单选题You need to generate a report that lists all of the computers in the domain that can be converted to Hyper-V hosts. The solution must meet the company’s business requirements. What should you use to generate the report?()AMicrosoft System Center Virtual Machine ManagerBMicrosoft Desktop Optimization Pack (MDOP)CMicrosoft Assessment and Planning Toolkit (MAP)DMicrosoft System Center Operations Manager
单选题
You need to generate a report that lists all of the computers in the domain that can be converted to Hyper-V hosts. The solution must meet the company’s business requirements. What should you use to generate the report?()
A
Microsoft System Center Virtual Machine Manager
B
Microsoft Desktop Optimization Pack (MDOP)
C
Microsoft Assessment and Planning Toolkit (MAP)
D
Microsoft System Center Operations Manager
参考解析
解析:
暂无解析
相关考题:
You discover audit log entries that report attempts to log on to your computer. You need to be notified of all logon attempts that occur on your computer.What should you do?() A.AB.BC.CD.D
Your computer runs Microsoft Windows XP Professional. You share your computer with two other co-workers. You purchase a new computer. You install Microsoft Windows Vista on the new computer. You need to migrate the following content from the old computer to the new computer:All system and program settingsAll users settingsOnly the content in the C:\Appdata folderWhich tool should you use?()A.AB.BC.CD.D
You have a computer that runs Windows Vista.You need to prevent all inbound traffic to your computer without being notified.What should you do?() A.AB.BC.CD.D
You need to verify whether your computer can obtain all of the latest operating system updates.What should you do?() A.AB.BC.CD.D
You discover audit log entries that report attempts to log on to your computer. You need to be notified of all logon attempts that occur on your computer. What should you do?()A、Enable the Problem Reporting feature for all users.B、Configure a custom view to monitor failed logon events on your computer.C、Use the Computer Management console to connect to your computer from another computer and monitor the audit logs.D、In the Event Viewer window, attach a task to a failed logon event. Configure this task to send an e-mail message to your e-mail account.
You have a single Active Directory directory service domain. All client computers run either Windows Vista or Windows XP. You create and configure a Group Policy object (GPO) named Secure Client Computer. You need to ensure that the Secure Client Computer GPO is automatically applied to current and future Windows XP client computers. What should you do?()A、 Create a WMI filter that limits the scope of the Secure Client Computer GPO to the Windows XP operating system. Link the WMI filter to the GPO. Link the GPO to the domain.B、 Create a global security group that contains all of the Windows XP client computers. Edit the permissions of the Secure Client Computer GPO to allow the global security group the Read and Apply Group Policy permissions. Link the Secure Client Computer GPO to the domain.C、 Use the Delegation of Control Wizard at the domain level, and delegate the Generate Resultant Set of policy (Planning) right to the Windows XP client computers. Link the Secure Client Computer GPO to the domain.D、 Use the Delegation of Control Wizard at the domain level, and delegate the Generate Resultant Set of policy (Logging) right to the Windows XP client computers. Link the Secure Client Computer GPO to the domain.
You design a Business Intelligence (BI) solution by using SQL Server 2008. You create a SQL Server 2008 Reporting Services (SSRS) solution. You create reports by using Microsoft Visual Studio .NET 2008. The development team of your company must create 50 SSRS reports. You need to ensure that the company logo and the company name are included in the page header of all the reports. What should you do?()A、 Create an SSRS report and include the required page header in the report. Use the report as a template for all the reports.B、 Create an SSRS report and include the required page header in the report. Create a subreport that refers to the report. Include the subreport to all the reports.C、 Create a SSRS report and include the required page header in the report. Copy the report definition to an XML file.Add the XML file as a data source for all the reports.D、 Create a SSRS report and include the required page header in the report. Create a class library that includes the report.Add the class library as an assembly reference for all the reports.
You need to generate a report that lists all of the computers in the domain that can be converted to Hyper-V hosts. The solution must meet the company’s business requirements. What should you use to generate the report?()A、Microsoft System Center Virtual Machine ManagerB、Microsoft Desktop Optimization Pack (MDOP)C、Microsoft Assessment and Planning Toolkit (MAP)D、Microsoft System Center Operations Manager
You have a computer that runs Windows 7. You need to view the processes that currently generate network activity. What should you do? ()A、Open Resource Monitor and click the Network tab.B、Open Windows Task Manager and click the Networking tab.C、Open Event Viewer and examine the NetworkProfile Operational log.D、Open Performance Monitor and add all the counters for network interface.
Your computer is part of a workgroup. You share files with other users on the network. You configure exceptions in Microsoft Windows Firewall to allow file sharing. Users report that they are unable to connect to your computer. You need to ensure that other users are able to access only the shared files. What should you do? ()A、Restart the Workstation service on your computer.B、Change all of your TCP port exceptions to UDP port exceptions.C、Ensure parental controls are not configured to block file sharing.D、Clear the Block all incoming connections check box in Windows Firewall.
Your network contains a public computer that runs Windows 7. Multiple users log on to the computer byusing a local user account named User1. Users report that they can log on to some secure Web sites byusing credentials that were saved by other users. You need to prevent forms-based credentials from beingsaved on the computer. What should you do?()A、Remove all generic credentials from Windows Vault.B、Remove all Windows credentials from Windows Vault.C、Modify the Windows Internet Explorer certificates settings.D、Modify the Windows Internet Explorer AutoComplete settings.
You have an Exchange Server 2010 organization named Contoso.com that contains a mail-enabled Domain Local group named Group1.Users from outside the organization report that all e-mail messages sent to group1@contoso.com generate a non-delivery-report (NDR).You need to ensure that users from outside the organization send e-mail to group1@contoso.com. What should you modify for group1?()A、Advanced settingsB、Group scopeC、Group typeD、The mail flow settings
You design a SQL Server 2008 Reporting Services (SSRS) solution. You create a report by using Microsoft Visual Studio .NET 2008. The report contains the following components: A dataset named Customer that lists all active customers and their details. The dataset accepts no parameters. A dataset named SalesHistory that lists all sales transactions for a specified time period and accepts year and month as parameters. You need to ensure that a summary of sales transactions is displayed for each customer after the customer details. Which component should you add to the report? ()A、 ListB、 TableC、 MatrixD、 Subreport
You need to generate the utilization report for the application servers. What should you use to generate the report?()A、Microsoft Assessment and Planning Toolkit (MAP)B、Microsoft Desktop Optimization Pack (MDOP)C、Microsoft System Center Virtual Machine ManagerD、Microsoft System Center Operations Manager
Your computer runs Microsoft Windows XP Professional. You share your computer with two other co-workers. You purchase a new computer. You install Microsoft Windows Vista on the new computer. You need to migrate the following content from the old computer to the new computer: All system and program settings All users settings Only the content in the C:///Appdata folder Which tool should you use? ()A、File and Settings Transfer wizardB、Application Compatibility toolkitC、Windows Automated Installation toolkitD、Microsoft Windows Easy Transfer wizard
单选题You have an Exchange Server 2010 organization named Contoso.com that contains a mail-enabled Domain Local group named Group1.Users from outside the organization report that all e-mail messages sent to group1@contoso.com generate a non-delivery-report (NDR).You need to ensure that users from outside the organization send e-mail to group1@contoso.com. What should you modify for group1?()AAdvanced settingsBGroup scopeCGroup typeDThe mail flow settings
单选题You have a computer that runs Windows 7. You generate a System Diagnostic Report and receive thefollowing warning message: The Graphics rating for the system is poor and may be the cause of performance problems. You need to increase the graphics performance of the computer without modifyingthe current hardware or drivers. What should you do?()AFrom Personalization, modify the screen saver.BFrom Indexing Options, modify the Advanced options.CFrom Performance Options, modify the visual effects.DFrom Performance Options, modify the processor scheduling.
单选题ou are developing a fiscal report for a customer. Your customer has a main office in the United States and a satellite office in Mexico. You need to ensure that when users in the satellite office generate the report, the current date is displayed in Mexican Spanish format.Which code segment should you use?()A AB BC CD D
单选题You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all client computers run Windows XP Professional. A user named King uses a client computer named TestKing1. This computer has a locally attached tape device. You grant King the necessary permission to perform backups of a member server named TestKingSrvB. King runs the Backup utility on TestKing1 to back up the files located on TestKingSrvB. You need to use your client computer to view the most recent backup logs for TestKingSrvB. What should you do?()AUse Notepad to view the contents of the backup report located on TestKingSrvb.BUse Notepad to view the contents of the backup report located on TestKing1.CUse Event Viewer to view the contents of the application log located on TestKingSrvb.DUse Event Viewer to view the contents of the application log located on TestKing1
单选题You design a SQL Server 2008 Reporting Services (SSRS) solution. You create a report by using Microsoft Visual Studio .NET 2008. The report contains the following components: A dataset named Customer that lists all active customers and their details. The dataset accepts no parameters. A dataset named SalesHistory that lists all sales transactions for a specified time period and accepts year and month as parameters. You need to ensure that a summary of sales transactions is displayed for each customer after the customer details. Which component should you add to the report? ()A ListB TableC MatrixD Subreport
单选题You share a folder named Folder1 on a computer that runs Windows XP Professional. Users report that they cannot access the folder from other computers on the network. You verify that all users can access Folder1 when logged on to the computer. You need to ensure that all users can access Folder1 from the network. What should you do?()AOn Folder1, modify the share permissions.BOn Folder1, modify the NTFS permissions.CAdd all local user accounts to the Guests group. DAdd all local user accounts to the Network Configuration Operators group.
单选题You design a Business Intelligence (BI) solution by using SQL Server 2008. You plan to create a SQL Server 2008 Reporting Services (SSRS) solution. Developers generate random reports against a data source that contains 200 tables. Power users generate random reports against four of the 200 tables. You need to design a strategy for the SSRS solution to meet the following requirements: ·Uses minimum amount of development effort. ·Provides two sets of tables in SSRS to the developers group and the power users group. Which strategy should you use?()A Create two Report Builder models.Include the four frequently used tables in the first model and all the tables in the second model.B Create a Report Builder model by using all the tables.Create a perspective within the model to use only the four frequently used tables.C Create a Report Builder model by using all the tables. Create two folders.Place the four frequently used tables in the first folder and the remaining tables in the second folder.D Create two Data Source Views.Include all the tables in one Data Source View and the four frequently used tables in the other Data Source View.Create two Report Builder models so that each model uses one of the Data Source Views.
单选题Your network contains a Windows Server Update Services (WSUS) server.You have an organizational unit (OU) named Sales. The Sales OU contains all of the computer objects for the sales department. You enable client-side targeting for the Sales OU and set the target group name to Sales-Computers.You restart a sales computer.You discover that the computer is not added to the Sales-Computer computer group in WSUS.You need to ensure that all sales computers are added to the Sales-Computers group. Which options should you configure?()AAutomatic ApprovalsBComputersCPersonalizationDProducts and Classifications
单选题You need to generate a report that lists all of the computers in blueyonderairlines.com that can be converted to Hyper-V hosts. The solution must meet the company’s corporate requirements. What should you use to generate the report?()AMicrosoft System Center Operations ManagerBMicrosoft Desktop Optimization Pack (MDOP)CMicrosoft Assessment and Planning Toolkit (MAP)DMicrosoft System Center Virtual Machine Manager
单选题What is the result of this command?() RMAN Report need backup days 3;A Lists all datafiles created in the last three days that are not backed up.B Lists all datafiles not recoverable based on the current retention criteria.C Lists all datafiles not backed up in the last three days. The datafile is not recoverable. D Lists all datafiles that need to be backed up due to unrecoverable operations.E Lists all datafiles not backed up in the last three days. It does not imply that the datafile is not recoverable.
单选题You are a network administrator for your company. The network contains a Windows Server 2003 computernamed Server3. Server3 functions as a file server. Six users in the accounting department use an accounting software application to open files that are stored in a shared folder on Server3. The users keep these files open for an extended period of time. You need to restart Server3. You need to find out if any files on Server3 are open before you restart the computer. What should you do? ()AUse Computer Management to view existing connections.BUse the netsend command to send a message to all domain members.CUse Task Manager to monitor processes started by all users.DUse System Monitor to monitor the Server object in Report view.
单选题You design a Business Intelligence (BI) solution by using SQL Server 2008. You create a SQL Server 2008 Reporting Services (SSRS) solution. You create reports by using Microsoft Visual Studio .NET 2008. The development team of your company must create 50 SSRS reports. You need to ensure that the company logo and the company name are included in the page header of all the reports. What should you do?()A Create an SSRS report and include the required page header in the report. Use the report as a template for all the reports.B Create an SSRS report and include the required page header in the report. Create a subreport that refers to the report. Include the subreport to all the reports.C Create a SSRS report and include the required page header in the report. Copy the report definition to an XML file.Add the XML file as a data source for all the reports.D Create a SSRS report and include the required page header in the report. Create a class library that includes the report.Add the class library as an assembly reference for all the reports.
单选题Your network consists of an Active Directory Domain Services (AD DS) forest with 1,000 client computers that run Windows XP. Nine hundred of the computers are on the local area network. One hundred computers are portable computers that connect to the main office only once every few months. You are planning to deploy Windows 7. You need to generate a report of the software that is installed on all client computers. You need this information as soon as possible. What should you use?()AMicrosoft System Center EssentialsBMicrosoft Desktop Optimization PackCMicrosoft System Center Operations ManagerDMicrosoft System Center Data Protection Manager