单选题You need to recommend a strategy for delegating administrative rights to Admin1. The strategy must support the company’s planned changes.What should you include in the recommendation?()Athe Authorization Manager snap-in on Node1 and Node2Bthe Authorization Manager snap-in on the VMsCthe Network Configuration Operators local group on each VMDthe Network Configuration Operators local group on Node1 and Node2

单选题
You need to recommend a strategy for delegating administrative rights to Admin1. The strategy must support the company’s planned changes.What should you include in the recommendation?()
A

the Authorization Manager snap-in on Node1 and Node2

B

the Authorization Manager snap-in on the VMs

C

the Network Configuration Operators local group on each VM

D

the Network Configuration Operators local group on Node1 and Node2


参考解析

解析: 暂无解析

相关考题:

You need to recommend a strategy for the computer lab that meet the company’s technical requirements. What should you recommend?()A、Enable the loopback setting in GPO2. Enable the Enforced option in GPO1.B、Enable the Block Inheritance option on Lab OU. Enable the Enforced option in GPO1.C、Enable the loopback setting in GPO2. Disable the user configuration settings in GPO3.D、Enable the Block Inheritance option on Lab OU. Disable the user configuration settings in GPO3.

You need to recommend a backup strategy for the servers in the San Francisco office. The strategy must meet the company's technical requirements    What should you include in the recommendation?()A、native-boot virtual hard disks (VHDs)B、Microsoft System Center Data Protection Manager 2010C、system restore pointsD、Windows Server Backup

You are the enterprise administrator for an Exchange Server 2010 organization. All users run Microsoft Office Outlook 2010.  You are designing a sharing solution for your organization and a partner organization. The partner organization also uses Exchange Server 2010.  You need to recommend a strategy for sharing information with the partner organization to meet thefollowing requirements: .Provide cross-organizational access to user contacts  .Provide cross-organizational access to free/busy information What should you recommend?()A、Creating cross-forest trustsB、Implementing Federated SharingC、Implementing Microsoft Identify Lifecycle Manager (ILM) 2007D、Running the Microsoft Exchange Inter-Organization Replication tool

You need to recommend a strategy for delegating administrative rights to Admin1. The strategy must support the company’s planned changes.What should you include in the recommendation?()A、the Authorization Manager snap-in on Node1 and Node2B、the Authorization Manager snap-in on the VMsC、the Network Configuration Operators local group on each VMD、the Network Configuration Operators local group on Node1 and Node2

You are designing a strategy for synchronizing a SQL Azure database and multiple remote Microsoft SQL Server 2008 databases.  The SQL Azure database contains many tables that have circular foreign key relationships.  You need to recommend an approach for ensuring that all changes in the remote databases synchronize with the SQL Azure database.  What should you recommend?()A、 Use SQLAzure Data Sync Service.B、 Use SQL Server replication.C、 Use SQL Server backup and restore.D、 Use SQL Server database snapshots.

You need to recommend a strategy to ensure that the administration of AD LDS is encrypted.  What should you include in the recommendation?()A、a server authentication certificateB、client authentication certificatesC、Digest authenticationD、Windows Integrated authentication

You need to recommend a strategy for managing Windows Firewall that meets the companys technical requirements. What should you include in the recommendation?()A、domain-based Group Policy objects (GPOs)B、local Group Policy objects (GPOs)C、Starter Group Policy objects (GPOs)D、System Starter Group Policy objects (GPOs)

You need to recommend a strategy for using managed service accounts on the Web servers.How many managed service accounts should you recommend?()A、1B、2C、3D、5

You need to recommend a security strategy for WebApp2 that meets the company’s applicaton  requirements.What should you include in the recommendation?()A、Basic authentication and connection security rulesB、Basic authentication and SSLC、Digest authentication and connection security rulesD、Digest authentication and SSL

You need to recommend an IP addressing strategy for the client computers in the new sales office. What should you recommend implementing in the new sales office?()A、DHCP server rolesB、the DirectAccess featureC、the Network Policy Server (NPS) role serviceD、the Remote Access Service role service

You are designing an automated deployment process for a Windows Azure application.   The process must deploy the application to Windows Azure without any user interaction. You need to recommend a deployment strategy.  What should you recommend?()A、 Use the Service Management API to deploy the application package.B、 Use the cspack and csrun command-line utilities and pass the cloud project as an argument.C、 Publish the cloud project to a local directory and upload the application package to Windows Azure Blob storage.D、 Publish the cloud project to a localdirectory and use the Windows Azure Developer Portal to upload the application.

单选题You are designing a strategy for synchronizing a SQL Azure database and multiple remote Microsoft SQL Server 2008 databases.  The SQL Azure database contains many tables that have circular foreign key relationships.  You need to recommend an approach for ensuring that all changes in the remote databases synchronize with the SQL Azure database.  What should you recommend?()A Use SQLAzure Data Sync Service.B Use SQL Server replication.C Use SQL Server backup and restore.D Use SQL Server database snapshots.

单选题You need to recommend a deployment strategy for App1. What should you recommend?()AAssign App1 to users by using a Group Policy.BPublish App1 to users by using a Group Policy.CDeploy App1 as a RemoteApp program by using an MSI file.DDeploy App1 as a RemoteApp program by using an RDP file.

单选题You need to recommend a server build for the Web servers. Which server build should you recommend?()AClass 1BClass 2CClass 3DClass 4

多选题You need to recommend a strategy for recovering objects deleted from Active Directory that supports the planned changes.   What should you include in the recommendation? ()AActive Directory Recycle BinBActive Directory snapshotsCnon-authoritative restoresDtombstone reanimation

单选题You need to recommend a Group Policy strategy for the Remote Desktop servers. What should you include in the recommendation?()Ablock inheritanceBloopback processingCsecurity filteringDWMI filtering

单选题You need to recommend a strategy for the file servers that meets the company’s technical requirements.   What should you recommend?()AImplement active file screens.BImplement passive file screens.CConfigure classification rules.DConfigure File Server Resource Manager (FSRM) quotas.

单选题You need to recommend a Windows update strategy for the new branch office. What should you recommend doing in the new branch office?()ADeploy WSUS in replica mode. Configure updates to be stored on the new WSUS server.BDeploy WSUS in autonomous mode. Configure updates to be stored on the new WSUS server.CDeploy WSUS in replica mode. Configure the WSUS clients to retrieve updates from Microsoft Update.DDeploy WSUS in autonomous mode.Configure the WSUS clients to retrieve updates from Microsoft  Update.

单选题You need to recommend a strategy to ensure that the administration of AD LDS is encrypted.  What should you include in the recommendation?()Aa server authentication certificateBclient authentication certificatesCDigest authenticationDWindows Integrated authentication

单选题You need to recommend a strategy for managing the domain controllers in the branch offices thatmeets the company security requirements.What should you include in the recommendation?()AConfigure Administration Role Separation.BAdd the BranchAdmins group to the Domains Admins group.CAdd the BranchAdmins group to the Server Operators group.DAssign the permission for the domain controller computer objects to the BranchAdmins group.

单选题You need to recommend a NAP enforcement method that meets the companyˉs security requirements. Which method should you recommend?()A802.1XBDHCPCIPSecDVPN

单选题You need to recommend a strategy for using managed service accounts on the Web servers.How many managed service accounts should you recommend?()A1B2C3D5

单选题You are designing a Windows Azure solution. The solution will be used by multiple customers.  Each customer has different business logic and user interface requirements. Not all customers use the same version of the .NET runtime. You need to recommend a deployment strategy.  What should you recommend?()A Deploy in a multitenant configuration.B Deploy in a single-tenant configuration.C Deploy with multiple web role instances.D Deploy with multiple worker role instances.

单选题You need to recommend an update management strategy for the Chicago campus that meets the  company’s technical requirements. What should you recommend?()ADeploy a WSUS server in replica mode,and then configure the servers reporting rollup settingsBDeploy a WSUS server in replica mode,and then configure the serverse-mail notification settings.CDeploy a WSUS server in autonomous mode,and then configure the servers reporting rollup settingsDDeploy a WSUS server in autonomous mode,and then configure the servers e-mail notification  settings.

单选题You need to recommend which protocol to use for the planned App-V deployment. Which protocol should you recommend?()ASMBBRTSPSCCIFSDHTTPS

单选题You need to recommend a strategy for delegating administration to the consulting firm.What should you recommend?()ACreate local user accounts.BCreate domain user accounts.CCreate IIS Manager user accounts.DImplement Active Directory Lightweight Directory Services (AD LDS).

单选题You need to recommend an IP addressing strategy for the client computers in the new sales office. What should you recommend implementing in the new sales office?()ADHCP server rolesBthe DirectAccess featureCthe Network Policy Server (NPS) role serviceDthe Remote Access Service role service