单选题Which policy determines what happens to local data and to the BIOS settings on a server during the discovery process and when the server is disassociated from a service profile?()A boot policy and BIOS policyB disk scrub and boot policyC BIOS setting scrub, boot policy, and BIOS policyD disk scrub and BIOS setting scrub

单选题
Which policy determines what happens to local data and to the BIOS settings on a server during the discovery process and when the server is disassociated from a service profile?()
A

 boot policy and BIOS policy

B

 disk scrub and boot policy

C

 BIOS setting scrub, boot policy, and BIOS policy

D

 disk scrub and BIOS setting scrub


参考解析

解析: 暂无解析

相关考题:

What happens to the 66.66.66/24 route when it is evaluated by this policy? () A. The route does not match this policy.B. The route is rejected.C. The route is accepted.D. The route is accepted, then rejected.

______is well known,data under-determines theories.A.AsB.ThatC.WhatD.Which

A receiving host computes the checksum on a frame and determines that the frame is damaged.The frame is then discarded.At which OSI layer did this happen?()A、sessionB、networkC、physicalD、data linkE、transport

Regarding disk scrub, which two of these occur to the data on any local drives upon disassociation? ()A、 If disk scrub is enabled, all BIOS settings for the server are erased.B、 If disk scrub is enabled, all the data access on any local drives is destroyed.C、 If disk scrub is enabled, the LSI active RAID is destroyed but data is still preserved.D、 If disk scrub is disabled, all data on any local drives is preserved, including the local storage configuration.E、 If disk scrub is enabled, all data on any local drives is preserved, including the local storage configuration.

Which of the following BEST describes a hub?()A、Determines the best route to transmit dataB、Inspects traffic and accepts or declines transmissionC、Broadcasts data to specific network devicesD、Broadcasts data to all network devices

If there is a conflict in policy for data retention, which of the following should the technician adhere to FIRST?()A、Industry best practicesB、Company policyC、International standardsD、Local legal requirements

What is the objective of the aaa authentication login console-in local command?()A、It specifies the login authentication method list named console-in using the local user database on the routerB、It specifies the login authorization method list named console-in using the local RADIUS username-password data baseC、It specifies the login authentication list named console-in using the local username- password data base on the routerD、It specifies the login authorization method list named console-in using the local username- password data base on the router

You have a computer that runs Windows 7. You need to record when an incoming connection is allowedthrough Windows firewall. What should you do?()A、In Local Group Policy, modify the audit policy.B、In Local Group Policy, modify the system audit policy.C、From the Windows Firewall with Advanced Security properties, set the logging settings to Log successfulconnections.D、From the Windows Firewall with Advanced Security properties, set the Data Protection (Quick Mode)IPSec settings to Advanced.

Which policy determines what happens to local data and to the BIOS settings on a server during the discovery process and when the server is disassociated from a service profile?()A、 boot policy and BIOS policyB、 disk scrub and boot policyC、 BIOS setting scrub, boot policy, and BIOS policyD、 disk scrub and BIOS setting scrub

Which of the following does an astronomical time clock do?()A、Determines the ambient light at night with a photocell.B、Calculates sunset and sunrise times based on geographical area.C、Determines the start and end of each of the seasons.D、Synchronizes the local time displayed with the official world time.

When disposing of data, which of the following should be considered FIRST?()A、Company policy requirementsB、Local legal requirementsC、Storage requirementsD、Disposal requirements

Which test checks the transmitter and receiver of a local modem?()A、data parityB、analog loop backC、local digital loop backD、remote digital loop back

You executed the following command to create a tablespace called SALES_DATA: SQL CREATE TABLESPACE sales_data DATAFILE SIZE 100M SEGMENT SPACE MANAGEMENT AUTO; Which two statements are true about the SALES_DATA tablespace()A、The database automatically determines the extent-sizing policy for the tablespace.B、The segments are automatically shrunk when the contents are removed from them.C、The allocation of extents within the tablespace is managed through the dictionary tables.D、The space utilization description of the data blocks in segments is recorded in bitmap blocks.E、The space utilization description of the data blocks in segments is managed through free lists.

You need to recommend a strategy for managing Windows Firewall that meets the companys technical requirements. What should you include in the recommendation?()A、domain-based Group Policy objects (GPOs)B、local Group Policy objects (GPOs)C、Starter Group Policy objects (GPOs)D、System Starter Group Policy objects (GPOs)

Your network consists of a single Active Directory domain. The network contains a Terminal Server that runs Windows Server 2008, and client computers that run Windows Vista. All computers are members of the domain.   You deploy an application by using the TS RemoteApp Manager. The Terminal Servers security layer is set to Negotiate.  You need to ensure that domain users are not prompted for credentials when they access the application. What should you do?()A、On the server, modify the Password Policy settings in the local Group Policy.B、On the server, modify the Credential Delegation settings in the local Group Policy.C、On all client computers, modify the Password Policy settings in the local Group Policy.D、On all client computers, modify the Credential Delegation settings in the local Group Policy.

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system.You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services,and configuring aweb services infrastructure. There is a single Active Directory domain in your network. The networkcontains a Terminal Server that runs Windows Server 2008, and client computers that run Windows Vista.All computers are members of the domain. You use the TS RemoteApp Manager to deploy an application.The Terminal Servers security layer is set to Negotiate. You have to make sure that domain users are notprompted for credentials when they access the application.  What action should you perform to make sureof this?()A、The Credential Delegation settings in the local Group Policy should be modified on the server.B、The Password Policy settings in the local Group Policy should be modified on the server.C、The Credential Delegation settings in the local Group Policy should be modified on all client computers.D、The Password Policy settings in the local Group Policy should be modified on all client computers.

单选题You have enabled backup optimization in RMAN. You issue the following RMAN command to configure a redundancy-based retention policy: CONFIGURE RETENTION POLICY TO REDUNDANCY 3; Which statement is true?()AThe command fails because you cannot configure a redundancy-based retention policy when backup optimization is enabledBBackup optimization is performed, but RMAN considers the redundancy-based retention policy when it determines which datafiles should be backed upCBackup optimization is permanently disabledDBackup optimization is temporarily disabled because a redundancy-based retention policy is specified

单选题You have a standalone computer that runs Windows 7. Multiple users share the computer. You need toensure that you can read the content of all encrypted files on the computer.  What should you do?()ARun the Certificates Enrollment wizard and then run Certutil.exe importpfx.BRun the Certificates Enrollment wizard and then run Certutil.exe installcert.CRun Cipher.exe /r and then add a data recovery agent from the local security policy.DRun Cipher.exe /rekey and then import a security template from the local security policy.

多选题You have a share on your local computer. Someone has been intentionally damaging your files.  You want to be able to know which account is doing this. What do you do? ()ATurn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.BTurn on auditing for objects in the Local Security Policy and Select 'Object Access'.CUse Windows Explorer to turn on auditing for the specific files.DHave the administrator for domains log you on as an administrator and enable auditing for a  specific file.ETurn on auditing for objects in the Local Security Policy and Select 'Account Management'.FAllow only one account at a time to log on to your shared folder. Check the event viewer to  see who logged on.

单选题What is the procedure for announcing routes leared from RIP to ISIS neighbors?()AApply an import policy to RIP which announces the routes to ISIS.BApply an export policy to ISIS which announces the routes to ISIS.CApply an export policy to RIP which announces the routes to ISIS.DApply an import policy to ISIS which imports the routes into ISIS.

单选题What is the default export routing policy for RIP?()AAccept all local routesBAccept all RIP routesCAccept no routesDAccept all direct routes

单选题An administrator is creating a new data retention policy. Which of the following is the MOST important consideration?()ACompile technical requirements for new policyBComply with applicable laws and regulationsCDestroy the old data retention policyDHave hard copies of the new policy stored offsite

多选题You executed the following command to create a tablespace called SALES_DATA:   CREATE TABLESPACE sales_data DATAFILE SIZE 100M SEGMENT SPACE MANAGEMENT AUTO;  Which two statements are true about the SALES_DATA tablespace ()AThe database automatically determines the extent-sizing policy for the tablespace.BThe segments are automatically shrunk when the contents are removed from them.CThe allocation of extents within the tablespace is managed through the dictionary tables.DThe space utilization description of the data blocks in segments is recorded inbitmapblocks.EThe space utilization description of the data blocks in segments is managed through free lists.MANUAL

多选题You need to design Group Policy object (GPO) settings to support the use of the Encrypting File System (EFS). Your solution must meet business and security requirements. Which two actions should you perform?()ADesignate a data recovery agent and issue an EFS certificate to the data recovery agent. Export the private key and restrict access to the exported keyBMake the data recovery agent a local administrator on all client computersCRemove the default data recovery agent from the Default Domain Policy GPO. Then, include the new data recovery agent insteadDDelete the Default Domain Policy GPO. Configure a new GPO linked to the domain that does not specify a data recovery agent

多选题Regarding disk scrub, which two of these occur to the data on any local drives upon disassociation? ()AIf disk scrub is enabled, all BIOS settings for the server are erased.BIf disk scrub is enabled, all the data access on any local drives is destroyed.CIf disk scrub is enabled, the LSI active RAID is destroyed but data is still preserved.DIf disk scrub is disabled, all data on any local drives is preserved, including the local storage configuration.EIf disk scrub is enabled, all data on any local drives is preserved, including the local storage configuration.

单选题You have a portable computer that runs Windows 7. The computer is joined to a domain. Multiple users logon to the computer. You need to prevent the computer from displaying the username of the last user whologged on. What should you do?()AFrom Control Panel, modify the User Profiles settings.BFrom Control Panel, modify the Personalization settings.CFrom the local computer policy, add a policy template.DFrom the local computer policy, modify the local security policy.

单选题You have a computer that runs Windows 7. You need to record when an incoming connection is allowedthrough Windows firewall. What should you do?()AIn Local Group Policy, modify the audit policy.BIn Local Group Policy, modify the system audit policy.CFrom the Windows Firewall with Advanced Security properties, set the logging settings to Log successfulconnections.DFrom the Windows Firewall with Advanced Security properties, set the Data Protection (Quick Mode)IPSec settings to Advanced.