网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You need to design a patch management strategy for Southbridge Video. Your solution must meet business requirements. What should you do?()
A

Configure all client computers to use Automatic Updates to obtain security patches from the Windows Update Web site. Test and install all patches

B

Configure a batch file to download security patches daily. Distribute the security patches by using a.zap file and the Default Domain Policy Group Policy object (GPO)

C

Deploy a Software Update Services (SUS) server. Test all security patches and then approve them. Configure all client computers to automatically obtain updates from the server

D

Configure a batch file to download security patches daily. Manually install the security patches on all computers


参考答案

参考解析
解析: 暂无解析
更多 “单选题You need to design a patch management strategy for Southbridge Video. Your solution must meet business requirements. What should you do?()A Configure all client computers to use Automatic Updates to obtain security patches from the Windows Update Web site. Test and install all patchesB Configure a batch file to download security patches daily. Distribute the security patches by using a.zap file and the Default Domain Policy Group Policy object (GPO)C Deploy a Software Update Services (SUS) server. Test all security patches and then approve them. Configure all client computers to automatically obtain updates from the serverD Configure a batch file to download security patches daily. Manually install the security patches on all computers” 相关考题
考题 At which stage of the service lifecycle should the processes necessary to operate a new service be defined? ( ) 。A.Service design: Design the processes B.Service strategy: Develop the offerings C.Service transition: Plan and prepare for deployment D.Service operation: IT operations management

考题 The purpose of the systems analysis phase is to build a logical model of the new system.The first step is(71),where you investigate business processes and document what the new system must do to satisfy users. This step continues the investigation that began during the(72). You use the fact-finding results to build business models,data and process models,and object models. The deliverable for the systems analysis phase is the(73),which describes management and user requirements,costs and benefits,and outlines alternative development strategies.The purpose of the systems design phase is to create a physical model that will satisfy all documented requirements for the system. During the systems design phase,you need to determine the(74),which programmers will use to transform the logical design into program modules and code. The deliverable for this phase is the(75),which is presented to management and users for review and approval.A.system charter B.system scope definition C.system blueprint D.system requirements document

考题 The purpose of the systems analysis phase is to build a logical model of the new system.The first step is(71),where you investigate business processes and document what the new system must do to satisfy users. This step continues the investigation that began during the(72). You use the fact-finding results to build business models,data and process models,and object models. The deliverable for the systems analysis phase is the(73),which describes management and user requirements,costs and benefits,and outlines alternative development strategies.The purpose of the systems design phase is to create a physical model that will satisfy all documented requirements for the system. During the systems design phase,you need to determine the(74),which programmers will use to transform the logical design into program modules and code. The deliverable for this phase is the(75),which is presented to management and users for review and approval.A.systems planning phase B.systems modeling phase C.systems analysis phase D.systems design phase

考题 Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2008 R2. All servers run Windows Server 2008 R2.   A corporate security policy requires complex passwords for user accounts that have administrator  privileges. You need to design a strategy that meets the following requirements: èEnsures that administrators use complex passwords   èMinimizes the number of servers required to support the solution What should you include in your design?()A、Implement Network Access Protection (NAP).B、Implement Active Directory Rights Management Services (AD RMS).C、Create a new Password Settings Object (PSO) for administrator accounts.D、Create a new child domain in the forest. Move all non-administrator accounts to the new domain.Configure a complex password policy in the root domain.

考题 You design a Business Intelligence (BI) solution by using SQL Server 2008. You plan to design the report strategy for a new report project that will be used by a financial application. The application uses five calculations that are implemented in Microsoft .NET Framework 3.5 assemblies. The assemblies are written in the C# language and use the static methods. You need to ensure that the calculations can be used by the expressions in all reports. You also need to ensure consistency within the reports by using the least amount of development effort. What should you do?()A、 Add a reference to the assemblies in the Report Properties References tab. B、 Write the calculation logic used by the calculations by using T-SQL functions. C、 Write the code of the calculation logic into the Report Properties Custom Code tab.D、 Write the calculation logic in each report by using the mathematical functions available natively to SQL Server 2008 Reporting Services (SSRS).

考题 You need to design a certificate management process for internal users. What should you do?()A、Establish a Web enrollment service for internal users to request access to resourcesB、Grant Enrollment Agent rights to usersC、Establish enrollment stations and store user certificates in a smart cardD、Create Connection Manager scripts to identify the client computer operating system, and configure Web proxy settings to specify the appropriate Web enrollment service

考题 You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()A、Require client computers to connect to the marketing application by using a VPN connectionB、Use IPSec to encrypt communications between the servers in the New York and Atlanta officesC、Require the high security setting on Terminal Services connections to the marketing applicationD、Configure all marketing application Web pages to require SSL

考题 You need to design a method to log changes that are made to servers and domain controllers. You also need to track when administrators modify local security account manager objects on servers. What should you do?()A、Enable failure audit for privilege user and object access on all servers and domain controllersB、Enable success audit for policy change and account management on all servers and domain controllersC、Enable success audit for process tracking and logon events on all servers and domain controllersD、Enable failure audit for system events and directory service access on all servers and domain controllers

考题 You need to design a method to address the chief information officer’s security concerns. What should you do?()A、Configure Windows Management Instrumentation (WMI) filtering options in the Default Domain Policy GPOB、Use the gpresult commandC、Use Mbsacli.exeD、Configure software restriction policy options in the Default Domain Policy GPO

考题 You need to design an e-mail access strategy for remote users. What should you do? () A、 Instruct remote users to connect to their e-mail by using RPCB、 Instruct remote users to connect to Outlook Web Access by using only HTTPSC、 Instruct remote users to connect to the company network by using PPTP connectionsD、 Instruct remote users to connectd to their e-mail by using RPC over HTTP Configure the HTTP servers to require encryption.

考题 You need to design a security patch management strategy. Your solution must meet business and security requirements, and it must accommodate the company’s resource restrictions. What should you do?()A、Test and manually deploy updatesB、Deploy a Software Update Services (SUS) server. Test all updates and then approve them. Configure all client computers to automatically obtain updates from the serverC、Test all updates and then use a third-party utility to repackage updates in a Windows Installer file. Deploy the -.msi files by using Group PolicyD、Configure all client computers to use Automatic Updates to obtain security updates from the Windows Update Web site. Test all updates posted to the Windows Update Web site

考题 You plan to deploy a distributed database application that runs on multiple Windows Server 2008 R2  servers.   You need to design a storage strategy that meets the following requirements: èAllocates storage to servers as required  èUses the existing network infrastructure èUses standard Windows management tools   èEnsures that data is available if a single disk fails What should you include in your design?()A、An iSCSI disk storage subsystem that supports Microsoft Multipath I/O. Configure the storage  subsystem as a RAID?0 array.B、An iSCSI disk storage subsystem that supports Virtual Disk Service (VDS). Configure the storageubsystem as a RAID?5 array.C、A Fibre Channel (FC) disk storage subsystem that supports Microsoft Multipath I/O. Configure the  storage subsystem as a RAID?0 array.D、A Fibre Channel(FC)disk storage subsystem that supports the Virtual Disk Service(VDS).Configure  the storage subsystem as a RAID?5 array.

考题 Your company has a single Active Directory Domain Services (AD DS) domain with Windows Server 2008 R2 member servers and 1,000 Windows 7 client computers. You are designing the deployment of a custom application.   You have the following requirements:   The application must be available to only users who need it. Minimize network traffic during deployment.   You need to design a deployment strategy that meets the requirements.   Which deployment method should you use?()A、RemoteApp and Desktop ConnectionsB、software installation in Group PolicyC、Microsoft Application Virtualization (App-V)D、Microsoft System Center Configuration Manager 2007

考题 Your company has a branch office that contains a Windows Server 2008 R2 server. The server runs Windows Server Update Services (WSUS).   The company opens four new satellite offices. Each satellite office connects to the branch office by using a dedicated WAN link. You need to design a strategy for patch management that meets the following  requirements:   èWSUS updates are approved from a central location.   èWAN traffic is minimized between the branch office and the satellite offices. What should you include in your design?()A、In each satellite office, install a WSUS server. Configure each satellite office WSUS server as a replica of the branch office WSUS server.B、In each satellite office, install a WSUS server. Configure each satellite office WSUS server as an autonomous server that synchronizes to the branch office WSUS server.C、On the branch office WSUS server, create a computer group for each satellite office. Add the client computers in each satellite office to their respective computer groups.D、For each satellite office,create an organizational unit(OU).Create and link a Group Policy object(GPO)to each OU. Configure different schedules to download updates from the branch office WSUS  server to the client computers in each satellite office.

考题 单选题You need to design an access control strategy for the Payment folder for the Sales Managers group. What should you do?()A Use IPSec in transport modeB Use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV)C Use PEAP-EAP-TLSD Use Encrypting File System (EFS) remote encryption

考题 多选题You need to design a strategy to increase security for the client computers in the finance department. Which two actions should you perform?()AEnable automatic certificate enrollmentBEnforce smart card logonsCEnable Encrypting File System (EFS) for offline filesDEnable a screen saver password

考题 单选题You are designing a group management strategy for users in the finance department. You need to  identify the appropriate changes that need to be made to the current group management strategy. You want to accomplish this goal by using the minimum number of groups.  What should you do?()A  Add the finance users to the financeData group to which the necessary permissions have been assigned.B  Add the finance users to the financeGG group to which the necessary permissions have been assigned.C  Add the finance users to the financeGG group. Then add the financeGG group to the financeData group to which the necessary permissions have been assigned.D  Add the finance users to the financeGG group. Add the financeGG group to the financeUG group to the financeDat group to which the necessary permissions have been assigned.

考题 单选题You need to recommend a Group Policy strategy for the Remote Desktop servers. What should you include in the recommendation?()A block inheritanceB loopback processingC security filteringD WMI filtering

考题 单选题You need to design a patch management strategy that meets business requirements. What should you do?()A Install Systems Management Server (SMS) on a computer on the internal network. Use the Default Domain Policy GPO to distribute the SMS client software to all computers in the domainB Install Microsoft Operations Manager (MOM) on a computer on the internal network. Use the Default Domain Policy GPO to distribute the MOM client software to all computers in the domainC Install Software Update Services (SUS) on a Web server, and configure it to synchronize and approve updates nightly. Configure client computers to receive automatic updates from the Web server. Ensure that users restart their client computers dailyD Install Software Update Services (SUS) on a domain controller, and configure it to synchronize and approve updates nightly. Configure client computers to receive automatic updates from the domain controller. Ensure that users restart their client computers daily

考题 单选题Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers.  You are planning to deploy Windows 7 Enterprise to the client computers.    You need to design a zero-touch installation strategy.()A unattended installationB custom Windows 7 image on DVDC Windows Deployment Services (WDS)D Microsoft System Center Configuration Manager 2007 R2

考题 单选题You need to design the consolidation strategy for the Promotions and Partners databases. You want to choose a strategy that results in the best database performance while maintaining the permissions of end users in each database.What consolidation strategy should you choose?()A Place each database in a separate instance running on SQL2.B Place each database in a separate instance running on SQL3.C Place both databases in a single instance running on SQL2.D Place both databases in a single instance running on SQL3.

考题 单选题You are designing a strategy for migrating domain user accounts to the new Windows Server 2003 Active Directory environment. You want to identify the minimum number of trust relationships that need to be manually created to perform this operation.  Which design should you use? ()A  one external trust relationshipB  two external trust relationshipsC  six external trust relationshipsD  twelve external trust relationshipsE  one two-way cross-forest trust relationship

考题 单选题You need to design a group membership strategy for the EditorialAdmins group. What should you do?()A Move the EditorialAdmins group to the Servers OU in the editorial departmentB Move the members of the EditorialAdmins group to the Editorial OUC Move the members of the EditorialAdmins group to the New York OUD Move the EditorialAdmins group to the New York OU

考题 单选题Your company has client computers that run Windows Vista.   The company plans to upgrade the Windows Vista computers to Windows 7.   The current configuration of all client computers in your company is based on a common Windows Vista image.   Some branch offices use WAN connections to connect to the main office. You have the following requirements:   Transfer all user data from the original Windows Vista installation to the new Windows 7 installation.  Use the least amount of bandwidth while transferring the user data.  Support the same migration strategy for all offices.    You need to design a user state migration strategy that supports the requirements.   What should you do?()A Use the multicast feature of Windows Deployment Services (WDS)B Use the Deployment Image Servicing and Management (DISM) toolC Use the User State Migration Tool (USMT) and a hard-link migration storeD Use Windows PE to perform an offline migration