单选题You are planning to upgrade the client computers of the users in the sales department to Windows 7. You need to recommend an upgrade solution to ensure that the client computers can run App2. What should you include in the recommendation?()AInternet Explorer Administration Kit (IEAK)BMicrosoft Application Compatibility Toolkit (ACT)CMicrosoft Application Virtualization (App-V)DMicrosoft Enterprise Desktop Virtualization (MED-V)

单选题
You are planning to upgrade the client computers of the users in the sales department to Windows 7. You need to recommend an upgrade solution to ensure that the client computers can run App2. What should you include in the recommendation?()
A

Internet Explorer Administration Kit (IEAK)

B

Microsoft Application Compatibility Toolkit (ACT)

C

Microsoft Application Virtualization (App-V)

D

Microsoft Enterprise Desktop Virtualization (MED-V)


参考解析

解析: 暂无解析

相关考题:

You are the administrator of a Windows 2000 Active Directory network. The network consists of a single domain. The domain includes 20 Windows NT Workstation 4.0 client computers. All other client computers are Windows 2000 Professional computers.You create a Windows NT 4.0 default user policy on the Windows 2000 Server computer that is configured as the PDC emulator. This default user policy denies access to Network Neighborhood. You then install Terminal Services on one of the servers and Terminal Services Client on the 20 Windows NT Workstation client computers.You find that the users of the Terminal Server can still browse the network when they open My Network Places. You want to prevent all users from browsing the network.What should you do?A.Modify the Windows NT policy template file so that you can restrict access to both My Network Places and Network Neighborhood. Save the policy file on the Terminal Server.B.Copy the Windows NT policy file to the 20 Windows NT Workstation computers.C.Create a Windows 2000 Group Policy that denies user access to My Network Places.D.Edit the local registry on the Windows NT Workstation computers to deny access to Entire Network in Network Neighborhood.

Your company has client computers that run Windows 7 and client computers that run Windows XP Professional. You enable the Network Discovery feature on the Windows 7 computers. You discover that the Windows XP computers do not appear on the network map. You need to ensure that all client computers appear on the network map. What should you do?()A.Configure the IPv6 protocol on the Windows 7 computers.B.Configure the network shares on the Windows 7 computers to include the user names of all employees.C.Configure the network shares on the Windows XP computers to include the user names of all employees.D.Install the Link Layer Topology Discovery (LLTD) Responder on the Windows XP computers.

Your company has client computers that run Windows 7 and client computers that run Windows XP Professional. You enable the Network Discovery feature on the Windows 7 computers. You discover that the Windows XP computers do not appear on the network map. You need to ensure that all client computers appear on the network map. What should you do?()A、Configure the IPv6 protocol on the Windows 7 computers.B、Configure the network shares on the Windows 7 computers to include the user names of all employees.C、Configure the network shares on the Windows XP computers to include the user names of all employees.D、Install the Link Layer Topology Discovery (LLTD) Responder on the Windows XP computers.

Your network contains an Active Directory domain. All domain controllers run Windows Server 2008  R2. Client computers run either Windows XP Service Pack 3 (SP3) or Windows Vista.  You need to ensure that all client computers can apply Group Policy preferences.   What should you do()A、Upgrade all Windows XP client computers to Windows 7.B、Create a central store that contains the Group Policy ADMX files.C、Install the Group Policy client-side extensions (CSEs) on all client computers.D、Upgrade all Windows Vista client computers to Windows Vista Service Pack 2 (SP2).

You are a network administrator for your company. All domain controllers run Windows Server 2003. The network contains 50 Windows 98 client computers, 300 Windows 2000 Professional computers, and 150 Windows XP Professional computers.   According to the network design specification, the Kerberos version 5 authentication protocol must be used for all client computers on the internal network.   You need to ensure that Kerberos version 5 authentication is used for all client computers on the internal network.   What should you do?  ()A、 On each domain controller, disable Server Message Block (SMB) signing and encryption of the secure channel traffic.B、 Replace all Windows 98 computers with new Windows XP Professional computers.C、 Install the Active Directory Client Extensions software on the Windows 98 computers.D、 Upgrade all Windows 98 computers to Windows NT Workstation 4.0.

Your network has a single domain with 1,000 client computers that run Windows Vista. All client computers are members of the domain.   You are planning to deploy Windows 7.   You need to create a report that shows hardware and device compatibility on all client computers.    You need to perform this action without installing any additional software on the client computers.   Which tool should you use?()A、System Center Capacity PlannerB、System Center Configuration ManagerC、Microsoft Assessment and Planning ToolkitD、Windows Performance Monitor Data Collector Sets

You upgrade all client computers in your network to Windows 2000 Professional. Then you apply the basicwk.inf security template to the computers. Now, none of the users can run the company’s database application. What should you do?()A、Apply the compactws.inf security template to the computers.B、Delete the basicwk.inf security template file from the computers.C、Use the system policy editor to configure a new security policy for the database application.D、For each user account, allow read permission to the database application and in associated files.

Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2008 R2. The network contains 100 servers and 5,000 client computers. The client computers run either Windows XP Service Pack 1 or Windows 7. You need to plan a VPN solution that meets the following requirements:   èStores VPN passwords as encrypted text  èSupports Suite B cryptographic algorithms èSupports automatic enrollment of certificates   èSupports client computers that are configured as members of a workgroup What should you include in your plan?() A、Upgrade the client computers to Windows XP Service Pack 3. Implement a stand-alone certification authority (CA). Implement an IPsec VPN that uses certificate-based authentication.B、Upgrade the client computers to Windows XP Service Pack 3. Implement an enterprise certification authority (CA) that is based on Windows Server?2008 R2. Implement an IPsec VPN that uses Kerberos  authentication.C、Upgrade the client computers to Windows 7. Implement an enterprise certification authority (CA) that is  based on Windows Server 2008 R2. Implement an IPsec VPN that uses pre-shared keys.D、Upgrade the client computers to Windows 7. Implement an enterprise certification authority (CA) that is  based on Windows Server 2008 R2. Implement an IPsec VPN that uses certificate-based authentication.

Your company’s network has client computers that run Windows 7.    When a user attempts to log on to the domain from a computer named Client1,she receives the following message:   The system cannot log you on to this domain because the system’s computer account in its primary domain is missing or the password on that account is incorrect.  You need to ensure that the user can log on to the domain from Client1.   What should you do?()A、Disjoin and rejoin Client1 to the domain.B、Add the computer account for Client1 to the Domain Computers Active Directory group.C、Reset the account password for Client1 through Active Directory Users and Computers.D、Reset the account password for the user through Active Directory Users and Computers.

You are planning to upgrade the operating systems of the client computers in the financedepartment.   You need to recommend a solution for App1 that meets the company’s technical requirements. What should you include in the recommendation?()A、Microsoft Application Virtualization (App-V)B、RemoteApp and Desktop ConnectionC、RD GatewayD、Windows XP Mode

Your company has client computers that run Windows XP Professional.   You are planning to install Windows 7 Enterprise on the existing client computers.    You need to ensure that the user state can be viewed after it has been collected and saved.    What are two possible ways to achieve this goal?()A、Use a hard-link migration storeB、Use an uncompressed migration storeC、Perform an offline migration by using WindowsoldD、Perform an offline migration by using Windows PE

Your company has a single Active Directory directory service domain. Servers in your environment run Windows Server 2003. Client computers run Windows XP or Windows Vista. You plan to create an internal centrally managed security update infrastructure for client computers. You need to choose a security update management tool that supports all the client computers.  Which tool should you choose? ()A、 Microsoft Assessment and Planning (MAP) ToolkitB、 Microsoft Baseline Security AnalyzerC、 Microsoft System Center Operations ManagerD、 Windows Server Update Services (WSUS)

Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers.   You are planning to deploy Windows 7 Enterprise to the client computers.   You need to design a custom image that will enable users to connect to a Telnet server.   What should you do?()A、 Configure Windows Firewall to allow the Telnet program through Windows Firewall before capturing the image.B、 Change User Account Control settings before capturing the image.C、 Turn on the Telnet Server feature in the image.D、 Turn on the Telnet Client feature in the image.

单选题Your company has client computers that run Windows XP Professional.   You are planning to install Windows 7 Enterprise on the existing client computers.   You have the following requirements:   Migrate user data and operating system components.  Encrypt and password-protect the migration store.   You need to design a user state migration strategy that supports the requirements. What should you do?()AUse a hard-link migration storeBUse a compressed migration storeCPerform an offline migration by using WindowsoldDPerform an offline migration by using Windows PE

单选题You are planning to upgrade Internet Explorer.   You have the following requirements:   Create a report that identifies which computers are successfully upgraded. Do not install additional software on the client computers.   You need to design a deployment method that meets the requirements.   What should you do?()AUse Internet Explorer Administration Kit (IEAK) and Group Policy.BUse Microsoft System Center Configuration Manager.CUse Windows Server Update Services (WSUS).DUse Microsoft System Center Essentials.

多选题Your network has client computers that run Windows XP.   Users do not have administrative rights to their local computers.   You use Windows Server Update Services (WSUS) to manage software updates. You are planning to deploy Windows 7.   Your company uses a custom application that is not compatible with Windows?7.   You need to ensure that all users are able to run the custom application.    What are two possible ways to achieve this goal?()ADeploy and register the compatibility-fix database file to the client computers by using a user startup script.BDeploy and register the compatibility-fix database file to the client computers by using a computer startup script.CInstall and register a shim on the client computers by using Group Policy.DInstall and register a shim on the WSUS server.

单选题Your company has 1,000 client computers. Each client computer has 1 GB of RAM. You are planning to deploy Windows 7 Enterprise.   You need to design a zero-touch deployment strategy to increase the number of client computers that can be imaged at one time.   What should you do?()AIncrease the amount of RAM on the client computers.BChange from unicast to multicast deployment of images.CChange from multicast to unicast deployment of images.DDecrease the trivial file transfer protocol (TFTP) block size on the TFTP server.

单选题You are the network administrator for your company. The network consists of a single Active Directorydomain. All network servers run Windows Server 2003. Three thousand client computers run Windows 2000Professional, and 1,500 client computers run Windows XP Professional.A new employee named Peter is hired to assist you in installing Windows XP Professional on 150 new client computers.You need to ensure that Peter has only the minimum permissions required to add new computer accounts to the domain and to own the accounts that he creates. Peter must not be able to delete computer accounts.What should you do()?AAdd Peter's user account to the Server Operators group.BAdd Peter's user account to the Account Operators group.CUse the Delegation of Control Wizard to permit Peter's user account to create new computer objects in the Computers container.DCreate a Group Policy object (GPO) and link it to the domain. Configure the GPO to permit Peter's user account to add client computers to the domain.

单选题Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers.   You are planning to deploy Windows 7 Enterprise to the client computers.   You need to design a custom image that will enable users to connect to a Telnet server.   What should you do?()A Configure Windows Firewall to allow the Telnet program through Windows Firewall before capturing the image.B Change User Account Control settings before capturing the image.C Turn on the Telnet Server feature in the image.D Turn on the Telnet Client feature in the image.

单选题Your network consists of an Active Directory domain. The domain controllers run Windows Server 2008 R2. Client computers run Windows 7.   You need to implement Encrypting File System (EFS) for all client computers. You want to achieve this goal while meeting the following requirements:   èYou must minimize the amount of data that is transferred across the network when a user logs on to or off from a client computer.   èUsers must be able to access their EFS certificates on any client computers. èIf a client computer s disk fails, EFS certificates must be accessible    What should you do?()AEnable credential roaming.BEnable roaming user profiles.CEnable a Data Recovery Agent.DIssue smart cards to all users.

单选题Your network has client computers that run Windows Vista. You are planning to deploy Windows 7.You need to detect and analyze the compatibility of an application that requires elevated privileges.   What should you do?()AUse the Standard User Analyzer (SUA) tool.BUse the Standard User Analyzer (SUA) Wizard.CRun a virtual version of the Setup Analysis Tool (SAT).DRun a stand-alone version of the Setup Analysis Tool (SAT).

单选题Your company has client computers that run Windows Vista.   The company plans to upgrade the Windows Vista computers to Windows 7.   The current configuration of all client computers in your company is based on a common Windows Vista image.   Some branch offices use WAN connections to connect to the main office. You have the following requirements:   Transfer all user data from the original Windows Vista installation to the new Windows 7 installation.  Use the least amount of bandwidth while transferring the user data.  Support the same migration strategy for all offices.    You need to design a user state migration strategy that supports the requirements.   What should you do?()AUse the multicast feature of Windows Deployment Services (WDS)BUse the Deployment Image Servicing and Management (DISM) toolCUse the User State Migration Tool (USMT) and a hard-link migration storeDUse Windows PE to perform an offline migration

单选题Your network has a single domain with 1,000 client computers that run Windows Vista. You are planning a deployment of Windows 7. Your company has multiple departments.   Only the sales department will use the existing target computers to run Windows 7.   You have the following requirements:Migrate the user state for each user.  Preserve the file system and existing applications for only the sales department computers.    You need to recommend the deployment method that is appropriate for the environment.    Which combination of deployment scenarios should you recommend?()A Use the Refresh Computer method for the sales department computers. Use the New Computer method for all other computers.B Use the Refresh Computer method for the sales department computers. Use the Replace Computer method for all other computers.C Use the Upgrade Computer method for the sales department computers. Use the Refresh Computer method for all other computers.D Use the Upgrade Computer method for the sales department computers. Use the Replace Computer method for all other computers.

单选题Your company is planning to deploy Windows 7 to all client computers.   You have the following requirements:   Test an application to detect potential compatibility issues caused by User Account Control (UAC). Monitor an application’s operating system use.   You need to select the appropriate method to detect application compatibility issues.   What should you do?()AUse the Standard User Analyzer tool.BUse the Standard User Analyzer Wizard.CUse the standalone Setup Analysis Tool.DUse the Setup Analysis Tool in a virtual environment.

单选题Your company has client computers that run Windows XP Professional.   You are planning to install Windows 7 Enterprise on the existing client computers.    You need to design a user state migration strategy that minimizes network bandwidth and server use when user data is being migrated.   What should you do?()AUse the Refresh Computer method and a hard-link migration store.BUse the Refresh Computer method and a compressed migration store.CUse the Replace Computer method and a hard-link migration store.DUse the Replace Computer method and a compressed migration store.