考题
– It’s our great pleasure to have you visit our company. --_________________A、Thank you.B、Nice to meet you.C、It’s our pleasure, too.D、Wonderful.
考题
You need to recommend a strategy for the computer lab that meet the company’s technical requirements. What should you recommend?()A、Enable the loopback setting in GPO2. Enable the Enforced option in GPO1.B、Enable the Block Inheritance option on Lab OU. Enable the Enforced option in GPO1.C、Enable the loopback setting in GPO2. Disable the user configuration settings in GPO3.D、Enable the Block Inheritance option on Lab OU. Disable the user configuration settings in GPO3.
考题
You need to recommend a backup strategy for the servers in the San Francisco office. The strategy must meet the company's technical requirements What should you include in the recommendation?()A、native-boot virtual hard disks (VHDs)B、Microsoft System Center Data Protection Manager 2010C、system restore pointsD、Windows Server Backup
考题
You need to recommend changes to the environment that meet the company’s user requirements. What should you include in the recommendation?()A、a BranchCache in Distributed Cache modeB、a BranchCache in Hosted Cache modeC、Distributed File System (DFS) namespacesD、Distributed File System (DFS) Replication
考题
You need to design a remote access strategy for the customer support users when they work from home. Your solution must meet security requirements. What should you do?()A、Deploy an L2TP/IPsec VPN server in each call center. Configure the portable computers as L2TP VPN clientsB、Create IPSec tunnel mode connections between the customer support users home and the company’s Internet-facing routersC、Create IP packet filters on the company’s Internet-facing routers to allow the Remote Desktop Protocol (RDP).Create IPSec filters on the terminal servers to allow only connections that use RDPD、Create IP packet filters on the company’s Internet-facing routers to allow the IPSec protocols. Assign the Secure Server (Require Security) IPSec policy to the terminal servers. Assign the Client (Respond only) IPSec policy to the portable computers
考题
You need to recommend a solution for monitoring the servers. The solution must meet the company’s technical requirements What should you include in the recommendation?()A、Data Collector Sets (DCSs)B、event subscriptionsC、Reliability MonitorD、Windows System Resource Manager (WSRM)
考题
You need to recommend a solution for configuring the Web servers. The solution must meet the company’s technical requirements.What should you include in the recommendations?()A、Active Directory Lightweight Directory Services (AD LDS)B、Failover ClusteringC、HTTP redirectionD、IIS Shared Configuration
考题
You need to design a security patch management strategy. Your solution must meet business and security requirements, and it must accommodate the company’s resource restrictions. What should you do?()A、Test and manually deploy updatesB、Deploy a Software Update Services (SUS) server. Test all updates and then approve them. Configure all client computers to automatically obtain updates from the serverC、Test all updates and then use a third-party utility to repackage updates in a Windows Installer file. Deploy the -.msi files by using Group PolicyD、Configure all client computers to use Automatic Updates to obtain security updates from the Windows Update Web site. Test all updates posted to the Windows Update Web site
考题
You need to recommend a solution for improving the automated deployment of servers. The solution must meet the company’s technical requirements.What should you include in the recommendation?()A、an offline domain joinB、native-boot virtual hard disks(VHDs)C、the Offline servicing of imagesD、the Online servicing of images
考题
You need to recommend a strategy for delegating administrative rights to Admin1. The strategy must support the company’s planned changes.What should you include in the recommendation?()A、the Authorization Manager snap-in on Node1 and Node2B、the Authorization Manager snap-in on the VMsC、the Network Configuration Operators local group on each VMD、the Network Configuration Operators local group on Node1 and Node2
考题
You need to recommend a solution for managing the service accounts for SQL1 and SQL2. The solution must meet the company’s security requirements. What should you include in the recommendation?()A、a custom password filterB、a Password Settings object (PSO)C、managed service accountsD、manual password changes
考题
You need to implement an auditing strategy that will fulfill the company’s business requirements.What should you do?()A、Use C2 auditing.B、Use DML triggers.C、Use DDL triggers.D、Use event notifications.
考题
You need to recommend a security strategy for WebApp2 that meets the company’s applicaton requirements.What should you include in the recommendation?()A、Basic authentication and connection security rulesB、Basic authentication and SSLC、Digest authentication and connection security rulesD、Digest authentication and SSL
考题
多选题You need to recommend changes to the DFS infrastructure that meet the company’s techical requirements. What should you recommend implementing in each branch office?()Aa DFS namespace serverBa DFS replicaCa standalone DFS namespaceDBranchCache in Distributed Cache modeEBranchCache in Hosted Cache mode
考题
单选题You need to design a strategy to meet the company’s requirements for e-mail. What should you do?()A
Configure and publish a certificate template that is suitable for S/MIME, Deploy a Group Policy object (GPO) so that a certificate that is based on this template is automatically issued to all domain usersB
Specify Group Policy objects (GPOs) and IPSec policies that require all client computers to use Kerberos authentication to connect to mail serversC
For each mail server, acquire an SSL server certificate from a commercial CA whose root certificate is already trustedD
Require IPSec encryption on all TCP connections that are used to send or receive e-mail messages
考题
单选题You need to ensure that all servers meet the company’s security requirements. Which tool should you use?()A
Microsoft Baseline Security Analyzer (MBSA)B
Microsoft Security Assessment Tool (MSAT)C
Resultant Set of Policy (RSoP)D
Security Configuration Wizard (SCW)
考题
单选题You need to recommend a strategy for the file servers that meets the company’s technical requirements. What should you recommend?()A
Implement active file screens.B
Implement passive file screens.C
Configure classification rules.D
Configure File Server Resource Manager (FSRM) quotas.
考题
单选题Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers. You are planning to deploy Windows 7 Enterprise to the client computers. You need to design a zero-touch installation strategy.()A
unattended installationB
custom Windows 7 image on DVDC
Windows Deployment Services (WDS)D
Microsoft System Center Configuration Manager 2007 R2
考题
单选题You need to recommend changes to the intranet site that meet the company’s technical requirements. What should you include in the recommendation?()A
additional application poolsB
additional worker processesC
Failover ClusteringD
Network Load Balancing (NLB)
考题
单选题You need to recommend a solution for managing the service accounts for SQL1 and SQL2. The solution must meet the company’s security requirements. What should you include in the recommendation?()A
a custom password filterB
a Password Settings object (PSO)C
managed service accountsD
manual password changes
考题
单选题You need to recommend a solution for managing the address information of the user accounts. The solution must meet the company’s security requirements. What should you include in the recommendation?()A
Active Directory delegationB
Authorization ManagerC
built-in security groupsD
user rights assignments