You manage 20 servers that run Windows Server 2008. The Terminal Services role and the Microsoft Windows System Resource Manager (WSRM) feature are installed on all the servers. You create and configure a resource-allocation policy that has the required custom settings on a server named TS01. You need to configure the WSRM settings on all the servers to match the WSRM settings on TS01. What should you do?()A、Use the Windows Backup tool to back up only the System State data on TS01. Use the Windows Backup tool to restore the System State data on each server.B、Use the WSRM console on each server to enable the Accounting function. Configure the Remote WSRM accounting option to TS01 on each server.C、Use the WSRM console on TS01 to export the WSRM information to a shared folder. Use the WSRM console to import the WSRM information from the shared folder.D、Use the regedit tool to export the HKLM/SYSTEM/CurrentControlSet/Services/WSRM registry key on TS01 to a shared folder. On each server, delete this registry key and use the regedit tool to import the registry key from the shared folder.
You manage 20 servers that run Windows Server 2008. The Terminal Services role and the Microsoft Windows System Resource Manager (WSRM) feature are installed on all the servers. You create and configure a resource-allocation policy that has the required custom settings on a server named TS01. You need to configure the WSRM settings on all the servers to match the WSRM settings on TS01. What should you do?()
- A、Use the Windows Backup tool to back up only the System State data on TS01. Use the Windows Backup tool to restore the System State data on each server.
- B、Use the WSRM console on each server to enable the Accounting function. Configure the Remote WSRM accounting option to TS01 on each server.
- C、Use the WSRM console on TS01 to export the WSRM information to a shared folder. Use the WSRM console to import the WSRM information from the shared folder.
- D、Use the regedit tool to export the HKLM/SYSTEM/CurrentControlSet/Services/WSRM registry key on TS01 to a shared folder. On each server, delete this registry key and use the regedit tool to import the registry key from the shared folder.
相关考题:
As space of our office is limited Is it possible to pile cartons here?A.No. Something more important is expected to be put here So, you’ve got to find somewhere to pile cartons.B.No. This place is not vacant. You mustn’t pile anything hereC.No. This is an emergency exit. You mustn’t pile anything hereD.Maybe you can. If you manage to persuade them to let you pile cartons, you can do that.
I really appreciate ()to help me,but I am sure that I will be able to manage by myself.A、you to offerB、your offeringC、that you offer
Could I help you with the heavy box? You look so-fired.()I can manage it.A. No, thanks.B. Yes, please.C. All right.
Paul: Can I help with your luggage?Lisa:______.A、No, many thanks. I can doB、No, thanks. I can manage itC、No, not necessary. Thank you anywayD、No, you needn't. Thank you anyway
Jackson: What's there to do at night?Clerk: There are clubs, concerts, plays, and so on._______!A、You make itB、You name itC、You find itD、You manage it
You have been assigned to manage a set of databases. The previous DBA did not leave you notes regarding the structure of each of the databases. While analyzing an instance, you notice that the system identifier (SID) for the instance is set to ’+ASM’. What is the purpose of this instance?()A、 This instance is being used to manage the operating system files.B、 This instance is being used to manage the files of other databases.C、 This instance is being used to manage the instances of other databases.D、 This instance is being used to manage the background processes of other instances.
You have a Windows Server 2008 R2 Enterprise Root certification authority (CA). You need to grant members of the Account Operators group the ability to only manage Basic EFS certificates. You grant the Account Operators group the Issue and Manage Certificates permission on the CA . Which three tasks should you perform next()A、Enable the Restrict Enrollment Agents option on the CA .B、Enable the Restrict Certificate Managers option on the CA .C、Add the Basic EFS certificate template for the Account Operators group.D、Grant the Account Operators group the Manage CA permission on the CA .E、Remove all unnecessary certificate templates that are assigned to the Account Operators group.
Your environment includes multiple Windows Server 2008 R2 Hyper-V servers. You manage the virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You plan to place multiple Hyper-V servers in the perimeter network (also known as DMZ). You need to be able to manage the Hyper-V servers by using VMM. Which two actions should you perform for each server in the perimeter network?()A、Create a local administrative accountB、Perform a VMM local agent installationC、Open port 8100 in the Windows firewallD、Copy the security file to the VMM Administrator Console, and then run the Add Hosts Wizard
You work as a network Exchange administrator at Company.com.Company.com has its headquarters located in Miami and branch office located in Toronto.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently made the Toronto office administrators members of a custom management role group which is configured to allow members to manage recipients.During your routine maintenance you discover that Toronto office administrators are able to manage recipients in both offices.During the course of the business week you receive instruction from Company.com to ensure that the Toronto office administrators are able to manage recipients in the Toronto office only. What should you do?()A、You should consider having a new linked role group created.You should then have the Toronto office administrators added to the role group.B、You should consider having a new role created.You should then have the management role entries added to the role.C、You should consider having a management scope created and associated to the role group.D、You should consider having a management role assignment policy created and associated to the role group.
You need to design an administrative model that meets the business and technical requirements. What should you do?()A、Assign permissions to manage Mailbox and Exchange Server configuration to the server-admins groupB、Assign permissions to manage Mailbox and Exchange Server configuration to the domain-admins groupC、Assign permissions to manage Mailboxes to the server-admins group. Assign permissions to manage Exchange Servers configuration to the domain-admins groupD、Assign permissions to manage Mailboxes to the domain-admins group. Assign permissions to manage Exchange Servers configuration to the server-admins group
You have a computer that runs Windows XP Professional. You connect one local print device and install a printer. You share the printer. You need to give a user the ability to manage all new print jobs submitted to the printer. Your solution must prevent the user from installing additional local printers. What should you do?()A、In the printer properties, assign the Manage Printers permission to the user.B、In the printer properties, assign the Manage Documents permission to the user.C、From the Local Users and Groups snap-in, add the user to the Power Users group.D、From the Local Users and Groups snap-in, add the user to the Replicators group.
You have a server that runs Windows Server 2003 Service Pack 2 (SP2). You create a user account named Admin1. You need to allow Admin1 to restart the server and to manage shared folders. You must minimize the rights assigned to Admin1.Which group should you add Admin1 to? ()A、Power UsersB、AdministratorsC、HelpServicesGroupD、Remote Desktop Users
You need to design a remote administration solution for servers on the internal network. Your solution must meet business and security requirements. What should you do?()A、Permit administrators to use an HTTP interface to manage servers remotelyB、Permit only administrators to connect to the servers’ Telnet serviceC、Permit administrators to manage the servers by using Microsoft NetMeetingD、Require administrators to use Remote Desktop for Administration connections to manage the servers
Your company has a main office and a branch office.The branch office administrators are the only members of a custom management role group.The role group is configured to allow members to manage recipients. You notice that the branch office administrators can manage recipients in both offices.You need to ensure that the branch office administrators can manage recipients in the branch office only. What should you do?()A、Create and associate a management scope to the role group.B、Create and associate a management role assignment policy to the role group.C、Create a new linked role group, and then add the branch office administrators to the role group.D、Create a new role, and then add management role entries to the role.
单选题Bob: Can I help with your luggage? Mary: ______ .ANo, thanks. I can manage it.BNo, Many thanks. I can do.CNo, not necessary. Thank you anyway.DNo, you needn't. Thank you anyway.
单选题Paul: Can I help with your luggage? Lisa:()ANo, many thanks. I can doBNo, thanks. I can manage itCNo, not necessary. Thank you anywayDNo, you needn't. Thank you anyway
单选题A:Can I do anything for you? B:()ANo. You can't do anything for me.BNo,it's alright. I can manage myself.CNever mindDIt's my pleasure
单选题A:Can I do anything for you? B:()ANo. You can't do anything for me.BNo,it's alright. I can manage myself.CNever mindDIt's my pleasure.
单选题You have been assigned to manage a set of databases. The previous DBA did not leave you notes regarding the structure of each of the databases. While analyzing an instance, you notice that the system identifier (SID) for the instance is set to ’+ASM’. What is the purpose of this instance?()A This instance is being used to manage the operating system files.B This instance is being used to manage the files of other databases.C This instance is being used to manage the instances of other databases.D This instance is being used to manage the background processes of other instances.
单选题You and Stephen are the desktop administrators for your company. You install a printer on your Windows XP Professional computer. You share this printer on the company network. You want to ensure that only members of the DTAdmins local group can use this printer, and that only you and Stephen can manage the printer and all print jobs. You also want to ensure that members of the DTAdmins local group can manage only their own print jobs. How should you configure security on this printer?()AGrant Allow - Print permission to the DTAdmins group. Grant Allow - Manage Documents permission to your user account and to Stephen’s user account. BGrant Allow - Print permission to the DTAdmins group. Grant Allow - Manage Documents and Allow - Manage Printers permissions to your user account and to Stephen’s user account. CGrant Allow - Manage Documents permission to the DTAdmins group. Grant Allow - Manage Printers permission to your user account and to Stephen’s user account. DGrant Allow - Print permission to the DTAdmins group. Remove Allow - Manage Documents permission from the Creator Owner group. Grant Allow - Manage Printers permission to your user account and to Stephen’s user account.
单选题You need to recommend a tool to manage the SANs. The tool must support the company’s planned changes and technical requirements. Which tool should you recommend?()ADisk ManagementBShare and Storage ManagementCStorage ExplorerDStorage Manager for SANs
多选题Your company has an Active Directory Domain Services (AD DS) domain. You have a Windows Server 2008 R2 Hyper-V server. You manage the virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to ensure that a user can create new virtual machines (VMs) on only a specific set of servers . The user must not be able to see or manage servers outside of that set within VMM . Which two actions should you perform?()ACreate a host group. Add the host servers that the user will manage to the host group.BCreate a failover cluster. Join the host servers that the user will manage to the failover cluster.CUsing Authorization Manager, assign the user to a role with the necessary permission to manage the servers by using VMM.DUsing Authorization Manager, assign the user to a role with the necessary permission to manage the servers by using the VMM Self-Service Portal.
单选题You manage a domain controller that runs Windows Server 2008 R2 and the DNS Server server role.The DNS server hosts an Active Directory-integrated zone for your domain.You need to provide a user with the ability to manage records in the zone. The user must not be able to modify the DNS server settings.What should you do?()AAdd the user to the DNSUpdateProxy Global security group.BAdd the user to the DNSAdmins Domain Local security group.CGrant the user permissions on the zone.DGrant the user permissions on the DNS server.
单选题Your organization has a n Active Directory Domain Services (AD DS) domain. All client computers run Windows 7. You u se Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 to manage your Hyper - V hosts. Your environment includes Microsoft Enterprise Desktop Virtualization (MED - V). You plan to deploy a virtual machine (VM) image to all client computers. You need to ensure that user state information is maintained between sessions in the VM. What should you do?()AUse VMM to configure placement settings.BConfigure a MED - V revertible workspace policy.CConfigure a MED - V persistent workspace policy.DUse Hyper - V M anager to create a revert snapshot.
单选题You have an enterprise subordinate certification authority (CA). You have a group named Group1. You need to allow members of Group1 to publish new certificate revocation lists. Members of Group1 must not be allowed to revoke certificates. What should you do()AAdd Group1 to the local Administrators group.BAdd Group1 to the Certificate Publishers group.CAssign the Manage CA permission to Group1.DAssign the Issue and Manage Certificates permission to Group1.