单选题You are the desktop administrator for Contoso, Ltd. The company's network contains 1,000 Windows XP Professional computers, which are members of a single Active Directory domain. The computers' hard disks are formatted as NTFS. The company's software developers release a new custom application. The application uses a .dll file named AppLib.dll, which is installed in a folder named /Program Files/Contoso/OpsApp. The company's help desk technicians report that several users experience problems when they use the application because the AppLib.dll file was deleted on their client computers. The company's software developers recommend that you modify the file permissions on AppLib.dll so that users have only Read permission on the file. You need to ensure that all users have only Read permission on the AppLib.dll file on all 1,000 Windows XP Professional computers. What should you do?()AWrite a logon script that moves the AppLib.dll file into the %systemroot%/System32 folder.BEnsure that Windows File Protection is enabled on all 1,000 Windows XP Professional computers.CApply the logon script to all domain user accounts. DUse the Security Configuration and Analysis console to create a new security template that modifies the file permissions on AppLib.dll. EUse Active Directory Group Policy to import and apply the template to all 1,000 Windows XP Professional computers. FRepackage the custom application in a Windows Installer package.

单选题
You are the desktop administrator for Contoso, Ltd. The company's network contains 1,000 Windows XP Professional computers, which are members of a single Active Directory domain. The computers' hard disks are formatted as NTFS. The company's software developers release a new custom application. The application uses a .dll file named AppLib.dll, which is installed in a folder named /Program Files/Contoso/OpsApp. The company's help desk technicians report that several users experience problems when they use the application because the AppLib.dll file was deleted on their client computers. The company's software developers recommend that you modify the file permissions on AppLib.dll so that users have only Read permission on the file. You need to ensure that all users have only Read permission on the AppLib.dll file on all 1,000 Windows XP Professional computers. What should you do?()
A

Write a logon script that moves the AppLib.dll file into the %systemroot%/System32 folder.

B

Ensure that Windows File Protection is enabled on all 1,000 Windows XP Professional computers.

C

Apply the logon script to all domain user accounts. 

D

Use the Security Configuration and Analysis console to create a new security template that modifies the file permissions on AppLib.dll. 

E

Use Active Directory Group Policy to import and apply the template to all 1,000 Windows XP Professional computers. 

F

Repackage the custom application in a Windows Installer package. 


参考解析

解析: 暂无解析

相关考题:

Yourcompany,Contoso,Ltd.,hasamainofficeandabranchoffice.TheofficesareconnectedbyaWANlink.ContosohasanActiveDirectoryforestthatcontainsasingledomainnamedad.contoso.com.Thead.contoso.comdomaincontainsonedomaincontrollernamedDC1thatislocatedinthemainoffice.DC1isconfiguredasaDNSserverforthead.contoso.comDNSzone.Thiszoneisconfiguredasastandardprimaryzone.YouinstallanewdomaincontrollernamedDC2inthebranchoffice.YouinstallDNSonDC2.YouneedtoensurethattheDNSservicecanupdaterecordsandresolveDNSqueriesintheeventthataWANlinkfails.Whatshouldyoudo()

You have two desktop computers at your home. You establish a remote desktop connection from one computer to the other.The remote session fails to show the desktop background of the remote computer. You need to view the desktop background when you establish a remote session.What should you do?()A.AB.BC.CD.D

What allows you to monitor the system performance of the Cisco CRS System (CPU, memory, etc.)?()A、Cisco Desktop Administrator  B、Cisco Supervisor Desktop  C、Microsoft Windows 2000 Performance Monitoring  D、CRS Application Administration  E、CRS Application Editor

You are the desktop administrator for Contoso, Ltd. Philippe is a user in the accounting department. Philippe reports that he is not able to download a file from an FTP server by using Internet Explorer on his Windows XP Professional computer. When Philippe attempts to access the FTP server by using the URL ftp://ftp.contoso.com, Internet Explorer displays the following error message: "The password was rejected." Philippe informs you that he has a user name and password for the FTP server, but that Internet Explorer does not prompt him to type the user name or password. You need to ensure that Philippe can access the FTP server by using Internet Explorer on his computer. Which URL should you instruct Philippe to use?() A、ftp://ftp.contoso.com/Philippe B、ftp://Philippe:password@ftp.contoso.comC、ftp://Philippe/ftp.contoso.com D、ftp://ftp.contoso.com@Philippe:password

Your network contains a single Active Directory domain named contoso.com.     An administrator accidentally deletes the _msdsc.contoso.com zone.   You recreate the _msdsc.contoso.com zone.     You need to ensure that the _msdsc.contoso.com zone contains all of the required DNS records.     What should you do on each domain controller()A、Restart the Netlogon service.B、Restart the DNS Server service.C、Run dcdiag.exe /fix.D、Run ipconfig.exe /registerdns.

Your company, Contoso, Ltd., has a main office and a branch office. The offices are connected by a WAN link. Contoso has an Active Directory forest that contains a single domain named ad.contoso.com.   The ad.contoso.com domain contains one domain controller named DC1 that is located in the main office.   DC1 is configured as a DNS server for the ad.contoso.com DNS zone. This zone is configured as a  standard primary zone.   You install a new domain controller named DC2 in the branch office. You install DNS on DC2.    You need to ensure that the DNS service can update records and resolve DNS queries in the event that a  WAN link fails.   What should you do()  A、Create a new stub zone named ad.contoso.com on DC2.B、Configure the DNS server on DC2 to forward requests to DC1.C、Create a new secondary zone named ad.contoso.com on DC2.D、Convert the ad.contoso.com zone on DC1 to an Active Directory-integrated zone.

You are designing an Active Directory implementation strategy to present to executives from your company and from Contoso, Ltd.  Which implementation strategy should you use?()A、 Upgrade the New York domain. Upgrade the Chicago domain. Create a pristine forest for Contoso, Ltd.B、 Create a pristine forest. Upgrade the New York domain. Upgrade the Chicago domain. Do nothing further.C、 Create pristine forest. Upgrade the New York domain.Upgrade the Chicago domain.Create a pristine forest for Contoso, Ltd.D、 Create a pristine forest.Upgrade the New York domain. Upgrade the Chicago domain.Create a new child domain for Contoso, Ltd.

Your company named Contoso, Ltd. has a Web server named WEB1.   The Web server runs Windows Server 2008. The fully qualified domain name of WEB1 is web1.contoso.com. The public DNS server has an alias record named owa.contoso.com that maps to web1.contoso.com. Users access WEB1 from the Internet by using http://owa.contoso.com.  The new company security policy states that the owa.contoso.com site must be available for Internet users only through secure HTTP (HTTPS) protocol. The security policy also states that users must not get security warnings when they connect to the site.  You need to request a certificate from a public certification authority (CA). Which Common Name should you use?()A、Contoso, Ltd.B、owa.contoso.comC、WEB1D、web1.contoso.com

You have an Exchange Server 2010 organization for a company named Contoso, Ltd. Contoso has the following security policy:  .Messages that contain the word budget cannot be sent to external recipients .Messages that contain the name Northwind Traders must be sent to the legal department automaticallyYou need to recommend a solution to meet the security policy.  What should you recommend?()A、Create two transport rules.B、Create two message classifications.C、Create one transport rule and configure a legal hold.D、Create one message classification and configure a legal hold.

You have a portable computer and a desktop computer that both run Windows XP Professional. Both computers are members of a domain named Contoso. The desktop computer hosts a shared folder named Share1. You need to ensure that all files in the Share1 folder are automatically available on the portable computer when the computer is disconnected from the network.  Which two actions should you perform?()A、From the portable computer, enable offline files. B、From the portable computer, modify the properties of the Shared Documents folder.C、From the desktop computer, enable simple file sharing.D、From the desktop computer, modify the properties of Share1.

You have an Exchange organization named nwtraders.com.All servers in the organization have Exchange Server 2010 Service Pack 1 (SPl) installed.Your company acquires another company named Contoso, Ltd. You plan to create new mailboxes for each user from Contoso. You need to ensure that each new mailbox can receive e-mail messages sent to contoso.com.Which two objects should you create?()A、a Receive connectorB、a Remote domainC、an organizational relationshipD、an accepted domainE、an e-mail address policy

You are designing an Active Directory implementation strategy to present to executives from your  company and from Contoso, Ltd. Which implementation strategy should you use?()A、Upgrade the New York domain. Upgrade the Chicago domain. Create a pristine forest for Contoso, Ltd.B、Create a pristine forest. Upgrade the New York domain. Upgrade the Chicago domain. Do nothing further.C、Create pristine forest. Upgrade the New York domain. Upgrade the Chicago domain. Create a pristine forest for Contoso, Ltd.  D、Create a pristine forest. Upgrade the New York domain. Upgrade the Chicago domain. Create a new child domain for Contoso, Ltd.

单选题Your company named Contoso, Ltd. has a Web server named WEB1.   The Web server runs Windows Server 2008. The fully qualified domain name of WEB1 is web1.contoso.com. The public DNS server has an alias record named owa.contoso.com that maps to web1.contoso.com. Users access WEB1 from the Internet by using http://owa.contoso.com.  The new company security policy states that the owa.contoso.com site must be available for Internet users only through secure HTTP (HTTPS) protocol. The security policy also states that users must not get security warnings when they connect to the site.  You need to request a certificate from a public certification authority (CA). Which Common Name should you use?()AContoso, Ltd.Bowa.contoso.comCWEB1Dweb1.contoso.com

单选题You are the network administrator for The network consists of a single Active Directory domain named All 40 network servers run Windows Server 2003, and all 1,500 client computers run Windows XP Professional. The servers are located in seven different buildings. All are configured to allow Remote Desktop connections. A new administrator named Tess King is hired to help you configure applications and perform disk defragmentation on all 40 servers. You need to enable Tess King to manage the servers remotely by using Remote Desktop for Administration. What should you do?()AAdd Tess King to the Administrators group.BAdd Tess King to the Power Users group.CAdd Tess King to the Remote Desktop Users group.DDelegate control of the Domain Controllers organizational unit (OU) to Tess King.EDelegate control of the Computers organizational unit (OU) to Tess King.

单选题You are the network administrator for Fabrikam, Inc. Your network consists of a single Active Directory forest that contains one domain named fabrikam.com. The functional level of the forest is Windows Server 2003. Fabrikam, Inc., acquires a company named Contoso, Ltd. The Contoso, Ltd.,network consists of a single Active Directory forest that contains a root domain named contoso.com and a child domain named usa.contoso.com. The functional level of the forest is Windows 2000. The functional level of the usa.contoso.com domain is Windows 2000 native. A business decision by the company requires the usa.contoso.com domain to be removed. You need to move all user accounts from the usa.contoso.com domain to the fabrikam.com domain by using the Active Directory Migration Tool. You need to accomplish this task without changing the logon rights and permissions for all other users. You need to ensure that users in usa.contoso.com can log on to fabrikam.com by using their current user names and passwords.  What should you do?()A Create a two­way Windows Server 2003 external trust relationship between the fabrikam.com domain and the contoso.com domain.B Create a one­way Windows Server 2003 external trust relationship in which the fabrikam.com domain trusts the contoso.com domain.C Create a temporary two­way external trust relationship between the fabrikam.com domain and the usa.contoso.com domain.D Create a temporary one­way external trust relationship in which the usa.contoso.com domain trusts the fabrikam.com domain.

单选题You are the desktop administrator for Contoso, Ltd. A graphic designer named Peter saves all his files in the My Documents folder on his Window XP Professional computer. Peter now needs to work on several computers each day to complete his work. Peter needs to be able to access his files at any time. You implement a roaming user profile and a home directory for Peter. However, Peter reports that when he uses his roaming profile, it takes 10 minutes for him to log on to computers other than his own. You need to reduce the amount of time it takes for Peter to log on to computers when using his roaming profile. What should you do?()AChange the UNC path of Peter’s roaming profile to his home directory folder. BLog on as a local administrator on Peter’s computer. Change the roaming profile to a local profile. CLog on as a local administrator on Peter’s computer. Edit the local Group Policy to exclude Directories in Roaming Profile. DLog on as a local administrator on Peter’s computer. In the properties of the My Documents folder, change the Target folder location to Peter’s home directory.

单选题You are the network administrator for Contoso Pharmaceuticals. The network consists of a single Active Directory forest. The forest contains Windows Server 2003 servers and Windows XP Professional computers.   The forest consists of a forest root domain named contoso.com and two child domains named child1.contoso.com and child2.contoso.com. The child1.contoso.com domain contains a member server named Server1. You configure Server1 to be an enterprise certification authority (CA), and you configure a user certificate template. You enable the Publish certificate in Active Directory setting in the certificate template. You instruct users in both the child1.contoso.com and the child2.contoso.com domains to enroll for user certificates.   You discover that the certificates for user accounts in the child1.contoso.com domain are being published to Active Directory, but the certificates for user accounts in the child2.contoso.com domain are not.   You want certificates issued by Server1 to child2.contoso.com domain user accounts to be published in Active Directory.   What should you do? ()A Configure user certificate autoenrollment for all domain user accounts in the contoso.com domain.B Configure user certificate autoenrollment for all domain user accounts in the child2.contoso.com domain.C Add Server1 to the Cert Publishers group in the contoso.com domain.D Add Server1 to the Cert Publishers group in the child2.contoso.com domain.

单选题You have a computer that runs Windows XP Professional. Multiple users share the computer. You log on to the computer by using the local administrator account and install a custom application. You need to add an application shortcut to the desktop of all new users who use the computer. The shortcut must appear on the desktop of new users only. What should you do?()ACopy the shortcut to %systemdrive%/documents and settings/default user/desktop/.BCopy the shortcut to %systemdrive%/documents and settings/all users/desktop/.CCopy the shortcut to your desktop. Modify the %comspec% system environment variable. DCopy the shortcut to the guest user’s desktop. Assign the Everyone group Read permission to the guest user profile.

单选题What allows you to monitor the system performance of the Cisco CRS System (CPU, memory, etc.)?()ACisco Desktop Administrator  BCisco Supervisor Desktop  CMicrosoft Windows 2000 Performance Monitoring  DCRS Application Administration  ECRS Application Editor

单选题You are designing a forest and domain structure to address the concerns of Contoso, Ltd., and to meet the business and technical requirements. You want to use the minimum number of domains and forests that are required.  Which domain structure should you use?()A One forest and two domains.B One forest and three domains.C One forest and four domains.D Two forests and three domains.E Two forests and four domains.

单选题You are designing a forest and domain structure to address the concerns of Contoso, Ltd., and to meet the business and technical requirements. You want to use the minimum number of domains and forests that are required.  Which domain structure should you use?()AOne forest and two domains.BOne forest and three domains.COne forest and four domains.DTwo forests and three domains.ETwo forests and four domains.

单选题You have a computer that runs Windows XP Professional Service Pack 2 (SP2). A remote user has a computer that runs Windows XP Professional SP2. The remote user experiences several errors while attempting to install an application. You need to remotely observe the actions the user performs. What should you do first?()AInstruct the user to send you a Remote Assistance invitation. BInstruct the user to start the Remote Desktop Help Session Manager service.CAt the command prompt, establish a telnet session to the user's computer. DEnable a Remote Desktop and establish a Remote Desktop Connection. Log on by using the local administrator account.

单选题You are a systems administrator responsible for securing a Windows Server 2008 Web server. You havecreated a new Web site called Contoso Intranet that will contain seven Web applications. One of theapplication developers has told you that her Web application requires a new request handler that isprocessed using a .NET library her team created. How can you meet these requirements while also maximizing security for the server?()AAdd a new managed handler to the Contoso Intranet Web site.BAdd a new managed handler for the specific Web application that requires it.CAdd a new module mapping to the Contoso Intranet Web site.DAdd a new module mapping for the specific Web application that requires it.

单选题Your comp any runs Remote Desktop Services on Windows Server 2008. You have a Remote Desktop Session Host (RD Session Host) server. You plan to install an application on the RD Session Host server by running a setup.exe file. You need to ensure that the application will install properly and be useable by all users on the RD Session Host server. What should you do first on the RD Session Host server?()ARun the Changeuser /install command.BRun the Changeuser /execute command.CSet the Remote Desktop licensing mode t o RDS Per User CAL.DSet the Remote Desktop licensing mode to RDS Per Device CAL.

多选题You have an Exchange organization named nwtraders.com.All servers in the organization have Exchange Server 2010 Service Pack 1 (SPl) installed.Your company acquires another company named Contoso, Ltd. You plan to create new mailboxes for each user from Contoso. You need to ensure that each new mailbox can receive e-mail messages sent to contoso.com.Which two objects should you create?()Aa Receive connectorBa Remote domainCan organizational relationshipDan accepted domainEan e-mail address policy

单选题You are designing an Active Directory implementation strategy to present to executives from your company and from Contoso, Ltd.  Which implementation strategy should you use?()A Upgrade the New York domain. Upgrade the Chicago domain. Create a pristine forest for Contoso, Ltd.B Create a pristine forest. Upgrade the New York domain. Upgrade the Chicago domain. Do nothing further.C Create pristine forest. Upgrade the New York domain.Upgrade the Chicago domain.Create a pristine forest for Contoso, Ltd.D Create a pristine forest.Upgrade the New York domain. Upgrade the Chicago domain.Create a new child domain for Contoso, Ltd.