they cannot log on to the site. Which of thefollowing changes should you make to resolve the problem?()
A

Create a new site within an existing site collection for the external users.

B

Create a new site collection for the external users.

C

Change the authentication mode for the Web application to Forms authentication.

D

Modify the User Permissions For Web Applications settings.


参考解析

解析: 暂无解析

相关考题:

Do you want to be responsible ______ this assignmen? A、inB、onC、atD、for

A Windows Communication Foundation (WCF) service is responsible for transmitting XML documents between systems.The service has the following requirements:It must minimize the transmission size by attaching the XML document as is without using escape characters or base64 encoding.It must interoperate with systems that use SOAP but are not built on the .NET plafform.You need to configure the service to support these requirements. Which message encoding should you use?()A. Binary message encodingB. MTOM (Message Transmission Optimization Mechanism) message encodingC. Text message encoding with message version set to noneD. Text message encoding with message version set to SOAP 1.2

You are the administrator responsible for security and user desktop settings on your network. You need to configure a custom registry entry for all users. You want to add the custom registry entry into a Group Policy object (GPO) with the least amount of administrative effort.What should you do?A.Configure an ADM template and add the template to the GPO.B.Configure an INF policy and add the policy to the GPO.C.Configure a Microsoft Windows installer package and add the package to the GPO.D.Configure RIS to include the registry entry.

An administrator attempts a traceroute but receives a "Destination Unreadable" message. Which protocol is responsible for that message?()A、RARPB、RUDPC、ICMPD、SNMP

A system administrator is responsible for a vast and growing collection of dissimilar AIX systems. The verification of microcode levels and installation of new microcode is becoming increasingly unmanageable. What tool can be used to discover the existence of new microcode and automate the download and installation?()A、NIMB、HMCC、sumaD、invscout

Your virtual environment includes Windows Server 2008 R2 Hyper-V servers. You are deploying a  Remote Desktop Pool.You need to choose an operating system for the virtual machines(VMs)in the pool. Which two operating systems will achieve this goal?()A、Windows Vista EnterpriseB、Windows 7 EnterpriseC、Windows Server 2008D、Windows Server 2008 R2

A Windows Communication Foundation (WCF) service is responsible for transmitting XML documents between systems. The service has the following requirements: It must minimize the transmission size by attaching the XML document as is without using escape characters or base64 encoding. It must interoperate with systems that use SOAP but are not built on the .NET plafform. You need to configure the service to support these requirements. Which message encoding should you use?()A、Binary message encodingB、MTOM (Message Transmission Optimization Mechanism) message encodingC、Text message encoding with message version set to noneD、Text message encoding with message version set to SOAP 1.2

You work as an administrator at ENSUREPASS.com. The ENSUREPASS.com network consists of a single domain named ENSUREPASS.com.Subsequent to deploying a Server Core Installation of Windows Server 2012 on a new ENSUREPASS.com server, you are instructed to add a graphical user interface (GUI) to the server.You want to achieve this goal from the command prompt. Which of the following actions should you take?()A、You should consider making use of the dism.exe command.B、You should consider making use of the dsquery.exe commandC、You should consider making use of the dsadd.exe commandD、You should consider making use of the dsrm.exe command

You work as the exchange administrator at TestKing.com. The TestKing.com network contains anExchange Server 2010 Organization. You are responsible for managing the Exchange network forTestKing.com. You are in the process of deploying an Edge Transport server named TESTKING-EX01 into the organization. During the course of the day you receive an instruction from management to implement amessages hygiene solution. Management wants you to: * Ensure that TESTKING-EX01 blocks e-mails sent to invalid address in the organization. * Ensure that clients receive e-mail from external recipients that is added to their Sage Senders Lists. What should you do?()A、Your best option would be to create Send connectors.B、Your best option would be to configure EdgeSync synchronization.C、Your best option would be to enable sender filtering.D、Your best option would be to configure real time block lists (RBLs).

You are a systems administrator responsible for managing a Windows Server 2008 SMTP server.Recently, users have complained that a Web application running on the same server is experiencing performance problems at specific times of the day. You suspect that the problem might be related to loadplaced on the SMTP Server service. Which of the following methods should you use to monitor theperformance of an SMTP virtual server over time?()A、The Current Sessions section of IIS 6.0 ManagerB、SMTP Server counters collected by Performance MonitorC、Windows Event Viewer: Application LogD、Windows Event Viewer: System Log

You work as the exchange administrator at TestKing.com. The TestKing.com network contains anExchange Server 2010 Organization. TestKing.com has its headquarters in Stockholm where you arelocated. You are responsible for managing the Exchange network for TestKing.com. The Exchange organization contains two Client Access Servers. You are in the process of deploying aMicrosoft Internet Security and Acceleration (ISA) server. During the course of day you receive aninstruction from the CIO to recommend a high availability solution for the Client Access servers formanagment. Management wants OWA connections to be available in the event of one Client Access Server failing as well as ensuring that the client access services is accessible in a fail on the Client AccessServer. What should you do?()A、You should recommend the deployment of Windows Network Load Balancing.B、You should recommend publishing every Client Access server in a separate publishing rule.C、You should recommend publishing the two Client Access servers in a single publishing rule as a Web server farm.D、You should recommend the deployment of a hardware load balancer.

You work as the enterprise exchange administrator at Xxx .The Xxx network is running in a Microsoft Exchange Server 2010 environment.You are responsible for managing an Exchange Server 2010 server named XXX-EX02 that has IMAP4 installed.What actions must you take to determine the ability of users to e-mail hosts on the Internet?()A、You must connect to port 587, from a workstation.B、You must use the Get-MessageTrackingReport cmd.C、You must enable the Receive connectors and Send connectors.D、You must use the Remote Connectivity Analyzer.

Company.com has employed you as their Exchange administrator.The Company.com network contains an Exchange Server 2010 Organization.You are responsible for managing the Company.com network.You receive an instruction from management to reject e-mail messages that have a spam confidence level (SCL) of 5.You thus decide to configure the organization to accomplish this task. What should you do?()A、You should consider configuring the sender reputation.B、You should consider configuring the sender filtering.C、You should consider configuring the content filtering.D、You should consider configuring the recipient filtering.

You are a desktop administrator for your company. You are responsible for deploying a new application. The application is packaged in an .msi file. You need to deploy the application to only three users in the company. The .msi file contains all of the information necessary to correctly install the application. You need to install the application so that users see information about the installation progress, but no other user interface is displayed during the installation. What should you do?()A、Use the Msiexec.exe program to perform a quiet installation of the application.B、Use the Msiexec.exe program to perform a passive installation of the application. C、Create a Group Policy object (GPO) that assigns the application. Link the GPO to the site containing the users who will use the application. D、Create a Group Policy object (GPO) that advertises the application. Link the GPO to the domain.

An administrator named Admin1 plans to deploy operating systems to the planned VMs. You need to recommend a configuration plan for the VMs. The plan must ensure that the operating systems can be deployed to the VMs. What should you include in the recommendation?()A、a synthetic network adapterB、an emulated network adapterC、virtual machine queue (VMQ)D、Virtual Machine Chimney

You work as the enterprise exchange administrator at Xxx .The Xxx network is running in a Microsoft Exchange Server 2010 environment.You are responsible for managing an Exchange Server 2010 server named XXX-EX02.What command can be used to determine if the employees can utilize Outlook Anywhere to access XXXEX02?()A、You must use the Test-ImapConnectivity cmdlet.B、You must use the Test-OutlookConnectivity cmdlet.C、You must use the Get-MessageTrackingReport cmd.D、You must use the Exchange Remote Connectivity Analyzer.

多选题You work as a database administrator for Certkiller .com. In your development environmentenvironment, the developers are responsible for modifying the table structure according to the application requirements. However, you want to keep track of the ALTER TABLE commands being executed by developers, so you enable auditing to achieve this objective.  Which two views would you refer to find out the audit information?()ADBA_AUDIT_TRAILBDBA_AUDIT_SESSIONCDBA_FGA_AUDIT_TRAILDDBA_COMMON_AUDIT_TRAIL

多选题You are an administrator in a company that has Windows 2000 Professional systems. Your users have been installing unsupported USB drivers on to their systems causing them to lock up and fail. You want to insure that only drivers that are in the HAL can be installed. What must be done?()AIgnore - Install all files, regardless of file signatureBWarn - Display a message before installing an unsigned fileCBlock - Prevent installation of unsigned filesDApply setting as system default

单选题You are an administrator for a corporate network. At a branch office,you want to deploy Windows Vista to21 client computers and Windows Server 2008 to four servers. For which operating systems is the branchoffice eligible for KMS licensing?()AWindows VistaBWindows Server 2008CBoth Windows Vista and Windows Server 2008DNeither Windows Vista nor Windows Server 2008

单选题You are a Windows Server 2008 systems administrator responsible for configuring FTP Publishing Servicefor use by members of your organization’s engineering department. The name of the server is FTPServer01. Several users have reported that they are able to access most files through the FTP site,but they cannot access the contents of the Drawings folder. You have verified that these users. Windowsaccounts have the correct file system permissions for this folder. You want to minimize the permissionsgranted to all the users. Which of the following changes should you make to enable users to access thisfolder?()AChange the permissions for the IUSR_FTPServer01 account on the Drawings folder.BCreate new TCP/IP Address Restrictions entries for the users who cannot access the Drawings folder.CDisable the Allow Only Anonymous Connections option.DAdd the users to the local Administrators group on FTPServer02.

单选题You are a systems administrator responsible for managing a Windows Server 2008 Web server. Recently,your organization set up a new IIS Web site that will be accessed by users outside of your organizations.Consultants should be able to connect to this Web site, using IIS Manager. Your organization’s securitypolicy prevents you from creating domain accounts or local user accounts for these users. You attempt touse the IIS Manager Permissions feature for the Web site. However, when you click Allow User, you areable to select only Windows users.  How can you resolve this problem?()AVerify that Management Service has been started.BReconfigure the file system permissions for the root folder of the Web site.CReconfigure Management Service to enable Windows And IIS Manager Credentials.DVerify the Authentication settings for the Web site.

单选题You are a systems administrator responsible for securing a Windows Server 2008 Web server. You havecreated a new Web site called Contoso Intranet that will contain seven Web applications. One of theapplication developers has told you that her Web application requires a new request handler that isprocessed using a .NET library her team created. How can you meet these requirements while also maximizing security for the server?()AAdd a new managed handler to the Contoso Intranet Web site.BAdd a new managed handler for the specific Web application that requires it.CAdd a new module mapping to the Contoso Intranet Web site.DAdd a new module mapping for the specific Web application that requires it.

单选题You are a database administrator for your company. You are responsible for a SQL Server 2005 database that has several indexes. You need to write a stored procedure that checks the indexes for fragmentation. Which Transact-SQL statement should you use?()ADBCC DBREINDEXBSELECT * FROM sys.dm_db_index_physical_statsCDBCC INDEXDEFRAGDSELECT * FROM sys.indexes

多选题You are a systems administrator responsible for managing a Windows Server 2008 Web Server Currently,there are no Web sites configured on the server. You need to configure the server to host two Web applications: Engineering App and Sales App. Both Web applications must be accessible by using HTTPport 80 without the use of host headers. Also, you must protect against problems in one Web applicationaffecting the performance or reliability of the other Web application. Which two steps should you take tomeet these requirements?()ACreate a single Web site that contains both Web applications.BCreate two Web sites, one for each Web application.CAssign both Web applications to the same application pool.DAssign each Web application to its own application pool.

多选题You are a systems administrator responsible for configuring a Windows Server 2008 SMTP server. Yourorganization is currently using the default SMTP virtual server for sending order notifications from a single Web application called ContosoOrderManagement. Recently, you have noticed that a largenumber of messages have been sent to the SMTP virtual server from other computers and users. Which two methods can you use to prevent unauthorized access to the SMTP server?()AEnable Basic Authentication.BConfigure a smart host for use by the SMTP virtual server.CAdd Connection Control entries to limit which IP addresses can use the SMTP server.DModify settings on the Security tab of the properties of the SMTP virtual server.

单选题You work as the exchange administrator at TestKing.com. The TestKing.com network contains anExchange Server 2010 Organization. TestKing.com has its headquarters in Stockholm where you arelocated. You are responsible for managing the Exchange network for TestKing.com. The Exchange organization contains two Client Access Servers. You are in the process of deploying aMicrosoft Internet Security and Acceleration (ISA) server. During the course of day you receive aninstruction from the CIO to recommend a high availability solution for the Client Access servers formanagment. Management wants OWA connections to be available in the event of one Client Access Server failing as well as ensuring that the client access services is accessible in a fail on the Client AccessServer. What should you do?()AYou should recommend the deployment of Windows Network Load Balancing.BYou should recommend publishing every Client Access server in a separate publishing rule.CYou should recommend publishing the two Client Access servers in a single publishing rule as a Web server farm.DYou should recommend the deployment of a hardware load balancer.

单选题An administrator named Admin1 plans to deploy operating systems to the planned VMs. You need to recommend a configuration plan for the VMs. The plan must ensure that the operating systems can be deployed to the VMs. What should you include in the recommendation?()Aa synthetic network adapterBan emulated network adapterCvirtual machine queue (VMQ)DVirtual Machine Chimney