网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You manage a department that uses Microsoft Windows Calendar to assign tasks. Another member of the department owns the calendar.  The calendar is published to a shared network location. Users report that they do not see the most recent updates to the assigned tasks.  You need to ensure that the shared calendar displays the latest updates.  What should you do? ()
A

Select the published calendar in Windows Calendar, and then click the Sync All option. 

B

Publish your local calendar in Windows Calendar and then click the Automatically publish changes option.

C

Schedule a task to publish the Calendar.ics file to the shared network location. Configure the task to run on an hourly schedule.

D

Instruct the calendar owner to click the Local calendar option in Windows Calendar, and then click the Automatically publish changes option for tasks.


参考答案

参考解析
解析: 暂无解析
更多 “单选题You manage a department that uses Microsoft Windows Calendar to assign tasks. Another member of the department owns the calendar.  The calendar is published to a shared network location. Users report that they do not see the most recent updates to the assigned tasks.  You need to ensure that the shared calendar displays the latest updates.  What should you do? ()A Select the published calendar in Windows Calendar, and then click the Sync All option. B Publish your local calendar in Windows Calendar and then click the Automatically publish changes option.C Schedule a task to publish the Calendar.ics file to the shared network location. Configure the task to run on an hourly schedule.D Instruct the calendar owner to click the Local calendar option in Windows Calendar, and then click the Automatically publish changes option for tasks.” 相关考题
考题 You are writing an application that uses isolated storage to store user preferences.The application uses multiple assemblies.Multiple users will use this application on the same computer.You need to create a directory named Preferences in the isolated storage area that is scoped to the current Microsoft Windows identity and assembly.Which code segment should you use?()A.B.C.D.

考题 You are writing an application that uses SOAP to exchange data with other applications.You use a Department class that inherits from ArrayList to send objects to another application.The Department object is named dept.You need to ensure that the application serializes the Department object for transport by using SOAP.Which code should you use?()A.B.C.D.

考题 You are hosting a Windows Communication Foundation (WCF) service under Microsoft Interent Information Services (IIS) 7.0.You have set up a web site in IIS Manager. The physical path is c:\wwwroot\Calendar.There is a Calendar.svc file in the c:\wwwroot\Calendar folder. It contains the following directive:% @ServiceHost Language=C Debug=true Service=Calendar.Calendar CodeBehind=CalendarSvc.cs %The CalendarSvc.cs file contains the source for the Calendar class in the Calendar namespace.You compile this code into the Calendar.dll file. You need to deploy your service to the web site. What should you do?()A. Copy the Calendar.dll file to the c:\wwwroot\Calendar\code folderB. Copy the Calendar.dll file to the c:\wwwroot\Calendar\bin folderC. Copy the Calendar.svc.cs file to the c:\wwwroot\Calendar\bin folderD. Copy the Calendar.svc.cs file to the c:\wwwroot\Calendar\code folder

考题 You want to provide 802.1X access for Windows clients using Junos Pulse as the agent. Which two considerations must you take into account() A.Junos Pulse out erauth entication uses EAP-PEAP.B.Junos Pulse ou terauth entication uses EAP-TTLS.C.Junos Pulse innerauth entication uses EAP-MSCHAP-V2.D.Theend point must use thenative Microsoft 802.1X supplicant.

考题 You perform a clean installation of Microsoft Windows Vista on the first partition. Then, you install Microsoft Windows XP Professional on the second partition of the same machine.You are able to log on to Windows XP Professional but do not have the option to boot to Windows Vista.You need to be able to dual boot the computer.What should you do?()A.AB.BC.CD.D

考题 You need to recommend an automated deployment solution for the new servers in the finance department.   What should you include in the recommendation?()A、Microsoft Hyper-V Server 2008 R2B、Microsoft System Center Virtual Machine Manager (VMM)C、Windows Deployment Services (WDS)D、Windows Server Migration Tools

考题 You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.Xxx has a Research department.Xxx currently only has one electronic microscope that the staff must share.You receive instruction from Xxx to implement a solution so that all the employees are able to automatically calendar the use of an electronic microscope. How can you achieve the goal?()A、You must use an equipment mailbox.B、You must use a local use request.C、You must use a managed folder mailbox policy.D、You must use Personal Archives.

考题 Your portable computer has a built-in secondary display on the lid.  You need to display your e-mail messages, calendar, and contacts on the secondary display.  What should you do? ()A、Configure the e-mail, calendar, and contacts gadgets to be displayed on Microsoft Windows Sidebar.B、Configure the e-mail, calendar, and contacts gadgets to be displayed on Microsoft Windows Sideshow.C、Configure desktop shortcuts to Microsoft Windows Mail, Microsoft Windows Calendar, and Microsoft Windows Contacts.D、Configure Quick Launch shortcuts to Microsoft Windows Mail, Microsoft Windows Calendar, and Microsoft Windows Contacts.

考题 You are the desktop administrator for your company's sales department. Susan is a user in the sales department. Susan's computer currently runs Microsoft Windows NT Workstation 4. 0.  Susan uses a legacy application that is compatible with only Windows NT Workstation. You want to install Windows XP Professional on Susan's computer. You plan to set up a dual-boot configuration so that Susan can run either Windows XP Professional or Windows NT Workstation. Susan's computer has two hard disks, named drive C and drive G. You install Windows XP Professional on drive G. After Windows XP Professional is installed, Susan reports that Windows NT Workstation is no longer available. You need to ensure that both operating systems are available on Susan's computer. What should you do?() A、Insert the Windows XP Professional CD-ROM into the computer. Run the Sfc.exe /scannow command.B、Insert the Windows XP Professional CD-ROM into the computer. Run the Winnt32. exe /cmdcons command.C、Start the computer by using an MS-DOS bootable floppy disk. Run the Attrib.exe -r -h -s c:/bootsect.dos command.D、Start the computer by using the Windows XP Professional CD-ROM. From the Recovery console, run the Bootcfg /rebuild command.

考题 You install a third-party application on your computer. The application uses port 80 to negotiate a listening port. After establishing the listening port, the application uses dynamic ports above 6000.  You need to configure Microsoft Windows Firewall to allow traffic for the application.  What should you do? ()A、Add a port exception for port 80.B、Disable the Core Networking exception.C、Restore the Windows Firewall defaults.D、Add a program exception for the new application.

考题 Your company has 1,000 client computers that run Windows XP Professional x64.   You are planning to deploy Windows 7 Enterprise x64. The company uses an application that is incompatible with Windows 7 Enterprise x64.   You have the following requirements:   Provide all users with access to the application.   Deploy and manage the application by using a centralized solution.  You need to design a solution that meets the requirements.   What should you do?()A、 Install the application on all client computers by using Group Policy,and then use the Compatibility tab.B、 Install the Microsoft Enterprise Desktop Virtualization(MED-V) v2 package on each client computer.C、 Install the Microsoft Application Virtualization(App-V) client on each client computer,and stream the application byusing App-V.D、 Install the Microsoft Application Virtualization(App-V) client on each client computer,and run the application in offline mode.

考题 Your company uses Microsoft Windows Server Update Services (WSUS) to deploy software updates and service packs.  Microsoft releases a security update for Windows 7. You have the following requirements:  The security update must be deployed by 5:00 P.M. on Friday.   Computers that are off when the security update is deployed must install the security update as soon as they are turned on.   You need to manage the software update process to meet the requirements.  What should you do?()A、 Approve the security update for installation through the WSUS console with a deadline of Friday at 5:00 P.M.B、 Approve the security update for installation through the WSUS console with no deadline.C、 Approve the security update for download through the WSUS console with a deadline of Friday at 5:00 P.M.D、 Approve the security update for download through the WSUS console with no deadline.

考题 Your computer runs Microsoft Windows Vista Home Basic edition.  You need to record television programs by using Microsoft Windows Media Center. You add a compatible TV tuner.  What should you do next?()A、Configure Windows Media Center to recognize the tuner.B、Install Windows Media Center.C、Upgrade to Microsoft Windows Vista Home Premium edition.D、Run a Microsoft Windows Update scan against the Microsoft Update servers.

考题 A Microsoft Exchange mobile messaging solution uses Microsoft Windows Mobile 5.0 with  Microsoft Messaging and Security Feature Pack. You deploy the solution by using front-end and back-end servers. Microsoft Exchange Server 2003 Service Pack 2 is installed on the front-end server.   You need to use the remote wipe feature.   What should you do?()A、Install Microsoft Windows Server 2003 Service Pack 2 on all domain controllers. B、Install Microsoft Exchange Server 2003 Service Pack 2 on the back-end server. C、Install Microsoft Exchange Server ActiveSync Web Administration Tool on the front-end server.D、Install Microsoft Exchange Server ActiveSync Web Administration Tool on the back-end server.Reset Instructions Calculator. 

考题 Your company has client computers that run Windows Vista and client computers that run Windows 7.   The client computers connect directly to the Microsoft Update Web site once per week and automatically install all available security updates.  Microsoft releases a security update for Windows 7.   You have the following requirements:   Create a report of all Windows 7 computers that are currently connected to the network and that do not have the security update installed. Use the least amount of administrative effort.  You need to manage the software update process to meet the requirements.   What should you do?()A、 Deploy Microsoft Windows Server Update Services (WSUS). Approve the security update for installation,and forcea detection cycle on the client computers.B、 Deploy Microsoft Windows Server Update Services (WSUS). Approve the security update for detection, and force adetection cycle on the client computers.C、 Use the Microsoft Baseline Security Analyzer (MBSA) to scan the client computers.Configure MBSA to use the Microsoft Update site catalog.D、 Use the Microsoft Baseline Configuration Analyzer (MBCA) to scan the client computers.

考题 You deploy a mobile messaging solution by using front-end and back-end servers that run Microsoft Exchange Server 2003 Service Pack 2.   Company policy requires that all Microsoft Windows Mobilebased devices must support Microsoft Exchange ActiveSync communication that is Federal Information Processing Standard compliant.   You need to deploy the Windows Mobilebased devices.   What should you use?()A、Microsoft Windows Mobile 5.0B、Microsoft Windows Mobile 2003 for Pocket PCC、Microsoft Windows Mobile 2003 Second EditionD、Microsoft Windows Mobile 5.0 with Microsoft Messaging and Security Feature Pack

考题 You deploy a mobile messaging solution with Microsoft Exchange Server 2003 Service Pack 2.   The company security policy requires complex passwords on all the Microsoft Windows Mobilebased devices.   You provide a Microsoft Windows Mobile 5.0 smartphonebased device to a new user. The first time the user uses the device, the user is not prompted for a password. You need to ensure that the user is prompted for a password.   What should you do?()A、Instruct the user to set a PIN on the mobile device.B、Instruct the user to perform Microsoft Exchange ActiveSync synchronization Over-The-Air (OTA).C、On the Device Security Settings tab, select the Require both numbers and letters option.D、Add the user account of the user to the Exceptions list on the Device Security Settings tab.

考题 You need to identify the data mining algorithm that meets the requirements of the credit department. Which algorithm should you use?()A、Microsoft ClusteringB、Microsoft Decision TreeC、Microsoft Nave BayesD、Microsoft Association

考题 You are planning to upgrade the client computers of the users in the sales department to Windows 7. You need to recommend an upgrade solution to ensure that the client computers can run App2. What should you include in the recommendation?()A、Internet Explorer Administration Kit (IEAK)B、Microsoft Application Compatibility Toolkit (ACT)C、Microsoft Application Virtualization (App-V)D、Microsoft Enterprise Desktop Virtualization (MED-V)

考题 单选题Your company has client computers that run Windows Vista and client computers that run Windows 7.   The client computers connect directly to the Microsoft Update Web site once per week and automatically install all available security updates.  Microsoft releases a security update for Windows 7.   You have the following requirements:   Create a report of all Windows 7 computers that are currently connected to the network and that do not have the security update installed. Use the least amount of administrative effort.  You need to manage the software update process to meet the requirements.   What should you do?()A  Deploy Microsoft Windows Server Update Services (WSUS). Approve the security update for installation,and forcea detection cycle on the client computers.B  Deploy Microsoft Windows Server Update Services (WSUS). Approve the security update for detection, and force adetection cycle on the client computers.C  Use the Microsoft Baseline Security Analyzer (MBSA) to scan the client computers.Configure MBSA to use the Microsoft Update site catalog.D  Use the Microsoft Baseline Configuration Analyzer (MBCA) to scan the client computers.

考题 单选题You are hosting a Windows Communication Foundation (WCF) service under Microsoft Interent Information Services (IIS) 7.0. You have set up a web site in IIS Manager. The physical path is c:/wwwroot/Calendar. There is a Calendar.svc file in the c:/wwwroot/Calendar folder. It contains the following directive: The CalendarSvc.cs file contains the source for the Calendar class in the Calendar namespace. You compile this code into the Calendar.dll file. You need to deploy your service to the web site. What should you do?()A Copy the Calendar.dll file to the c:/wwwroot/Calendar/code folderB Copy the Calendar.dll file to the c:/wwwroot/Calendar/bin folderC Copy the Calendar.svc.cs file to the c:/wwwroot/Calendar/bin folderD Copy the Calendar.svc.cs file to the c:/wwwroot/Calendar/code folder

考题 单选题You manage a server named SSP1 that runs Windows Server 2008. SSP1 has the Windows SharePoint Services (WSS) role in standalone mode.  You manage another Windows Server 2008 server named SSP2. You install the WSS role on SSP2. During the installation, you indicate that SSP2 must be a member of a WSS server farm. You are unable to connect to SSP1 in the server farm.  You need to configure SSP1 and SSP2 in a WSS server farm. What should you do?()A Restart the Web Management service on SSP1.B Set the Microsoft .NET Framework Trust Level to Low on both SSP1 and SSP2.C Set the Microsoft .NET Framework Trust Level to Medium on both SSP1 and SSP2.D Uninstall and reinstall WSS on SSP1 and select the server farm mode during the installation.

考题 单选题You have a Windows Server 2008 R2 Hyper-V failover cluster with a single iSCSI logical unit number (LUN) and one highly available virtual machine (HAVM). You manage the virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You monitor the environment by using Microsoft System Center Operations Manager 2007 R2. You configure a new virtual machine (VM) by deploying a VHD from the VMM library and placing the VHD on the existing iSCSI LUN. You create a HAVM configuration, and you attach the VHD to the configuration. VMM reports the status of the VMs as Unsupported Cluster Configuration. You need to be able to manage the VMs by using VMM. What should you do?()A Move the VHD of one HAVM to a new iSCSI LUN.B Move the VHD of one HAVM to the system volume of a cluster node.C Configure Performance and Resource Optimization (PRO) on the Windows Server 2008 R2 cluster nodes.D Configure Windows System Resource Manager (WSRM) on the Windows Server 2008 R2 cluster nodes.

考题 单选题You need to design a monitoring strategy to meet business requirements for data on servers in the production department. What should you do?()A Use the Microsoft Baseline Security Analyzer (MBSA) to scan for Windows vulnerabilities on all servers in the production departmentB Run Security and Configuration Analysis to analyze the security settings of all servers in the production departmentC Enable auditing for data on each server in the production department. Run System Monitor on all servers in the production department to create a counter log that tracks activity for the Objects performance objectD Create a Group Policy Object (GPO) that enables auditing for object access and link it to the product department’s Servers OU. Enable auditing for data on each server in the production department

考题 多选题You want to provide 802.1X access for Windows clients using Junos Pulse as the agent. Which two considerations must you take into account()AJunos Pulse out erauth entication uses EAP-PEAP.BJunos Pulse ou terauth entication uses EAP-TTLS.CJunos Pulse innerauth entication uses EAP-MSCHAP-V2.DTheend point must use thenative Microsoft 802.1X supplicant.

考题 单选题Your company has 1,000 client computers that run Windows XP Professional x64.   You are planning to deploy Windows 7 Enterprise x64. The company uses an application that is incompatible with Windows 7 Enterprise x64.   You have the following requirements:   Provide all users with access to the application.   Deploy and manage the application by using a centralized solution.  You need to design a solution that meets the requirements.   What should you do?()A  Install the application on all client computers by using Group Policy,and then use the Compatibility tab.B  Install the Microsoft Enterprise Desktop Virtualization(MED-V) v2 package on each client computer.C  Install the Microsoft Application Virtualization(App-V) client on each client computer,and stream the application byusing App-V.D  Install the Microsoft Application Virtualization(App-V) client on each client computer,and run the application in offline mode.

考题 单选题You manage 40 computers that run Microsoft Windows Vista.  You use Microsoft Windows Calendar to publish a calendar to a shared network location. You need to allow users to automatically view the most recent calendar updates.  What should you do? ()A Instruct all users to configure a calendar subscription that has an update interval of 15 minutes.B Instruct all users to perform calendar synchronization for all shared calendar subscriptions. C Instruct all users to map a network drive to the folder that holds the shared calendar. Import the .ics file for the shared calendar.D Use e-mail messages to deploy the .ics file for the shared calendar to each user. Instruct each user to import the .ics file that is attached to the e-mail message.