网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A companys computer policy dictates that all users workstations must use the companys corporate web page as their default home page.  Which of the following methods should an administrator use to BEST comply with this policy?()
A

 Configure a logon script to set the homepage at logon.

B

 Set the default homepage to the corporate website in Group Policy.

C

 Manually configure the homepage on all workstations and setup trace logs to ensure compliance.

D

 Set the default homepage to the corporate website on the base computer image.


参考答案

参考解析
解析: 暂无解析
更多 “单选题A companys computer policy dictates that all users workstations must use the companys corporate web page as their default home page.  Which of the following methods should an administrator use to BEST comply with this policy?()A  Configure a logon script to set the homepage at logon.B  Set the default homepage to the corporate website in Group Policy.C  Manually configure the homepage on all workstations and setup trace logs to ensure compliance.D  Set the default homepage to the corporate website on the base computer image.” 相关考题
考题 You wish to enable an audit policy for all database users, except SYS, SYSTEM, and SCOTT.You issue the following statements:SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYS;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYSTEM;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SCOTT;For which database users is the audit policy now active?()A. All users except SYSB. All users except SCOTTC. All users except sys and SCOTTD. All users except sys, system, and SCOTT

考题 Start of repeated scenarioYou are an enterprise desktop support technician for Fabrikam, Inc. Active Directory InformationThe company has a main office and a branch office. The main office hosts all of the companys servers. The main office connects to the branch office by using a WAN link. The network contains a single Active Directory domain that has 500 users. The domain contains three domain controllers and an enterprise root certification authority (CA). All servers run Windows Server 2008 R2. All user accounts are in an organizational unit (OU) named Employees. The computer accounts for all desktop computers are in an OU named Desktops. The computer accounts for all portable computers are in an OU named Laptops. A startup script is deployed to all computers by using Group Policy objects (GPOs). Client ConfigurationsAll client computers run Windows 7 Enterprise. All users have desktop computers. All computers are members of the domain. All desktop computers use wired connections to connect to the network. All portable computers use wireless connections to connect to the network. The wireless network is secured by using EAP-TLS. Company policy states that all client computers must be configured by using DHCP. The company has an internal Web site. The Web site is configured to useSSL encryption and to require client certificates. All company users can access the internal Web site. End of repeated scenario Users in the branch office report slow network performance when they connect to the file shares in the main office. You need to recommend a solution to improve performance when users access the file shares from the branch office. The solution must minimize hardware costs. What should you recommend implementing?()

考题 A companys computer policy dictates that all users workstations must use the companys corporate web page as their default home page.  Which of the following methods should an administrator use to BEST comply with this policy?()A、 Configure a logon script to set the homepage at logon.B、 Set the default homepage to the corporate website in Group Policy.C、 Manually configure the homepage on all workstations and setup trace logs to ensure compliance.D、 Set the default homepage to the corporate website on the base computer image.

考题 You wish to enable an audit policy for all database users, except SYS, SYSTEM, and SCOTT.You issue the following statements: SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYS;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYSTEM; SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SCOTT; For which database users is the audit policy now active?()A、All users except SYSB、All users except SCOTTC、All users except sys and SCOTTD、All users except sys, system, and SCOTT

考题 Your corporate network has a member server named RAS1 that runs Windows Server 2008 R2. You configure RAS1 to use the Routing and Remote Access Services (RRAS).The companys remote access policy allows members of the Domain Users group to dial in to RAS1. The company issues smart cards to all employees.You need to ensure that smart card users are able to connect to RAS1 by using a dial-up connection.What should you do?()A、Install the Network Policy Server (NPS) server role on RAS1.B、Create a remote access policy that requires users to authenticate by using SPAP.C、Create a remote access policy that requires users to authenticate by using EAP-TLS.D、Create a remote access policy that requires users to authenticate by using MS-CHAP v2.

考题 Your corporate network has a member server named RAS1 that runs windows server 2008. You configure RAS1 to use the routing and remote access service (RRAS). The companys remote access policy allows members of the domain users group to dial in to RAS1. The company issues smart cards to all employees. You need to ensure that smart card users are able to connect to RAS1 by using a dial-up connection. What should you do?()A、Install the network policy server (NPS) on the RAS1 server.B、Create a remote access policy that requires users to authenticate by using SPAP.C、Create a remote access policy that requires uses to authenticate by using EAP-TLS.D、Create a remote access policy that requires uses to authenticate by using MS-CHAPv2.

考题 Your corporate network has a member server named RAS1 that runs Windows Server 2008. You configure RAS1 to use the Routing and Remote Access Service (RRAS) The companys remote access policy allows members of the Domain Users group to dial in to RAS1. The company issues smart cards to all employees. You need to ensure that smart card users are able to connect to RAS1 by using a dial-up connection. What should you do?()A、 Install the Network Policy Server (NPS) on the RAS1 serverB、 Create a remote access policy that requires users to authenticate by using SPAPC、 Create a remote access policy that requires users to authenticate by using EAP-TLSD、 Create a remote access policy that requires users to authenticate by using MS-CHAP v2

考题 Your company has an Active Directory Domain Services (A D DS) domain. All servers run Windows Server 2008 R2. You provide access to some applications through a virtual desktop infrastructure (VDI) environment. All virtual desktop computers are located in an organizational unit (OU) named VirtualDesktops . All o ther client computer objects are located in an OU named Desktops. Many users experience long logon times when logging into virtual desktop computers due to large roaming profiles. You need to reduce the user logon times for virtual desktop computers. What should you do?()A、On each virtual desktop computer, set a disk quota on the system drive.B、On each client computer, set the temporary folders option to not use session - specific temporary folders.C、Create a Group Policy object (GPO) that enables folder red irection for all users. Enable loopback processing, and link the GPO to the VirtualDesktops OU.D、Create a Group Policy object (GPO) that enables folder redirection for all users. Enable slow link detection, and link the GPO to the VirtualDesktops OU.

考题 You have a computer named Computer1 that runs Windows XP Professional. Computer1 is a member of a workgroup. You need to prevent all users from encrypting files on Computer1. What should you do?() A、For all files, deny the Take ownership permission to the Everyone group. B、From the Local Security Policy, modify the Encrypting File System (EFS) properties.C、From the Certificates snap-in, delete the recovery agent certificate. D、From the Certificates snap-in, delete all trusted root certification authority (CA) certificates. 

考题 You upgrade five computers in the Finance organizational unit (OU) from Windows NT Workstation 4.0 to Windows 2000 Professional. The computers are used by members of the Finance OU to run financial Applications. All five computers are configured to have the default security settings. A user named Helene reports that she can no longer log run the financial applications on her Windows 2000 Professional computer. Prior to the upgrade, Helene was able to run the financial applications on her computer. Helene is a member of the local Users group. You want the financial applications to run on her computer. What should you do?()A、 Use Computer Management to configure separate memory space for each financial application on Helene’s computer.B、 Use Security Templates to edit the Security Policy to include the financial application onHelene’s computer. Then add Helene’s user account to the Power Users group on Helene’s computer.C、 Use Security Configuration and Analysis to reconfigure the default security policy .inf to allow financial  applications to run on Helene’s computer.D、 Use Secedit.exe to apply the Compatws.inf security template on Helene’s Security Policy toloosen the permissions for the local Users group on Helene’s computer.

考题 You have an Exchange Server 2010 organization. Your company’s compliance policy states the following:.Delete e-mail messages sent to legal department users that are older than 180 days. .Delete e-mail messages sent to all other users that are older than 60 days You need to recommend a solution that meets the requirements of the compliance policy. What should you recommend?()A、Configure deleted item retention for all users.B、Configure Personal Archives for the legal department users.C、Create two Managed Folder mailbox policies. Use one policy for the legal department users. Use the other policy for all other users.D、Create two new message classifications. Use one message classification for the e-mails sent to legal department users. Use the other message classification for the e-mails sent to all other users.

考题 单选题You wish to enable an audit policy for all database users, except SYS, SYSTEM, and SCOTT.You issue the following statements: SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYS;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYSTEM; SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SCOTT; For which database users is the audit policy now active?()A All users except SYSB All users except SCOTTC All users except sys and SCOTTD All users except sys, system, and SCOTT

考题 单选题You are the administrator of a SQL Server 2005 computer named SQL1. All servers run Microsoft Windows Server 2003 and belong to a Microsoft Active Directory domain. The companys written security policy mandates strong passwords for all domain, local, and application accounts. The appropriate domain password policy has been deployed through the use of a Group Policy object (GPO). Many of the company’s computers run MS-DOS-based or UNIX-based operating systems. These computers require varying levels of access to a database named Services on SQL1. You need to ensure that these computers can access the Services database without violating the company’s written security policy.  What should you do?()A Create a domain account for each of the company’s users. Provide each domain account with access to SQL1 and the Services database.B Create a local logon account on SQL1 for each of the company’s users. Provide each logon account with access to SQL1 and the Services database.C Create a SQL Server logon account for each of the company’s users. Enable the Enforce password policy option for each logon account. Provide each logon account with access to the Services database.D Configure a virtual directory through Internet Information Services (IIS) for access to SQL1. Direct users to the virtual directory for data access.E Create one SQL Server logon account for all of the company’s computers running MS-DOS or UNIX-based operating systems. Enable the Enforce password policy option for users’ accounts. Provide the logon accounts with access to the Services database.

考题 单选题You have a computer that runs Windows XP Professional Service Pack 2 (SP2). Five users share the computer. You need to allow pop-ups from the internal Web servers for all users of the computer. Pop-ups from other Web site must continue to be denied. You log on to the computer by using the local administrator account. What should you do next?()A Modify the Internet Explorer Pop-up Blocker settings. B Move all URLs from the local Web servers to the Internet Explorer Favorites list.C From the Local Computer Policy, modify the User Configuration settings.D From the Local Computer Policy, modify the Computer Configuration settings.

考题 单选题You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? ()A Enable the Require domain controller to unlock policy.B Set the Number of previous logons to cache policy to 0.  C Remove all user and group accounts from the Log on locally user right. D Remove all user and group accounts from the Access this computer from the network user right. 

考题 单选题You are the help desk manager for your company. The company network consists of a single Active Directory domain. All client computers run Windows XP Professional. All help desk technicians are members of the Help Desk Technicians group. They use Remote Assistance to remotely control user sessions to provide online support and training to users. The users currently use Windows Messenger to submit Remote Assistance invitations to the help desk technicians. You want to reduce the time required for help desk technicians to respond to Remote Assistance requests. To accomplish this goal, you want to configure the client computers to allow help desk technicians to establish a Remote Assistance session with a client computer without requiring an invitation from a user. What should you do?()A In the Default Domain Policy, set the Remote Assistance - Solicited Remote Assistance policy setting to Disabled. B In the Default Domain Policy, set the Remote Assistance - Offer Remote Assistance policy setting to Enabled and add the Help Desk Technicians group to the Helpers list. C In each computer's Local Security Policy, grant the Help Desk Technicians group the Allow logon through Terminal Services user right. D In the System properties for each computer, select the Allow users to connect remotely to this computer option, and add the Help Desk Technicians group to the list of allowed users. 

考题 单选题You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. Three member servers are configured as terminal servers. All three host confidential data. Currently, all network users are full-time employees, and all network users are allowed to log on to the terminal servers. TestKing hires 25 temporary employees. You create a user account for each one. You need to ensure that only full-time employees are allowed to log on to the terminal servers. What should you do?()A Modify the Default Domain Group Policy object (GPO).Configure a computer-level policy to prevent the temporary employees from connecting to the terminal servers.B Modify the Default Domain Group Policy object (GPO). Enable the user-level Terminal Server setting Sets rules for remote control of Terminal Services user sessions.C On the Terminal Services Profile tab of the user properties for each account, disable the option to log on to terminal servers.D In the security policy for domain controllers, disable the computer-level Terminal Server setting Allow users to connect remotely using the terminal server.

考题 单选题You need to design an authentication strategy for users of portable computers. Your solution must meet business requirements. What should you do?()A Issue smart cards and smart card readers to all portable computer users. Configure the domain to require smart cards for login and to log off users who remote their smart cardsB Configure the portable computers to connect to only wireless networks that use Wired Equivalent Privacy (WEP). Install digital certificates on all portable computersC Install computer certificates on all portable computers. Configure all portable computers to respond to requests for IPSec encryptionD Install biometric authentication devices on all portable computers. Configure the Default Domain Policy GPO to require complex passwords for all users

考题 单选题You have an Exchange Server 2010 organization.  All users on the network connect to their mailboxes by using Microsoft Office Outlook. Your companys compliance policy states that: .A copy of e-mail messages sent to the human resources department from the Internet must be archived .All archived e-mail messages must be stored on a third-party archival server  You need to recommend a solution that meets the requirements of the compliance policy.  What should you include in the solution?()A journal rulesB personal archivesC Retention PoliciesD Transport Protection Rules

考题 多选题You have a single Active Directory directory service domain. All users are located in an organizational unit (OU) named ContosoUsers. All client computer accounts are located in an OU named ContosoComputers. You need to deploy a new application to all users. The application shortcut must be available the next time the users log on. What are two possible ways to achieve this goal?()ACreate a Group Policy object (GPO) to publish the application. Link the GPO to the ContosoComputers OU.BCreate a Group Policy object (GPO) to assign the application. Link the GPO to the ContosoComputers OU.CCreate a Group Policy object (GPO) to publish the application. Link the GPO to the ContosoUsers OU.DCreate a Group Policy object (GPO) to assign the application. Link the GPO to the ContosoUsers OU.

考题 单选题Your network contains Exchange Server 2010 servers.  All users access their mailboxes by using Outlook Web App (OWA). Your companys compliance policy states the following: .All e-mail messages that contain customer contracts must be stored for three years .Users must be able to classify e-mail messages that relate to customer contracts .Users must be able to move e-mail messages to any folder  You need to recommend a solution that supports the requirements of the compliance policy.  What should you recommend?()A Managed Folder mailbox policiesB an OWA mailbox policyC Personal Archives and an Archive policyD Retention Policy Tags and a Retention Policy

考题 单选题You administer a Windows 2000 Professional computer that is shared by multiple users. You receive a phone call from one of the users of the shared computer that tells you that the computer is reporting a kernel stop error. You notice that a user has tried to install video drivers that have caused the computer to become unstable. You want to ensure that users can install only the drivers that are approved by the manufacturer.  What should you do? ()A Configure File signature verification to block driver installation, and set driver signing as a system default.B Remove all users from the Power User group.C Create a Local Computer Policy to prevent users from installing drivers.D Create a Local Computer Policy to enable Windows File Protection.

考题 单选题Start of repeated scenarioYou are an enterprise desktop support technician for Fabrikam, Inc. Active Directory InformationThe company has a main office and a branch office. The main office hosts all of the companys servers. The main office connects to the branch office by using a WAN link. The network contains a single Active Directory domain that has 500 users. The domain contains three domain controllers and an enterprise root certification authority (CA). All servers run Windows Server 2008 R2. All user accounts are in an organizational unit (OU) named Employees. The computer accounts for all desktop computers are in an OU named Desktops. The computer accounts for all portable computers are in an OU named Laptops. A startup script is deployed to all computers by using Group Policy objects (GPOs). Client ConfigurationsAll client computers run Windows 7 Enterprise. All users have desktop computers. All computers are members of the domain. All desktop computers use wired connections to connect to the network. All portable computers use wireless connections to connect to the network. The wireless network is secured by using EAP-TLS. Company policy states that all client computers must be configured by using DHCP. The company has an internal Web site. The Web site is configured to useSSL encryption and to require client certificates. All company users can access the internal Web site. End of repeated scenario Users in the branch office report slow network performance when they connect to the file shares in the main office. You need to recommend a solution to improve performance when users access the file shares from the branch office. The solution must minimize hardware costs. What should you recommend implementing?()A BranchCacheB DirectAccessC Distributed File System Replication (DFSR)D Universal Group Membership Caching

考题 单选题You have a portable computer that runs Windows 7. The computer is joined to a domain. Multiple users logon to the computer. You need to prevent the computer from displaying the username of the last user whologged on. What should you do?()A From Control Panel, modify the User Profiles settings.B From Control Panel, modify the Personalization settings.C From the local computer policy, add a policy template.D From the local computer policy, modify the local security policy.