网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You need to design an administrative model that meets the business and technical requirements. What should you do?()
A

Assign permissions to manage Mailbox and Exchange Server configuration to the server-admins group

B

Assign permissions to manage Mailbox and Exchange Server configuration to the domain-admins group

C

Assign permissions to manage Mailboxes to the server-admins group. Assign permissions to manage Exchange Servers configuration to the domain-admins group

D

Assign permissions to manage Mailboxes to the domain-admins group. Assign permissions to manage Exchange Servers configuration to the server-admins group


参考答案

参考解析
解析: 暂无解析
更多 “单选题You need to design an administrative model that meets the business and technical requirements. What should you do?()A Assign permissions to manage Mailbox and Exchange Server configuration to the server-admins groupB Assign permissions to manage Mailbox and Exchange Server configuration to the domain-admins groupC Assign permissions to manage Mailboxes to the server-admins group. Assign permissions to manage Exchange Servers configuration to the domain-admins groupD Assign permissions to manage Mailboxes to the domain-admins group. Assign permissions to manage Exchange Servers configuration to the server-admins group” 相关考题
考题 The purpose of the systems analysis phase is to build a logical model of the new system.The first step is(71),where you investigate business processes and document what the new system must do to satisfy users. This step continues the investigation that began during the(72). You use the fact-finding results to build business models,data and process models,and object models. The deliverable for the systems analysis phase is the(73),which describes management and user requirements,costs and benefits,and outlines alternative development strategies.The purpose of the systems design phase is to create a physical model that will satisfy all documented requirements for the system. During the systems design phase,you need to determine the(74),which programmers will use to transform the logical design into program modules and code. The deliverable for this phase is the(75),which is presented to management and users for review and approval.A.system charter B.system scope definition C.system blueprint D.system requirements document

考题 The purpose of the systems analysis phase is to build a logical model of the new system.The first step is(71),where you investigate business processes and document what the new system must do to satisfy users. This step continues the investigation that began during the(72). You use the fact-finding results to build business models,data and process models,and object models. The deliverable for the systems analysis phase is the(73),which describes management and user requirements,costs and benefits,and outlines alternative development strategies.The purpose of the systems design phase is to create a physical model that will satisfy all documented requirements for the system. During the systems design phase,you need to determine the(74),which programmers will use to transform the logical design into program modules and code. The deliverable for this phase is the(75),which is presented to management and users for review and approval.A.systems planning phase B.systems modeling phase C.systems analysis phase D.systems design phase

考题 As part of your design, you are evaluating whether a second-level organizational unit (OU) structure is required.  Which factor necessitates the need for a second-level OU structure?()A、 Audit policy settingsB、 Software deployment needsC、 Client operating systems in useD、 Delegation of administrative authority

考题 You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. TestKing.com is configured to run an exchange 2010 environment.  You are planning to design the installation of numerous Mailbox servers. TestKing.com Service LevelAgreement (SLA) requires the following: * The servers need to support 1,500 concurrent connections to mailboxes.* The servers need to maintain a latency of less than 20 milliseconds. You ensure deployment success you need to ensure that your design comply with the Service LevelAgreement (SLA) of TestKing.com. What should you do?()A、The best option is to use the Exchange Server User Monitor (ExMon) tool to check if your design meets the requirements.B、The best option is to use the Exchange Server Load Generator (LoadGen) 2010 tool to check if your design meets the requirements.C、The best option is to use the Exchange Server Connectivity Analyzer (ExRCA) tool to check if your design meets the requirements.D、The best option is to use the Exchange Server Jetstress 2010 tool to check if you design meets there quirements.

考题 You need to design an administrative model for the Exchange Server environment. What should you do?()A、Create a single organizational unit (OU). Place the user accounts for each office in the OU. Delegate control over the OU to the office’s server administrators and the central IT staffB、Create a single Exchange administrative group. Place all Exchange servers into that administrative group. Assign permissions for the administrative group to the officer’s server administrators and the central IT staffC、Create an Exchange administrative group for each office. Place the Exchange severs for each office into that office’s administrative group. Assign permissions for the administrative group to the office’s server administrators. Allow the central IT staff to manage user mailboxesD、Create an organizational unit (OU) for each office. Place the user accounts for each office into the appropriate OU. Delegate control over each OU to the office’s server administrators. Allow the central IT staff to manager user mailboxes

考题 You need to design a PKI that meets business requirements. What should you do?()A、Move ATLCA1 offline and create an enterprise subordinate CA to issue certificatesB、Create a stand-alone subordinate CA to issue certificatesC、Use a qualified subordinate CAD、Configure certificate template access control lists (ACLs) on ATLCA1

考题 You have an Exchange Server 2010 organization. You design a deployment of multiple Mailbox servers.  Your companys Service Level Agreement (SLA) states that servers must support 1,000 concurrent connections to mailboxes while maintaining an RPC latency of less than 20 milliseconds.  You need to verify that your design meets the requirements of the SLA before you deploy servers in the production environment.  Which tool should you use?()A、Exchange Server Jetstress 2010B、Exchange Server User Monitor (ExMon)C、Exchange Server Load Generator (LoadGen) 2010D、Exchange Server Remote Connectivity Analyzer (ExRCA)

考题 You have an Exchange Server 2010 organization that contains two Hub Transport servers.  You need to design a recovery plan for the Hub Transport servers that meets the following requirements:.Restores all Windows settings .Restores all Exchange configurations.Minimizes administrative effort What should you include in the plan?()A、.Retention of Exchange server computer accounts in Active Directory .Backup and recovery of Windows system stateA recovery installation of Exchange Server 2010B、.Retention of Exchange server computer accounts in Active Directory .Backup and recovery of transport queues.A custom installation of Exchange Server 2010C、Recovery of Windows system state.Backup and recovery of transport queues.A typicalinstallation of Exchange Server 2010D、Backup and recovery of Windows system state.A repair installation of Windows Server 2008.A typical installation of Exchange Server 2010

考题 You need to design an administrative model that meets the business and technical requirements. What should you do?()A、Assign permissions to manage Mailbox and Exchange Server configuration to the server-admins groupB、Assign permissions to manage Mailbox and Exchange Server configuration to the domain-admins groupC、Assign permissions to manage Mailboxes to the server-admins group. Assign permissions to manage Exchange Servers configuration to the domain-admins groupD、Assign permissions to manage Mailboxes to the domain-admins group. Assign permissions to manage Exchange Servers configuration to the server-admins group

考题 You need to design a domain model that meets the company business and security requirements for controlling access to the new Web-based ordering application. What should you do?()A、Create a child OU within the existing domainB、Create a child domain of the existing domainC、Create a new domain in a new forest. Configure the new domain to trust the existing domainD、Create a new tree in the existing forest. Configure the new domain to trust the existing domain

考题 You need to recommend a solution for managing App1. The solution must require the minimum  amount of administrative effort.What should you include in the recommendation?()A、Group Policy Administrative TemplatesB、Group Policy PreferencesC、Group Policy Software SettingsD、Windows Remote Management (WinRM)

考题 Your company has a single Active Directory Domain Services (AD DS) domain with Windows Server 2008 R2 member servers and 1,000 Windows 7 client computers. You are designing the deployment of a custom application.   You have the following requirements:   The application must be available to only users who need it. Minimize network traffic during deployment.   You need to design a deployment strategy that meets the requirements.   Which deployment method should you use?()A、RemoteApp and Desktop ConnectionsB、software installation in Group PolicyC、Microsoft Application Virtualization (App-V)D、Microsoft System Center Configuration Manager 2007

考题 You need to design an administrative model for Exchange Server 2003. What should you?()A、Create an administrative group for each office. Place each Exchange server that is managed by an office technician into that Office’s administrative group. Assign the central IT group full control over all administrative groups. Assign each office technician control over his or her office’s administrative groupsB、Create one administrative group. Place all Exchange servers in the administrative group. Assign the central IT group full control over the administrative group. Make each office technician a member fo the local Backup Operators group on each group they manageC、Create an administrative group for each office. Place one Exchange server in each group. Assign the central IT group and each office technician full control over each administrative groupD、Create one administrative group for all Exchange front-end servers. Assign each office technician control over this administrative group. Create another administrative group for all Exchange back-end servers. Assign the central IT group control over this administrative group

考题 As part of your design, you are evaluating whether a second-level organizational unit (OU) structure is required. Which factor necessitates the need for a second-level OU structure?()A、Audit policy settingsB、Software deployment needs  C、Client operating systems in useD、Delegation of administrative authority

考题 You need to recommend an administrative solution for the help desk technicians that meets the  museum’s technical requirements    What should you recommend?()A、Add the help desk technicians to the Domain Admins group.B、Add the help desk technicians to the Accounts Operators group.C、Assign permissions for the Groups OU and the Branch1 OU to the help desk technicians.D、Assign permissions for the domain object and the Users container to the help desk technicians.

考题 You need to design a password policy that meets business requirements. What should you do? Select all that apply.()A、Increase the number of passwords that are rememberedB、Disable reversible encryptionC、Set the minimum password age to zero daysD、Increase the maximum password age

考题 单选题You are developing an ASP.NET MVC 2 application. A view contains a form that allows users to submit their first name. You need to display the value that is submitted, and you must ensure that your code avoids cross-site scripting. Which code segment should you use?()A %: Model.FirstName %B %= Model.FirstName % C % Response.Write(Model.FirstName) %  D % Response.Write(HttpUtility.HtmlDecode(Model.FirstName)) % 

考题 单选题You need to design an administrative model that meets all business and technical requirements. What should you do?()A Place the mailboxes for each region on a separate server. Create an administrative group for each region. Assign each regional technician Exchange Full Administrator permission over that region’s administrative groups. Assign the main office IT staff Exchange Full Administrator permission over each administrative group.B Place the mailboxes for each region on a separate server. Create an administrative group for each region. Assign each regional technician Exchange Full Administrator permission over all administrative groups. Assign the main office IT staff Exchange Full Administrator permission over each administrative groupC Place the mailboxes from multiple regions on each server. Create an administrative group for each server. Assign each regional technician Exchange Full Administrator permission over the administrative groups that contain servers that hold mailboxes for that region. Assign the main office IT staff Exchange Full Administrator permission over each administrative groupD Place the mailboxes from multiple regions on each server. Create a single administrative group for all servers. Assign each regional technician and the main office IT Staff Exchange Full Administrator permission over the administrative group

考题 单选题You are planning to upgrade Internet Explorer.   You have the following requirements:   Create a report that identifies which computers are successfully upgraded. Do not install additional software on the client computers.   You need to design a deployment method that meets the requirements.   What should you do?()A Use Internet Explorer Administration Kit (IEAK) and Group Policy.B Use Microsoft System Center Configuration Manager.C Use Windows Server Update Services (WSUS).D Use Microsoft System Center Essentials.

考题 单选题You need to design an authentication solution for Terminal Services that meets the business requirements.What should you do?()A Configure the terminal server to use smart cardsB Configure IPSec to permit only Remote Desktop Protocol (RDP) connections to the terminal serverC Deny the Remote Desktop Users group access to the terminal serverD Restrict treyresearch.com users from logging on locally to the terminal server

考题 单选题You are designing a Windows 7 virtual desktop infrastructure.You have the following requirements:   Provide access to Remote Desktop Services RemoteApp sources from multiple remote desktop servers.  Support network load balancing.  Support reconnection to existing sessions on virtual desktops.    You need to specify a design that meets the requirements.   What should you include in your design?()A Remote Desktop GatewayB Remote Desktop Connection BrokerC Windows Deployment ServicesD Windows Virtual PC and Windows XP Mode

考题 单选题You design a Business Intelligence (BI) solution by using SQL Server 2008. The solution contains a SQL Server 2008 Analysis Services (SSAS) database. A measure group in the database contains log entries of manufacturing events. These events include accidents, machine failures, production capacity metrics, and other activities. You need to implement a data mining model that meets the following requirements: Predict the frequency of different event types. Identify short-term and long-term patterns. Which algorithm should the data mining model use?()A  the Microsoft Time Series algorithmB  the Microsoft Decision Trees algorithmC  the Microsoft Linear Regression algorithmD  the Microsoft Logistic Regression algorithm

考题 单选题You need to recommend a NAP enforcement method that meets the companyˉs security requirements. Which method should you recommend?()A 802.1XB DHCPC IPSecD VPN

考题 单选题As part of your design, you are evaluating whether a second-level organizational unit (OU) structure is required.  Which factor necessitates the need for a second-level OU structure?()A  Audit policy settingsB  Software deployment needsC  Client operating systems in useD  Delegation of administrative authority

考题 单选题You are creating a Windows Forms Application by using the .NET Framework 3.5.You plan to design a control for the application.You need to ensure that the control meets the following requirements:    (1)Contains the DataGridView, BindingSource, and BindingNavigator controls.  (2)Exposes the properties of the BindingSource control.   (3)Protects the properties of the DataGridView and BindingNavigator controls.    What sholud you do?()A Extend the Control class.B Extend the ContainerControl class.C Create protected accesses for each control property.D Create public accesses for the properties of the BindingSource control.