Your company has a single Active Directory Domain Services (AD DS) domain with Windows Server 2008 R2 member servers and 1,000 Windows 7 client computers. You are designing the deployment of a custom application.   You have the following requirements:   The application must be available to only users who need it. Minimize network traffic during deployment.   You need to design a deployment strategy that meets the requirements.   Which deployment method should you use?()A、RemoteApp and Desktop ConnectionsB、software installation in Group PolicyC、Microsoft Application Virtualization (App-V)D、Microsoft System Center Configuration Manager 2007

Your company has a single Active Directory Domain Services (AD DS) domain with Windows Server 2008 R2 member servers and 1,000 Windows 7 client computers. You are designing the deployment of a custom application.   You have the following requirements:   The application must be available to only users who need it. Minimize network traffic during deployment.   You need to design a deployment strategy that meets the requirements.   Which deployment method should you use?()

  • A、RemoteApp and Desktop Connections
  • B、software installation in Group Policy
  • C、Microsoft Application Virtualization (App-V)
  • D、Microsoft System Center Configuration Manager 2007

相关考题:

Your company has an Active Directory Domain Services (AD DS) domain. You install the Remote Desktop Session Host (RD Session Host) role service on a server that runs Windows Server 2008 R2. Client computers run Windows Vista and Windows 7.You need to automate the migration of user settings from client computers to the RD Session Host server.Which tool should you use?()A.Windows Easy TransferB.User State Migration Tool (USMT)C.Windows System Image Manager (Windows SIM)D.Deployment Image Servicing and Management (DISM)

Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows Vista computers.  You are planning to deploy Windows 7 and a custom application.   You have the following requirements:   The application must be available to only a specific group of users. You must be able to monitor application usage.   You need to design a deployment method for the custom application that meets the requirements.  Which deployment method should you use in your design?()A、software installation in Group PolicyB、startup scripts in Group PolicyC、Microsoft Application Virtualization (App-V)D、baseline Windows 7 image that includes the custom application

Your company has 1,000 client computers.  You are planning to deploy Windows 7 and a new line-of-business application.   You have the following requirements:   Install the application as part of the standard Windows 7 deployment. Use a single Windows 7 image for the deployment.  The application must be available for use on client computers that are not connected to the network.   You need to ensure that the application is installed on all new client computers.   What should you do?()A、Publish the application by using Group Policy Software Installation.B、Deploy the application by using Windows Server Update Services (WSUS).C、Service an online image of Windows 7 to add the new application.D、Service an offline image of Windows 7 to add the new application.

Your network consists of a single Active Directory domain. All domain controllers run Windows Server2008 R2. Your company and an external partner plan to collaborate on a project. The external partner has an Active Directory domain that contains Windows Server 2008 R2 domain controllers. You need to design a collaboration solution that meets the following requirements:   èAllows users to prevent sensitive documents from being forwarded to untrusted recipients or from being  printed.   èAllows users in the external partner organization to access the protected content to which they have been granted rights.   èSends all inter-organizational traffic over port 443.   èMinimizes the administrative effort required to manage the external users. What should you include in your design?()A、Establish a federated trust between your company and the external partner. Deploy a Windows Server 2008 R2 server that has Microsoft SharePoint Foundation 2010 installed.B、Establish a federated trust between your company and the external partner. Deploy a Windows Server 2008 R2 server that runs Microsoft SharePoint 2010 and that has the Active Directory Rights  Management Services (AD?RMS) role installed.C、Establish an external forest trust between your company and the external partner. Deploy a Windows Server 2008 R2 server that has the Active Directory Certificate Services server role installed. Implement Encrypting File System (EFS).D、Establish an external forest trust between your company and the external partner. Deploy a Windows Server 2008 R2 server that has the Active Directory Rights Management Service (AD?RMS)role installed  and Microsoft SharePoint Foundation 2010 installed.

Your company has an Active Directory Domain Services (AD DS) domain. You have m ultiple Remote Desktop Session Host (RD Session Host) servers. You have 100 Windows Server 2008 R2 Remote Desktop Services client access licenses (RDS CALs) installed on your license server. You need to return 10 RDS CALs to the pool on the license server. What should you do?()A、Remove the Per User RDS CALs.B、Revoke the Per Device RDS CALs.C、Remove the Per Device RDS CALs.D、Revoke the Per User RDS CALs.

Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers.  You are planning to deploy Windows 7 Enterprise to the client computers.    You need to design a zero-touch installation strategy.()A、unattended installationB、custom Windows 7 image on DVDC、Windows Deployment Services (WDS)D、Microsoft System Center Configuration Manager 2007 R2

our network consists of a single Active Directory domain. You have a domain controller and a  member server that run Windows Server 2008 R2. Both servers are configured as DNS servers.  Client computers run either Windows XP Service Pack 3 or Windows 7. You have a standard  primary zone on the domain controller. The member server hosts a secondary copy of the zone.     You need to ensure that only authenticated users are allowed to update host (A) records in the  DNS zone.     What should you do first()A、On the member server, add a conditional forwarder.B、On the member server, install Active Directory Domain Services.C、Add all computer accounts to the DNSUpdateProxy group.D、Convert the standard primary zone to an Active Directory-integrated zone.

Your company has an Active Directory Rights Management Services (AD RMS) server. Users  have Windows Vista computers. An Active Directory domain is configured at the Windows Server  2003 functional level.     You need to configure AD RMS so that users are able to protect their documents.     What should you do()A、Install the AD RMS client 2.0 on each client computer.B、Add the RMS service account to the local administrators group on the AD RMS server.C、Establish an e-mail account in Active Directory Domain Services (AD DS) for each RMS user.D、Upgrade the Active Directory domain to the functional level of Windows Server 2008.

Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers.  You are planning to deploy Windows 7 by using a zero-touch installation process.   You need to test the deployment methodology.   What should you do first?()A、Create a security group with test computers as members.B、Create a distribution group with test computers as members.C、Create a computer collection with test computers as members.D、Create an organizational unit and move test computer accounts into it.

Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows 7 computers.  You are planning to deploy a custom application.   You need to schedule the deployment to occur outside of business hours and without user interaction.   Which deployment method should you choose?()A、software installation with Group PolicyB、Microsoft Application Virtualization (App-V)C、Lite Touch InstallationD、software deployment with Microsoft System Center Configuration Manager 2007

Your company has an Active Directory Domain Services (AD DS) forest with a single domain.  A server has the Windows Deployment Services (WDS) role installed. You create a Windows 7 image.  You plan to use the Lite Touch Installation deployment method to deploy the Windows 7 image.    You need to design a deployment strategy that will install an image on unknown client computers only if administrative approval is granted.   What should you do?()A、Create a multicast transmission for the Windows 7 image.B、Create a unicast transmission for the Windows 7 image.C、Use DHCP rogue detection on the WDS server.D、Use an Auto-Add policy on the WDS server.

Your network consists of a single Active Directory domain. You have a domain controller and a   member server that run Windows Server 2008 R2. Both servers are configured as DNS servers. Client  computers run either Windows XP Service Pack 3 or Windows 7.   You have a standard primary zone on the domain controller. The member server hosts a secondary copy  of the zone.You need to ensure that only authenticated users are allowed to update host (A) records in the DNS zone.   What should you do first()A、On the member server, add a conditional forwarder.B、On the member server, install Active Directory Domain Services.C、Add all computer accounts to the DNSUpdateProxy group.D、Convert the standard primary zone to an Active Directory-integrated zone.

Your company has an Active Directory Domain Services (AD DS) domain that includes an AD security group named Development. You have a member server that runs Windows Server 2008 R2 with the Hyper-V role installed. You need to ensure that Development group members can only manage virtual machines (VMs). Development group members must not have administrative privileges on the host server. What should you use?()A、Authorization ManagerB、Local Users and GroupsC、the net localgroup commandD、Active Directory Administrative Center

Your company has a single Active Directory directory service domain. Servers in your environment run Windows Server 2003. Client computers run Windows XP or Windows Vista. You plan to create an internal centrally managed security update infrastructure for client computers. You need to choose a security update management tool that supports all the client computers.  Which tool should you choose? ()A、 Microsoft Assessment and Planning (MAP) ToolkitB、 Microsoft Baseline Security AnalyzerC、 Microsoft System Center Operations ManagerD、 Windows Server Update Services (WSUS)

Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers.   You are planning to deploy Windows 7 Enterprise to the client computers.   You need to design a custom image that will enable users to connect to a Telnet server.   What should you do?()A、 Configure Windows Firewall to allow the Telnet program through Windows Firewall before capturing the image.B、 Change User Account Control settings before capturing the image.C、 Turn on the Telnet Server feature in the image.D、 Turn on the Telnet Client feature in the image.

Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. You use Microsoft Enterprise Desktop Virtualization (MED-V) to support client virtualization requirements. You need to ensure that all MED-V virtual machine (VM) images can be centrally stored and are available to all client computers. What should you do?()A、Install and configure IIS on a member server.B、Configure a shared folder on a member server.C、Create a single workspace for all client computers.D、Install and configure Microsoft SQL Server 2008 on a member server.

Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. You manage client computers by using Microsoft System Center Configuration Manager 2007 R2. You are deploying Microsoft Enterprise Desktop Virtualization (MED-V) to support client virtualization requirements. You need to ensure that administrators can centrally store MED-V logging information and generate reports. Which two actions should you perform?()A、Install and configure IIS on a member server.B、Configure a shared folder on a member server.C、Install and configure Microsoft SQL Server 2008 on a member server.D、Configure permissions for the shared folder on a member server.

Your company has an Active Directory Domain Services (AD DS) domain. You install the Remote Desktop Session Host (RD Session Host) role service on a server that runs Windows Server 2008 R2. Client computers run Windows Vista and Windows 7. You need to automate the migration of user settings from client computers to the RD Session Host server. Which tool should you use?()A、Windows Easy TransferB、User State Migration Tool (USMT)C、Windows System Image Manager (Windows SIM)D、Deployment Image Servicing and Management (DISM)

Your company has an Active Directory forest. The company has servers that run Windows Server  2008 R2 and client computers that run Windows 7. The domain uses a set of GPO administrative  templates that have been approved to support regulatory compliance requirements.     Your partner company has an Active Directory forest that contains a single domain. The company  has servers that run Windows Server 2008 R2 and client computers that run Windows 7.     You need to configure your partner company’s domain to use the approved set of administrative  templates.   What should you do()A、Use the Group Policy Management Console (GPMC) utility to back up the GPO to a file. In each site, import the GPB、Copy the ADMX files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PC、Copy the ADML files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PD、Download the conf.adm, system.adm, wuau.adm, and inetres.adm files from the Microsoft Updates Web site. Copy

Your company has an Active Directory Domain Services (AD DS) domain. You install the Remote Desktop Session Host (RD Session Host) role service on a server that runs Windows Server 2008 R2. Client computers run Windows Vista and Windows 7. You need to automate the migration of user settings from client computers to the RD Session Host server. Which tool should y ou use?()A、Windows Easy TransferB、User State Migration Tool (USMT)C、Windows System Image Manager (Windows SIM)D、Deployment Image Servicing and Management (DISM)

Your company has an Active Directory Domain Services (AD DS) domain. All server s run Windows Server 2008 R2. All client computers run Windows 7. You use Microsoft Enterprise Desktop Virtualization (MED - V) to support client virtualization requirements. You need to ensure that all MED - V virtual machine (VM) images can be centrally stor ed and are available to all client computers. What should you do?()A、Install and configure IIS on a member server.B、Configure a shared folder on a member server.C、Create a single workspace for all client computers.D、Install and configure Microsoft SQL Se rver 2008 on a member server.

单选题Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers.  You are planning to deploy Windows 7 Enterprise to the client computers.    You need to design a zero-touch installation strategy.()Aunattended installationBcustom Windows 7 image on DVDCWindows Deployment Services (WDS)DMicrosoft System Center Configuration Manager 2007 R2

单选题Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers.   You are planning to deploy Windows 7 Enterprise to the client computers.   You need to design a custom image that will enable users to connect to a Telnet server.   What should you do?()A Configure Windows Firewall to allow the Telnet program through Windows Firewall before capturing the image.B Change User Account Control settings before capturing the image.C Turn on the Telnet Server feature in the image.D Turn on the Telnet Client feature in the image.

单选题Your company has an Active Directory Domain Services (AD DS) domain that includes an AD security group named Development. You have a member server that runs Windows Server 2008 R2 with the Hyper-V role installed. You need to ensure that Development group members can only manage virtual machines (VMs). Development group members must not have administrative privileges on the host server. What should you use?()AAuthorization ManagerBLocal Users and GroupsCthe net localgroup commandDActive Directory Administrative Center