单选题You need to recommend an RD Gateway configuration that meets the company’s technical requirements.   What should you recommend?()ACreate two Remote Desktop connection authorization policies (RD CAPs) and one Remote Desktop resource authorization policy (RD RAP).BCreate one Remote Desktop connection authorization policy(RD CAP)and two Remote Desktop  resource authorization policies (RD RAPs).CCreate one Remote Desktop resource authorization policy(RD RAP)and deploy the Remote Desktop Connection Broker(RD Connection Broker) role service.DCreate one Remote Desktop connection authorization policy(RD CAP) and deploy the Remote  Desktop Connection Broker (RD Connection Broker) role service.

单选题
You need to recommend an RD Gateway configuration that meets the company’s technical requirements.   What should you recommend?()
A

Create two Remote Desktop connection authorization policies (RD CAPs) and one Remote Desktop resource authorization policy (RD RAP).

B

Create one Remote Desktop connection authorization policy(RD CAP)and two Remote Desktop  resource authorization policies (RD RAPs).

C

Create one Remote Desktop resource authorization policy(RD RAP)and deploy the Remote Desktop Connection Broker(RD Connection Broker) role service.

D

Create one Remote Desktop connection authorization policy(RD CAP) and deploy the Remote  Desktop Connection Broker (RD Connection Broker) role service.


参考解析

解析: 暂无解析

相关考题:

Your company has a load-balanced Remote Desktop Session Host (RD Session Host) cluster. You are configuring the Remote Desktop Gateway (RD Gateway) role service on servers that run Windows Server 2008 R2. You need to centralize the storage of Remote Desktop connection authorization policies (RD CAPs). Which two actions should you perform?()A、Install the Network Policy Server role service.B、Install the Distributed File System role service.C、Configure the RD Gateway servers to use a local RD CAP store.D、Configure the RD Gateway servers to use a remote RD CAP store.

You need to recommend a monitoring solution for the file server that meets the technical  requirements.   What should you include in the recommendation?()A、Data Collector SetsB、File Server Resource Manger quotasC、File Server Resource Manger storage reportsD、NTFS disk quotas

You need to recommend a VHD configuration for the virtual desktop pool VMs. What should you include in the recommendation?()A、differencing VHDsB、dynamically expanding VHDsC、fixed-size VHDsD、pass-through disks

You need to recommend a delegation solution for CA1 that meets the company’s security requirements.   What should you include in the recommendation?()A、access-based enumeration (ABE)B、Active Directory delegationC、Authorization ManagerD、role separation

Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. You have a Remote Desktop Session Host (RD Session Host) server and a Remote Desktop Gateway (RD Gateway) server. You use Windows Firewall on your servers. You need to ensure that users can connect to their virtual desktops. What should you do?()A、Create a Windows Firewall inbound rule for port 443 on the RD Gateway server.B、Create a Windows Firewall inbound rule for port 443 on the RD Session Host server.C、Create a Windows Firewall inbound rule for port 3389 on the RD Gateway server.D、Create a Windows Firewall inbound rule for port 3389 on the RD Session Host server.

You need to recommend a solution for Group Policy that meets the companys technical requirements.What should you recommend?()A、Create a Central Store.B、Enable folder redirection.C、Modify the File Replication Service (FRS) settings for SYSVOL.D、Configure SYSVOL to use Distributed File System (DFS) Replication.

You need to recommend a BitLocker recovery method that meets the company’s technical requirements.   Which recovery method should you recommend?()A、a data recovery agentB、a recovery keyC、a recovery password printed and stored in a secure locationD、a recovery password stored in Active Directory

All servers on your network run Windows Server 2008 R2. You deploy Remote Desktop Services  (RDS).You are configuring the Remote Desktop Session Host (RD Session Host) role service. You need to ensure that authentication occurs before the Remote Desktop Connection logon screen appears. What should you do?()A、In the RD Session Host Configuration tool, select the Allow connections only from computers running Remote Desktop with Network Level Authentication option.B、In the RD Session Host Configuration tool, select the Allow connections from computers running any version of Remote Desktop option.C、In the Group Policy Object Editor, configure the Set TS Gateway authentication method setting to Use smart card.D、In the Group Policy Object Editor, configure the Set TS Gateway authentication method setting to Use locally logged-on credentials.

You need to recommend a solution for managing all of the servers. The solution must meet the  company’s technical requirements.What should you include in the recommendation?()A、Remote Server Administration Tools (RSAT)B、the Administration Tools Pack (adminpak.msi)C、the Remote Desktop Gateway (RD Gateway) role serviceD、the Remote Desktop Web Access (RD Web Access) role service

You are planning to upgrade the operating systems of the client computers in the financedepartment.   You need to recommend a solution for App1 that meets the company’s technical requirements. What should you include in the recommendation?()A、Microsoft Application Virtualization (App-V)B、RemoteApp and Desktop ConnectionC、RD GatewayD、Windows XP Mode

You need to recommend a solution that meets the company’s application provsioning requirements. What should you recommend?()A、Create a new MED-V workspace.B、Publish a new RemoteApp program.C、Create an application compatibility shim.D、Package a new application by using the App-V Sequencer.

You need to recommend a management solution for Server1 that meets the company's security  requirements.   What should you include in the recommendation?()A、access-based enumeration (ABE)B、Authentication Mechanism AssuranceC、Authorization ManagerD、Hyper-V Manager

单选题All servers on your network run Windows Server 2008 R2. You deploy Remote Desktop Services  (RDS).You are configuring the Remote Desktop Session Host (RD Session Host) role service. You need to ensure that authentication occurs before the Remote Desktop Connection logon screen appears. What should you do?()AIn the RD Session Host Configuration tool, select the Allow connections only from computers running Remote Desktop with Network Level Authentication option.BIn the RD Session Host Configuration tool, select the Allow connections from computers running any version of Remote Desktop option.CIn the Group Policy Object Editor, configure the Set TS Gateway authentication method setting to Use smart card.DIn the Group Policy Object Editor, configure the Set TS Gateway authentication method setting to Use locally logged-on credentials.

单选题You have an Exchange Server 2010 organization.  You need to recommend a storage solution that meets the following requirements:.Provides users with an alternate location for storing e-mail messages  .Provides users with access to the alternate location by using Outlook Web App (OWA)  What should you recommend?()Ajournal rulesBmanaged foldersCpersonal archivesDpersonal folders (.pst)

单选题You need to recommend a BitLocker recovery method that meets the company’s technical requirements.   Which recovery method should you recommend?()Aa data recovery agentBa recovery keyCa recovery password printed and stored in a secure locationDa recovery password stored in Active Directory

单选题You need to recommend a strategy for the file servers that meets the company’s technical requirements.   What should you recommend?()AImplement active file screens.BImplement passive file screens.CConfigure classification rules.DConfigure File Server Resource Manager (FSRM) quotas.

单选题You need to recommend a solution for managing all of the servers. The solution must meet the  company’s technical requirements.What should you include in the recommendation?()ARemote Server Administration Tools (RSAT)Bthe Administration Tools Pack (adminpak.msi)Cthe Remote Desktop Gateway (RD Gateway) role serviceDthe Remote Desktop Web Access (RD Web Access) role service

单选题You need to recommend a NAP enforcement method that meets the companyˉs security requirements. Which method should you recommend?()A802.1XBDHCPCIPSecDVPN

单选题You need to recommend an access solution for the users in the sales department that meets the  museum's technical requirements.    What should you include in the recommendation?()ABranchCache in Distributed Cache modeBBranchCache in Hosted Cache modeCoffline filesDtransparent caching

单选题You need to recommend a solution for the Web server content that meets the company’s technical requirements.   What should you include in the recommendation?()ADistributed File System (DFS) ReplicationBfolder redirectionCHTTP redirectionDIIS Shared Configuration

单选题Your company uses Remote Desktop Services (RDS). You install and configure the Remote Desktop Gateway (RD Gateway) role service on a server that runs Windows Server 2008 R2. Employees connect to RDS from unmanaged remote computers. Employees are unable to access the RD Gateway server from the unmanaged remote computers.You need to ensure that employees can access the RD Gateway server. What should you do?()ACreate a Remote Desktop resource authorization policy (RD RAP).BCreate a Remote Desktop connection authorization policy (RD CAP).COn the RD Gateway server, open port 3389 on the Windows Firewall.DOn the RD Gateway server, configure Network Access Protection (NAP) health policy checking.

单选题You need to recommend a data management solution that meets the company’s technical requirements.   What should you include in the recommendation?()ADFS ManagementBFile Server Resource Manager (FSRM)CShare and Storage ManagementDStorage Explorer