单选题Your company includes mobile computer users who frequently work offline. You are planning to deploy Windows 7 by using an image.   You have the following requirements:   Provide access to all applications when mobile computer users first start their computers. Minimize network and local storage requirements.  Provide language-pack support based on the geographic location of the user.    You need to ensure that your image-creation strategy meets the requirements.   What should you do?()ACreate a single thin image for all computers.BCreate a single hybrid image for all computers.CCreate one thin image for the mobile computers. Create one thick image for all other computers.DCreate one thick image for the mobile computers. Create one thin image for all other computers.

单选题
Your company includes mobile computer users who frequently work offline. You are planning to deploy Windows 7 by using an image.   You have the following requirements:   Provide access to all applications when mobile computer users first start their computers. Minimize network and local storage requirements.  Provide language-pack support based on the geographic location of the user.    You need to ensure that your image-creation strategy meets the requirements.   What should you do?()
A

Create a single thin image for all computers.

B

Create a single hybrid image for all computers.

C

Create one thin image for the mobile computers. Create one thick image for all other computers.

D

Create one thick image for the mobile computers. Create one thin image for all other computers.


参考解析

解析: 暂无解析

相关考题:

You are the administrator of a Windows 2000 Professional computer that has a shared printer. Several departments in your company use the shared printer.The Sales department frequently prints multiple-page presentation graphics, which take a long time to print. Users in other departments who have short messages to print must wait an unnecessarily long time for their jobs to print.You want to improve the efficiency of printing for all users who use the shared printer. You want to accomplish this with the least amount of administrative effort.What should you do?A.Configure the priority of the printer to 50. Add a new printer, and set the priority to 1. For the new printer, deny print permission for users in the Sales department.B.Configure the priority of the printer to 50. Add a new printer, and set the priority to 99. For the new printer, deny print permissions for users in the Sales department.C.Monitor the print queue and raise the priority of all print jobs that are sent by users who are not members of the Sales department.D.Delete the old printer. Add a new printer, and set the priority to a higher value. Pause the print queue only when graphic intensive print jobs are printing.

All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Your company policy requires that all unnecessary services be disabled on the computers. The Sales department staff has been provided with new mobile broadband adapters that use the Global System for Mobile Communications (GSM) technology. You need to ensure that portable computers can connect to the broadband GSM network. Which service should be enabled on the portable computers?()A.WLAN AutoConfigB.WWAN AutoConfigC.Computer BrowserD.Portable Device Enumerator Service

Your company has a main office and a branch office. The network contains an Active Directory forest. All users on the network access the Internet from their computers. The company hires a temporary employee who has his own portable computer. The employee connects his portable computer to the network. When the employee attempts to join the computer to the domain, the connection fails. A help desk technician reports the following about the employee. He has a domain user account.His computer can access Internet Web sites.His computer can contact domain controllers by using the domain controllers IP addresses. You need to ensure that the employees computer can join the domain. The solution must ensure that the computer can access resources on the Internet. What should you do?()A.Modify the time zone for the computer.B.Modify the IPv4 settings on the computer.C.Create an A record for the computer in an internal DNS zone.D.Request that an administrator create a prestaged computer account in the domain.

You share your computer with other users. You install a new Microsoft add-on to view videos on the computer. You discover that this add-on conflicts with existing add-ons that other users frequently require.You need to ensure that you are able to view videos without affecting other users.What should you do?()A.AB.BC.CD.D

Your mobile device runs the latest version of the Microsoft Windows Mobile operating system.Your mobile device supports the use of Bluetooth and Infrared (IR) for data synchronization. You need to configure data synchronization on your computer to only use Bluetooth.Which three actions should you perform?()A.AB.BC.CD.DE.EF.F

You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()A.AB.BC.CD.D

You share your computer with other users.  You install a new Microsoft Windows Internet Explorer add-on to view videos on the computer. You discover that this add-on conflicts with existing add-ons that other users frequently require. You need to ensure that you are able to view videos without affecting other users.  What should you do?()A、Uninstall the new Windows Internet Explorer add-on.B、Log on as an administrator and disable the new Windows Internet Explorer add-on.C、Direct other users to log on and disable the new Windows Internet Explorer add-on.D、Select the Turn off Automatic Website Checking option for the Phishing filter.

Your company has a single active directory domain. The company network is protected by a firewall. Remote users connect to your network through a VPN server by using PPTP. When the users try to connect to the VPN server, they receive the following error message: Error 721: The remote computer is not responding. You need to ensure that users can establish a VPN connection. What should you do? ()A、Open port 1423 on the firewallB、Open port 1723 on the firewallC、Open port 3389 on the firewallD、Open port 6000 on the firewall

Your company has a main office and a branch office. The network contains an Active Directory forest. All users on the network access the Internet from their computers. The company hires a temporary employee who has his own portable computer. The employee connects his portable computer to the network. When the employee attempts to join the computer to the domain, the connection fails. A help desk technician reports the following about the employee. He has a domain user account.His computer can access Internet Web sites.His computer can contact domain controllers by using the domain controllers IP addresses. You need to ensure that the employees computer can join the domain. The solution must ensure that the computer can access resources on the Internet. What should you do?()A、Modify the time zone for the computer.B、Modify the IPv4 settings on the computer.C、Create an A record for the computer in an internal DNS zone.D、Request that an administrator create a prestaged computer account in the domain.

You are a help desk technician for your company. Susan is an executive. Because Susan travels frequently, she uses a Windows XP Professional portable computer that has a smart card reader.  Susan asks you to configure her computer so that she can dial in to the company network when she is out of the office. Company security policy states that dial-in users must use a smart card when they connect to the network, and that the users must use the strongest form of data encryption possible. Company security policy also states that client computers must disconnect if the Routing and Remote Access server does not support both smart card authentication and the strongest possible authentication. You need to configure the dial-up connection properties on Susan’s computer to dial in to the company network. Your solution must ensure that company security policies are enforced.  Which three actions should you perform?() A、Select the Advanced (custom settings) security option.B、Select the Require data encryption check box. C、Select the Typical (recommended settings) security option. D、Select the Use smart card item from the Validate my identity as follows list.E、Select the Maximum strength encryption item from the Data encryption list.F、Select the Extensible Authentication Protocol (EAP) option, and select Smart Card or other Certificate from the EAP list.

Your company includes mobile computer users who frequently work offline. You are planning to deploy Windows 7 by using an image.   You have the following requirements:   Provide access to all applications when mobile computer users first start their computers. Minimize network and local storage requirements.  Provide language-pack support based on the geographic location of the user.    You need to ensure that your image-creation strategy meets the requirements.   What should you do?()A、Create a single thin image for all computers.B、Create a single hybrid image for all computers.C、Create one thin image for the mobile computers. Create one thick image for all other computers.D、Create one thick image for the mobile computers. Create one thin image for all other computers.

You are the administrator of your Windows 2000 Professional computer. You share severalfolders on your computer, which are accessible to all the users on your company’s network. You want to ensure that you have correctly assigned the appropriate permissions to all the shares.Where can you view all the shares in use on your computer, so as to verify the permissions as quickly as possible? ()A、Control Panel  Data Sources (ODBC).B、Control Panel  System Tools  Shared Folders.C、Computer Management  System Tools  System Information.D、Computer Management  System Tools  Shared Folders  Open Files.E、Computer Management  System Tools  Shared Folders  Sessions.F、Computer Management  System Tools  Shared Folders  Shares.

You are a desktop administrator for your company. A company user reports that he is unable to use his Bluetooth-enabled mobile phone with his Bluetooth-enabled Windows XP Professional computer. He is trying to play audio from the phone through the speakers on his computer. You verify that other Bluetooth devices work properly with the user’s computer. You test the speakers to make sure they are in working order. You also verify that the mobile phone can send output to a computer. You then discover that the phone cannot detect the computer.You need to ensure that the user can use the phone with his computer. What should you do?()A、Place the phone in Bluetooth discovery mode.B、Place the user’s computer in Bluetooth discovery mode.C、Add the phone and the computer to the same Bluetooth Personal Area Network (PAN).D、Install mobile phone synchronization software on the user’s computer.

You have an Exchange Server 2010 organization that contains Windows Mobile 5.0 devices. Your company plans to replace all mobile devices with Windows Mobile 6.5 devices.  You need to identify which users accessed their mailboxes by using Windows Mobile 5.0 devices in thepast month.  What should you do?()A、Create a Data Collector Set.B、Install and run the Exchange Server User Monitor (ExMon).C、Export and review the Internet Information Services (IIS) logs.D、Enable User Agent logging, and then review the agent logs.

All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Your company policy requires that all unnecessary services be disabled on the computers. The Sales department staff has been provided with new mobile broadband adapters that use the Global System for Mobile Communications (GSM) technology. You need to ensure that portable computers can connect to the broadband GSM network. Which service should be enabled on the portable computers?()A、WLAN AutoConfigB、WWAN AutoConfigC、Computer BrowserD、Portable Device Enumerator Service

Your company has a single Active Directory domain. The company network is protected by a firewall.Remote users connect to your network through a VPN server by using PPTP.When the users try to connect to the VPN server, they receive the following error message :Error 721:The remote computer is not responding.You need to ensure that users can establish a VPN connection.What should you do?()A、Open port 1423 on the firewall.B、Open port 1723 on the firewall.C、Open port 3389 on the firewall.D、Open port 6000 on the firewall.

单选题Putting your mobile phone on a restaurant table may make your friends think _____.Ayou prefer to talk to your friends at the tableByou value your calls more than your friendsCyou are enjoying the company of your friendsDyou are polite and considerate of your friends

单选题You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? ()AEnable the Require domain controller to unlock policy.BSet the Number of previous logons to cache policy to 0.  CRemove all user and group accounts from the Log on locally user right. DRemove all user and group accounts from the Access this computer from the network user right.

多选题You need to design the network to support the company’s VPN requirements for mobile users who connect to the network in Seattle. Which two actions should you perform?()AUse a password generator application to create a preshared key, and distribute it to all mobile usersBUse computer autoenrollment to create digital certificates that can be used to authenticate to a VPN serverCAcquire a digital certificate that can be used for SSL from a commercial CA for each computer that established a VPN connectionDConfigure IPSec policies on all Routing and Remote Access servers to require the use of digital certificates

单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.the Company.com contains an exchange server 2010 client access server named -ex13.The mobile clients at Company.com are configured to either run windows mobile 5.0, windows mobile 6.1 or windows mobile 6.5.the mobile users use the internet to connect to -ex13, using mail.Company.com.you have received instructions from the cio to equip -ex13 with a certificate.however, the mobile users need to connect to -ex13 from the internet via exchange activesync.What should you do?()AYou should consider including Company.com in the certificate.Byou should consider including -ex13.Company.com in the certificate.CYou should consider including EAS.Company.com in the certificate.DYou should consider including mail.Company.com in the certificate.

单选题You have a computer that runs Windows XP Professional. Multiple users share the computer. You log on to the computer by using the local administrator account and install a custom application. You need to add an application shortcut to the desktop of all new users who use the computer. The shortcut must appear on the desktop of new users only. What should you do?()ACopy the shortcut to %systemdrive%/documents and settings/default user/desktop/.BCopy the shortcut to %systemdrive%/documents and settings/all users/desktop/.CCopy the shortcut to your desktop. Modify the %comspec% system environment variable. DCopy the shortcut to the guest user’s desktop. Assign the Everyone group Read permission to the guest user profile.

多选题You are the administrator of a Windows 2000 Professional computer, which has a 56 Kbps modem, connected to itself. You want the users on your company’s network to be able to connect to the Internet using your computer. But, you do not want to allow any other operations than HTTP and FTP. Which ports will you allow through this connection? ()APort 80BPort 21CPort 25DPort 81

单选题You are the administrator of your company’s network. Your company is based in Russia and conducts the majority of its business in Russian. Users in your company create, view, and edit documents in English (US), French, and Spanish to communicate weight vendors internationally. Users run the Russian localized edition of Windows 2000 Professional on their desktop and portable computers. A user named Katrin wants to create a word processing documents in both English and Spanish by using Notepad in Windows 2000 Professional. She requests your assistance in enabling English and Spanish on her computer. What should you do?()AInstruct Katrin to select the desired input local for either English or Spanish within NotepadBInstruct Katrin to select the input local indicator on the taskbar and select either English or  SpanishCInstruct Katrin to use Regional Options in Control Panel to add input Locales and keyboard  layouts/IME for both English and SpanishDCreate a Local Computer Policy for Katrin's computer to include both English and Spanish.

单选题You are the network administrator for Company and you support the portable computer users. An Account Executive named Hildegard frequently travels to meet with customers and uses her portable computer to demonstrate the company’s new software products.  Hildegard needs to update these products frequently so customers can evaluate the latest software releases. You need to allow Hildegard to install the product updates while limiting her ability to perform  ther administrative duties on her portable computer.  What should you do? ()A Add Hildegard’s user accounts to the Pre-Windows 2000 Compatible Access group.B Add Hildegard’s user account to the local Power Users group.C Allow Hildegard’s user account Full Control permission to the Program Files folder. Propagate the permissions to all the subdirectories and files in that directory.D Allow Hildegard’s user account Write permissions to the Program Files folder. Propagate the permissions to all the subdirectories and files in that directory.

单选题You are the administrator of your company’s network. Your company is based in Russia and conducts the majority of its business in Russian. Users in your company create, view, and edit documents in English (US), French, and Spanish to communicate with vendors internationally. Users run the Russian localized edition of Windows 2000 Professional on their desktop and portable computers. A user named Katrin wants to create word processing documents in both English and Spanish by using Notepad in Windows 2000 Professional. She requests your assistance in enabling English and Spanish on her computer. What should you do? ()AInstruct Katrin to select the desired input locale for either English or Spanish within NotepadBInstruct Katrin to select the input locale indicator on the taskbar and select either English or  Spanish.  CInstruct Katrin to use Regional Options in Control Panel to add input Locales and keyboard layouts/IME for both English and Spanish.DCreate a Local Computer Policy for Katrins computer to include both English and Spanish.

单选题Your network contains an Active Directory domain. The domain contains 1000 user accounts.  You have a list that contains the mobile phone number of each user  You need to add the mobile number of each user to Active Directory.     What should you do()ACreate a file that contains the mobile phone numbers, and then run ldifde.exeBCreate a fila that contains the mobile phone numbers, and then run csvde.exeCFrom Adsiedit, select the CN=Users container, and then mofify the properties of the container.DFrom Active Directory Users and Computers, select all of the users, and then modify the properties of the users.

单选题You use a Windows 2000 Professional computer at home. You need to access shared files on a server named server1. This server is on your company’s network and is not accessible from the internet. Your company’s network also includes a third party VPN server that is accessible from the internet. You dial in to your internet service provider and then create a VPN connection to your company’s VPN server. After the connection is successfully established, you run the net view//server1 command and receive the following error ‘the server is inaccessible or could not be found’. You need to access the shared files on server 1. What should you do? ()AStop and then start the TCP/IP NetBIOS helper service on your computer.BStop and then start the DNS client service on your computer.CAdd a HOSTS entry for server1 to your computer.DAdd a LMHOSTS entry for server1 to your computer.