考题
You create a Web application for your company‘s intranet. You want to enable users to customize their versions of the intranet home page. You create sections of content as Web Parts. You need to ensure that users can customize content at any time.Which two code segments should you use?()A.B.C.D.
考题
You need to maintain a record of all transactions on some tables for at least three years. Automatic undo management is enabled for the database.What must you do accomplish this task?()
A. Enable supplemental logging for the database.B. Specify undo retention guarantee for the databaseC. Create Flashback Data Archive in the tablespace where the tables are stored.D. Create Flashback Data Archive and enable Flashback Data Archive for specific tables
考题
You need to design a monitoring strategy to meet business requirements for data on servers in the production department. What should you do?()A、Use the Microsoft Baseline Security Analyzer (MBSA) to scan for Windows vulnerabilities on all servers in the production departmentB、Run Security and Configuration Analysis to analyze the security settings of all servers in the production departmentC、Enable auditing for data on each server in the production department. Run System Monitor on all servers in the production department to create a counter log that tracks activity for the Objects performance objectD、Create a Group Policy Object (GPO) that enables auditing for object access and link it to the product department’s Servers OU. Enable auditing for data on each server in the production department
考题
You need to maintain a record of all transactions on some tables for at least three years. Automatic undo management is enabled for the database. What must you do accomplish this task?()A、 Enable supplemental logging for the database.B、 Specify undo retention guarantee for the databaseC、 Create Flashback Data Archive in the tablespace where the tables are stored.D、 Create Flashback Data Archive and enable Flashback Data Archive for specific tables
考题
You need to provide ad hoc reporting capabilities to fulfill business requirements. What should you do?()A、Create a SQL Server Reporting Services (SSRS) report. Enable customers to modify the report by using Report Builder.B、Create an ASP.NET application that will enable customers to view and modify reports by calling the SQL Server Reporting Services (SSRS) API.C、Create an ASP.NET application that will enable customers to view and modify reports by using a SQL Server Reporting Services (SSRS) ActiveX control.D、Create a SQL Server Reporting Services (SSRS) Report Model. Enable customers to modify reports based on the model by using Report Builder.
考题
You need to design an administrative model for the Exchange Server environment. What should you do?()A、Create a single organizational unit (OU). Place the user accounts for each office in the OU. Delegate control over the OU to the office’s server administrators and the central IT staffB、Create a single Exchange administrative group. Place all Exchange servers into that administrative group. Assign permissions for the administrative group to the officer’s server administrators and the central IT staffC、Create an Exchange administrative group for each office. Place the Exchange severs for each office into that office’s administrative group. Assign permissions for the administrative group to the office’s server administrators. Allow the central IT staff to manage user mailboxesD、Create an organizational unit (OU) for each office. Place the user accounts for each office into the appropriate OU. Delegate control over each OU to the office’s server administrators. Allow the central IT staff to manager user mailboxes
考题
You are a network administrator for The network contains a Windows Server 2003 computer named Testking1. You need to install an application on Testking1. The installation will cause several changes to the registry. You plan to use the Backup utility to create a backup that will enable you to restore the registry. TestKing requirements for network management state that all backups must be performed during an eight-hour period at night. Because of this time constraint, you need to ensure that the backup can be recovered as quickly as possible. You need to create a backup that meets the requirements. What should you do?()A、Create a backup of the system partition.B、Create a backup of the boot partition.C、Create a backup of the System State.D、Create an Automated System Recovery (ASR) backup.E、Create a backup of the Systemroot/System32/Config folder.
考题
You need to design a PKI that meets business requirements. What should you do?()A、Move ATLCA1 offline and create an enterprise subordinate CA to issue certificatesB、Create a stand-alone subordinate CA to issue certificatesC、Use a qualified subordinate CAD、Configure certificate template access control lists (ACLs) on ATLCA1
考题
You need to design a method for junior IT administrators to perform more IT support tasks. Your solution must meet business and security requirements. What should you do?()A、Delegate appropriate Active Directory permissions to the junior IT administratorsB、Add the junior IT administrators’ user accounts to the Domain Admins user groupC、Create a custom Microsoft Management Console (MMC) that uses taskpad views to enable the appropriate tasks for the junior IT administratorsD、Make the junior IT administrators’ domain user accounts member of the local Administrators group on all client computersE、Create new domain user accounts for each junior IT administrator. Make the new accounts members of the Domain Admins group and instruct junior IT administrators to use the new accounts only for appropriate administrative tasks
考题
You need to design a method to log changes that are made to servers and domain controllers. You also need to track when administrators modify local security account manager objects on servers. What should you do?()A、Enable failure audit for privilege user and object access on all servers and domain controllersB、Enable success audit for policy change and account management on all servers and domain controllersC、Enable success audit for process tracking and logon events on all servers and domain controllersD、Enable failure audit for system events and directory service access on all servers and domain controllers
考题
You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()A、Configure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addressesB、Configure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points useC、Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networksD、Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks
考题
You need to design a strategy to increase security for the client computers in the finance department. Which two actions should you perform?()A、Enable automatic certificate enrollmentB、Enforce smart card logonsC、Enable Encrypting File System (EFS) for offline filesD、Enable a screen saver password
考题
Your company has an Active Directory Domain Services (AD DS) forest with a single domain. A server has the Windows Deployment Services (WDS) role installed. You create a Windows 7 image. You plan to use the Lite Touch Installation deployment method to deploy the Windows 7 image. You need to design a deployment strategy that will install an image on unknown client computers only if administrative approval is granted. What should you do?()A、Create a multicast transmission for the Windows 7 image.B、Create a unicast transmission for the Windows 7 image.C、Use DHCP rogue detection on the WDS server.D、Use an Auto-Add policy on the WDS server.
考题
You need to use the Event Viewer window to review the event logs for only critical and error events. You also need the maximum amount of detail for each of these events. What should you do? ()A、Edit the filter for the Administrative Events view.B、Create a custom view. Enable the Critical, Error, and Information level events. Select all logs.C、Create a custom view. Select the Critical checkbox, Error checkbox, and Verbose checkbox. Select all logs.D、Search for the Critical or Error string by using the Find option of the Administrative Events view.
考题
You have a server that runs the Terminal Services Gateway (TS Gateway) role service. Users need to connect remotely through the gateway to desktop computers located in their offices. You create a security group named Remote1 for the users who need to connect to computers in their offices. You need to enable the users to connect to the TS Gateway. What should you do?()A、Add the Remote1 security group to the local remote desktop users group on the TS Gateway server.B、Create a client authorization policy. Add the Remote1 security group and enable Device redirection.C、Create a resource authorization policy. Add the Remote1 security group and enable Users to connect to any resource.D、Create a Group Policy object and enable the Set TS Gateway authentication method properties to Ask for credentials, use Basic protocol. Apply the policy to the TS Gateway server.
考题
You need to design a strategy for managing the messages that are sent to the customer service mailboxes. What should you do?()A、Create a separate storage group and database to contain the customer service mailboxes. Enable circular logging for this storage groupB、Create a separate storage group and database to contain the customer service mailboxes. Set the deleted item retention period for this database to zeroC、Place the customer service mailboxes on a new mailbox store in the storage group that contains the main office user mailboxes. Enable circular logging for this storage groupD、Place the customer service mailboxes on a new mailbox store in the storage group that contains the branch office user mailboxes. Set the deleted item retention period for this database to zero
考题
You need to design a method to enable remote encryption on Server5. What should you do?()A、Configure the editor’s user account properties to enable Store password using reversible encryptionB、Configure the editor’s user account properties to enable Use DES encryption for this accountC、Configure the Local Security Policy on Server to enable the System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing security policyD、Configure the Server5 computer account properties to enable Trust computer for delegation
考题
You need to design a domain model that meets the company business and security requirements for controlling access to the new Web-based ordering application. What should you do?()A、Create a child OU within the existing domainB、Create a child domain of the existing domainC、Create a new domain in a new forest. Configure the new domain to trust the existing domainD、Create a new tree in the existing forest. Configure the new domain to trust the existing domain
考题
You need to create an administrative design that will enable the organization to centralize the management of the Exchange Server 2003 computers. Which two actions should you perform?()A、Create a new domain named Exchange.Corp.cpandl.com and locate all the Exchange servers in the domainB、Create a new organizational unit (OU) named Exchange OU and move all the Exchange servers into the OUC、Locate all the Exchange servers in the Domain Controller OU.(Modified NEW answer)D、Assign Full Exchange Administrator rights to the Domain Admins group and to the Exchange Admins Group.(Modified NEW answer)E、Assign Full Exchange Administrator rights to the Domain Admins group. Assign Exchange Administrator rights to the Exchange Admins group.(Modified NEW answer)F、Assign Full Exchange Administrator rights to the Domain Admins group. Add the Exchange Admins group to the Administrators group on each Exchange server.(Modified NEW answer)
考题
You need to design an administrative control strategy for Denver administrators. What should you do?()A、Create a security group named HelpDesk. Add the HelpDesk group to the Enterprise Admins group in both domainsB、Create a security group named HelpDesk. Add the HelpDesk group to the Domain Admins groups in both domainsC、Add the Domain Admins group in the litwareinc.com domain to the Domain Admins group in the contoso.com domain. Delegate full control of the litwareinc.com domain to the Domain Admins group in the contoso.com domainD、Create a security group named HelpDesk for each office. Delegate administrative tasks to their respective OU or domain.Delegate full control of the contoso.com domain to the Domain Admins group from the litwareinc.com domain
考题
You create a Web site. You add an EditorZone control to the home page on the Web site. You need to enable users to customize the size and location of the Web Parts on their home pages. Which two controls should you add to the EditorZone control?()A、BehaviorEditorPartB、AppearanceEditorPartC、PropertyGridEditorPartD、LayoutEditorPart
考题
You need to design an administrative model for Exchange Server 2003. What should you?()A、Create an administrative group for each office. Place each Exchange server that is managed by an office technician into that Office’s administrative group. Assign the central IT group full control over all administrative groups. Assign each office technician control over his or her office’s administrative groupsB、Create one administrative group. Place all Exchange servers in the administrative group. Assign the central IT group full control over the administrative group. Make each office technician a member fo the local Backup Operators group on each group they manageC、Create an administrative group for each office. Place one Exchange server in each group. Assign the central IT group and each office technician full control over each administrative groupD、Create one administrative group for all Exchange front-end servers. Assign each office technician control over this administrative group. Create another administrative group for all Exchange back-end servers. Assign the central IT group control over this administrative group
考题
Your virtual environment includes Hyper-V host servers and VMware ESX Server hosts. You manage the environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to enable non-administrative users to manage snapshots or checkpoints for virtual machines (VMs) that are hosted on either host system. What should you do?()A、Create checkpoints in VMM.B、Create snapshots by using Hyper-V Manager.C、Create checkpoints by using the VMM Self-Service Portal.D、Create snapshots from within the Virtual Machine Connection console.
考题
You need to recommend a solution for managing the public computers in the branch offices. What should you recommend?()A、Create a GPO that is linked to the domain and configure security filtering for the GPO.B、Create a GPO that is linked to the Public OU and configure security filtering for the GPO.C、Create a GPO that is linked to the Public OU and enable loopback processing in the GPO.D、Create a GPO that is linked to the domain and enable block inheritance on the Public OU.
考题
单选题You need to design an administrative model that meets all business and technical requirements. What should you do?()A
Place the mailboxes for each region on a separate server. Create an administrative group for each region. Assign each regional technician Exchange Full Administrator permission over that region’s administrative groups. Assign the main office IT staff Exchange Full Administrator permission over each administrative group.B
Place the mailboxes for each region on a separate server. Create an administrative group for each region. Assign each regional technician Exchange Full Administrator permission over all administrative groups. Assign the main office IT staff Exchange Full Administrator permission over each administrative groupC
Place the mailboxes from multiple regions on each server. Create an administrative group for each server. Assign each regional technician Exchange Full Administrator permission over the administrative groups that contain servers that hold mailboxes for that region. Assign the main office IT staff Exchange Full Administrator permission over each administrative groupD
Place the mailboxes from multiple regions on each server. Create a single administrative group for all servers. Assign each regional technician and the main office IT Staff Exchange Full Administrator permission over the administrative group
考题
单选题You are developing a Windows Presentation Foundation (WPF) application.You need to display HTML content from a Web page on the WPF form. What should you do?()A
Add a FlowDocumentReader control to the design surface. Then create a FlowDocument control.B
Add a DocumentViewer control to the design surface. Then create a FixedDocument control.C
Add a WebBrowser control to the design surface. Then use the Navigate method to navigate the URI object.D
Add a ContentControl control to the design surface. Then reference a WebClient object to return an HTML string.
考题
单选题You are developing a Windows Presentation Foundation (WPF) application. You need to display HTML content from a Web Page on the WPF form. What should you do?()A
Add a FlowDocumentReader control to the design surface. Then create a FlowDocument control.B
Add a ContentControl control to the design surface. The reference a WebClient object to return an HTML string.C
Add a DocumentViewer control to the design surface. The create a FixedDocument control.
考题
单选题You have an Exchange Server 2010 organization.You plan to enable Federated Sharing.You need to create a DNS record to store the Application Identifier (AppID) of the domain for the federated trust. Which type of record should you create?()A
AB
CNAMEC
SRVD
TXT