网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Machine policy templates can be assigned based on certain attributes of a machine. A customer  organizes their machines based on the following requirements:   The machines are all placed in specific Organizational Units in the Active Directory.   The customer has Citrix Servers, and they have a specific naming convention meant only for their Citrix Servers. The customer has DHCP enabled for all the client machines.   The customer has made it clear that they should not need to change anything in the existing infrastructure. Given these requirements, which single assignment attribute would be chosen for assigning machine policy templates?()

  • A、Hostnames
  • B、IP Addresses
  • C、Machine Group Tag
  • D、Active Directory Groups

参考答案

更多 “ Machine policy templates can be assigned based on certain attributes of a machine. A customer  organizes their machines based on the following requirements:   The machines are all placed in specific Organizational Units in the Active Directory.   The customer has Citrix Servers, and they have a specific naming convention meant only for their Citrix Servers. The customer has DHCP enabled for all the client machines.   The customer has made it clear that they should not need to change anything in the existing infrastructure. Given these requirements, which single assignment attribute would be chosen for assigning machine policy templates?()A、HostnamesB、IP AddressesC、Machine Group TagD、Active Directory Groups” 相关考题
考题 关于HostMachine和Guest Machine关系描述正确的是() A、使用了虚拟化技术后,一台Guest Machine可以同时使用多台Host Machine的资源B、使用了虚拟化技术后,一台Guest Machine只能运行在创建它的Host Machine上C、使用了虚拟化技术后,一台Host Machine只能运行一个HypervisorD、使用了虚拟化技术后,一台Host Machine上能够运行多台Guest Machine

考题 Which two commands are needed to create and apply an export policy that advertises static routes to OSPF neighbors?() A.edit policy-options policy-statement policy-name set term 1 from protocol static set term 1 then acceptB.edit ospf policy set from protocol static set 1 then acceptC.set protocols OSPF export policy-nameD.set protocols OSPF policy policy-name

考题 Since independence the Irish Republic has adhered to().Aa policy of protectionismBa policy of containmentCa policy of military allianceDa policy of neutrality and nonalignment

考题 Since independence the Irish Republic has adhered to().A、a policy of protectionismB、a policy of containmentC、a policy of military allianceD、a policy of neutrality and nonalignment

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a server named S01 that runs Windows Server 2008 and Hyper-V inyour company. Three virtual machines are hosted on S01. According to the requirement of company policy,the virtual machines must not connect to the company network. All of the virtual machines need to beconfigured to connect to each other. You must meet the company policy. Which should you do?()A、The Connection should be set to Host for the network interface card.B、The Connection should be set to None for the network interface card.C、You should choose the Not connected option for each virtual machine.D、The Enable virtual LAN identification option should be enabled for each virtual machine.

考题 A technician is sent out to a client’s office to solve an issue involving a machine which has numerous Windows XP service failures upon startup. Which of the following would be the FIRST place to check for information on this?()A、Event ViewerB、MSCONFIGC、Services MMCD、Group Policy Editor

考题 Which of the following logical volume placement policies is likely to give the best performance in most cases, all other factors being equal?()A、 INTRA-POLICY set to ’edge’, INTER-POLICY set to maximumB、 INTRA-POLICY set to ’center’, INTER-POLICY set to maximumC、 INTRA-POLICY set to ’middle’, INTER-POLICY set to minimumD、 INTRA-POLICY set to ’center’, INTER-POLICY set to minimum

考题 When using a mksysb and base media to clone a system, which of the following will cause the installation to fail()A、mksysb made on a single processor machine but is being installed on a multiple processor machine, no editing of the image.data fileB、mksysb made on machine with mirrored rootvg and new machine only has one disk in rootvg, no editing of the image.data fileC、mksysb made on a machine with 32GB of RAM but being installed on a machine with only 8GB of RAMD、mksysb made on a machine with virtual Ethernet adapter but being installed on a machine which only has a physical Ethernet adapter

考题 Which information is required to get the feature activation codes()A、machine serial number, model, and machine signatureB、model, disk size, and machine serial numberC、model, Storage Managerversion, and machine signatureD、model, WWNN, and machine serial number

考题 An administrator performs a Live Partition Mobility operation. After the operation completes, the administrator runs errpt -a.  What is the machine ID reported by errpt command?()A、 The machine ID of the machine that logged the errorB、 The machine ID of the machine that it is currently running onC、 The administrator defined machine ID in the /etc/machineid fileD、 The machine ID of the machine that the operating system was originally started on

考题 Your network contains an Active Directory domain named contoso.com. The domain contains five  domain controllers. You add a logoff script to an existing Group Policy object (GPO). You need to verify that each  domain controller successfully replicates the updated group policy.     Which two objects should you verify on each domain controller()A、/servername/SYSVOL/contoso.com/Policies/{GUID}/gpt.iniB、//servername/SYSVOL/contoso.com/Policies/{GUID}/machine/registry.polC、the uSNChanged value for the CN={GUID},CN=Policies,CN=System,DC=contoso,DC=com containerD、the versionNumber value for the CN={GUID},CN=Policies,CN=System,DC=contoso,DC=com container

考题 Your organization has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 7. You use Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 to manage your Hyper-V hosts. Your environment includes Microsoft Enterprise Desktop Virtualization (MED-V). You plan to deploy a virtual machine (VM) image to all client computers. You need to ensure that user state information is maintained between sessions in the VM. What should you do? ()A、Use VMM to configure placement settings.B、Configure a MED-V revertible workspace policy.C、Configure a MED-V persistent workspace policy.D、Use Hyper-V Manager to create a revert snapshot.

考题 You are the administrator of your company’s network. You use Security Templates to configure a Security Policy on the Windows 2000 Professional Computers in the Sales organizational unit (OU). You notice that the Computers in the Sales OU are not downloading the Security Policy settings. On each computer, the Security Policy appears in the Local Computer Policy, but is not listed as the effective policy. You want all computers in the Sales OU to have the Security Policy listed as the effective policy. How should you accomplish this task? ()A、Use Security Templates to correct the setting and export the security file.B、Use Security Configuration and Analysis to import the security setting. Then create a Group policy object (GPO) for the Sales QU.C、Use Secedit /RefreshPolicy Machine_Policy command.D、Use the Basicwk.inf security file settings, save the security file, and then import the fileto theComputers.

考题 单选题The ratio of the work done by the machine()the work done on it is called the efficiency of the machine.A againstB withC toD for

考题 单选题An administrator performs a Live Partition Mobility operation. After the operation completes, the administrator runs errpt -a.  What is the machine ID reported by errpt command?()A  The machine ID of the machine that logged the errorB  The machine ID of the machine that it is currently running onC  The administrator defined machine ID in the /etc/machineid fileD  The machine ID of the machine that the operating system was originally started on

考题 单选题Machine policy templates can be assigned based on certain attributes of a machine. A customer  organizes their machines based on the following requirements:   The machines are all placed in specific Organizational Units in the Active Directory.   The customer has Citrix Servers, and they have a specific naming convention meant only for their Citrix Servers. The customer has DHCP enabled for all the client machines.   The customer has made it clear that they should not need to change anything in the existing infrastructure. Given these requirements, which single assignment attribute would be chosen for assigning machine policy templates?()A HostnamesB IP AddressesC Machine Group TagD Active Directory Groups

考题 多选题You want to enforce a Host Checker policy so that only users who pass the policy receive the Employee role. In the admin GUI, which two parameters must you configure?()ASelect Require and Enforce for the Host Checker Policy in the realm authentication policy.BSelect Evaluate Policies for the Host Checker policy in the realm authentication policy.CConfigure the Host Checker policy as a role restriction for the Employee role.DConfigure the Host Checker policy as a resource access policy for the Employee role.

考题 单选题Since independence the Irish Republic has adhered to().A a policy of protectionismB a policy of containmentC a policy of military allianceD a policy of neutrality and nonalignment

考题 单选题What are customers told to do?A Read the warranty carefullyB Clean the machine with gentle chemicalsC Refrain from closing the machine by handD Dry the machine after cleaning

考题 多选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a server named S01 that runs Windows Server 2008 and Hyper-V inyour company. Three virtual machines are hosted on S01. According to the requirement of company policy,the virtual machines must not connect to the company network. All of the virtual machines need to beconfigured to connect to each other. You must meet the company policy. Which should you do?()AThe Connection should be set to Host for the network interface card.BThe Connection should be set to None for the network interface card.CYou should choose the Not connected option for each virtual machine.DThe Enable virtual LAN identification option should be enabled for each virtual machine.

考题 多选题Your company has a server named Server1 that runs Windows Server 2008 and Microsoft Hyper-V. Server1 hosts three virtual machines.  Company policy states that the virtual machines must not connect to the company network.  You need to configure all of the virtual machines to connect to each other. You must meet the company policy.  Which two actions should you perform?()ASelect the Not connected option for each virtual machine.BEnable the Enable virtual LAN identification option for each virtual machine.CSet the Connection to Host for the network interface card.DSet the Connection to None for the network interface card.

考题 单选题Which information is required to get the feature activation codes()A machine serial number, model, and machine signatureB model, disk size, and machine serial numberC model, Storage Managerversion, and machine signatureD model, WWNN, and machine serial number

考题 填空题What is the first step for using the machine to wash your clothes?To throw the clothes of ____ into the machine.

考题 单选题_____A l’ordinateurB la machine à écrireC la machine à laverD la machine à coudre

考题 单选题You are the desktop administrator for your company's sales department. The IT manager for the sales department needs to distribute a custom application to the Windows XP Professional computers in the sales department. He deploys the software by using Group Policy. Susan is a user in the sales department. She reports that the custom application is not available. You examine her computer, and you verify that the application is not present on her computer. You want to ensure that the software is deployed the next time Susan logs on. Which command should you run?()A Secedit /refreshpolicy user_policy /enforceB Secedit /refreshpolicy machine_policy /enforceC Gpupdate /target:computer /syncD Gpupdate /target:user /sync