网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
You deploy Windows 7 and several custom Internet Explorer add-ons to 1,000 client computers. Internet Explorer closes when users run a specific Web application. You need to find out whether an add-on is the cause of the problem. What should you do?()
A
Start Internet Explorer in No Add-ons mode.
B
Reset all Internet Explorer security zones to the default levels.
C
Use Group Policy to turn on Internet Explorer 7 Standards mode.
D
Use Group Policy to disable the Programs tab in Internet Explorer for all client computers.
参考答案
参考解析
解析:
暂无解析
更多 “单选题You deploy Windows 7 and several custom Internet Explorer add-ons to 1,000 client computers. Internet Explorer closes when users run a specific Web application. You need to find out whether an add-on is the cause of the problem. What should you do?()A Start Internet Explorer in No Add-ons mode.B Reset all Internet Explorer security zones to the default levels.C Use Group Policy to turn on Internet Explorer 7 Standards mode.D Use Group Policy to disable the Programs tab in Internet Explorer for all client computers.” 相关考题
考题
You are using Microsoft Windows Internet Explorer 7 on your computer. You need to print only the graphic on a Web page.How should you print the graphic?()
A.AB.BC.CD.D
考题
You have a computer that runs Windows Vista.You need to ensure that the temporary Internet files are deleted when you close Windows Internet Explorer.What should you do?()
A.AB.BC.CD.D
考题
You have a computer that runs Windows Vista.You need to restore the default Windows Internet Explorer settings for the internal network. You want to maintain the current settings for the Internet.What should you do on the Internet Explorer Security tab?()A.AB.BC.CD.D
考题
You have a portable computer that runs Windows Vista.You use Windows Internet Explorer 7 to browse to a Web site that is Really Simple Syndication (RSS)-enabled.You need to configure Internet Explorer 7 so that you can view the site’s headlines when the computer is offline.What should you do?()A.AB.BC.CD.D
考题
Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows Vista computers. You are planning to deploy Windows 7 and a custom application. You have the following requirements: The application must be available to only a specific group of users. You must be able to monitor application usage. You need to design a deployment method for the custom application that meets the requirements. Which deployment method should you use in your design?()A、software installation in Group PolicyB、startup scripts in Group PolicyC、Microsoft Application Virtualization (App-V)D、baseline Windows 7 image that includes the custom application
考题
You share your computer with other users. You install a new Microsoft Windows Internet Explorer add-on to view videos on the computer. You discover that this add-on conflicts with existing add-ons that other users frequently require. You need to ensure that you are able to view videos without affecting other users. What should you do?()A、Uninstall the new Windows Internet Explorer add-on.B、Log on as an administrator and disable the new Windows Internet Explorer add-on.C、Direct other users to log on and disable the new Windows Internet Explorer add-on.D、Select the Turn off Automatic Website Checking option for the Phishing filter.
考题
Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers. You are planning to deploy Windows 7 Enterprise to the client computers. You need to design a zero-touch installation strategy.()A、unattended installationB、custom Windows 7 image on DVDC、Windows Deployment Services (WDS)D、Microsoft System Center Configuration Manager 2007 R2
考题
You need to recommend changes to the existing environment that meet the company’s security requirements for the file server on the main campus. What should you recommend?()A、Deploy Network Policy Server (NPS) and create a network policy.B、Deploy Print and Document Services and create a custom printer filter.C、Deploy File Server Resource Manager (FSRM) and create a file classification rule.D、Deploy Active Directory Rights Management Services (AD RMS) and create an AD RMS rights policy template.
考题
Your network has client computers that run Windows XP. Users do not have administrative rights to their local computers. You use Windows Server Update Services (WSUS) to manage software updates. You are planning to deploy Windows 7. Your company uses a custom application that is not compatible with Windows?7. You need to ensure that all users are able to run the custom application. What are two possible ways to achieve this goal?()A、Deploy and register the compatibility-fix database file to the client computers by using a user startup script.B、Deploy and register the compatibility-fix database file to the client computers by using a computer startup script.C、Install and register a shim on the client computers by using Group Policy.D、Install and register a shim on the WSUS server.
考题
Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows 7 computers. You are planning to deploy a custom application. You need to schedule the deployment to occur outside of business hours and without user interaction. Which deployment method should you choose?()A、software installation with Group PolicyB、Microsoft Application Virtualization (App-V)C、Lite Touch InstallationD、software deployment with Microsoft System Center Configuration Manager 2007
考题
You deploy Windows 7 to the computers that are used by your company’s Web developers. All Web developer user accounts are in a single organizational unit (OU). Internet Explorer is blocking pop-up windows for multiple internal Web applications that are hosted on different servers. You need to use Group Policy to ensure that Internet Explorer does not block pop-up windows for internal Web applications. What should you do?()A、Add each server to the Intranet zone.B、Add each server to the Trusted Sites zone.C、Enable Compatibility View in Internet Explorer.D、Set the default security setting in Internet Explorer to Medium.
考题
Your company has 1,000 client computers that run Windows 7. The company uses several custom line-of-business applications that are not compatible with Windows 7. You need to distribute a Microsoft Enterprise Desktop Virtualization (MED-V) v2 virtual machine (VM) image that includes the custom applications to all Windows 7 client computers. What should you do?()A、Deploy the VM image from the MED-V server.B、Mount the VM image from the MED-V workspace.C、Deploy the VM image by using Windows Deployment Services (WDS).D、Deploy the VM image by using Windows Server Update Services (WSUS).
考题
Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers. You are planning to deploy Windows 7 Enterprise to the client computers. You need to design a custom image that will enable users to connect to a Telnet server. What should you do?()A、 Configure Windows Firewall to allow the Telnet program through Windows Firewall before capturing the image.B、 Change User Account Control settings before capturing the image.C、 Turn on the Telnet Server feature in the image.D、 Turn on the Telnet Client feature in the image.
考题
You use Group Policy to standardize Internet Explorer settings on Windows 7 client computers. Users occasionally change the Internet Explorer settings on individual client computers. The company wants to maintain a standard Internet Explorer configuration on all client computers. You need to ensure that the standard Internet Explorer configuration is in place each time users log on to client computers. What should you do?()A、Enable User Group Policy loopback processing mode.B、Use the Group Policy Update utility to refresh Group Policy.C、Enable Internet Explorer Maintenance Policy Processing in Group Policy.D、Use Group Policy to disable the Advanced tab of the Internet Explorer Properties dialog box.
考题
单选题You need to reduce the level of access that a malicious Web site might have to your computer. What should you do? ()A
Start a Windows Defender scan.B
Enable Microsoft Windows Internet Explorer Phishing Filter.C
Enable Microsoft Windows Internet Explorer Pop-up Blocker.D
Confirm that Microsoft Windows Internet Explorer Protected Mode is enabled on the Internet security zone.
考题
单选题You are planning to deploy Windows 7. You have a custom line-of-business application that is not compatible with Windows 7. You need to design a solution that allows the application to run. What should you do?()A
Use the Setup Analysis Tool.B
Use the Compatibility Administrator.C
Use the Update Compatibility Evaluator.D
Use the Windows Compatibility Evaluator.
考题
多选题You create a Windows 7 deployment image that includes custom Internet Explorer branding and search providers. Your company decides to deploy all custom settings by using Group Policy. You need to restore the Internet Explorer settings in the deployment image to the Microsoft default settings. Which two actions should you perform?()AUse the Reset Internet Explorer Settings (RIES) feature, and run the Reset process on the deployment image.BUse the Reset Internet Explorer Settings (RIES) feature, and run the Remove Branding process on the deploymentimage.CUpdate the Internet Explorer Maintenance policy processing Group Policy object (GPO) settings for all computers.DUpdate the Internet Explorer Manage Add-ons settings for all computers.
考题
单选题You need to remove any Microsoft Windows Internet Explorer 7 add-ons in Microsoft Windows Vista computers that do not have prior approval from the following authorities: Microsoft System manufacturer Service provider What should you do? ()A
Remove any add-ons that are not found in the list of downloaded ActiveX controls.B
Remove any add-ons that are not found in the list of add-ons used by Windows Internet Explorer 7.C
Remove any add-ons that are not found in the list of add-ons that run without requiring permission.D
Remove any add-ons that are not found in the list of add-ons that are at present loaded in Windows Internet Explorer 7.
考题
单选题Your network has client computers that run Windows 7. A custom Web-based application requires specific security settings. You need to prevent users from permanently modifying their Internet Explorer browser’s security settings. What should you do?()A
Use Windows Internet Explorer Maintenance (IEM) extension settings in Preference mode.B
Use Windows Internet Explorer Maintenance (IEM) extension settings in Normal mode.C
Reset the Internet Explorer settings.D
Restore the advanced settings in Internet Explorer.
考题
单选题Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers. You are planning to deploy Windows 7 Enterprise to the client computers. You need to design a custom image that will enable users to connect to a Telnet server. What should you do?()A
Configure Windows Firewall to allow the Telnet program through Windows Firewall before capturing the image.B
Change User Account Control settings before capturing the image.C
Turn on the Telnet Server feature in the image.D
Turn on the Telnet Client feature in the image.
考题
单选题Your company has 1,000 computers in the main office and 20 computers in store kiosks.All the computers run Windows 7 Enterprise. The kiosk computers do not have network connections. The company brands the Internet Explorer program window on all computers by displaying the company logo at the left end of the title bar. The company changes its logo. You have the following requirements: Display the new logo on the Internet Explorer program window title bar on the main office computers and the kiosk computers. Modify the search providers that are available to main office computers. You need to define Internet Explorer settings to support the requirements. What should you do?()A
Save the logo as Logo.png and copy the file to the C:///Windows/Branding/ directory on each kiosk computer. Createand distribute a new OpenSearch description file for the main office computers.B
Use the Internet Explorer Administration Kit (IEAK) to create a custom configuration-only deployment package on the main office computers. Enable automatic version synchronization and specify a flash drive for the path. Distribute the configuration package to the kiosk computers.C
Use the Internet Explorer Administration Kit (IEAK) to create a custom configuration-only deployment package on the main office computers. Create a deployment CD for the kioskcomputers.D
Use the Internet Explorer Administration Kit (IEAK) to create a custom configuration-only deployment package. Copy the setup file to a flash drive,and distribute the file to all computers.
考题
单选题You have a computer that runs Windows 7. You need to prevent ActiveX controls from running in WindowsInternet Explorer. Which Internet Explorer settings should you modify?()A
ContentB
EncodingC
SafetyD
Security
考题
单选题You have a computer named Computer1 that runs Windows 7 and Windows Internet Explorer 8. A userreports that Computer1 has a number of Internet Explorer configuration issues that cause instability whenbrowsing the Internet. You need to configure Internet Explorer to use all default settings. What should youdo from Internet Options?()A
From the Advanced tab, click Reset.B
From the Programs tab, click Set programs.C
From the Advanced tab, click Restore advanced settings.D
From the Security tab, click Reset all zones to default level.
考题
单选题You have a computer that runs Windows 7. You open Windows Internet Explorer and access a Web site asshown in the exhibit. (Click the Exhibit button.) You click the Suggested Sites button, but the suggestions failto display. You need to obtain suggested sites. What should you do?()A
From the Page menu, enable Caret Browsing.B
From the Safety menu, disable the SmartScreen Filter.C
From the Start menu, open a new Internet Explorer window.D
From the Microsoft Corporation Web site, refresh the Suggested Sites Web Slice.
考题
单选题Your network has client computers that run Windows 7 Enterprise. You plan to deploy new administrative template policy settings by using custom ADMX files. You create the custom ADMX files, and you save them on a network share. You start Group Policy Object Editor (GPO Editor). The custom ADMX files are not available in the Group Policy editing session. You need to ensure that the ADMX files are available to the GPO Editor. What should you do?()A
Set the network share permissions to grant all Windows 7 users Read access for the share.B
Copy the ADMX files to the central store,and then restart the GPO Editor.C
Copy the ADMX files to the %systemroot%/inf folder on each Windows 7 computer,and then restart the GPO EditorD
Copy the ADMX files to the %systemroot%/system32 folder on each Windows 7 computer,and then restart the GPO Editor.
考题
单选题You have a computer that runs Windows 7 and Windows Internet Explorer 8. A user named User1 attemptsto access a Web page. User1 fails to access the Web page and receives an error message stating that thepage does not have a rating. You need to configure Internet Explorer to allow User1 to access Web pagesthat do not have a rating. Which settings should you modify?()A
Content AdvisorB
InPrivate FilteringC
Parental ControlsD
Restricted sites
考题
单选题You have a computer that runs Windows 7 and Windows Internet Explorer 8. You open Internet Explorerand access a Web site. The Web site displays a page that has misaligned text and graphic images. Youverify that the Web page displays correctly in previous versions of Internet Explorer. You need to view theWeb page correctly. What should you do?()A
Modify the text size.B
Enable Caret Browsing.C
Enable Compatibility View.D
Disable the SmartScreen Filter.
热门标签
最新试卷