单选题Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers.   You are planning to deploy Windows 7 Enterprise to the client computers.   You need to design a custom image that will enable users to connect to a Telnet server.   What should you do?()A Configure Windows Firewall to allow the Telnet program through Windows Firewall before capturing the image.B Change User Account Control settings before capturing the image.C Turn on the Telnet Server feature in the image.D Turn on the Telnet Client feature in the image.

单选题
Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers.   You are planning to deploy Windows 7 Enterprise to the client computers.   You need to design a custom image that will enable users to connect to a Telnet server.   What should you do?()
A

 Configure Windows Firewall to allow the Telnet program through Windows Firewall before capturing the image.

B

 Change User Account Control settings before capturing the image.

C

 Turn on the Telnet Server feature in the image.

D

 Turn on the Telnet Client feature in the image.


参考解析

解析: 暂无解析

相关考题:

Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows Vista computers.  You are planning to deploy Windows 7 and a custom application.   You have the following requirements:   The application must be available to only a specific group of users. You must be able to monitor application usage.   You need to design a deployment method for the custom application that meets the requirements.  Which deployment method should you use in your design?()A、software installation in Group PolicyB、startup scripts in Group PolicyC、Microsoft Application Virtualization (App-V)D、baseline Windows 7 image that includes the custom application

Your company has a single Active Directory directory service domain. All servers in your environment run Windows Server 2003. Client computers run Windows XP or Windows Vista. You plan to create a security update scan procedure for client computers. You need to choose a security tool that supports all the client computers.  Which tool should you choose? ()A、 UrlScan Security ToolB、 Enterprise Scan Tool (EST)C、 Malicious Removal Tool (MRT)D、 Microsoft Baseline Security Analyzer (MBSA)

Your company has 1,000 client computers.  You are planning to deploy Windows 7 and a new line-of-business application.   You have the following requirements:   Install the application as part of the standard Windows 7 deployment. Use a single Windows 7 image for the deployment.  The application must be available for use on client computers that are not connected to the network.   You need to ensure that the application is installed on all new client computers.   What should you do?()A、Publish the application by using Group Policy Software Installation.B、Deploy the application by using Windows Server Update Services (WSUS).C、Service an online image of Windows 7 to add the new application.D、Service an offline image of Windows 7 to add the new application.

Your network consists of an Active Directory Domain Services (AD DS) forest with 1,000 client computers that run Windows XP.   Nine hundred of the computers are on the local area network.   One hundred computers are portable computers that connect to the main office only once every few months.  You are planning to deploy Windows 7.  You need to generate a report of the software that is installed on all client computers.    You need this information as soon as possible.  What should you use?()A、Microsoft System Center EssentialsB、Microsoft Desktop Optimization PackC、Microsoft System Center Operations ManagerD、Microsoft System Center Data Protection Manager

Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers.  You are planning to deploy Windows 7 Enterprise to the client computers.    You need to design a zero-touch installation strategy.()A、unattended installationB、custom Windows 7 image on DVDC、Windows Deployment Services (WDS)D、Microsoft System Center Configuration Manager 2007 R2

Your company has a single Active Directory Domain Services (AD DS) domain named PassGuide.com that uses Active Directory-integrated DNS. You deploy the Key Management Service (KMS) on a Windows 7 computer. You need to ensure that Windows 7 client computers can locate the KMS host and perform activation.   Which two actions should you perform?()A、Deploy a Windows Server 2008 KMS host.B、Grant the KMS server the Full Control permission on the _vlmcs._tcp.PassGuide.com DNS record.C、Grant the KMS server the Full Control permission on the _msdcs._tcp.PassGuide.com DNS zone.D、Create and deploy a GPO firewall rule to allow RPC traffic through TCP port 1688 on the client computers.

Your network has a single domain with 1,000 client computers that run Windows Vista. All client computers are members of the domain.   You are planning to deploy Windows 7.   You need to create a report that shows hardware and device compatibility on all client computers.    You need to perform this action without installing any additional software on the client computers.   Which tool should you use?()A、System Center Capacity PlannerB、System Center Configuration ManagerC、Microsoft Assessment and Planning ToolkitD、Windows Performance Monitor Data Collector Sets

Your company has an Active Directory Rights Management Services (AD RMS) server. Users  have Windows Vista computers. An Active Directory domain is configured at the Windows Server  2003 functional level.     You need to configure AD RMS so that users are able to protect their documents.     What should you do()A、Install the AD RMS client 2.0 on each client computer.B、Add the RMS service account to the local administrators group on the AD RMS server.C、Establish an e-mail account in Active Directory Domain Services (AD DS) for each RMS user.D、Upgrade the Active Directory domain to the functional level of Windows Server 2008.

Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers.  You are planning to deploy Windows 7 by using a zero-touch installation process.   You need to test the deployment methodology.   What should you do first?()A、Create a security group with test computers as members.B、Create a distribution group with test computers as members.C、Create a computer collection with test computers as members.D、Create an organizational unit and move test computer accounts into it.

Your network has a single domain with 1,000 client computers that run Windows 7.  Users frequently copy data from their computers to removable drives.    You need to ensure that data that is copied to removable drives is protected.   What should you do?()  A、Use Encrypting File System (EFS).B、Use Active Directory Rights Management Services.C、Configure a Group Policy to enforce the use of BitLocker To Go.D、Enable Trusted Platform Module (TPM) hardware on all client computers.

Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows 7 computers.  You are planning to deploy a custom application.   You need to schedule the deployment to occur outside of business hours and without user interaction.   Which deployment method should you choose?()A、software installation with Group PolicyB、Microsoft Application Virtualization (App-V)C、Lite Touch InstallationD、software deployment with Microsoft System Center Configuration Manager 2007

Your company has an Active Directory Domain Services (AD DS) forest with a single domain.  A server has the Windows Deployment Services (WDS) role installed. You create a Windows 7 image.  You plan to use the Lite Touch Installation deployment method to deploy the Windows 7 image.    You need to design a deployment strategy that will install an image on unknown client computers only if administrative approval is granted.   What should you do?()A、Create a multicast transmission for the Windows 7 image.B、Create a unicast transmission for the Windows 7 image.C、Use DHCP rogue detection on the WDS server.D、Use an Auto-Add policy on the WDS server.

Your company has 1,000 client computers that run Windows 7.   The company uses several custom line-of-business applications that are not compatible with Windows 7.    You need to distribute a Microsoft Enterprise Desktop Virtualization (MED-V) v2 virtual machine (VM) image that includes the custom applications to all Windows 7 client computers.   What should you do?()A、Deploy the VM image from the MED-V server.B、Mount the VM image from the MED-V workspace.C、Deploy the VM image by using Windows Deployment Services (WDS).D、Deploy the VM image by using Windows Server Update Services (WSUS).

Your company has a single Active Directory Domain Services (AD DS) domain with Windows Server 2008 R2 member servers and 1,000 Windows 7 client computers. You are designing the deployment of a custom application.   You have the following requirements:   The application must be available to only users who need it. Minimize network traffic during deployment.   You need to design a deployment strategy that meets the requirements.   Which deployment method should you use?()A、RemoteApp and Desktop ConnectionsB、software installation in Group PolicyC、Microsoft Application Virtualization (App-V)D、Microsoft System Center Configuration Manager 2007

Your company has a single Active Directory directory service domain. Servers in your environment run Windows Server 2003. Client computers run Windows XP or Windows Vista. You plan to create an internal centrally managed security update infrastructure for client computers. You need to choose a security update management tool that supports all the client computers.  Which tool should you choose? ()A、 Microsoft Assessment and Planning (MAP) ToolkitB、 Microsoft Baseline Security AnalyzerC、 Microsoft System Center Operations ManagerD、 Windows Server Update Services (WSUS)

Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers.   You are planning to deploy Windows 7 Enterprise to the client computers.   You need to design a custom image that will enable users to connect to a Telnet server.   What should you do?()A、 Configure Windows Firewall to allow the Telnet program through Windows Firewall before capturing the image.B、 Change User Account Control settings before capturing the image.C、 Turn on the Telnet Server feature in the image.D、 Turn on the Telnet Client feature in the image.

单选题Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows Vista computers.  You are planning to deploy Windows 7 and a custom application.   You have the following requirements:   The application must be available to only a specific group of users. You must be able to monitor application usage.   You need to design a deployment method for the custom application that meets the requirements.  Which deployment method should you use in your design?()Asoftware installation in Group PolicyBstartup scripts in Group PolicyCMicrosoft Application Virtualization (App-V)Dbaseline Windows 7 image that includes the custom application

单选题Your company has an Active Directory Rights Management Services (AD RMS) server. Users  have Windows Vista computers. An Active Directory domain is configured at the Windows Server  2003 functional level.     You need to configure AD RMS so that users are able to protect their documents.     What should you do()AInstall the AD RMS client 2.0 on each client computer.BAdd the RMS service account to the local administrators group on the AD RMS server.CEstablish an e-mail account in Active Directory Domain Services (AD DS) for each RMS user.DUpgrade the Active Directory domain to the functional level of Windows Server 2008.

单选题Your company has a single Active Directory directory service domain. All servers in your environment run Windows Server 2003. Client computers run Windows XP or Windows Vista. You plan to create a security update scan procedure for client computers. You need to choose a security tool that supports all the client computers.  Which tool should you choose? ()A UrlScan Security ToolB Enterprise Scan Tool (EST)C Malicious Removal Tool (MRT)D Microsoft Baseline Security Analyzer (MBSA)

单选题Your company has a single Active Directory Domain Services (AD DS) domain with Windows Server 2008 R2 member servers and 1,000 Windows 7 client computers. You are designing the deployment of a custom application.   You have the following requirements:   The application must be available to only users who need it. Minimize network traffic during deployment.   You need to design a deployment strategy that meets the requirements.   Which deployment method should you use?()ARemoteApp and Desktop ConnectionsBsoftware installation in Group PolicyCMicrosoft Application Virtualization (App-V)DMicrosoft System Center Configuration Manager 2007

单选题Your network consists of an Active Directory Domain Services (AD DS) forest with 1,000 client computers that run Windows XP.   Nine hundred of the computers are on the local area network.   One hundred computers are portable computers that connect to the main office only once every few months.  You are planning to deploy Windows 7.  You need to generate a report of the software that is installed on all client computers.    You need this information as soon as possible.  What should you use?()AMicrosoft System Center EssentialsBMicrosoft Desktop Optimization PackCMicrosoft System Center Operations ManagerDMicrosoft System Center Data Protection Manager

单选题Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers.  You are planning to deploy Windows 7 Enterprise to the client computers.    You need to design a zero-touch installation strategy.()Aunattended installationBcustom Windows 7 image on DVDCWindows Deployment Services (WDS)DMicrosoft System Center Configuration Manager 2007 R2

单选题Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers.  You are planning to deploy Windows 7 by using a zero-touch installation process.   You need to test the deployment methodology.   What should you do first?()ACreate a security group with test computers as members.BCreate a distribution group with test computers as members.CCreate a computer collection with test computers as members.DCreate an organizational unit and move test computer accounts into it.

单选题Your company has an Active Directory Domain Services (AD DS) forest with a single domain.  A server has the Windows Deployment Services (WDS) role installed. You create a Windows 7 image.  You plan to use the Lite Touch Installation deployment method to deploy the Windows 7 image.    You need to design a deployment strategy that will install an image on unknown client computers only if administrative approval is granted.   What should you do?()ACreate a multicast transmission for the Windows 7 image.BCreate a unicast transmission for the Windows 7 image.CUse DHCP rogue detection on the WDS server.DUse an Auto-Add policy on the WDS server.

单选题Your network has a single domain with 1,000 client computers that run Windows Vista. All client computers are members of the domain.   You are planning to deploy Windows 7.   You need to create a report that shows hardware and device compatibility on all client computers.    You need to perform this action without installing any additional software on the client computers.   Which tool should you use?()ASystem Center Capacity PlannerBSystem Center Configuration ManagerCMicrosoft Assessment and Planning ToolkitDWindows Performance Monitor Data Collector Sets

单选题Your company has a single Active Directory directory service domain. Servers in your environment run Windows Server 2003. Client computers run Windows XP or Windows Vista. You plan to create an internal centrally managed security update infrastructure for client computers. You need to choose a security update management tool that supports all the client computers.  Which tool should you choose? ()A Microsoft Assessment and Planning (MAP) ToolkitB Microsoft Baseline Security AnalyzerC Microsoft System Center Operations ManagerD Windows Server Update Services (WSUS)

单选题Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows 7 computers.  You are planning to deploy a custom application.   You need to schedule the deployment to occur outside of business hours and without user interaction.   Which deployment method should you choose?()Asoftware installation with Group PolicyBMicrosoft Application Virtualization (App-V)CLite Touch InstallationDsoftware deployment with Microsoft System Center Configuration Manager 2007