单选题Machine policy templates can be assigned based on certain attributes of a machine. A customer  organizes their machines based on the following requirements:   The machines are all placed in specific Organizational Units in the Active Directory.   The customer has Citrix Servers, and they have a specific naming convention meant only for their Citrix Servers. The customer has DHCP enabled for all the client machines.   The customer has made it clear that they should not need to change anything in the existing infrastructure. Given these requirements, which single assignment attribute would be chosen for assigning machine policy templates?()AHostnamesBIP AddressesCMachine Group TagDActive Directory Groups

单选题
Machine policy templates can be assigned based on certain attributes of a machine. A customer  organizes their machines based on the following requirements:   The machines are all placed in specific Organizational Units in the Active Directory.   The customer has Citrix Servers, and they have a specific naming convention meant only for their Citrix Servers. The customer has DHCP enabled for all the client machines.   The customer has made it clear that they should not need to change anything in the existing infrastructure. Given these requirements, which single assignment attribute would be chosen for assigning machine policy templates?()
A

Hostnames

B

IP Addresses

C

Machine Group Tag

D

Active Directory Groups


参考解析

解析: 暂无解析

相关考题:

Control chart theory is based on the differentiation of the causes of variations in quality. Variations may be produced by assignable causes. All of the following are examples of assignable causes except:A . differences among machines.B . differences among workers.C . differences among materials.D . differences in each of these factors over time.E . None of the above (all are examples)

195 Control chart theory is based on the differentiation of the causes of variations in quality. Variations may be produced by assignable causes. All of the following are examples of assignable causes except:A. differences among machines.B. differences among workers.C. differences among materials.D. differences in each of these factors over time.E. None of the above (all are examples)

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a server named S01 that runs Windows Server 2008 and Hyper-V inyour company. Three virtual machines are hosted on S01. According to the requirement of company policy,the virtual machines must not connect to the company network. All of the virtual machines need to beconfigured to connect to each other. You must meet the company policy. Which should you do?()A、The Connection should be set to Host for the network interface card.B、The Connection should be set to None for the network interface card.C、You should choose the Not connected option for each virtual machine.D、The Enable virtual LAN identification option should be enabled for each virtual machine.

Which statement regarding the implementation of an IDP policy template is true?()A、IDP policy templates are automatically installed as the active IDP policy.B、IDP policy templates are enabled using a commit script.C、IDP policy templates can be downloaded without an IDP license.D、IDP policy templates are included in the factory-default configuration.

Which of the following requires an update to the baseline after installing new software on a machine?()A、Signature-based NIPSB、Signature-based NIDSC、HoneypotD、Behavior-based HIDS

Which of the following technologies can provide geographically based load balancing with high availability between two web servers with static content?()A、MulticastB、Active/passive clusterC、Active/active clusterD、DNS round robin

Machine policy templates can be assigned based on certain attributes of a machine. A customer  organizes their machines based on the following requirements:   The machines are all placed in specific Organizational Units in the Active Directory.   The customer has Citrix Servers, and they have a specific naming convention meant only for their Citrix Servers. The customer has DHCP enabled for all the client machines.   The customer has made it clear that they should not need to change anything in the existing infrastructure. Given these requirements, which single assignment attribute would be chosen for assigning machine policy templates?()A、HostnamesB、IP AddressesC、Machine Group TagD、Active Directory Groups

Regarding a route-based versus policy-based IPsec VPN, which statement is true?()A、A route-based VPN generally uses less resources than a policy-based VPN.B、A route-based VPN cannot have a deny action in a policy; a policy-based VPN can have a deny action.C、A route-based VPN is better suited for dialup or remote access compared to a policy-based VPN.D、A route-based VPN uses a policy referencing the IPsec VPN; a policy-based VPN policy does not use apolicy referencing the IPsec VPN

Your network contains a Virtualization environment that includes the following: - 10 hosts that run VMware ESX Server 4.0 - Microsoft System Center Virtual Machine Manager - 50 Hyper-V hosts that run Windows Server 2008 R2 Each Virtualization host contains a minimum of 15 virtual machines (VMs). You need to recommend a solution to ensure that users can create and deploy VMs to any of the virtualization hosts. The VMs must be based on templates created by an administrator. What should you include in the recommendation?()A、Microsoft System Center Data Protection ManagerB、Microsoft Enterprise Desktop Virtualization (MED-V) Workspace PackagerC、VMM Self-service PortalD、System Center Virtual Machine Manager physical-to-virtual machine (P2V) conversionE、Virtual Machine Servicing Tool (VSMT)F、Authorization ManagerG、Microsoft Application Virtualization (App-V) SequencerH、Microsoft System Center Operations ManagerI、System Center Virtual Machine Manager virtual-to-virtual machine (V2V) conversionJ、Active Directory Rights Management Services (AD RMS)

Your company has a single Active Directory directory service domain that includes a main office and two branch offices. Each branch office has its own Active Directory site. All user accounts are placed into organizational units (OUs) based on department. Multiple Group Policy objects (GPOs) are linked at the domain, the site, and the OU levels. A user in Atlanta transfers to a different branch office and joins a different department. You move her user account into the corresponding OU. After logging on to her new client computer, the user notices that the desktop settings are different from the settings she had in her previous location. You need to find out the effect of all GPOs on the user.  What should you do?()A、 Use the Security Configuration and Analysis snap-in.B、 Use the Resultant Set of Policy snap-in.C、 Run the Secedit /analyze command.D、 Run the Secedit /validate command.

You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()A、Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computersB、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersC、Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersD、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers

You work as a network exchange administrator at company.com.thecompany.com network currently consists of a single active directory forest containing a single domain named company.com.the company.com organization makes use of microsoft exchange server 2010 as their messaging solution.in each of the organizational units in the company.com forest, a user has been identified to manage recipients in their specific organizational units.During the course of the business week you receive instruction from company.com to ensure that these chosen users will indeed have the ability to manage recipients in a specific organizational unit (ou).what should you do?()A、you should consider using role based access control (rbac) and having a new management scope created.B、you should consider using role based access control (rbac) and having the default management scope modified.C、you should consider having a new direct role assignment created.D、you should consider having a new management role assignment policy created.

A bank runs 50 workstations and would like to decrease its electricity costs, while not sacrificing functionality. All of the workstations are high-end performance units that are intended to be used for CAD-like applications. Analysts benefit from the added performance, but tellers and associates could use more minimalist systems. Which of the following methods would decrease the banks electricity and hardware costs?()A、Swap all teller and associate machines with servers.B、Swap all teller and associate machines with thin clients.C、Swap all teller and associate machines with low-profile high-end workstations.D、Swap all teller and associate machines with laptops.

Your company has a server named Server1 that runs Windows Server 2008 and Microsoft Hyper-V. Server1 hosts three virtual machines.  Company policy states that the virtual machines must not connect to the company network.  You need to configure all of the virtual machines to connect to each other. You must meet the company policy.  Which two actions should you perform?()A、Select the Not connected option for each virtual machine.B、Enable the Enable virtual LAN identification option for each virtual machine.C、Set the Connection to Host for the network interface card.D、Set the Connection to None for the network interface card.

单选题A bank runs 50 workstations and would like to decrease its electricity costs, while not sacrificing functionality. All of the workstations are high-end performance units that are intended to be used for CAD-like applications. Analysts benefit from the added performance, but tellers and associates could use more minimalist systems. Which of the following methods would decrease the banks electricity and hardware costs?()ASwap all teller and associate machines with servers.BSwap all teller and associate machines with thin clients.CSwap all teller and associate machines with low-profile high-end workstations.DSwap all teller and associate machines with laptops.

单选题You are an enterprise administrator for Cer-tech .com. All the servers on the network run Windows Server2008. The network consists of a server called Server01 that runs Microsoft Hyper-V and hosts three virtualmachines. To fulfill a network requirement, you need to configure all of the virtual machines to connect toeach other. However, the company policy states that the virtual machines must not connect to the companynetwork. Which of the following options would you choose to ensure that all the virtual machines connect to eachother and you meet the company policy also?()AEnable the Enable virtual LAN identification option for each virtual machineBEnable the Enable virtual LAN identification option for each virtual machine and then set the connection to Host for the network interface cardCSet the Connection to None for the network interface cardDSelect the Not connected option for each virtual machine.

单选题Your company has an Active Directory directory service domain. All servers run Windows Server 2003. You are developing a security monitoring plan. You must monitor the files that are stored in a specific directory on a member server. You have the following requirements. Log all attempts to access the files.Retain log information until the full weekly backup occurs. You need to ensure that the security monitoring plan meets the requirements.  What should your plan include?()A Configure a directory service access audit policy. Increase the maximum size of the security log.B Configure a directory service access audit policy. Set the system log to overwrite events older than 7 days.C Configure an object access audit policy for the directory. Increase the maximum size of the system log.D Configure an object access audit policy for the directory. Set the security log to overwrite events older than 7 days.

单选题A system administrator wants to configure 802.1X on an Ethernet switch to enable access to specific parts of the network based on group memberships.How can the administrator accomplish this goal?()AConfigure roles based on departments and assign access based on source IP address.BConfigure roles based on the user's manager and assign access based on the user's MAC addressCConfigure roles based on group memberships and assign a specific VLAN to the role.DConfigure roles based on RADIUS request attribute and assign a specific VLAN to the role.

单选题Your company has a single Active Directory directory service domain that includes a main office and two branch offices. Each branch office has its own Active Directory site. All user accounts are placed into organizational units (OUs) based on department. Multiple Group Policy objects (GPOs) are linked at the domain, the site, and the OU levels. A user in Atlanta transfers to a different branch office and joins a different department. You move her user account into the corresponding OU. After logging on to her new client computer, the user notices that the desktop settings are different from the settings she had in her previous location. You need to find out the effect of all GPOs on the user.  What should you do?()A Use the Security Configuration and Analysis snap-in.B Use the Resultant Set of Policy snap-in.C Run the Secedit /analyze command.D Run the Secedit /validate command.

单选题Which statement regarding the implementation of an IDP policy template is true?()AIDP policy templates are automatically installed as the active IDP policy.BIDP policy templates are enabled using a commit script.CIDP policy templates can be downloaded without an IDP license.DIDP policy templates are included in the factory-default configuration.

单选题Which of the following requires an update to the baseline after installing new software on a machine?()ASignature-based NIPSBSignature-based NIDSCHoneypotDBehavior-based HIDS

单选题You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()ADesign a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computersBDesign a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersCDesign a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersDDesign a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers

单选题Regarding a route-based versus policy-based IPsec VPN, which statement is true?()AA route-based VPN generally uses less resources than a policy-based VPN.BA route-based VPN cannot have a deny action in a policy; a policy-based VPN can have a deny action.CA route-based VPN is better suited for dialup or remote access compared to a policy-based VPN.DA route-based VPN uses a policy referencing the IPsec VPN; a policy-based VPN policy does not use apolicy referencing the IPsec VPN

单选题Which of the following technologies can provide geographically based load balancing with high availability between two web servers with static content?()A MulticastB Active/passive clusterC Active/active clusterD DNS round robin

单选题You work as a network exchange administrator at company.com.thecompany.com network currently consists of a single active directory forest containing a single domain named company.com.the company.com organization makes use of microsoft exchange server 2010 as their messaging solution.in each of the organizational units in the company.com forest, a user has been identified to manage recipients in their specific organizational units.During the course of the business week you receive instruction from company.com to ensure that these chosen users will indeed have the ability to manage recipients in a specific organizational unit (ou).what should you do?()Ayou should consider using role based access control (rbac) and having a new management scope created.Byou should consider using role based access control (rbac) and having the default management scope modified.Cyou should consider having a new direct role assignment created.Dyou should consider having a new management role assignment policy created.

多选题Your company has a server named Server1 that runs Windows Server 2008 and Microsoft Hyper-V. Server1 hosts three virtual machines.  Company policy states that the virtual machines must not connect to the company network.  You need to configure all of the virtual machines to connect to each other. You must meet the company policy.  Which two actions should you perform?()ASelect the Not connected option for each virtual machine.BEnable the Enable virtual LAN identification option for each virtual machine.CSet the Connection to Host for the network interface card.DSet the Connection to None for the network interface card.

单选题The Company should clearly define and document the master’s responsibility with regard to all the following items except().Aimplementing the safety and environmental protection policy of the CompanyBpreparing procedures to respond to emergency situationsCverifying that specified requirements are observedDreviewing the SMS and reporting its deficiencies to the shore based management