网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Machine policy templates can be assigned based on certain attributes of a machine. A customer  organizes their machines based on the following requirements:   The machines are all placed in specific Organizational Units in the Active Directory.   The customer has Citrix Servers, and they have a specific naming convention meant only for their Citrix Servers. The customer has DHCP enabled for all the client machines.   The customer has made it clear that they should not need to change anything in the existing infrastructure. Given these requirements, which single assignment attribute would be chosen for assigning machine policy templates?()
A

Hostnames

B

IP Addresses

C

Machine Group Tag

D

Active Directory Groups


参考答案

参考解析
解析: 暂无解析
更多 “单选题Machine policy templates can be assigned based on certain attributes of a machine. A customer  organizes their machines based on the following requirements:   The machines are all placed in specific Organizational Units in the Active Directory.   The customer has Citrix Servers, and they have a specific naming convention meant only for their Citrix Servers. The customer has DHCP enabled for all the client machines.   The customer has made it clear that they should not need to change anything in the existing infrastructure. Given these requirements, which single assignment attribute would be chosen for assigning machine policy templates?()A HostnamesB IP AddressesC Machine Group TagD Active Directory Groups” 相关考题
考题 Control chart theory is based on the differentiation of the causes of variations in quality. Variations may be produced by assignable causes. All of the following are examples of assignable causes except:A . differences among machines.B . differences among workers.C . differences among materials.D . differences in each of these factors over time.E . None of the above (all are examples)

考题 195 Control chart theory is based on the differentiation of the causes of variations in quality. Variations may be produced by assignable causes. All of the following are examples of assignable causes except:A. differences among machines.B. differences among workers.C. differences among materials.D. differences in each of these factors over time.E. None of the above (all are examples)

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a server named S01 that runs Windows Server 2008 and Hyper-V inyour company. Three virtual machines are hosted on S01. According to the requirement of company policy,the virtual machines must not connect to the company network. All of the virtual machines need to beconfigured to connect to each other. You must meet the company policy. Which should you do?()A、The Connection should be set to Host for the network interface card.B、The Connection should be set to None for the network interface card.C、You should choose the Not connected option for each virtual machine.D、The Enable virtual LAN identification option should be enabled for each virtual machine.

考题 Which statement regarding the implementation of an IDP policy template is true?()A、IDP policy templates are automatically installed as the active IDP policy.B、IDP policy templates are enabled using a commit script.C、IDP policy templates can be downloaded without an IDP license.D、IDP policy templates are included in the factory-default configuration.

考题 Which of the following requires an update to the baseline after installing new software on a machine?()A、Signature-based NIPSB、Signature-based NIDSC、HoneypotD、Behavior-based HIDS

考题 Which of the following technologies can provide geographically based load balancing with high availability between two web servers with static content?()A、MulticastB、Active/passive clusterC、Active/active clusterD、DNS round robin

考题 Machine policy templates can be assigned based on certain attributes of a machine. A customer  organizes their machines based on the following requirements:   The machines are all placed in specific Organizational Units in the Active Directory.   The customer has Citrix Servers, and they have a specific naming convention meant only for their Citrix Servers. The customer has DHCP enabled for all the client machines.   The customer has made it clear that they should not need to change anything in the existing infrastructure. Given these requirements, which single assignment attribute would be chosen for assigning machine policy templates?()A、HostnamesB、IP AddressesC、Machine Group TagD、Active Directory Groups

考题 Regarding a route-based versus policy-based IPsec VPN, which statement is true?()A、A route-based VPN generally uses less resources than a policy-based VPN.B、A route-based VPN cannot have a deny action in a policy; a policy-based VPN can have a deny action.C、A route-based VPN is better suited for dialup or remote access compared to a policy-based VPN.D、A route-based VPN uses a policy referencing the IPsec VPN; a policy-based VPN policy does not use apolicy referencing the IPsec VPN

考题 Your network contains a Virtualization environment that includes the following: - 10 hosts that run VMware ESX Server 4.0 - Microsoft System Center Virtual Machine Manager - 50 Hyper-V hosts that run Windows Server 2008 R2 Each Virtualization host contains a minimum of 15 virtual machines (VMs). You need to recommend a solution to ensure that users can create and deploy VMs to any of the virtualization hosts. The VMs must be based on templates created by an administrator. What should you include in the recommendation?()A、Microsoft System Center Data Protection ManagerB、Microsoft Enterprise Desktop Virtualization (MED-V) Workspace PackagerC、VMM Self-service PortalD、System Center Virtual Machine Manager physical-to-virtual machine (P2V) conversionE、Virtual Machine Servicing Tool (VSMT)F、Authorization ManagerG、Microsoft Application Virtualization (App-V) SequencerH、Microsoft System Center Operations ManagerI、System Center Virtual Machine Manager virtual-to-virtual machine (V2V) conversionJ、Active Directory Rights Management Services (AD RMS)

考题 Your company has a single Active Directory directory service domain that includes a main office and two branch offices. Each branch office has its own Active Directory site. All user accounts are placed into organizational units (OUs) based on department. Multiple Group Policy objects (GPOs) are linked at the domain, the site, and the OU levels. A user in Atlanta transfers to a different branch office and joins a different department. You move her user account into the corresponding OU. After logging on to her new client computer, the user notices that the desktop settings are different from the settings she had in her previous location. You need to find out the effect of all GPOs on the user.  What should you do?()A、 Use the Security Configuration and Analysis snap-in.B、 Use the Resultant Set of Policy snap-in.C、 Run the Secedit /analyze command.D、 Run the Secedit /validate command.

考题 You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()A、Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computersB、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersC、Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersD、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers

考题 You work as a network exchange administrator at company.com.thecompany.com network currently consists of a single active directory forest containing a single domain named company.com.the company.com organization makes use of microsoft exchange server 2010 as their messaging solution.in each of the organizational units in the company.com forest, a user has been identified to manage recipients in their specific organizational units.During the course of the business week you receive instruction from company.com to ensure that these chosen users will indeed have the ability to manage recipients in a specific organizational unit (ou).what should you do?()A、you should consider using role based access control (rbac) and having a new management scope created.B、you should consider using role based access control (rbac) and having the default management scope modified.C、you should consider having a new direct role assignment created.D、you should consider having a new management role assignment policy created.

考题 A bank runs 50 workstations and would like to decrease its electricity costs, while not sacrificing functionality. All of the workstations are high-end performance units that are intended to be used for CAD-like applications. Analysts benefit from the added performance, but tellers and associates could use more minimalist systems. Which of the following methods would decrease the banks electricity and hardware costs?()A、Swap all teller and associate machines with servers.B、Swap all teller and associate machines with thin clients.C、Swap all teller and associate machines with low-profile high-end workstations.D、Swap all teller and associate machines with laptops.

考题 Your company has a server named Server1 that runs Windows Server 2008 and Microsoft Hyper-V. Server1 hosts three virtual machines.  Company policy states that the virtual machines must not connect to the company network.  You need to configure all of the virtual machines to connect to each other. You must meet the company policy.  Which two actions should you perform?()A、Select the Not connected option for each virtual machine.B、Enable the Enable virtual LAN identification option for each virtual machine.C、Set the Connection to Host for the network interface card.D、Set the Connection to None for the network interface card.

考题 单选题A bank runs 50 workstations and would like to decrease its electricity costs, while not sacrificing functionality. All of the workstations are high-end performance units that are intended to be used for CAD-like applications. Analysts benefit from the added performance, but tellers and associates could use more minimalist systems. Which of the following methods would decrease the banks electricity and hardware costs?()A Swap all teller and associate machines with servers.B Swap all teller and associate machines with thin clients.C Swap all teller and associate machines with low-profile high-end workstations.D Swap all teller and associate machines with laptops.

考题 单选题You are an enterprise administrator for Cer-tech .com. All the servers on the network run Windows Server2008. The network consists of a server called Server01 that runs Microsoft Hyper-V and hosts three virtualmachines. To fulfill a network requirement, you need to configure all of the virtual machines to connect toeach other. However, the company policy states that the virtual machines must not connect to the companynetwork. Which of the following options would you choose to ensure that all the virtual machines connect to eachother and you meet the company policy also?()A Enable the Enable virtual LAN identification option for each virtual machineB Enable the Enable virtual LAN identification option for each virtual machine and then set the connection to Host for the network interface cardC Set the Connection to None for the network interface cardD Select the Not connected option for each virtual machine.

考题 单选题Your company has an Active Directory directory service domain. All servers run Windows Server 2003. You are developing a security monitoring plan. You must monitor the files that are stored in a specific directory on a member server. You have the following requirements. Log all attempts to access the files.Retain log information until the full weekly backup occurs. You need to ensure that the security monitoring plan meets the requirements.  What should your plan include?()A  Configure a directory service access audit policy. Increase the maximum size of the security log.B  Configure a directory service access audit policy. Set the system log to overwrite events older than 7 days.C  Configure an object access audit policy for the directory. Increase the maximum size of the system log.D  Configure an object access audit policy for the directory. Set the security log to overwrite events older than 7 days.

考题 单选题A system administrator wants to configure 802.1X on an Ethernet switch to enable access to specific parts of the network based on group memberships.How can the administrator accomplish this goal?()A Configure roles based on departments and assign access based on source IP address.B Configure roles based on the user's manager and assign access based on the user's MAC addressC Configure roles based on group memberships and assign a specific VLAN to the role.D Configure roles based on RADIUS request attribute and assign a specific VLAN to the role.

考题 单选题Your company has a single Active Directory directory service domain that includes a main office and two branch offices. Each branch office has its own Active Directory site. All user accounts are placed into organizational units (OUs) based on department. Multiple Group Policy objects (GPOs) are linked at the domain, the site, and the OU levels. A user in Atlanta transfers to a different branch office and joins a different department. You move her user account into the corresponding OU. After logging on to her new client computer, the user notices that the desktop settings are different from the settings she had in her previous location. You need to find out the effect of all GPOs on the user.  What should you do?()A  Use the Security Configuration and Analysis snap-in.B  Use the Resultant Set of Policy snap-in.C  Run the Secedit /analyze command.D  Run the Secedit /validate command.

考题 单选题Which statement regarding the implementation of an IDP policy template is true?()A IDP policy templates are automatically installed as the active IDP policy.B IDP policy templates are enabled using a commit script.C IDP policy templates can be downloaded without an IDP license.D IDP policy templates are included in the factory-default configuration.

考题 单选题Which of the following requires an update to the baseline after installing new software on a machine?()A Signature-based NIPSB Signature-based NIDSC HoneypotD Behavior-based HIDS

考题 单选题You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()A Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computersB Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersC Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersD Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers

考题 单选题Regarding a route-based versus policy-based IPsec VPN, which statement is true?()A A route-based VPN generally uses less resources than a policy-based VPN.B A route-based VPN cannot have a deny action in a policy; a policy-based VPN can have a deny action.C A route-based VPN is better suited for dialup or remote access compared to a policy-based VPN.D A route-based VPN uses a policy referencing the IPsec VPN; a policy-based VPN policy does not use apolicy referencing the IPsec VPN

考题 单选题Which of the following technologies can provide geographically based load balancing with high availability between two web servers with static content?()A  MulticastB  Active/passive clusterC  Active/active clusterD  DNS round robin

考题 单选题You work as a network exchange administrator at company.com.thecompany.com network currently consists of a single active directory forest containing a single domain named company.com.the company.com organization makes use of microsoft exchange server 2010 as their messaging solution.in each of the organizational units in the company.com forest, a user has been identified to manage recipients in their specific organizational units.During the course of the business week you receive instruction from company.com to ensure that these chosen users will indeed have the ability to manage recipients in a specific organizational unit (ou).what should you do?()A you should consider using role based access control (rbac) and having a new management scope created.B you should consider using role based access control (rbac) and having the default management scope modified.C you should consider having a new direct role assignment created.D you should consider having a new management role assignment policy created.

考题 多选题Your company has a server named Server1 that runs Windows Server 2008 and Microsoft Hyper-V. Server1 hosts three virtual machines.  Company policy states that the virtual machines must not connect to the company network.  You need to configure all of the virtual machines to connect to each other. You must meet the company policy.  Which two actions should you perform?()ASelect the Not connected option for each virtual machine.BEnable the Enable virtual LAN identification option for each virtual machine.CSet the Connection to Host for the network interface card.DSet the Connection to None for the network interface card.

考题 单选题Machine policy templates can be assigned based on certain attributes of a machine. A customer  organizes their machines based on the following requirements:   The machines are all placed in specific Organizational Units in the Active Directory.   The customer has Citrix Servers, and they have a specific naming convention meant only for their Citrix Servers. The customer has DHCP enabled for all the client machines.   The customer has made it clear that they should not need to change anything in the existing infrastructure. Given these requirements, which single assignment attribute would be chosen for assigning machine policy templates?()A HostnamesB IP AddressesC Machine Group TagD Active Directory Groups

考题 单选题The Company should clearly define and document the master’s responsibility with regard to all the following items except().A implementing the safety and environmental protection policy of the CompanyB preparing procedures to respond to emergency situationsC verifying that specified requirements are observedD reviewing the SMS and reporting its deficiencies to the shore based management