网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You need to design a storage strategy that meets all business and technical requirements. What should you do?()
A

Create a storage group for each office. Within each storage group, create a single database

B

Create a storage group for each region. Within each storage group, create a single database

C

Create a storage group for each region. Within each storage group, create separate databases for each office in that region

D

Create a single storage group. Within that storage group, create a separate database for each office


参考答案

参考解析
解析: 暂无解析
更多 “单选题You need to design a storage strategy that meets all business and technical requirements. What should you do?()A Create a storage group for each office. Within each storage group, create a single databaseB Create a storage group for each region. Within each storage group, create a single databaseC Create a storage group for each region. Within each storage group, create separate databases for each office in that regionD Create a single storage group. Within that storage group, create a separate database for each office” 相关考题
考题 The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()A、On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policyB、On all client computers, implement logon auditing for all user account logonsC、On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policyD、On all domain controllers, implement logon auditing for all user account logons

考题 Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2008 R2. All servers run Windows Server 2008 R2.   A corporate security policy requires complex passwords for user accounts that have administrator  privileges. You need to design a strategy that meets the following requirements: èEnsures that administrators use complex passwords   èMinimizes the number of servers required to support the solution What should you include in your design?()A、Implement Network Access Protection (NAP).B、Implement Active Directory Rights Management Services (AD RMS).C、Create a new Password Settings Object (PSO) for administrator accounts.D、Create a new child domain in the forest. Move all non-administrator accounts to the new domain.Configure a complex password policy in the root domain.

考题 You need to design a configuration for Exchange Server storage that meets the business and technical requirements. What should you do?()A、Create a single storage group. Create one database for all usersB、Create two storage groups. In each storage group, create one database. Place mailboxes for remote users in one storage group database, and place all other mailboxes in the other storage group databaseC、Create two storage groups. In each storage group, create one database. Place executive mailboxes in one storage group database, and place all other mailboxes in the other storage group databaseD、Create two storage groups. In one storage group, create a database, and place all mailboxes for remote users and executives in the database. In the other storage group, create a database for all other mailboxes

考题 You need to recommend a solution for managing the shared folders that meets the company’s technical requirements.   What should you include in the recommendation?()A、Computer ManagementB、File Server Resource Manager (FSRM)C、Share and Storage ManagementD、Storage Explorer

考题 You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. TestKing.com is configured to run an exchange 2010 environment.  You are planning to design the installation of numerous Mailbox servers. TestKing.com Service LevelAgreement (SLA) requires the following: * The servers need to support 1,500 concurrent connections to mailboxes.* The servers need to maintain a latency of less than 20 milliseconds. You ensure deployment success you need to ensure that your design comply with the Service LevelAgreement (SLA) of TestKing.com. What should you do?()A、The best option is to use the Exchange Server User Monitor (ExMon) tool to check if your design meets the requirements.B、The best option is to use the Exchange Server Load Generator (LoadGen) 2010 tool to check if your design meets the requirements.C、The best option is to use the Exchange Server Connectivity Analyzer (ExRCA) tool to check if your design meets the requirements.D、The best option is to use the Exchange Server Jetstress 2010 tool to check if you design meets there quirements.

考题 You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()A、Require client computers to connect to the marketing application by using a VPN connectionB、Use IPSec to encrypt communications between the servers in the New York and Atlanta officesC、Require the high security setting on Terminal Services connections to the marketing applicationD、Configure all marketing application Web pages to require SSL

考题 Your company includes mobile computer users who frequently work offline. You are planning to deploy Windows 7 by using an image.   You have the following requirements:   Provide access to all applications when mobile computer users first start their computers. Minimize network and local storage requirements.  Provide language-pack support based on the geographic location of the user.    You need to ensure that your image-creation strategy meets the requirements.   What should you do?()A、Create a single thin image for all computers.B、Create a single hybrid image for all computers.C、Create one thin image for the mobile computers. Create one thick image for all other computers.D、Create one thick image for the mobile computers. Create one thin image for all other computers.

考题 You need to recommend a monitoring solution for the file server that meets the technical  requirements.   What should you include in the recommendation?()A、Data Collector SetsB、File Server Resource Manger quotasC、File Server Resource Manger storage reportsD、NTFS disk quotas

考题 Your network contains an Active Directory domain. All domain controllers run Windows Server 2008 R2 Service Pack 1 (SP1). You need to recommend a design for the Hyper-V host infrastructure that meets the following requirements: - Maximizes storage performance. - Remains available if a host server fails. - Minimizes hardware and software costs. - Supports redundant access to shared storage. What should you include in the recommendation?()A、Failover ClusteringB、Remote Desktop Services (RDS)C、Microsoft System Center Virtual Machine Manager 2008 R2D、a Storage Area Network (SAN)E、Network Attached Storage (NAS)F、Network Load Balancing (NLB)G、Multipath I/O

考题 You need to design a strategy for managing the messages that are sent to the customer service mailboxes. What should you do?()A、Create a separate storage group and database to contain the customer service mailboxes. Enable circular logging for this storage groupB、Create a separate storage group and database to contain the customer service mailboxes. Set the deleted item retention period for this database to zeroC、Place the customer service mailboxes on a new mailbox store in the storage group that contains the main office user mailboxes. Enable circular logging for this storage groupD、Place the customer service mailboxes on a new mailbox store in the storage group that contains the branch office user mailboxes. Set the deleted item retention period for this database to zero

考题 You plan to deploy a distributed database application that runs on multiple Windows Server 2008 R2  servers.   You need to design a storage strategy that meets the following requirements: èAllocates storage to servers as required  èUses the existing network infrastructure èUses standard Windows management tools   èEnsures that data is available if a single disk fails What should you include in your design?()A、An iSCSI disk storage subsystem that supports Microsoft Multipath I/O. Configure the storage  subsystem as a RAID?0 array.B、An iSCSI disk storage subsystem that supports Virtual Disk Service (VDS). Configure the storageubsystem as a RAID?5 array.C、A Fibre Channel (FC) disk storage subsystem that supports Microsoft Multipath I/O. Configure the  storage subsystem as a RAID?0 array.D、A Fibre Channel(FC)disk storage subsystem that supports the Virtual Disk Service(VDS).Configure  the storage subsystem as a RAID?5 array.

考题 Your company has a single Active Directory Domain Services (AD DS) domain with Windows Server 2008 R2 member servers and 1,000 Windows 7 client computers. You are designing the deployment of a custom application.   You have the following requirements:   The application must be available to only users who need it. Minimize network traffic during deployment.   You need to design a deployment strategy that meets the requirements.   Which deployment method should you use?()A、RemoteApp and Desktop ConnectionsB、software installation in Group PolicyC、Microsoft Application Virtualization (App-V)D、Microsoft System Center Configuration Manager 2007

考题 You need to recommend a file recovery solution that meets the company's technical requirements. What should you include in the recommendation?()A、Distributed File System (DFS) ReplicationB、File Server Resource Manager (FSRM) active file screensC、shadow copiesD、Windows Storage Server 2008

考题 You need to recommend a security strategy for WebApp2 that meets the company’s applicaton  requirements.What should you include in the recommendation?()A、Basic authentication and connection security rulesB、Basic authentication and SSLC、Digest authentication and connection security rulesD、Digest authentication and SSL

考题 You need to design a password policy that meets business requirements. What should you do? Select all that apply.()A、Increase the number of passwords that are rememberedB、Disable reversible encryptionC、Set the minimum password age to zero daysD、Increase the maximum password age

考题 You need to design a strategy to ensure that all servers are in compliance with the business requirements for maintaining security patches. What should you do?()A、Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the domainB、Log on to each server and run Security Configuration and Analysis to analyze the security settings by using a custom security templateC、Create a logon script to run the secedit command to analyze all servers in the domainD、Run the Microsoft Baseline Security Analyzer (MBSA) on a server to scan for Windows vulnerabilities on all servers in the domain

考题 You need to recommend a data management solution that meets the company’s technical requirements.   What should you include in the recommendation?()A、DFS ManagementB、File Server Resource Manager (FSRM)C、Share and Storage ManagementD、Storage Explorer

考题 单选题You need to design a security strategy for a remote e-mail access. What should you do?()A Require remote users to access e-mails by using Outlook Mobile AccessB Require Outlook Web Access users to install the secure MIME ActiveX-Control and to encrypt all messagesC On Outlook Web Access servers that accept connections from the Internet configure IIS to require SSL for all connectionsD On Outlook Web Access servers that accept connections from the Internet configure IIS to require Integrated Windows Authentication

考题 单选题You plan to deploy a distributed database application that runs on Windows Server 2008 R2. You need to design a storage strategy that meets the following requirements: èAllocates storage to servers as required   èIsolates storage traffic from the existing network   èEnsures that data is available if a single disk fails   èEnsures that data is available if a single storage controller fails What should you include in your design?()A An iSCSI disk storage subsystem that uses Microsoft Multipath I/O. Configure a RAID?0 array.B An iSCSI disk storage subsystem that uses Virtual Disk Service (VDS). Configure a RAID?5 array.C A Fibre Channel (FC) disk storage subsystem that uses Microsoft Multipath I/O. Configure a RAID?5  array.D A Fibre Channel(FC)disk storage subsystem that uses Virtual Disk Service(VDS).Configure a RAID?0 array.

考题 单选题The company is evaluating using a new Active Directory domain to contain all customer user accounts. You need to design a monitoring or logging strategy that meets business and security requirements for the new Web-based ordering application. Your solution must minimize overhead on existing domain controllers and servers.  What should you do?()A Enable logon auditing in both the new and the existing domainsB Enable logon auditing only in the existing domainC Enable logon auditing only in the new domainD Enable logon auditing on only the Web server

考题 多选题You need to design a strategy to increase security for the client computers in the finance department. Which two actions should you perform?()AEnable automatic certificate enrollmentBEnforce smart card logonsCEnable Encrypting File System (EFS) for offline filesDEnable a screen saver password

考题 单选题You need to recommend a strategy for the file servers that meets the company’s technical requirements.   What should you recommend?()A Implement active file screens.B Implement passive file screens.C Configure classification rules.D Configure File Server Resource Manager (FSRM) quotas.

考题 多选题You administer a SQL Server 2008 instance. You deploy a new database named Engineering. The Engineering database manages large documents that will be revised occasionally. You need to design a table structure that allows fast read access. You also need to minimize storage space requirements.  Which two actions should you perform?()AUse NTFS file system compression on the volume.BUse row-level compression on the document table.CUse varbinary(MAX) data type with FILESTREAM storage.DEnable row-level compression on all columns that use the vardecimal() data type.

考题 单选题You need to recommend a solution for managing the shared folders that meets the company’s technical requirements.   What should you include in the recommendation?()A Computer ManagementB File Server Resource Manager (FSRM)C Share and Storage ManagementD Storage Explorer

考题 单选题The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()A On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policyB On all client computers, implement logon auditing for all user account logonsC On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policyD On all domain controllers, implement logon auditing for all user account logons

考题 多选题Your network contains an Active Directory domain. All domain controllers run Windows Server 2008 R2 Service Pack 1 (SP1). You need to recommend a design for the Hyper-V host infrastructure that meets the following requirements: - Maximizes storage performance. - Remains available if a host server fails. - Minimizes hardware and software costs. - Supports redundant access to shared storage. What should you include in the recommendation?()AFailover ClusteringBRemote Desktop Services (RDS)CMicrosoft System Center Virtual Machine Manager 2008 R2Da Storage Area Network (SAN)ENetwork Attached Storage (NAS)FNetwork Load Balancing (NLB)GMultipath I/O

考题 单选题You need to design a storage strategy that meets all business and technical requirements. What should you do?()A Create a storage group for each office. Within each storage group, create a single databaseB Create a storage group for each region. Within each storage group, create a single databaseC Create a storage group for each region. Within each storage group, create separate databases for each office in that regionD Create a single storage group. Within that storage group, create a separate database for each office

考题 单选题You need to recommend a data management solution that meets the company’s technical requirements.   What should you include in the recommendation?()A DFS ManagementB File Server Resource Manager (FSRM)C Share and Storage ManagementD Storage Explorer