单选题A client has a need to look at and add many image files but has no need to change them. Which of the following media types would BEST meet the client’s needs?()ACD-RWBDiskCFlashDWORM
单选题
A client has a need to look at and add many image files but has no need to change them. Which of the following media types would BEST meet the client’s needs?()
A
CD-RW
B
Disk
C
Flash
D
WORM
参考解析
解析:
暂无解析
相关考题:
().I need to look for some papers to add to my research report.A. Do you like the library in our school?B. How many papers have you read so far?C. Why not comfortably stay at home to log onto the Web?
Your network consists of a single Active Directory domain.You install a new backup program. The backup program requires a service account.You create a service account in the domain.You need to ensure that the service account can back up all member servers and client computers in the domain.You must ensure that the service account cannot be used to restore files and folders.What should you do?()A. Add the service account to the domain Backup Operators group.B. Add the service account to the Backup Operators group on every server and every client computer.C. Assign the Back up files and directories user right by using a Group Policy object (GPO).D. Assign the Impersonate a client after authentication user right by using a Group Policy object (GPO).
Before performing a mksysb system backup, which of the following procedures should a system administrator perform to avoid backing up certain user files?()A、Add the list of files to /etc/exclude.rootvg.B、Modify the image.data file and add the files to be excluded form the backup.C、Modify the bosinst.data file and specify which files are to be excluded from the backup.D、Specify the files to be excluded on the command line when executing the mksysb command.
Your company has an Active Directory forest that contains Windows Server 2008 R2 domain controllers and DNS servers. All client computers run Windows XP SP3. You need to use your client computers to edit domain-based GPOs by using the ADMX files that are stored in the ADMX central store. What should you do()A、Add your account to the Domain Admins group.B、Upgrade your client computers to Windows 7.C、Install .NET Framework 3.0 on your client computers.D、Create a folder on PDC emulator for the domain in the PolicyDefinitions path. Copy the ADMX files to the PolicyDef
Your network consists of a single Active Directory domain. You install a new backup program. The backup program requires a service account. You create a service account in the domain. You need to ensure that the service account can back up all member servers and client computers in the domain. You must ensure that the service account cannot be used to restore files and folders. What should you do?()A、Add the service account to the domain Backup Operators group.B、Add the service account to the Backup Operators group on every server and every client computer.C、Assign the Back up files and directories user right by using a Group Policy object (GPO).D、Assign the Impersonate a client after authentication user right by using a Group Policy object (GPO).
Your company has an Active Directory forest that contains Windows Server 2008 R2 domain controllers and DNS servers. All client computers run Windows XP SP3. You need to use your client computers to edit domain-based GPOs by using the ADMX files that are stored in the ADMX central store. What should you do()A、Add your account to the Domain Admins group.B、Upgrade your client computers to Windows 7.C、Install .NET Framework 3.0 on your client computers.D、Create a folder on PDC emulator for the domain in the PolicyDefinitions path. Copy the ADMX files to the PolicyDefinitions folder.
Under which three conditions does a client initiate roaming between wireless cells in the Company WLAN? ()A、 The access point has broadcast too many SSIDs.B、 The wireless client has missed too many beacons from the access point.C、 The maximum data retry count, initiated by the wireless client, is exceeded.D、 The wireless client has reduced the data rate.E、 The access point has requested client reauthentication.F、 The wireless client has missed too many IAPP (Inter Access Point Protocol) updates.
A client has a need to look at and add many image files but has no need to change them. Which of the following media types would BEST meet the client’s needs?()A、CD-RWB、DiskC、FlashD、WORM
The user base of a three-node cluster has increased. In order to add clustered users to all nodes, which of the following steps should be performed?() A、 On one of the nodes,add the users via C-SPOC ’Add a User to the Cluster’smit menu.B、 Use C-SPOC to synchronize the password files between cluster nodes.C、 On all of the nodes,add the users to the /etc/passwd and system security files,and then synchronize the cluster.D、 On one of the nodes,add the users to the /tec/passwd and system security files,add home directories,and use cron to automate the movement of system security files between nodes.
You have an image that is used to deploy Windows 7 on client computers. You need to add drivers to the Windows 7 image. Which two actions should you perform?()A、Use the Deployment Image Servicing and Management (DISM) tool online.B、Use the Deployment Image Servicing and Management (DISM) tool offline.C、Use INF files for driver packages.D、Use executable files for driver packages.E、Use Windows Installer files for driver packages.
You are the network administrator for The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. All confidential company files are stored on a file server named TestKing1. The written company security states that all confidential data must be stored and transmitted in a secure manner. To comply with the security policy, you enable Encrypting File System (EFS) on the confidential files. You also add EFS certificates to the data decryption field (DDF) of the confidential files for the users who need to access them. While performing network monitoring, you notice that the confidential files that are stored on TestKing1 are being transmitted over the network without encryption. You must ensure that encryption is always used when the confidential files on TestKing1 are stored and transmitted over the network. What are two possible ways to accomplish this goal? ()(Each correct answer presents a complete solution. Choose two)A、Enable offline files for the confidential files that are stored on TestKing1, and select the Encrypt offline files to secure data check box on the client computers of the users who need to access the files.B、Use IPSec encryption between TestKing1 and the client computers of the users who need to access the confidential files.C、Use Server Message Block (SMB) signing between TestKing1 and the client computers of the users who need to access the confidential files.D、Disable all LM and NTLM authentication methods on TestKing1.E、Use IIS to publish the confidential files. Enable SSL on the IIS server. Open the files as a Web folder.
You have an image that is used to deploy Windows 7 on client computers. You need to modify the image to change the edition of Windows 7. What should you do?()A、Service the image online.B、Service the image offline.C、Use audit mode to service the image.D、Use Windows Setup to service the image.
You are designing a Windows 7 deployment image. You plan to partition the hard disk of each client computer during deployment. You need to modify the unattended answer file by using a text editor. Where should you add the disk information?()A、to the Specialize configuration passB、to the Generalize configuration passC、to the WindowsPE configuration passD、to the AuditSystem configuration pass
Your company has 1,000 client computers that run Windows 7. The company uses several custom line-of-business applications that are not compatible with Windows 7. You need to distribute a Microsoft Enterprise Desktop Virtualization (MED-V) v2 virtual machine (VM) image that includes the custom applications to all Windows 7 client computers. What should you do?()A、Deploy the VM image from the MED-V server.B、Mount the VM image from the MED-V workspace.C、Deploy the VM image by using Windows Deployment Services (WDS).D、Deploy the VM image by using Windows Server Update Services (WSUS).
Your organization has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 7. You need to create a single distribution file containing Windows Virtual PC and a virtual machine image that will be deployed to all client computers. Which should you use?()A、Microsoft System Center Virtual Machine Manager ( VMM) 2008 with a templateB、Deployment Image Servicing and Management (DISM)C、Microsoft Enterprise Desktop Virtualization (MED - V) Packaging WizardD、Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 with a template
Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers. You are planning to deploy Windows 7 Enterprise to the client computers. You need to design a custom image that will enable users to connect to a Telnet server. What should you do?()A、 Configure Windows Firewall to allow the Telnet program through Windows Firewall before capturing the image.B、 Change User Account Control settings before capturing the image.C、 Turn on the Telnet Server feature in the image.D、 Turn on the Telnet Client feature in the image.
多选题Under which three conditions does a client initiate roaming between wireless cells in the Company WLAN? ()AThe access point has broadcast too many SSIDs.BThe wireless client has missed too many beacons from the access point.CThe maximum data retry count, initiated by the wireless client, is exceeded.DThe wireless client has reduced the data rate.EThe access point has requested client reauthentication.FThe wireless client has missed too many IAPP (Inter Access Point Protocol) updates.
单选题You are designing a Windows 7 deployment image. You plan to partition the hard disk of each client computer during deployment. You need to modify the unattended answer file by using a text editor. Where should you add the disk information?()Ato the Specialize configuration passBto the Generalize configuration passCto the WindowsPE configuration passDto the AuditSystem configuration pass
单选题Your company has 1,000 client computers. You are planning to deploy Windows 7 and a new line-of-business application. You have the following requirements: Install the application as part of the standard Windows 7 deployment. Use a single Windows 7 image for the deployment. The application must be available for use on client computers that are not connected to the network. You need to ensure that the application is installed on all new client computers. What should you do?()APublish the application by using Group Policy Software Installation.BDeploy the application by using Windows Server Update Services (WSUS).CService an online image of Windows 7 to add the new application.DService an offline image of Windows 7 to add the new application.
单选题The user base of a three-node cluster has increased. In order to add clustered users to all nodes, which of the following steps should be performed?()A On one of the nodes,add the users via C-SPOC ’Add a User to the Cluster’smit menu.B Use C-SPOC to synchronize the password files between cluster nodes.C On all of the nodes,add the users to the /etc/passwd and system security files,and then synchronize the cluster.D On one of the nodes,add the users to the /tec/passwd and system security files,add home directories,and use cron to automate the movement of system security files between nodes.
单选题Your company is planning to deploy Windows 7. You have an image that is used to deploy Windows 7 on client computers. You need to add a volume image to the existing Windows image. What should you do?()AService the image online.BUse DiskPart to attach a new volume.CUse ImageX to append the volume image.DUse the Deployment Image Servicing and Management (DISM) tool to mount the image.
单选题Your organization has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 7. You create a Windows XP image. You need to deploy the image as a virtual machine (VM) to the client computers so that the image can run in Windows Virtual PC. Which should you use? ()AMicrosoft System Center Virtual Machine Manager (VMM) 2008 with a templateBMicrosoft Virtual Desktop Infrastructure (VDI)CMicrosoft System Center Configuration Manager 2007 R2DMicrosoft System Center Virtual Machine Manager (VMM) 2008 R2 with a template
单选题Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers. You are planning to deploy Windows 7 Enterprise to the client computers. You need to design a zero-touch installation strategy.()Aunattended installationBcustom Windows 7 image on DVDCWindows Deployment Services (WDS)DMicrosoft System Center Configuration Manager 2007 R2
单选题Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers. You are planning to deploy Windows 7 Enterprise to the client computers. You need to design a custom image that will enable users to connect to a Telnet server. What should you do?()A Configure Windows Firewall to allow the Telnet program through Windows Firewall before capturing the image.B Change User Account Control settings before capturing the image.C Turn on the Telnet Server feature in the image.D Turn on the Telnet Client feature in the image.
单选题Your company has an Active Directory forest. The corporate network uses DHCP to configure client computer IP addresses. The DHCP server has a DHCP client reservation for a portable computer named WKS1. You install a second DHCP server on the network. You need to ensure that WKS1 receives the DHCP reservation from the DHCP service. What should you do?()A Run the ipconfig /renew command on WKS1B Run the netsh add helper command on WKS1C Add the DHCP reservation for WKS1 to the second DHCP serverD Add both DHCP servers to the RAS and IAS Servers group in the Active Directory domain
单选题Your company has an Active Directory Domain Services (AD DS) forest with a single domain. A server has the Windows Deployment Services (WDS) role installed. You create a Windows 7 image. You plan to use the Lite Touch Installation deployment method to deploy the Windows 7 image. You need to design a deployment strategy that will install an image on unknown client computers only if administrative approval is granted. What should you do?()ACreate a multicast transmission for the Windows 7 image.BCreate a unicast transmission for the Windows 7 image.CUse DHCP rogue detection on the WDS server.DUse an Auto-Add policy on the WDS server.
单选题Your company has an Active Directory forest that contains Windows Server 2008 domain controllers and DNS servers. All client computers run Windows XP. You need to use your client computers to edit domain- based GPOs by using the ADMX files that are stored in the ADMX central store. What should you do()AAdd your account to the Domain Admins group.BUpgrade your client computers to Windows Vista.CInstall .NET Framework 3.0 on your client computerDCreate a folder on the Primary Domain Controller (PDC) emulator for the domain in the PolicyDefinitions path. Copy the ADMX files to the PolicyDefinitions folder.
单选题Your company has an Active Directory forest that contains Windows Server 2008 R2 domain controllers and DNS servers. All client computers run Windows XP SP3. You need to use your client computers to edit domain-based GPOs by using the ADMX files that are stored in the ADMX central store. What should you do()AAdd your account to the Domain Admins group.BUpgrade your client computers to Windows 7.CInstall .NET Framework 3.0 on your client computers.DCreate a folder on PDC emulator for the domain in the PolicyDefinitions path. Copy the ADMX files to the PolicyDefinitions folder.