单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is an Active Directory domain in your company. The company runs Terminal Services. A user has remotely logged on to the Terminal Server. The user requires help to use anapplication. When you connect to the Terminal Server session, you are not able to operate any applications. You have to make sure that you can assist any user on the Terminal Server. So what action should you perform to achieve this?()AUse remote control should be enabled with the following settings in the RDP-Tcp Properties. The Levelof control policy setting should be configured to Interact with the session. The user should be instructedto log off and log back on.BAfter the Tscon /v command is run from the Terminal Server, reconnect to the session.CAfter the Chgusr /execute command is run on the Terminal Server, reconnect to the session.DUse remote control should be enabled with default user settings in the RDP-Tcp Properties.

单选题
You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is an Active Directory domain in your company. The company runs Terminal Services. A user has remotely logged on to the Terminal Server. The user requires help to use anapplication. When you connect to the Terminal Server session, you are not able to operate any applications. You have to make sure that you can assist any user on the Terminal Server. So what action should you perform to achieve this?()
A

Use remote control should be enabled with the following settings in the RDP-Tcp Properties. The Levelof control policy setting should be configured to Interact with the session. The user should be instructedto log off and log back on.

B

After the Tscon /v command is run from the Terminal Server, reconnect to the session.

C

After the Chgusr /execute command is run on the Terminal Server, reconnect to the session.

D

Use remote control should be enabled with default user settings in the RDP-Tcp Properties.


参考解析

解析: 暂无解析

相关考题:

A: What do you do, Polly? B: I work for an IT company.()

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a server named S01 that runs Windows Server 2008 and Hyper-V inyour company. Three virtual machines are hosted on S01. According to the requirement of company policy,the virtual machines must not connect to the company network. All of the virtual machines need to beconfigured to connect to each other. You must meet the company policy. Which should you do?()A、The Connection should be set to Host for the network interface card.B、The Connection should be set to None for the network interface card.C、You should choose the Not connected option for each virtual machine.D、The Enable virtual LAN identification option should be enabled for each virtual machine.

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. A Windows Server 2008 server is contained by your company and the WebServer (IIS) server role is installed on the server. A Web site is included by the server. Since you are thetechnical report, you are required to encrypt the cookies sent from the Web site on users computers. Which Web site feature should be configured to achieve the goal?()A、To achieve the goal, Authorization Rules should be configured.B、To achieve the goal, Pages And Controls should be configured.C、To achieve the goal, SSL Settings should be configured.D、To achieve the goal, Machine Key should be configured.

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services,and configuring aweb services infrastructure. You have the Windows Deployment Services (WDS) role installed on a serverthat runs Windows Server 2008. You plan to install Windows Vista on a computer that does not supportPreboot Execution Environment (PXE). You have a Windows Vista image that is stored on the WDS server. You have to start the computer and install the image that is stored on the WDS server. What should you create?()A、You should create a discover imageB、You should create an install imageC、You should create a capture imageD、You should create a CD-ROM that contains PXE drivers

You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as a database administrator for your company. The users report the slow performance of a SQL Server 2005 application. You are required to identify the queries which perform slowly because of blocking. Which action should you perform?()A、In a SQL Trace log file, you should look for queries with low duration values and high read and write values.B、In a query execution plan, you should look for queries with missing or out-of-date statistics.C、In a SQL Trace log file, you should look for queries with high duration values and low read and write values.D、In a query execution plan, you should look for queries with a large number of table scans.

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The server hasthe Web Server (IIS) server role installed. The server contains a Web site that is configured to use onlyWindows Authentication. You have a security group named Group1 that contains several user accounts.Now you receive an order from the company management. According to the company requirement, youhave to prevent the members of Group1 from accessing a Web site. But you are not allowed prevent otherusers from accessing the Web site. Which Web site feature should you configure?()A、You should configure SSL SettingsB、You should configure AuthenticationC、You should configure Authorization RulesD、You should configure IIS Manager Permissions

You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services, configuring name resolution and network access and so on. You are in charge of a domain controller that runs windows server 2008 and the DNS server role. The dns server hosts an active directory-integrated zone for your domain. You need to provide a user with the ability to manage records in the zone. But the user must not so what action should you perform?()A、The user permissions on the zone should be granted.B、The user permissions on the DNS zone should be granted.C、The user should be added to the DNSUpdateProxy Global security group.D、The user should be added to the DNSAdmins domain local security group.

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is an Active Directory domain in your company. The company runsTerminal Services. All Terminal Services accounts are configured to allow session takeover without permission. A user has used an account named User1 to log on to a server named S02. The session ID forUser1 is 1337. You need to perform a session takeover for session ID 1337. Which commands should you run?()A、You should run Tsdiscon 1337, and then Tscon 1337B、You should run Chgusr 1337 /disable, and then Tscon 1337C、You should run Takeown /U User1 1337, and then Tscon 1337D、You should run Tsdiscon 1337, and then Chgport /U User1 1337

You work as the IT professional in an international company which is named wikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services, configuring name resolution and network access and so on. Your company has a server named printer a that runs windows server 2008. Printer a has the print services server role installed. You have to reduce the so what action should you perform?()A、After you open the print management console, you should open the properties of each individual printer on printer A and clear the enable advanced printing features option.B、After you open the event viewer console, a custom view for the system log should be created. Exclude the events that are notified by event ID 10 from the filter.C、After you open the print management console, you should open the properties of printer A and clear the log spooler information events option.D、After you open the print management console, you should open the properties of printer A and clear the show informational notifications for network printers option.

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There are four Terminal Servers that run Windows Server 2008. The TerminalServers are respectively named S01, S02, S03, and S04. You have the Terminal Server Session Brokerrole service installed on S01. You have to configure load balancing for the four Terminal Servers. Now youreceive an order from the company management. According to the company requirement, you must makesure that S02 is the preferred server for Terminal Services sessions. Which tool should you choose to use?()A、You should choose to use TS Gateway ManagerB、You should choose to use Terminal Services ManagerC、You should choose to use Group Policy ManagementD、You should choose to use Terminal Services Configuration

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a single Active Directory domain in your company. The domaincontains a server that runs Windows Server 2008. The server has Windows SharePoint Services (WSS)installed. Now you receive an order from the company management. According to the company requirement, you should allow users to create distribution lists from a SharePoint site. What action should you perform on the WSS server?()A、The site should be configured to use the default Rights Management server in Active Directory DomainServices.B、The outgoing mail character set should be set to 1200(Unicode).C、The SharePoint Directory Management Service should be enabled.D、The site should be configured to accept messages from authenticated users only.

You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as a database administrator for your company. You utilize the SP:Recompile event class to run SQL Server Profiler. You find that a great amount of recompiles occurring. The possible causes of the large number of recompiles should be identified.  From the flowing four options, which one is the most possible cause of the problem?()A、The sp_executesql batches are not being recovered from the procedure cache.B、A database administrator executed UPDATE STATISTICS statements on all tables, and the most common stored procedures reference all the tables.C、One new stored procedure is created by a database administrator.D、Ad hoc batches are not being recovered from the procedure cache.

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a server that runs Windows Server 2008 in your company. The serverhas the Web Server (IIS) server role installed. Now you receive an order from the company management.You are asked to activate SSL for the default Web site. What should you do?()A、Use the IIS Manager console to add bindings for the HTTPS protocol to the default Web site.B、You should use the IIS Manager console to obtain and import a server certificate.C、Use the Server Manager console to perform the installation of the Digest Authentication component forthe Web server role.D、You should choose the Generate Key option in the Machine Key dialog box for the default Web site.

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The server hasthe Hyper-V server role installed. Now you receive an order from the company management. According tothe company requirement, you have to merge a differencing disk and a parent disk. What action should you perform?()A、The differencing disk should be inspected.B、The parent disk should be edited.C、The parent disk should be inspected.D、The differencing disk should be edited.

You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services. Configuring name resolution and network access and so on.Your company is desigiing its network. The network will use an IPv6 prefix of 2001:DB8: BBCC:0000::/53. You have to identify an IPv6 addressing scheme that will support 2000 subnets. Which network mask should you use?()A、You should use /63.B、You should use /64.C、You should use /61.D、You should use /62.

单选题You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services. Configuring name resolution and network access and so on.Your company is desigiing its network. The network will use an IPv6 prefix of 2001:DB8: BBCC:0000::/53. You have to identify an IPv6 addressing scheme that will support 2000 subnets. Which network mask should you use?()AYou should use /63.BYou should use /64.CYou should use /61.DYou should use /62.

单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The server hasthe Web Server (IIS) server role installed. The server contains a Web site that is configured to use onlyWindows Authentication. You have a security group named Group1 that contains several user accounts.Now you receive an order from the company management. According to the company requirement, youhave to prevent the members of Group1 from accessing a Web site. But you are not allowed prevent otherusers from accessing the Web site. Which Web site feature should you configure?()AYou should configure SSL SettingsBYou should configure AuthenticationCYou should configure Authorization RulesDYou should configure IIS Manager Permissions

单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services,and configuring aweb services infrastructure. You have the Windows Deployment Services (WDS) role installed on a serverthat runs Windows Server 2008. You plan to install Windows Vista on a computer that does not supportPreboot Execution Environment (PXE). You have a Windows Vista image that is stored on the WDS server. You have to start the computer and install the image that is stored on the WDS server. What should you create?()AYou should create a discover imageBYou should create an install imageCYou should create a capture imageDYou should create a CD-ROM that contains PXE drivers

单选题As the administrator of your company’s network, you will be installing Windows 2000 Professional on 10 new Pentium III computers. Your company does business with a horde of countries and accepts many currencies. You must ensure that international currency options are set for 5 of the 10 computers. The remaining 5 computers must be configured to support different input locales.   How can you most efficiently set the correct international currency options and configure different input locales on each specified group of computers? ()A During the unattended installation of Windows 2000 Professional.B Make the appropriate changes in the regional settings dialogue box during the installation of Windows 2000 Professional.C After Windows 2000 Professional is installed, logon and make the changes through thecontrol panel.D Make the appropriate changes in the date and time settings dialogue box during theinstallation of Windows 2000 Professional.

单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. A Windows Server 2008 server is contained by your company and the WebServer (IIS) server role is installed on the server. A Web site is included by the server. Since you are thetechnical report, you are required to encrypt the cookies sent from the Web site on users computers. Which Web site feature should be configured to achieve the goal?()ATo achieve the goal, Authorization Rules should be configured.BTo achieve the goal, Pages And Controls should be configured.CTo achieve the goal, SSL Settings should be configured.DTo achieve the goal, Machine Key should be configured.

单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a single Active Directory domain in your company. The domaincontains a server that runs Windows Server 2008. The server has Windows SharePoint Services (WSS)installed. Now you receive an order from the company management. According to the company requirement, you should allow users to create distribution lists from a SharePoint site. What action should you perform on the WSS server?()AThe site should be configured to use the default Rights Management server in Active Directory DomainServices.BThe outgoing mail character set should be set to 1200(Unicode).CThe SharePoint Directory Management Service should be enabled.DThe site should be configured to accept messages from authenticated users only.

单选题Our company is a professional one,and you may rely()it.AonBinCatDup

单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The server hasthe Hyper-V server role installed. Now you receive an order from the company management. According tothe company requirement, you have to merge a differencing disk and a parent disk. What action should you perform?()AThe differencing disk should be inspected.BThe parent disk should be edited.CThe parent disk should be inspected.DThe differencing disk should be edited.

单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is an Active Directory domain in your company. The company runsTerminal Services. All Terminal Services accounts are configured to allow session takeover without permission. A user has used an account named User1 to log on to a server named S02. The session ID forUser1 is 1337. You need to perform a session takeover for session ID 1337. Which commands should you run?()AYou should run Tsdiscon 1337, and then Tscon 1337BYou should run Chgusr 1337 /disable, and then Tscon 1337CYou should run Takeown /U User1 1337, and then Tscon 1337DYou should run Tsdiscon 1337, and then Chgport /U User1 1337

多选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a server named S01 that runs Windows Server 2008 and Hyper-V inyour company. Three virtual machines are hosted on S01. According to the requirement of company policy,the virtual machines must not connect to the company network. All of the virtual machines need to beconfigured to connect to each other. You must meet the company policy. Which should you do?()AThe Connection should be set to Host for the network interface card.BThe Connection should be set to None for the network interface card.CYou should choose the Not connected option for each virtual machine.DThe Enable virtual LAN identification option should be enabled for each virtual machine.

单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There are four Terminal Servers that run Windows Server 2008. The TerminalServers are respectively named S01, S02, S03, and S04. You have the Terminal Server Session Brokerrole service installed on S01. You have to configure load balancing for the four Terminal Servers. Now youreceive an order from the company management. According to the company requirement, you must makesure that S02 is the preferred server for Terminal Services sessions. Which tool should you choose to use?()AYou should choose to use TS Gateway ManagerBYou should choose to use Terminal Services ManagerCYou should choose to use Group Policy ManagementDYou should choose to use Terminal Services Configuration

多选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a server that runs Windows Server 2008 in your company. The serverhas the Web Server (IIS) server role installed. Now you receive an order from the company management.You are asked to activate SSL for the default Web site. What should you do?()AUse the IIS Manager console to add bindings for the HTTPS protocol to the default Web site.BYou should use the IIS Manager console to obtain and import a server certificate.CUse the Server Manager console to perform the installation of the Digest Authentication component forthe Web server role.DYou should choose the Generate Key option in the Machine Key dialog box for the default Web site.

单选题You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005.You work as a database administrator for your company. A SQL Server 2005 database is utilized in your company. And a table named Inventory is contained by the database. A column named Price is included by the table. According to the company policy, you cannot reduce more than 10 percent the value in the Price column in any single database operation. Through many kinds of method, the company makes updates to the Price column. For instance, the utilization of ad hoc queries is one of the methods. Since you are the database administrator, you should confirm that this company policy takes its effect. Which action should be performed?()AA stored procedure should be created, and changes are disallowed by the procedure to the Price column that violates company policy.BOn the Price column, a check constraint should be created, and a specified minimum value is required by the check constraint.CA trigger should be created, and changes are rolled back by the trigger to the Price column that violates company policy.DOn the Price column, a foreign key constraint is created to a table that valid prices are included.