网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

It is a company’s policy to shut down all workstations at the end of the day. However, the majority of employees are leaving disks in their workstations and upon start up the next morning they are receiving a ‘NTLDR is missing’ error. Which of the following is a possible solution?()

  • A、Make a daily announcement to remove all disks before departing for the day.
  • B、Change the Boot order in the BIOS.
  • C、Make it a part of the evening checks to ensure all disks are removed.
  • D、Make a company policy that states that it is unlawful to leave disks in the machines.

参考答案

更多 “ It is a company’s policy to shut down all workstations at the end of the day. However, the majority of employees are leaving disks in their workstations and upon start up the next morning they are receiving a ‘NTLDR is missing’ error. Which of the following is a possible solution?()A、Make a daily announcement to remove all disks before departing for the day.B、Change the Boot order in the BIOS.C、Make it a part of the evening checks to ensure all disks are removed.D、Make a company policy that states that it is unlawful to leave disks in the machines.” 相关考题
考题 Insurance (保险) may be considered a game of risk in which individuals and businesses protect themselves, their families, and their property from possible losses resulting from unpredictable events such as storms, fires, accidents and illnesses. The first rule of the game, devised centuries age, is "share the risk". To play by this rule, many people take a small loss in place of one person′ s taking a large one. It is a simple idea: an individual pays a small amount of money called a premium (保险费) to an agent who acts on behalf of an insurance company, or underwriter, which holds the individual′s premium and the premiums paid by thousands of others. The individual receives an insurance policy, a promise that if there is a loss to the individual as defined in the policy the insurance company will pay for it. The funds will come from the individual′s premium, the premium paid by others who did not have losses, and money from the company′ s investment of all the premiums. An individual who does not have a loss loses the premium money but purchases what insurance underwriters call "peace of mind". It is a gamble for the customer and the underwriter, but it is built on the first rule of risk that losses are small when shared by many. The money the insurance used to pay for an individual′ s loss comes from ___________.A.the premium paid by the person previously B.the insurance company's investment C.the premiums paid by other persons D.all of the above

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a server named S01 that runs Windows Server 2008 and Hyper-V inyour company. Three virtual machines are hosted on S01. According to the requirement of company policy,the virtual machines must not connect to the company network. All of the virtual machines need to beconfigured to connect to each other. You must meet the company policy. Which should you do?()A、The Connection should be set to Host for the network interface card.B、The Connection should be set to None for the network interface card.C、You should choose the Not connected option for each virtual machine.D、The Enable virtual LAN identification option should be enabled for each virtual machine.

考题 Which should be the key driver for a company security policy’s creation, implementation and enforcement?()A、 the business knowledge of the IT staffB、 the technical knowledge of the IT staffC、 the company’s business objectivesD、 the company’s network topologyE、 the IT future directions

考题 You want to enforce a company’s business policy on several objects by using a single policy function. Which two types of policies can be assigned to the policy_type argument in the dbms_rls.add_policy procedure to achieve the above objective? ()A、 DBMS_RLS.STATICB、 DBMS_RLS.DYNAMICC、 DBMS_RLS.SHARED_STATICD、 DBMS_RLS.CONTEXT_SENSITIVEE、 DBMS_RLS.SHARED_CONTEXT_SENSITIVE

考题 You want to enforce a company’s business policy on several objects by using a singlepolicy function.  Which two types of policies can be assigned to the policy_type argument in the dbms_rls.add_policy procedure to achieve the above objective?()A、DBMS_RLS.STATICB、DBMS_RLS.DYNAMICC、DBMS_RLS.SHARED_STATICD、DBMS_RLS.CONTEXT_SENSITIVEE、DBMS_RLS.SHARED_CONTEXT_SENSITIVE

考题 You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com policy prohibits the users from changing their password by using Outlook Web App (OWA). What should you do?()A、The best option is to set up an Outlook Web App Mailbox policy so that the users comply with the Company.com policy.B、The best option is to set up a Group Policy Object so that the users comply with the Company.com policy.C、The best option is to change the authentication settings of the OWA virtual directory so that the users comply with the Company.com policy.D、The best option is to change the authentication settings of the IISADMPWD virtual directory so that the users comply with the Company.com policy.

考题 You need to design a remote access strategy for the customer support users when they work from home. Your solution must meet security requirements. What should you do?()A、Deploy an L2TP/IPsec VPN server in each call center. Configure the portable computers as L2TP VPN clientsB、Create IPSec tunnel mode connections between the customer support users home and the company’s Internet-facing routersC、Create IP packet filters on the company’s Internet-facing routers to allow the Remote Desktop Protocol (RDP).Create IPSec filters on the terminal servers to allow only connections that use RDPD、Create IP packet filters on the company’s Internet-facing routers to allow the IPSec protocols. Assign the Secure Server (Require Security) IPSec policy to the terminal servers. Assign the Client (Respond only) IPSec policy to the portable computers

考题 All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()A、Configure the Network authentication (Shared mode) setting.B、Apply a Wireless Network Policy to set the network type to WPA-PSK.C、Apply a Wireless Network Policy to automatically connect to the company wireless network.D、Apply a Wireless Network Policy to set the company wireless network as the preferred network.

考题 You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com policy prohibits the users from changing their password by using Outlook Web App (OWA).However, they can use Windows to change their passwords.What should you do?()A、The best option is to configure the settings on the Segmentation tab, in the properties of the OWA virtual directory so that the users comply with the Company.com policy.B、The best option is to configure the settings on the Account tab, in the properties of the user accounts so that the users comply with the Company.com policy.C、The best option is to configure the settings on the Mailbox Features tab, in the properties of the mailboxes so that the users comply with the Company.com policy.D、The best option is to configure the settings on the Authentication tab, in the properties of the OWA virtual directory so that the users comply with the Company.com policy.

考题 You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com security policy prohibits the employees to send certain words between them.What should you do?()A、The best option is to create an Outlook Protection Rule to comply with the Company.com security policy.B、The best option is to set up a content filtering feature to comply with the Company.com security policy.C、The best option is to create a transport rule to comply with the Company.com security policy.D、The best option is to set up a sender reputation feature to comply with the Company.com security policy.

考题 You are the desktop administrator for your company's sales department. The IT manager for the sales department creates a custom policy that will apply to a custom application that is loaded on the department's Windows XP Professional computers. He deploys this policy by using Group Policy. When you inspect the sales department's computers, you find out that the application has not been modified by the policy. You want to examine Windows XP Professional to find out whether the custom policy is affecting the correct location in the Registry. Which command should you run?()A、Msinfo32. exeB、Gpresult.exeC、Gpedit.mscD、Rsop.msc

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is an Active Directory domain in your company. Windows Server 2008 isrun by two servers named S01 and S02. The Terminal Services server role is installed on S01. TheTerminal Services Licensing role service is installed on S02. Only 10 Terminal Services Client AccessLicenses are available. Now you receive an order from the company management. According to the company requirement, you have to limit the number of concurrent users connected to the Terminal Serverto 10. So what action should you perform?()A、A Group Policy object (GPO) should be created. Enable the Set the Terminal Services licensing modepolicy setting should be enabled and the Per Device option chosen. The GPO should be applied to S01.B、A Group Policy object (GPO) should be created. Enable the Set the Terminal Services licensing modepolicy setting should be enabled and the Per Device option chosen. The GPO should be applied to S02.C、A Group Policy object (GPO) should be created. The Set the Terminal Services licensing mode policysetting should be enabled and the Per User option should be chosen. The GPO should be applied to S01.D、A Group Policy object (GPO) should be created. The Set the Terminal Services licensing mode policysetting should be enabled and the Per User option should be chosen. The GPO should be applied to S02.

考题 单选题You are a database administrator for your company. The company uses a SQL Server 2005 database that includes a table named Inventory. The table contains a column named Price. A company policy states that the value in the Price column cannot be decreased by more than 10 percent in any single database operation. Updates to the Price column are made by various means, including by using ad hoc queries. You need to ensure that this company policy is enforced. What should you do?()A Create a trigger that rolls back changes to the Price column that violate company policy.B Create a stored procedure that disallows changes to the Price column that violate company policy.C On the Price column, create a check constraint that requires a specified minimum value.D On the Price column, create a foreign key constraint to a table that contains valid prices.

考题 单选题Your company has an Active Directory forest. The company has servers that run Windows Server 2008 amd client computers that run Windows Vista. The domain uses a set of GPO administrative templates that have been approved to support regulatory compliance requirements. Your partner company has an Active Directory forest that contains a single domain, The company has servers that run Windows Server 2008 and client computers that run Windows Vista. You need to configure your partner company’s domain to use the approved set of administrative templates. What should you do()A Use the Group Policy Management Console (GPMC) utility to back up the GPO to a file. In each site, import the GPO to the default domain policy.B Copy the ADMX files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PDC emulatorC Copy the ADML files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PDC emulatorD Download the conf.adm, system.adm, wuau.adm, and inetres.adm files from the Microsoft Updates Web site. Copy the ADM files to the PolicyDefinitions folder on thr partner company’s emulator.

考题 单选题You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as the administrator of a SQL Server 2005 computer, and the computer is named SQL1. Microsoft Windows Server 2003 is run by all servers. All the servers belong to a Microsoft Active Directory domain. According to the company written security policy, strong passwords are mandated for all domain, local, and application accounts. The company utilizes a Group Policy object (GPO) to deploy the proper domain password policy. MS-DOS-based or UNIX-based operating systems are run by many of the company’s computers. Varying levels of access to a database named Services on SQL1 is requested by the computers. Since you are the database administrator, you are required to confirm that the Services database can be accessed by these computers. And the company’s written security policy should not be violated.  Which action should be performed by you?()A A domain account should be created for each of the company’s users. And then, each domain account should be offered with access to SQL1 and the Services database.B A local logon account should be created on SQL1 for each of the company’s users. And then, each logon account should be offered with access to SQL1 and the Services database.C One SQL Server logon account should be created for all of the company’s computers running MS-DOS or UNIX-based operating systems. And then, the Enforce password policy option should be enabled for users’ accounts. At last, the logon accounts should be provided with access to the Services database.D A SQL Server logon account should be created for each of the company’s users. And then, the Enforce password policy option should be enabled for each logon account. At last, each logon account should be offered with access to the Services database.E A virtual directory should be configured through Internet Information Services (IIS) for access to SQL1. And then, users should be directed to the virtual directory for data access.

考题 单选题You are the administrator of a SQL Server 2005 computer named SQL1. All servers run Microsoft Windows Server 2003 and belong to a Microsoft Active Directory domain. The companys written security policy mandates strong passwords for all domain, local, and application accounts. The appropriate domain password policy has been deployed through the use of a Group Policy object (GPO). Many of the company’s computers run MS-DOS-based or UNIX-based operating systems. These computers require varying levels of access to a database named Services on SQL1. You need to ensure that these computers can access the Services database without violating the company’s written security policy.  What should you do?()A Create a domain account for each of the company’s users. Provide each domain account with access to SQL1 and the Services database.B Create a local logon account on SQL1 for each of the company’s users. Provide each logon account with access to SQL1 and the Services database.C Create a SQL Server logon account for each of the company’s users. Enable the Enforce password policy option for each logon account. Provide each logon account with access to the Services database.D Configure a virtual directory through Internet Information Services (IIS) for access to SQL1. Direct users to the virtual directory for data access.E Create one SQL Server logon account for all of the company’s computers running MS-DOS or UNIX-based operating systems. Enable the Enforce password policy option for users’ accounts. Provide the logon accounts with access to the Services database.

考题 单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.the Company.com contains an exchange server 2010 client access server named -ex12.Company.com has an employee named andy booth.he uses exchange activesync to down load attachment.You have received instructions from the cio to limit andy booth’s attachments size;however your action should not in any way affect the other employees at Company.com.What should you do?()A The best option is to set up a new managed content setting.B The best option is to change Andy Booth’s message size restrictions.C The best option is to set up a new Exchange ActiveSync mailbox policy.D The best option is to change the default Exchange ActiveSync mailbox policy.

考题 单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com security policy prohibits the employees to send certain words between them.What should you do?()A The best option is to create an Outlook Protection Rule to comply with the Company.com security policy.B The best option is to set up a content filtering feature to comply with the Company.com security policy.C The best option is to create a transport rule to comply with the Company.com security policy.D The best option is to set up a sender reputation feature to comply with the Company.com security policy.

考题 单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services,and configuring aweb services infrastructure. There is an Active Directory domain in your company. The company has aserver which is named S01. S01 has the Terminal Services server role and the TS Web Access role service installed. The company has a server named S02 that runs ISA Server 2006. The company deploysthe Terminal Services Gateway (TS Gateway) role on a new server named S03. The company wants to useISA as the SSL endpoint for Terminal Server connections. You have to configure the TS Gateway role onS03 to use ISA 2006 on S02. What action should you perform?()A A self-signed SSL certificate should be exported from S03 and the SSL certificate should be installedon S02. The ISA service on S02 should be configured to use the SSL certificate from S03.B The TS Gateway should be configured to use SSL HTTPS-HTTP bridging.C The Terminal Services Connection Authorization Policy Store on S03 should be configured to use S02as the Central Network Policy Server.D The SSL certificate should be exported from S02 and the SSL certificate should be installed on S03.The TS Gateway should be configured to use the SSL certificate from S02.

考题 单选题You are the desktop administrator for your company's sales department. The IT manager for the sales department needs to distribute three custom applications to the department's Windows XP Professional computers. She deploys these applications by using Group Policy. Some users report that they must log on several times before the newly deployed applications are present on their computers. You need to ensure that all software is deployed the next time the users log on. What should you do?()A Enable the Always wait for the network at computer startup and logon policy.B Enable the Always use classic logon policy. C Enable the Turn off background refresh of Group Policy policy.D Enable the Group Policy slow link detection policy. 

考题 单选题You need to recommend a solution for managing the GPOs that supports the company's planned changes.   What should you include in the recommendation?()A Group Policy Management Console (GPMC) and Authorization ManagerB Group Policy Management Console (GPMC) and Microsoft SharePoint Foundation 2010C Microsoft Desktop Optimization Pack (MDOP)D Microsoft System Center Configuration Manager

考题 单选题Your company has an Active Directory forest. The company has servers that run Windows Server  2008 R2 and client computers that run Windows 7. The domain uses a set of GPO administrative  templates that have been approved to support regulatory compliance requirements.     Your partner company has an Active Directory forest that contains a single domain. The company  has servers that run Windows Server 2008 R2 and client computers that run Windows 7.     You need to configure your partner company’s domain to use the approved set of administrative  templates.   What should you do()A Use the Group Policy Management Console (GPMC) utility to back up the GPO to a file. In each site, import the GPB Copy the ADMX files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PDCC Copy the ADML files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PDC D Download the conf.adm, system.adm, wuau.adm, and inetres.adm files from the Microsoft Updates Web site. 

考题 单选题Which should be the key driver for a company security policy’s creation, implementation and enforcement?()A  the business knowledge of the IT staffB  the technical knowledge of the IT staffC  the company’s business objectivesD  the company’s network topologyE  the IT future directions

考题 多选题You want to enforce a company’s business policy on several objects by using a single policy function. Which two types of policies can be assigned to the policy_type argument in the dbms_rls.add_policy procedure to achieve the above objective? ()ADBMS_RLS.STATICBDBMS_RLS.DYNAMICCDBMS_RLS.SHARED_STATICDDBMS_RLS.CONTEXT_SENSITIVEEDBMS_RLS.SHARED_CONTEXT_SENSITIVE

考题 多选题You want to enforce a company’s business policy on several objects by using a singlepolicy function.  Which two types of policies can be assigned to the policy_type argument in the dbms_rls.add_policy procedure to achieve the above objective?()ADBMS_RLS.STATICBDBMS_RLS.DYNAMICCDBMS_RLS.SHARED_STATICDDBMS_RLS.CONTEXT_SENSITIVEEDBMS_RLS.SHARED_CONTEXT_SENSITIVE

考题 单选题You need to recommend a solution for managing Group Policy that meets the company’s technical  requirements.   What should you recommend?()A Implement a central store.B Upgrade DC3 to Windows Server 2008 R2.C Create starter Group Policy objects (GPOs).D Deploy Advanced Group Policy Management (AGPM).

考题 单选题()means a structured and documented system enabling company personal to implement effectively the company safety and environmental protection policy.A SMSB ISMC SOLASD SMC