单选题You want to create a Host Checker policy that looks for a specific antivirus product that is running on your client machines, but the predefined antivirus options do not include the antivirus product version that you use.Which feature should you verify the antivirus product is up to date?()AEnhanced Endpoint SecurityBDP signaturesCAntivirus licensingDEndpoint Security Assessment Plug-in

单选题
You want to create a Host Checker policy that looks for a specific antivirus product that is running on your client machines, but the predefined antivirus options do not include the antivirus product version that you use.Which feature should you verify the antivirus product is up to date?()
A

Enhanced Endpoint Security

B

DP signatures

C

Antivirus licensing

D

Endpoint Security Assessment Plug-in


参考解析

解析: 暂无解析

相关考题:

Your network has Network Access Protection (NAP) deployed. The network contains two servers named Server1 and Server2. Server1 is a Network Policy Server (NPS). Server2 has a third-party antivirus solution installed.Server1 is configured to use a custom system health validator provided by the antivirus vendor. The system health validator uses Server2 to identify the version of the current antivirus definition.You need to ensure that NAP clients are considered noncompliant if Server1 cannot connect to Server2.Which error code resolution setting should you configure?()A. SHA not responding to NAP clientB. SHA unable to contact required servicesC. SHV not respondingD. SHV unable to contact required services

You want to install Windows 2000 Professional on 20 new PXE compliant computers, which do not have operating systems installed. You create a RIS image and load the image onto the RIS server and then start the new computers. You find that the new computers cannot connect to the RIS server. You verify that existing client computers on the network can connect to network servers.What should you do? (SELECT AND PLACE)

You are the administrator for your company's network. The network is configured as shown in the exhibit.You want to install Windows 2000 Professional on 20 new PXE-compliant computers on the marketing segment of your network. The new computers do not have operating systems installed.You create a RIS image. You load the image onto the RIS server. You then start the new computers.You find that the new computers cannot connect to the RIS server. You verify that the new computers cannot connect to the RIS server. You verify that the existing client computers in the network can connect to the network servers, including the RIS server. You want to enable the new computers to connect to the RIS server.What should you do?A.Add a Windows 2000 Server computer running WINS to the network.B.Add a Windows 2000 Server computer running DHCP to the network.C.Add the domain Everyone group to the RIS OS image security settings.D.Place the new computers on the same segment as the RIS server.

You want to create a Host Checker policy that looks for a specific antivirus product that is running on your client machines, but the predefined antivirus options do not include the antivirus product version that you use.Which feature should you verify the antivirus product is up to date?()A. Enhanced Endpoint SecurityB. DP signaturesC. Antivirus licensingD. Endpoint Security Assessment Plug-in

You want to create a Host Checker policy that looks for a specific antivirus product that is running on your client machines, but the predefined antivirus options do not include the antivirus product version that you use.Which feature should you verify the antivirus product is up to date?()A、Enhanced Endpoint SecurityB、DP signaturesC、Antivirus licensingD、Endpoint Security Assessment Plug-in

You use a Windows 2000 Professional desktop computer. The corporate product information is stored on this computer. You want other users on the network to be able to read the product information on your computer. You use Windows Explorer to share the product information folder on the network. You want Sales staff to be able to keep a copy of the product information on their portable computers when they travel. Other users should not be able to synchronize the product information.  What should you do?()A、Use Synchronization manager to configure synchronization to occur when users are connected to the LAN connection.B、Use Windows Explorer to grant Sales Staff Special access for the reports on the network share.C、Use Windows Explorer to enable automatic caching for documents on the network share.D、Create a new share for the Sales users only and enable caching on that share only.

Your company runs Remote Desktop Services. You have a Remote Desktop Session Host (RD Session Host) server. You need to ensure that remote desktop users can print only to the printers that are installed on the RD Session Host server. What should you do?()A、Enable the Do not allow client printer redirection Group Policy setting.B、Disable the Do not allow client printer redirection Group Policy setting.C、Enable the Do not set default client printer to be default printer in a session Group Policy setting.D、Disable the Do not set default client printer to be default printer in a session Group Policy setting.

Your company runs Remote Desktop Services. You have a Remote Desktop Session Host (RD Session Host) server. You need to ensure that remote desktop users can prin t only to the printers that are installed on the RD Session Host server. What should you do?()A、Enable the Do not allow client printer redirection Group Policy setting.B、Disable the Do not allow client printer redirection Group Policy setting.C、Enable the Do not set default client printer to be default printer in a session Group Policy setting.D、Disable the Do not set default client printer to be default printer in a session Group Policy setting.

You want to enforce a Host Checker policy so that only users who pass the policy receive the Employee role. In the admin GUI, which two parameters must you configure?()A、Select "Require and Enforce" for the Host Checker Policy in the realm authentication policy.B、Select "Evaluate Policies" for the Host Checker policy in the realm authentication policy.C、Configure the Host Checker policy as a role restriction for the Employee role.D、Configure the Host Checker policy as a resource access policy for the Employee role.

You want to provide all users in your corporation with a single agent that provides access to multiple connection types conditionally. For example, you connect to the Junos Pulse Access Control Service if you are connected to the intranet, but you connect to the Junos Pulse Secure Access Service if you are on a remote network. Which agent should you use for this type of connection requirement?()A、Junos Pulse should be configured with location awareness rules configured.B、Odyssey Access Client should be installed with Host Checker configured to check the client's location.C、Junos Pulse should be configured with all components installed.D、Agentless access should be enabled so that clients can connect to any service without concern for installing an agent.

You are developing a product search page named Search.aspx for Web application that will be integrated into Certkiller .com's existing e-Commerce Web site. The Search.aspx page allows customers search for products that match specific criteria. Once a product is located, you want an image of the product to be displayed. You want to use an Image control to display the image. You want to configure the Image control to display a description of the image if the image cannot be displayed in the customer's Web browser. What should you do?()A、Set the ToolTip property of the Image control.B、Set the ImageUrl property of the Image control.C、Set the AlternateText property of the Image control.D、Set the DescriptionUrl property of the Image control.

Your network contains an Exchange Server 2010 server.You need to prevent e-mail messages that contain specific words from being sent between users in the organization. What should you do?()A、Create a transport rule.B、Create an Outlook Protection Rule.C、Configure the content filtering feature.D、Configure the sender reputation feature.

You need to design the deployment of antivirus software. What should you do?()A、Install the antivirus software on each mailbox storage serverB、Install the antivirus software on each Outlook Web Access serverC、Install the antivirus software on one Outlook Web Access server at each officeD、Install the antivirus software on a back-end server that contains no mailboxes

Your network has Network Access Protection (NAP) deployed. The network contains two servers named Server1 and Server2. Server1 is a Network Policy Server (NPS). Server2 has a third-party antivirus solution installed.Server1 is configured to use a custom system health validator provided by the antivirus vendor. The system health validator uses Server2 to identify the version of the current antivirus definition.You need to ensure that NAP clients are considered noncompliant if Server1 cannot connect to Server2.Which error code resolution setting should you configure?()A、SHA not responding to NAP clientB、SHA unable to contact required servicesC、SHV not respondingD、SHV unable to contact required services

You network contains an Exchange Server 2010 Mailbox server.You install and configure a third-party antivirus application on the server.You discover that a mailbox database named DB1 does not mount.You attempt to mount the mailbox database and receive an error message starting that the file named E01.log cannot be found.You need to mount DB1.The solution must prevent the antivirus application from causing the same error. What should you do?()A、Disable the antivirus application.Restore E01.log from the most recent backup.Run the mount-database DB1 commandB、Disable the antivirus application.Restore DB1 from the most recent backup.Run the mount-database DB1 commandC、Exclude the transaction log folder from the antivirus application scans.Restore E01.log from the antivirus quarentine.Run the mount-database DB1 commandD、Exclude the transaction log folder from the antivirus application scans.Restore DB1 from the most recent backup.Run the mount-database DB1 command

单选题You network contains an Exchange Server 2010 Mailbox server.You install and configure a third-party antivirus application on the server.You discover that a mailbox database named DB1 does not mount.You attempt to mount the mailbox database and receive an error message starting that the file named E01.log cannot be found.You need to mount DB1.The solution must prevent the antivirus application from causing the same error. What should you do?()ADisable the antivirus application.Restore E01.log from the most recent backup.Run the mount-database DB1 commandBDisable the antivirus application.Restore DB1 from the most recent backup.Run the mount-database DB1 commandCExclude the transaction log folder from the antivirus application scans.Restore E01.log from the antivirus quarentine.Run the mount-database DB1 commandDExclude the transaction log folder from the antivirus application scans.Restore DB1 from the most recent backup.Run the mount-database DB1 command

单选题Your network has Network Access Protection (NAP) deployed. The network contains two servers named Server1 and Server2. Server1 is a Network Policy Server (NPS). Server2 has a third-party antivirus solution installed.Server1 is configured to use a custom system health validator provided by the antivirus vendor. The system health validator uses Server2 to identify the version of the current antivirus definition.You need to ensure that NAP clients are considered noncompliant if Server1 cannot connect to Server2.Which error code resolution setting should you configure?()ASHA not responding to NAP clientBSHA unable to contact required servicesCSHV not respondingDSHV unable to contact required services

问答题Practice 7  ● You are supposed to write a letter of compliant about the quality of the product when you found the product and after-sales service you bought recently which fell far below the standard you expect.  ● It is necessary to include the information below in the proposed letter:  ● Why are you writing the letter of compliant?  ● Why are you dissatisfied with the newly purchased product?  ● Giving description of the malfunctioned product you bought recently.  ● Explaining the fact that the after-sales service is very poor.  ● What do you ask the supplier to do?  ● Write 200~250 words on your Answer Sheet.

单选题You need to design the deployment of antivirus software. What should you do?()AInstall the antivirus software on each mailbox storage serverBInstall the antivirus software on each Outlook Web Access serverCInstall the antivirus software on one Outlook Web Access server at each officeDInstall the antivirus software on a back-end server that contains no mailboxes

单选题You use a Windows 2000 Professional desktop computer. The corporate product information is stored on this computer. You want other users on the network to be able to read the product information on your computer. You use Windows Explorer to share the product information folder on the network. You want Sales staff to be able to keep a copy of the product information on their portable computers when they travel. Other users should not be able to synchronize the product information.  What should you do?()AUse Synchronization manager to configure synchronization to occur when users are connected to the LAN connection.BUse Windows Explorer to grant Sales Staff Special access for the reports on the network share.CUse Windows Explorer to enable automatic caching for documents on the network share.DCreate a new share for the Sales users only and enable caching on that share only.

单选题You manage Hyper-V host servers and virtual machines (VMs) by using Microsoft System Center  Virtual Machine Manager (VMM) 2008 R2. Testers are members of an AD security group named Test. You need to ensure that members of the Test group can create VMs on a specific host server by using the VMM Self-Service Portal. What should you do?()AIn VMM, specify a template for new VMs created by members of the Test group.BIn VMM, create a Delegated Administrator user role and add the Test group to this role.CIn VMM, assign the Test group the Local Administrator permission for the specific host server.DInstall Hyper-V Manager on the client computer of each member of the Test group, and grant the Test group administrative privileges on the specific host server.

单选题Your company has a single Active Directory directory service domain. All servers in your environment run Windows Server 2003. All domain controllers run Active DirectoryCintegrated DNS. You create several static host (A) resource records. You need to verify that the DNS server is sending the correct host records to all client computers.  Which command-line tool should you use?()A netshB tracertC ntdsutilD nslookup

单选题You want to provide all users in your corporation with a single agent that provides access to multiple connection types conditionally. For example, you connect to the Junos Pulse Access Control Service if you are connected to the intranet, but you connect to the Junos Pulse Secure Access Service if you are on a remote network. Which agent should you use for this type of connection requirement?()AJunos Pulse should be configured with location awareness rules configured.BOdyssey Access Client should be installed with Host Checker configured to check the client's location.CJunos Pulse should be configured with all components installed.DAgentless access should be enabled so that clients can connect to any service without concern for installing an agent.

单选题You want to create a Host Checker policy that looks for a specific antivirus product that is running on your client machines, but the predefined antivirus options do not include the antivirus product version that you use.Which feature should you verify the antivirus product is up to date?()AEnhanced Endpoint SecurityBDP signaturesCAntivirus licensingDEndpoint Security Assessment Plug-in

单选题You are developing a product search page named Search.aspx for Web application that will be integrated into Certkiller .com's existing e-Commerce Web site. The Search.aspx page allows customers search for products that match specific criteria. Once a product is located, you want an image of the product to be displayed. You want to use an Image control to display the image. You want to configure the Image control to display a description of the image if the image cannot be displayed in the customer's Web browser. What should you do?()ASet the ToolTip property of the Image control.BSet the ImageUrl property of the Image control.CSet the AlternateText property of the Image control.DSet the DescriptionUrl property of the Image control.

单选题Your company runs Remote Desktop Services. You have a Remote Desktop Session Host (RD Session Host) server. You need to ensure that remote desktop users can print only to the printers that are installed on the RD Session Host server. What should you do?()AEnable the Do not allow client printer redirection Group Policy setting.BDisable the Do not allow client printer redirection Group Policy setting.CEnable the Do not set default client printer to be default printer in a session Group Policy setting.DDisable the Do not set default client printer to be default printer in a session Group Policy setting.

单选题Your company runs Remote Desktop Services. You have a Remote Desktop Session Host (RD Session Host) server. You need to ensure that remote desktop users can prin t only to the printers that are installed on the RD Session Host server. What should you do?()AEnable the Do not allow client printer redirection Group Policy setting.BDisable the Do not allow client printer redirection Group Policy setting.CEnable the Do not set default client printer to be default printer in a session Group Policy setting.DDisable the Do not set default client printer to be default printer in a session Group Policy setting.

单选题Which antivirus solution integrated on branch SRX Series devices do you use to ensure maximum virus coverage for network traffic?()Aexpress AVBfull AVCdesktop AVDICAP