You deploy a server that runs Microsoft Exchange Server 2003 Service Pack  2. You also deploy mobile devices that run Microsoft Windows Mobile 5.0 with the Microsoft Messaging and Security Feature Pack.   You need to ensure that the Windows Mobilebased devices are as secure as possible from brute force password attacks.   What should you do?()A、Set the Microsoft ActiveSync synchronization schedule on the mobile devices to five-minute intervals.B、Enable the Wipe devices after failed attempts option and specify a valid value for the option.C、Configure the Default Domain Group Policy object to enable Password complexity.D、Configure the Default Domain Group Policy object to specify a valid value for the Account Lockout Threshold.

You deploy a server that runs Microsoft Exchange Server 2003 Service Pack  2. You also deploy mobile devices that run Microsoft Windows Mobile 5.0 with the Microsoft Messaging and Security Feature Pack.   You need to ensure that the Windows Mobilebased devices are as secure as possible from brute force password attacks.   What should you do?()

  • A、Set the Microsoft ActiveSync synchronization schedule on the mobile devices to five-minute intervals.
  • B、Enable the Wipe devices after failed attempts option and specify a valid value for the option.
  • C、Configure the Default Domain Group Policy object to enable Password complexity.
  • D、Configure the Default Domain Group Policy object to specify a valid value for the Account Lockout Threshold.

相关考题:

You create a service and deploy it on a network in a building named Building1. You will deploy the service to Building2.The service in Building1 is configured using the following discovery scopes.The service in Building2 will be configured using the following discovery scopes.You need to ensure that the client application can discover the service in Building1 or the service in Building2.Which scopes should you add to the client configuration file? ()A.B.C.D.

When do you need to configure the P1 interface?()A、 whenever you have an upstream proxyB、 whenever you intend to deploy the L4TM in blocking modeC、 whenever you want to enable the WSA proxyD、 whenever you have a separate management VLAN orsubnetwork

You develop an ASP.NET web application that uses a Windows Azure web role. The application includes a startup script that installs a third-party component. You are developing a test plan for the startup script.  What should you recommend?()  A、 Enable Remote Desktop Protocol (RDP) and deploy the application without the startup script.  Connect to the web role instance by using RDP, and then manually test the startup script.B、 Deploy the application in the Windows Azure Compute Emulator.C、 Deploy the application with a custom error page.D、 Deploy the application and then use IntelliTrace.

You need to recommend an update management strategy for the Chicago campus that meets the  company’s technical requirements. What should you recommend?()A、Deploy a WSUS server in replica mode,and then configure the servers reporting rollup settingsB、Deploy a WSUS server in replica mode,and then configure the serverse-mail notification settings.C、Deploy a WSUS server in autonomous mode,and then configure the servers reporting rollup settingsD、Deploy a WSUS server in autonomous mode,and then configure the servers e-mail notification  settings.

You want to create a valid directory structure for your Java EE web application, and you want to put yourweb application into a WAR file called MyApp.war. Which two are true about the WAR file?()A、At deploy time, Java EE containers add a directory called META-INF directly into the MyApp directory.B、At deploy time, Java EE containers add a file called MANIFEST.MF directly into the MyApp directory.C、It can instruct your Java EE container to verify, at deploy time, whether you have properly configured your application’s classes.D、At deploy time, Java EE containers add a directory call META-WAR directly into the MyApp directory.

Certkiller .com has a main office and branch office in another city. You are assigned to deploy and implement a Read-only Domain Controller (RODC) at the branch office. You deploy a RODC that runs Windows Server 2008.  What should you do to ensure that the users at the branch office can log on to the domain using RODC()A、Use Password Replication Policy on the RODCB、Add RODC to the main officeC、Deploy and configure a new bridgehead server in the branch officeD、Deploy and configure a Password Replication Policy on the RODC in the main office

You plan to deploy Windows 7 images. You need ensure that you can deploy images by using the WindowsPreinstallation Environment (Windows PE).  What should you do add to the Windows PE image?()A、Imagex.exeB、Loadstate.exeC、Mighost.exeD、Usmtutils.exe

You are planning a Windows 7 deployment infrastructure for a new company.   You have the following requirements:   Three domains  10,000 client computers No user interaction   You need to recommend a deployment infrastructure.   What should you recommend?()A、Deploy Microsoft Deployment Toolkit (MDT) 2010. Design a zero-touch installation.B、Deploy Microsoft System Center Virtual Machine Manager. Design a lite-touch installation.C、Deploy Microsoft System Center Operations Manager 2007 R2. Design a lite-touch installation. D、Deploy Microsoft System Center Configuration Manager 2007 R2. Design a zero-touch installation.

You need to recommend a Windows update strategy for the new branch office. What should you recommend doing in the new branch office?()A、Deploy WSUS in replica mode. Configure updates to be stored on the new WSUS server.B、Deploy WSUS in autonomous mode. Configure updates to be stored on the new WSUS server.C、Deploy WSUS in replica mode. Configure the WSUS clients to retrieve updates from Microsoft Update.D、Deploy WSUS in autonomous mode.Configure the WSUS clients to retrieve updates from Microsoft  Update.

Your company has a main office and a branch office. The offices connect by using WAN links. The network consists of a single Active Directory domain. An Active Directory site exists for each office.   Servers in both offices run Windows Server 2008 R2 Enterprise.   You plan to deploy a failover cluster solution to service users in both offices.  You need to plan a failover cluster to meet the following requirements: èMaintain the availability of services if a single server fails èMinimize the number of servers required What should you include in your plan?()A、Deploy a failover cluster that contains one node in each office.B、Deploy a failover cluster that contains two nodes in each office.C、In the main office, deploy a failover cluster that contains one node. In the branch office, deploy a  failover cluster that contains one node.D、In the main office, deploy a failover cluster that contains two nodes. In the branch office, deploy a  failover cluster that contains two nodes.

You need to recommend a solution to provision new applications on the VMs for the planned virtual desktop pool deployment. What should you recommend?()A、Deploy the applications to the VMs by using App-V streaming.B、Deploy the applications to the VMs by using Group Policy Software Installation.C、Deploy a MED-V workspace to each VM. Deploy the applications to the workspace.D、Deploy the applications by using RemoteApp.Create a RemoteApp and Desktop Connection for each  VM.

Your network consists of a single Active Directory domain. The network contains a file server that runs Windows Server 2008 R2. All servers use internal storage only. You plan to deploy a client/server application.   You need to deploy the application so that it is available if a single server fails. You must achieve this goal  while minimizing costs. What should you do?()A、Deploy RemoteApp.B、Deploy a failover cluster that uses No Majority: Disk Only.C、Deploy a failover cluster that uses Node and File Share Disk Majority.D、Deploy Distributed File System (DFS) and configure replication.

You create Windows Forms applications by using the .NET Framework 3.5.You plan to deploy a new application.You need to ensure that on deployment, the application meets the following requirements:  (1)It is executed on the client computer   (2)It is removed from the client computer after the application is closed   (3)It is not displayed in theAdd/Remove programs panel on the client computer    What should you do?()A、Deploy the application to a central network server.Access the application by using the Remote Desktop Connection tool.B、Deploy the application by using the ClickOnce technology.Use the Mage exe tool to set the Online Only option in the deployment manifest.C、Deploy the application by using the ClickOnce technology.Set the Install attribute of the deployment tag to true in the deployment manifest.D、Deploy the application to a CDROM by using the ClickOnce technology.Execute the application from the CDROM

You deploy mobile devices that run Microsoft Windows Mobile 5.0.   Company security policy requires an authentication process that is stronger than a user name and password combination.   You need to ensure that Microsoft ActiveSync sessions use an authentication process that meets the company security policy.   What should you do?()A、Deploy a two-factor authentication process.B、Deploy a single-factor authentication process.C、Deploy a simple PIN policy for the Windows Mobilebased devices.D、Deploy a complex PIN policy for the Windows Mobilebased devices.

You use Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 to manage virtual machines (VMs). You need to deploy a cloned VM and automatically assign it a different name.  Where should you deploy the cloned VM?()A、to the same host as the source VMB、to a different host from the source VMC、to the same library as the source VMD、to a different library from the source VM

You are designing an upgrade strategy for a Windows Azure application that includes one web role with one instance.  You have the following requirements:   - Test the application on the Windows Azure platform.   - Ensure that application upgrades can be rolled back.   - Ensure that upgrade and rollback processes do not cause downtime.    You need to recommend an approach for upgrading the application.  What should you recommend?()A、 Deploy to the Production slot.  Test the application, and then perform a VIP swap.B、 Deploy to the Staging slot.  Test the application, and then perform a VIP swap.C、 Deploy to the Staging slot.  Test the application, and then perform a manual in-place upgrade to the Production slot.D、 Deploy to the Staging slotTest the application, and then perform an automatic in-place upgrade to the Production slot.

You are creating a Windows Forms Application by using the .NET Framework 3.5.You plan to deploy a new Applciation.You need to ensure that on deployment, the application meets the following requirements;    (1)It is executed on the client computer.   (2)It is removed from the client computer after the application closed.   (3)It is not displayed in the Add/Remove programs panel on the client computer.     What sould you do?()A、Deploy the application to a central network server.- Access the application by using hte Remote Desktop Connection tool.B、Deploy the application by using the ClickOnce technology.- Use the Mage.exe tool to set the Online Only option in the deployment manifest.C、Deploy the application by using the ClickOnce technologoy.- Set the Install attiribute of the deployment tag to true in the deployment manifest.D、Deploy the application to a CD-ROM by using the ClickOnce technology. - Execute the application from the CD-ROM.

单选题You plan to deploy Windows XP Professional on 100 client computers. You need to create an answer file for a Sysprep setup.  What should you do from the Windows XP Professional installation CD? ()AExtract support.cab, and then run rsdir.exe.BExtract deploy.cab, and then run sysprep.exe.CExtract support.cab, and then run windiff.exe.DExtract deploy.cab, and then run setupmgr.exe.

单选题You use Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 to manage virtual machines (VMs). You need to deploy a cloned VM and automatically assign it a different name.  Where should you deploy the cloned VM?()Ato the same host as the source VMBto a different host from the source VMCto the same library as the source VMDto a different library from the source VM

单选题Your company is planning to deploy Windows 7.   You have an image that is used to deploy Windows 7 on client computers.   You need to add a volume image to the existing Windows image.   What should you do?()AService the image online.BUse DiskPart to attach a new volume.CUse ImageX to append the volume image.DUse the Deployment Image Servicing and Management (DISM) tool to mount the image.

单选题You have the following requirements:   - Ensure that the business tier can be updated without affecting the application tier.   - Use the minimum role instance size that meets or exceeds the current server specifications.    You need to recommend a topology for hosting the application in Windows Azure.  What should you recommend?()A Deploy the application tier and the business tier to one role with two Medium instances.B Deploy the application tier and the business tier to one role with two Large instances.C Deploy the application tier role to a Medium instance.  Deploy the business tier role to a medium instance.D Deploy the application tier role to a Large instance.  Deploy the business tier role to a Large instance.

单选题You are deploying an application using Windows 2000 (Windows 2000 Service pack). When Users try to install it, the installation fails. What do you need to do in order correct the situation?()ARe-deploy the .msi fileBRe-deploy the .mst fileCRe-deploy using the .zap file

单选题You develop an ASP.NET web application that uses a Windows Azure web role. The application includes a startup script that installs a third-party component. You are developing a test plan for the startup script.  What should you recommend?()A Enable Remote Desktop Protocol (RDP) and deploy the application without the startup script.  Connect to the web role instance by using RDP, and then manually test the startup script.B Deploy the application in the Windows Azure Compute Emulator.C Deploy theapplication with a custom error page.D Deploy the application and then use IntelliTrace.

单选题You have a reference computer that runs Windows 7. You plan to deploy an image of the computer. Youcreate an answer file named answer.xml. You need to ensure that the installation applies the answer fileafter you deploy the image.  Which command should you run before you capture the image?()AImagex.exe /append answer.xml /check.BImagex.exe /mount answer.xml /verify.CSysprep.exe /reboot /audit /unattend:answer.xml.DS.ysprep.exe /generalize /oobe /unattend:answer.xml.

单选题You are designing a Windows Azure solution. The solution will be used by multiple customers.  Each customer has different business logic and user interface requirements. Not all customers use the same version of the .NET runtime. You need to recommend a deployment strategy.  What should you recommend?()A Deploy in a multitenant configuration.B Deploy in a single-tenant configuration.C Deploy with multiple web role instances.D Deploy with multiple worker role instances.

单选题You plan to deploy Windows 7 images. You need ensure that you can deploy images by using the WindowsPreinstallation Environment (Windows PE).  What should you do add to the Windows PE image?()AImagex.exeBLoadstate.exeCMighost.exeDUsmtutils.exe

单选题Your company’s network has client computers that run Windows 7.   A software vendor releases version 2 of an application that your company uses.  Your company currently uses version 1.  Version 1 and version 2 are not compatible. You plan to deploy version 2 of the application.   You have the following requirements:Users must be able to run both versions of the application on their computers.   Version 2 must be available when a client computer is not connected to the network.  You need to plan a software deployment process that meets the requirements.   What should you do?()A Deploy version 2 of the application by using Microsoft Application Virtualization (App-V). B Deploy version 2 of the application as a Remote Desktop Services RemoteApp.C Deploy version 2 of the application by using a Group Policy Software Installation policy.D Deploy version 2 of the application by using a Microsoft System Center Configuration Manager package.

单选题You are using windows installer to deploy an application to 750 Windows 2000 Professional computers on your network. The network includes organizational unit (OU) named sales. A Group Policy object (GPO) is created for the Sales OU. The software deployment of the application is successful. Now, you want to install that application in the customized form. What should you do? ()ARepackage and re-deploy the application’s .msi file to the Sales OUBRe-deploy the application’s .mst file to the Sales OU.CRe-deploy the application by using the Group Policy object (GPO for the Sales OU)DRestart Windows Installer service on the ten computers.