A customer has installed UAC in their network. They have both Windows and Linux endpoints andmust choose a deployment method that everyone can use. Which deployment method allows for multiple platforms? ()A、IPsec enforcementB、802.1X enforcementC、Source IP enforcementD、Odyssey Access Client
A customer has installed UAC in their network. They have both Windows and Linux endpoints andmust choose a deployment method that everyone can use. Which deployment method allows for multiple platforms? ()
- A、IPsec enforcement
- B、802.1X enforcement
- C、Source IP enforcement
- D、Odyssey Access Client
相关考题:
You must configure access to the corporate network for employees using a client access method. Users require IPsec tunneling to protected resources and an 802.1X supplicant. Users will access the network using Windows platforms.Which two client access methods would support these requirements?()A. Junos PulseB. Java AgentC. Odyssey Access ClientD. Native 802.1X supplicant
A customer has installed UAC in their network. They have both Windows and Linux endpoints andmust choose a deployment method that everyone can use. Which deployment method allows for multiple platforms? ()A. IPsec enforcementB. 802.1X enforcementC. Source IP enforcementD. Odyssey Access Client
During consultation, you find that a customer has multiple asset closets and will be adding more in the future. Which NAS physical deployment model would you suggest to this customer?()A、edgeB、centralC、Layer2D、Layer3
A customer asks the pSeries technical specialist to recommend which remote access (SSH or Telnet) method to use. What question should the customer be asked to best determine the proper recommendation?()A、Is there a need for a PKI Management System?B、Is there a need for end-to-end encryption?C、Do they currently have a Kerberos domain in place?D、Which clients are installed on their desktops -- SSH, Telnet or both?
A Customer has a functional server deployment solution that uses a combination of disk imaging and application pushing technology. They need to get a working Windows 2003 image for their new servers as soon as possible. What method can achieve this?()A、Install Windows 2003 using the F6 supply Mass Storage Controller optionB、Replace Customer’s deployment solution with Tivoli Provisioning Manager for OS Deployment Director EditionC、Deploy Customer’s existing image and use UXSPi to update IBM specific driversD、Use ServerGuide to install Windows 2003
Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows Vista computers. You are planning to deploy Windows 7 and a custom application. You have the following requirements: The application must be available to only a specific group of users. You must be able to monitor application usage. You need to design a deployment method for the custom application that meets the requirements. Which deployment method should you use in your design?()A、software installation in Group PolicyB、startup scripts in Group PolicyC、Microsoft Application Virtualization (App-V)D、baseline Windows 7 image that includes the custom application
You are deploying an ASP.NET Web application to a remote server. You need to choose a deployment method that will ensure that all IIS settings, in addition to the Web content, will deploy to the remote server. Which deployment method should you choose?()A、the XCOPY command-line toolB、the Copy Web Site toolC、the Web Deployment toolD、the Publish Web Site utility
Your network has 1,000 client computers that run Windows XP. You are planning to deploy Windows 7. You plan to use the Microsoft Deployment Toolkit Lite Touch Installation deployment method to deploy the Windows 7 image. You have the following requirements: Migrate 20 computers at a time. Ensure that you conserve network bandwidth. You need to design a deployment strategy that meets the requirements. What should you do?()A、Configure multicast transmission on the deployment point.B、Configure unicast transmission on the deployment point.C、Compress the contents of the distribution folder.D、Distribute the image by using Background Intelligent Transfer Service (BITS).
A Customer has a proprietary server deployment solution that uses a combination of disk imaging and application pushing technology. They need to get a working Windows 2003 image for their new servers as soon as possible for deployment with their provisioning system. Which of the following methods can achieve this? ()A、Install Windows 2003 using the F6 supply Mass Storage Controller option B、Replace Customers deployment solution with Tivoli Provisioning Manager for OS Deployment Director Edition C、Use ServerGuide to install Windows 2003 D、Deploy Customers existing image and use UXSPi to update IBM specific drivers
You must configure access to the corporate network for employees using a client access method. Users require IPsec tunneling to protected resources and an 802.1X supplicant. Users will access the network using Windows platforms.Which two client access methods would support these requirements?()A、Junos PulseB、Java AgentC、Odyssey Access ClientD、Native 802.1X supplicant
A Customer has a proprietary server deployment solution that uses a combination of disk imaging and application pushing technology. They need to get a working Windows 2003 image for their new servers as soon as possible for deployment with their provisioning system. Which of the following methods can achieve this?()A、UseServerGuide to install Windows 2003rchase PowerVM Standard Edition for the entire systemB、Install Windows 2003 using the F6 supply Mass Storage Controller optionC、Replace Customer’s deployment solution with Tivoli Provisioning Manager for OS Deployment Director EditionD、Deploy Customer’s existing image and useUXSPi to update IBM specific drivers
Which two statements are true about using the isUserInRole method to implement security in a Java EEapplication?()A、It can be invoked only from the doGet or doPost methods.B、It can be used independently of the getRemoteUser method.C、Can return "true" even when its argument is NOT defined as a valid role name in the deployment descriptor.D、Using the isUserInRole method overrides any declarative authentication related to the method in which it is invoked.
All servers on your network run Windows Server 2008 R2. You are planning a deployment of a virtual desktop infrastructure (VDI). You need to estimate the number of servers required for the deployment. Which factor should you consider?()A、the number of static and dynamic sessions for the VDI clientsB、the Remote Desktop Protocol (RDP) version that clients will connect withC、the deployment method for VDI operating systemsD、the provisioning method for VDI desktops
Your network has a single domain with 1,000 client computers that run Windows Vista. You are planning a deployment of Windows 7. Your company has multiple departments. Only the sales department will use the existing target computers to run Windows 7. You have the following requirements:Migrate the user state for each user. Preserve the file system and existing applications for only the sales department computers. You need to recommend the deployment method that is appropriate for the environment. Which combination of deployment scenarios should you recommend?()A、 Use the Refresh Computer method for the sales department computers. Use the New Computer method for all other computers.B、 Use the Refresh Computer method for the sales department computers. Use the Replace Computer method for all other computers.C、 Use the Upgrade Computer method for the sales department computers. Use the Refresh Computer method for all other computers.D、 Use the Upgrade Computer method for the sales department computers. Use the Replace Computer method for all other computers.
Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows 7 computers. You are planning to deploy a custom application. You need to schedule the deployment to occur outside of business hours and without user interaction. Which deployment method should you choose?()A、software installation with Group PolicyB、Microsoft Application Virtualization (App-V)C、Lite Touch InstallationD、software deployment with Microsoft System Center Configuration Manager 2007
Your company has an Active Directory Domain Services (AD DS) forest with a single domain. A server has the Windows Deployment Services (WDS) role installed. You create a Windows 7 image. You plan to use the Lite Touch Installation deployment method to deploy the Windows 7 image. You need to design a deployment strategy that will install an image on unknown client computers only if administrative approval is granted. What should you do?()A、Create a multicast transmission for the Windows 7 image.B、Create a unicast transmission for the Windows 7 image.C、Use DHCP rogue detection on the WDS server.D、Use an Auto-Add policy on the WDS server.
Your company has a single Active Directory Domain Services (AD DS) domain with Windows Server 2008 R2 member servers and 1,000 Windows 7 client computers. You are designing the deployment of a custom application. You have the following requirements: The application must be available to only users who need it. Minimize network traffic during deployment. You need to design a deployment strategy that meets the requirements. Which deployment method should you use?()A、RemoteApp and Desktop ConnectionsB、software installation in Group PolicyC、Microsoft Application Virtualization (App-V)D、Microsoft System Center Configuration Manager 2007
You use Microsoft .NET Framework 4 to create a Windows application. You use ClickOnce technology to install the application on computers that run Windows 7 with User Access Control (UAC) enabled. The application requires access to environment variables on each computer. You need to ensure that users who do not have administrative permissions can install the application. Which deployment method should you use? ()A、Start from Web.B、Install from Web.C、Start from network shareD、Install from network share.
All client computers in your network run Windows XP. Some of the computers are part of a secure network. Some of the computers connect to the network by using virtual private networking (VPN). You are planning to deploy Windows 7. You have the following requirements: Use a dedicated server for deployment. Use a single operating system image for deployment. Ensure that you can use removable media to deploy the image. Ensure that you can select which applications are installed onto a client computer at the time of deployment. You need to design a deployment strategy that meets the requirements. What should you do?()A、 Using a Windows PE boot media, use ImageX to apply the image from a network share to the client computers.B、 Use System Center Configuration Manager 2007 R2 to perform a zero-touch installation.C、 Use the Microsoft Deployment Toolkit to perform a lite-touch installation.D、 Use Windows Deployment Services on a network server to deploy Windows 7 by using an install image.
You are planning a Windows 7 deployment infrastructure. You have the following requirements: Enable network deployments of WIM images or VHDs. Support multicast with the use of multiple stream transfer functionality. Allow drivers to be stored centrally,and use dynamic driver provisioning. You need to design an infrastructure that meets the requirements. Which deployment method should you recommend?()A、Microsoft Deployment Toolkit (MDT) 2008B、Microsoft Deployment Toolkit (MDT) 2010C、Deployment Image Servicing and Management (DISM)D、Windows Deployment Services in Windows Server 2008 R2
单选题A customer asks the pSeries technical specialist to recommend which remote access (SSH or Telnet) method to use. What question should the customer be asked to best determine the proper recommendation?()AIs there a need for a PKI Management System?BIs there a need for end-to-end encryption?CDo they currently have a Kerberos domain in place?DWhich clients are installed on their desktops -- SSH, Telnet or both?
单选题You are planning a Windows 7 deployment infrastructure. You have the following requirements: Enable network deployments of WIM images or VHDs. Support multicast with the use of multiple stream transfer functionality. Allow drivers to be stored centrally,and use dynamic driver provisioning. You need to design an infrastructure that meets the requirements. Which deployment method should you recommend?()AMicrosoft Deployment Toolkit (MDT) 2008BMicrosoft Deployment Toolkit (MDT) 2010CDeployment Image Servicing and Management (DISM)DWindows Deployment Services in Windows Server 2008 R2
单选题A customer has installed UAC in their network. They have both Windows and Linux endpoints andmust choose a deployment method that everyone can use. Which deployment method allows for multiple platforms? ()AIPsec enforcementB802.1X enforcementCSource IP enforcementDOdyssey Access Client
单选题You are deploying an ASP.NET Web application to a remote server. You need to choose a deployment method that will ensure that all IIS settings, in addition to the Web content, will deploy to the remote server. Which deployment method should you choose?()Athe XCOPY command-line toolBthe Copy Web Site toolCthe Web Deployment toolDthe Publish Web Site utility
单选题During consultation, you find that a customer has multiple asset closets and will be adding more in the future. Which NAS physical deployment model would you suggest to this customer?()AedgeBcentralCLayer2DLayer3
多选题Which two statements are true about using the isUserInRole method to implement security in a Java EEapplication?()AIt can be invoked only from the doGet or doPost methods.BIt can be used independently of the getRemoteUser method.CCan return true even when its argument is NOT defined as a valid role name in the deployment descriptor.DUsing the isUserInRole method overrides any declarative authentication related to the method in which it is invoked.
单选题All servers on your network run Windows Server 2008 R2. You are planning a deployment of a virtual desktop infrastructure (VDI). You need to estimate the number of servers required for the deployment. Which factor should you consider?()Athe number of static and dynamic sessions for the VDI clientsBthe Remote Desktop Protocol (RDP) version that clients will connect withCthe deployment method for VDI operating systemsDthe provisioning method for VDI desktops