单选题System, machine, and user policies can be configured though AccessAdmin. How are changes  synchronized with the AccessAgent?()Awritten by the Administrators on the INI filesBpropagated only with the Active Directory network serviceCpropagated to the clients on the next Administrator accessDpropagated to clients the next time AccessAgent synchronizes with the IMS Server

单选题
System, machine, and user policies can be configured though AccessAdmin. How are changes  synchronized with the AccessAgent?()
A

written by the Administrators on the INI files

B

propagated only with the Active Directory network service

C

propagated to the clients on the next Administrator access

D

propagated to clients the next time AccessAgent synchronizes with the IMS Server


参考解析

解析: 暂无解析

相关考题:

How can it be determined if the IMS Server (below Version 8.0) is configured for "Active Directory (AD) deployment type 1" or "AD deployment type 2"?()A、Check the server.xml on the IMS Server.B、Check the database table IMSSyncDataType.C、Check the System policies in the AccessAdmin.D、Check the IMS Server settings of the IMS Configuration Utility.

You install a read-only domain controller (RODC) named RODC1. You need to ensure that a user  named User1 can administer RODC1. The solution must minimize the number of permissions  assigned to User1.     Which tool should you use()A、Active Directory Administrative CenterB、Active Directory Users and ComputersC、DsaddD、Dsmgmt

The network administrator maps VLAN 10 through 20 to MST instance 2.  How will this information be propagated to all appropriate switches?()A、 Information will be carried in the RSTP BPDUs.B、 It will be propagated in VTP updates.C、 Information stored in the Forwarding Information Base and the switch will reply on query.  D、 Multiple Spanning Tree must be manually configured on the appropriate switches.

The IBM Tivoli Access Manager for Enterprise Single Sign-On IMS is configured to cache user’s wallets. The SLA for network reliability between the IMS Server and the desktop machines is 95%. The customer wants to use Graphical Identification and Authentication (GINA) replacement, and has enabled Active Directory (AD) password synchronization. The user has a cached wallet on their private desktop. Which statement is true when the network is unavailable?()A、The user would not be able to log in to the wallet.B、The user is able to log in with their wallet password, but the wallet is not synchronized with the server.C、A user must be re-assigned to another policy template in order to change any aspects of the applied policy.D、The user experiences normal operation, but AccessAgent will be unable to store newly captured  passwords.

System, machine, and user policies can be configured though AccessAdmin. How are changes  synchronized with the AccessAgent?()A、written by the Administrators on the INI filesB、propagated only with the Active Directory network serviceC、propagated to the clients on the next Administrator accessD、propagated to clients the next time AccessAgent synchronizes with the IMS Server

How can you verify that you have correctly configured SSH access to your Junos device?()A、user@router# show system servicesB、user@router show configuration servicesC、user@router# show configuration system servicesD、user@router# show system login

Your network contains a single Active Directory domain. Active Directory Rights Management  Services (AD RMS) is deployed on the network.     A user named User1 is a member of only the AD RMS Enterprise Administrators group. You need  to ensure that User1 can change the service connection point (SCP) for the AD RMS installation.  The solution must minimize the administrative rights of User1.     To which group should you add User1()A、AD RMS AuditorsB、AD RMS Service GroupC、Domain AdminsD、Schema Admins

You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? () A、Enable the Require domain controller to unlock policy.B、Set the Number of previous logons to cache policy to 0.  C、Remove all user and group accounts from the Log on locally user right. D、Remove all user and group accounts from the Access this computer from the network user right.

You are the network administrator for Southridge Video. The network consists of a single Active  Directory domain named southridgevideo.com. The domain contains one domain controller. All servers  run Windows Server 2003. All client computers run Windows XP Professional. The company uses Group  Policy objects (GPOs) to configure user and computer settings. The Active Directory database and the  SYSVOL shared folder are stored on separate hard disks. The hard disk containing the SYSVOL folder  fails. Some Group Policy settings are still applied, but new users do not receive the Group Policy settings. You replace the failed disk. You discover that there are no valid backups of the SYSVOL folder. You have  a list of GUIDs and friendly names for each GPO. On the new disk, you create a new shared folder named  SYSVOL in the same location as the previous SYSVOL folder. You need to configure the network so that the user and computer settings will be applied to all users.  Which three courses of action should you take?()A、 In the SYSVOL folder, create a folder named southridgevideo.com. In the southridgevideo.com folder, create a folder named Policies.B、 In the SYSVOL folder, create a folder named System State. In the System State folder, create a folder named Policies.C、 In the Policies folder, create a folder for each GPO. Name the folders by using the friendly name of each GPO. In the folder for each GPO, create a folder named MACHINE and a folder named USER.D、 In the Policies folder, create a folder for each GPO. Name the folders by using the GUID of each GPO. In the folder for each GPO, create a folder named MACHINE and a folder named USER.E、 Use Active Directory Users and Computers to open each GPO. Close each GPO without changing any settings.F、 Use Active Directory Users and Computers to open each GPO. Change at least one setting in each GPO before closing it.

Your network consists of a single Active Directory domain. All servers run Windows Server 2008 R2. A server named Server1 has the Remote Desktop Services server role installed.   You notice that several users consume more than 30 percent of the CPU resources throughout the day. You need to prevent users from consuming more than 15 percent of the CPU resources. Administrators must not be limited by the amount of CPU resources that they can consume. What should you do?()A、Implement Windows System Resource Manager (WSRM),and configure user policies.B、Implement Windows System Resource Manager (WSRM),and configure session policies.C、Configure Performance Monitor,and create a user-defined Data Collector Set.D、Configure Performance Monitor,and create an Event Trace Session Data Collector Set.

You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all client computers run Windows XP Professional. XML Web services for the internal network run on a member server named TestKingSrv1, which is configured with default settings. You are a member of the local Administrators group on TestKingSrv1. You need the ability to remotely manage TestKingSrv1. You have no budget to purchase any additional licensing for your network until the next fiscal year. How should you reconfigure TestKingSrv1?()A、In the System Properties dialog box, enable Remote Desktop.B、Add your user account to the Remote Desktop Users local group.C、In the System Properties dialog box, enable Remote Assistance.D、Install Terminal Services by using Add or Remove Programs.

Your company’s network has client computers that run Windows 7.    When a user attempts to log on to the domain from a computer named Client1,she receives the following message:   The system cannot log you on to this domain because the system’s computer account in its primary domain is missing or the password on that account is incorrect.  You need to ensure that the user can log on to the domain from Client1.   What should you do?()A、Disjoin and rejoin Client1 to the domain.B、Add the computer account for Client1 to the Domain Computers Active Directory group.C、Reset the account password for Client1 through Active Directory Users and Computers.D、Reset the account password for the user through Active Directory Users and Computers.

You are the administrator of the desktop.com domain. You are configuring a roaming user profile for a user named Paul West. You create a user account named Paul West on the Windows 2000 server computer named server 1. You define a network profile by entering the path //server1/profile/%username% in Paul’s user account setting. When Paul logs on to a Windows 2000 Professional computer he sees the following message- “Windows can not locate your roaming profile and is attempting to log you on with your local profile which will not be propagated to the server.” The details of network cannot be found. You want to configure the roaming user profile for Paul. What should you do?()A、Create a home folder for Paul.B、Share the network profile directory.C、Map a device to network profile directory.D、Use the %username% variable to allow access.

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server! that runs Windows Server 2012 R2. Server1 contains a virtual machine named VM1 that runs Windows Server 2012 R2.You need to ensure that a user named User1 can install Windows features on VM1. The solution must minimize the number of permissions assigned to User1. To which group should you add User1?()A、Administrators on VM1B、Power Users on VM1C、Hyper-V Administrators on Server1D、Server Operators on Server1

单选题You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? ()AEnable the Require domain controller to unlock policy.BSet the Number of previous logons to cache policy to 0.  CRemove all user and group accounts from the Log on locally user right. DRemove all user and group accounts from the Access this computer from the network user right.

单选题Your network contains a single Active Directory domain. Active Directory Rights Management  Services (AD RMS) is deployed on the network.     A user named User1 is a member of only the AD RMS Enterprise Administrators group. You need  to ensure that User1 can change the service connection point (SCP) for the AD RMS installation.  The solution must minimize the administrative rights of User1.     To which group should you add User1()AAD RMS AuditorsBAD RMS Service GroupCDomain AdminsDSchema Admins

单选题A user reports they cannot access the network share folder, the users workstation is configured to use automatic IP. When the administrator checks the IP address the response returns as 169.254.0.5. Which of the following should the administrator verify?()A That there are no DHCP relay serversB That the user account on Active Directory is not lockedC That the network card driver is not installed incorrectlyD The network connection is functioning

单选题You are the network administrator for The network consists if a single Active Directory domain named All network servers run Windows Server 2003, and all client computers run Windows XP Professional. XML Web services for the internal network run on a member server named TK1,which is configured with default settings. You are a member of the local Administrators group on TK1. You need the ability to remotely manage TK1. You have no budget to purchase any additional licensing for your network until the next fiscal year. How should you reconfigure TK1?()AIn the System Properties dialog box, enable Remote Desktop.BAdd your user account to the Remote Desktop Users local group.CIn the System Properties dialog box, enable Remote Assistance.DInstall Terminal Services by using Add or Remove Programs.

单选题Your company’s network has client computers that run Windows 7.    When a user attempts to log on to the domain from a computer named Client1,she receives the following message:   The system cannot log you on to this domain because the system’s computer account in its primary domain is missing or the password on that account is incorrect.  You need to ensure that the user can log on to the domain from Client1.   What should you do?()ADisjoin and rejoin Client1 to the domain.BAdd the computer account for Client1 to the Domain Computers Active Directory group.CReset the account password for Client1 through Active Directory Users and Computers.DReset the account password for the user through Active Directory Users and Computers.

单选题The network administrator maps VLAN 10 through 20 to MST instance 2.  How will this information be propagated to all appropriate switches?()A Information will be carried in the RSTP BPDUs.B It will be propagated in VTP updates.C Information stored in the Forwarding Information Base and the switch will reply on query.  D Multiple Spanning Tree must be manually configured on the appropriate switches.

单选题Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server! that runs Windows Server 2012 R2. Server1 contains a virtual machine named VM1 that runs Windows Server 2012 R2.You need to ensure that a user named User1 can install Windows features on VM1. The solution must minimize the number of permissions assigned to User1. To which group should you add User1?()AAdministrators on VM1BPower Users on VM1CHyper-V Administrators on Server1DServer Operators on Server1

单选题Your network consists of a single Active Directory domain. All servers run Windows Server 2008 R2. A server named Server1 has the Remote Desktop Services server role installed.   You notice that several users consume more than 30 percent of the CPU resources throughout the day. You need to prevent users from consuming more than 15 percent of the CPU resources. Administrators must not be limited by the amount of CPU resources that they can consume. What should you do?()AImplement Windows System Resource Manager (WSRM),and configure user policies.BImplement Windows System Resource Manager (WSRM),and configure session policies.CConfigure Performance Monitor,and create a user-defined Data Collector Set.DConfigure Performance Monitor,and create an Event Trace Session Data Collector Set.

单选题The IBM Tivoli Access Manager for Enterprise Single Sign-On IMS is configured to cache user’s wallets. The SLA for network reliability between the IMS Server and the desktop machines is 95%. The customer wants to use Graphical Identification and Authentication (GINA) replacement, and has enabled Active Directory (AD) password synchronization. The user has a cached wallet on their private desktop. Which statement is true when the network is unavailable?()AThe user would not be able to log in to the wallet.BThe user is able to log in with their wallet password, but the wallet is not synchronized with the server.CA user must be re-assigned to another policy template in order to change any aspects of the applied policy.DThe user experiences normal operation, but AccessAgent will be unable to store newly captured  passwords.

单选题You are the administrator of the desktop.com domain. You are configuring a roaming user profile for a user named Paul West. You create a user account named Paul West on the Windows 2000 server computer named server 1. You define a network profile by entering the path //server1/profile/%username% in Paul’s user account setting. When Paul logs on to a Windows 2000 Professional computer he sees the following message- “Windows can not locate your roaming profile and is attempting to log you on with your local profile which will not be propagated to the server.” The details of network cannot be found. You want to configure the roaming user profile for Paul. What should you do?()ACreate a home folder for Paul.BShare the network profile directory.CMap a device to network profile directory.DUse the %username% variable to allow access.

单选题Which MST configuration statement is correct?  ()A MST configurations can be propagated to other switches using VTP.B After MST is configured on a Switch, PVST+ operations will also be enabled by default.C MST configurations must be manually configured on each switch within the MST region.D MST configurations only need to be manually configured on the Root Bridge.E MST configurations are entered using the VLAN Database mode on Cisco Catalyst switches.

单选题How can it be determined if the IMS Server (below Version 8.0) is configured for "Active Directory (AD) deployment type 1" or "AD deployment type 2"?()ACheck the server.xml on the IMS Server.BCheck the database table IMSSyncDataType.CCheck the System policies in the AccessAdmin.DCheck the IMS Server settings of the IMS Configuration Utility.

单选题You are configuring a roaming user profile for a Scott Peters. You create a user account named ScottP on a Windows 2000 Server. You define a network profile directory path named //Server1/Profiles/%Username%. When Scott logs onto the computer, he receives the error message, "Windows cannot locate your roaming profile and is attempting to log you on with your local profile which will not be propagated to the server. The details of network cannot be found". What should you do?()AChange the %Username% variable to ScottP.BCreate a home folder for the Client computer.CMap a device to network profile directory.DShare the directory, which holds his profile.