网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

You are using ADU and are authenticated and associated to an access point. You are unable toobtain an IP address. Which of the following will cause this problem?()

  • A、AES encryption enabled
  • B、TKIP enabled
  • C、third-party wireless supplicant enabled
  • D、802.1X authentication type enabled

参考答案

更多 “ You are using ADU and are authenticated and associated to an access point. You are unable toobtain an IP address. Which of the following will cause this problem?()A、AES encryption enabledB、TKIP enabledC、third-party wireless supplicant enabledD、802.1X authentication type enabled” 相关考题
考题 An administrator account is granted the CREATE SESSION and SET CONTAINER system privileges.A multitenant container database (CDB) instant has the following parameter set:THREADED_EXECUTION = FALSEWhich four statements are true about this administrator establishing connections to root in a CDB that has been opened in read only mode?()A. You can conned as a common user by using the connect statement.B. You can connect as a local user by using the connect statement.C. You can connect by using easy connect.D. You can connect by using OS authentication.E. You can connect by using a Net Service name.F. You can connect as a local user by using the SET CONTAINER statement.

考题 Your company has an Active Directory Domain Services (AD DS) domain. You virtualize applications by using Microsoft Application Virtualization (App-V).You are creating an application virtualization package.Which should you use?()A.Microsoft Application Virtualization SequencerB.Microsoft Application Virtualization Desktop ClientC.Microsoft System Center Application Virtualization Streaming ServerD.Microsoft System Center Application Virtualization Management Server

考题 You want to check the EMP table in the user, Scott’s schema for block corruption. You also want to fix the corrupted blocks, if any. How will you accomplish the required task?()A、by using the ANALYZE utilityB、by using the DBVERIFY utilityC、by using the DB_BLOCK_CHECKING parameterD、by using the DBMS_REPAIR package

考题 You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5.  An exception management framework is not used in the Web application. You need to ensure thatthe application log the unhandled exceptions automatically to the event log. You need to configurethe Web.config file to accomplish this. Identify the configuration that will assist you in thisscenario?()A、You should consider using the healthMonitoring enabled="true"/ configuration.B、You should consider using the deployment retail="true"/ configuration.C、You should consider using the customErrors mode="On"/ configuration.D、You should consider using the trace enabled="true"/ configuration.

考题 You deploy an Active Directory Federation Services (AD FS) Federation Service Proxy on a  server named Server1.   You need to configure the Windows Firewall on Server1 to allow external users to authenticate by  using AD FS.     Which inbound TCP port should you allow on Server1()A、88B、135C、443D、445

考题 Active Directory Rights Management Services (AD RMS) is deployed on your network. Users who have Windows Mobile 6 devices report that they cannot access documents that are protected by  AD RMS.   You need to ensure that all users can access AD RMS protected content by using Windows  Mobile 6 devices.  What should you do()A、Modify the security of the ServerCertification.asmx file.B、Modify the security of the MobileDeviceCertification.asmx file.C、Enable anonymous authentication for the _wmcs virtual directory.D、Enable anonymous authentication for the certification virtual directory.

考题 You have an Exchange Server 2010 organization and an Active Directory Rights Management Services(AD RMS) server.  All users access their mailboxes by using Outlook Web App (OWA).  You need to plan a security solution for the organization to meet the following requirements:.Secure messages by using administrator-defined templates  .Ensure that e-mail messages sent by users can be stored in an encrypted format  What should you include in the plan?()A、a legal holdB、Domain SecurityC、Outlook Protection RulesD、Secure/Multipurpose Internet Mail Extensions (S/MIME)

考题 Certkiller .com has a main office and a branch office. Certkiller .com’s network consists of a single Active Directory forest. Some of the servers in the network run Windows Server 2008 and the rest run Windows server 2003.  You are the administrator at Certkiller .com. You have installed Active Directory Domain Services (AD DS) on a computer that runs Windows Server 2008. The branch office is located in a physically insecure place. It has not IT personnel onsite and there are no administrators over there. You need to setup a Read-Only Domain Controller (RODC) on the Server Core installation computer in the branch office. What should you do to setup RODC on the computer in branch office()A、Execute an attended installation of AD DSB、Execute an unattended installation of AD DSC、Execute RODC through AD DSD、Execute AD DS by using deploying the image of AD DSE、none of the above

考题 You work as the exchange administrator at company.com.the company.com network contains an exchange server 2010 organization.you are responsible for managing the exchange organization for company.com.during the course of the week you receive an instruction from the cio to change the exchange specific cost for a site link named kinglink1.what should you do?()A、you should consider setting up a site link bridge using the active directory sites and services snap-in.B、you should consider running the set-ad site cmdlet on the exchange management shell.C、you should consider having the properties of kinglink1 modified using the active directory users and computers snap-in.D、you should consider running the set-ad site link cmdlet on the exchange management shell.

考题 Your network contains an Active Directory domain named contoso.com. The network contains  client computers that run either Windows Vista or Windows 7. Active Directory Rights  Management Services (AD RMS) is deployed on the network.     You create a new AD RMS template that is distributed by using the AD RMS pipeline. The  template is updated every month.   You need to ensure that all the computers can use the most up-to-date version of the AD RMS  template. You want to achieve this goal by using the minimum amount of administrative effort.     What should you do()A、Upgrade all of the Windows Vista computers to Windows 7.B、Upgrade all of the Windows Vista computers to Windows Vista Service Pack 2 (SP2).C、Assign the Microsoft Windows Rights Management Services (RMS) Client Service Pack 2 (SP2) to all users by usinD、Assign the Microsoft Windows Rights Management Services (RMS) Client Service Pack 2 (SP2) to all computers by

考题 Your company has an Active Directory Domain Services (AD DS) domain. You virtualize applications by using Microsoft Application Virtualization (App - V). You are creating an application virtualization package. Which sh ould you use?()A、Microsoft Application Virtualization SequencerB、Microsoft Application Virtualization Desktop ClientC、Microsoft System Center Application Virtualization Streaming ServerD、Microsoft System Center Application Virtualization Management Server

考题 Your company has an Active Directory Domain Services (AD DS) domain. You have a Windows Server 2008 R2 Hyper-V server. You manage the virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to ensure that a user can create new virtual machines (VMs) on only a specific set of servers . The user must not be able to see or manage servers outside of that set within VMM . Which two actions should you perform?()A、Create a host group. Add the host servers that the user will manage to the host group.B、Create a failover cluster. Join the host servers that the user will manage to the failover cluster.C、Using Authorization Manager, assign the user to a role with the necessary permission to manage the servers by using VMM.D、Using Authorization Manager, assign the user to a role with the necessary permission to manage the servers by using the VMM Self-Service Portal.

考题 Your network contains a server named Server1 that runs Windows Server 2008 R2.  On Server1, you create an Active Directory Lightweight Directory Services (AD LDS) instance named Instance1.   You connect to Instance1 by using ADSI Edit.   You run the Create Object wizard and you discover that there is no User object class.   You need to ensure that you can create user objects in Instance1.   What should you do()A、Run the AD LDS Setup Wizard.B、Modify the schema of Instance1.C、Modify the properties of the Instance1 service.D、Install the Remote Server Administration Tools (RSAT).

考题 单选题You work as the exchange administrator at company.com.the company.com network contains an exchange server 2010 organization.you are responsible for managing the exchange organization for company.com.during the course of the week you receive an instruction from the cio to change the exchange specific cost for a site link named kinglink1.what should you do?()A you should consider setting up a site link bridge using the active directory sites and services snap-in.B you should consider running the set-ad site cmdlet on the exchange management shell.C you should consider having the properties of kinglink1 modified using the active directory users and computers snap-in.D you should consider running the set-ad site link cmdlet on the exchange management shell.

考题 单选题Your company has an Active Directory domain.     You log on to the domain controller. The Active Directory Schema snap-in is not available in the  Microsoft Management Console (MMC).   You need to access the Active Directory Schema snap-in.     What should you do()A Register Schmmgmt.dll.B Log off and log on again by using an account that is a member of the Schema Admins group.C Use the Ntdsutil.exe command to connect to the schema master operations master and open the schema for writingD Add the Active Directory Lightweight Directory Services (AD/LDS) role to the domain controller by using Server Man

考题 多选题You are designing a Windows Azure web application.  All users authenticate by using their Active Directory Domain Services (AD DS) credentials.  You need to recommend an approach for enabling single sign-on for domain-authenticated users.   Which two actions should you recommend?()AUse Forms authenticationto generate claims.BUse Active Directory Federation Services (AD FS) to generate claims.CUse SqlMembershipProvider in the web application.DUse Windows Identity Foundation in the web application.

考题 单选题Your network contains an Active Directory domain named contoso.com. The network contains client computers that run either Windows Vista or Windows 7.  Active Directory Rights Management Services  (AD RMS) is deployed on the network.   You create a new AD RMS template that is distributed by using the AD RMS pipeline. The template is  updated every month.   You need to ensure that all the computers can use the most up-to-date version of the AD RMS template.   You want to achieve this goal by using the minimum amount of administrative effort.   What should you do()A Upgrade all of the Windows Vista computers to Windows 7.B Upgrade all of the Windows Vista computers to Windows Vista Service Pack 2 (SP2).C Assign the Microsoft Windows Rights Management Services (RMS) Client Service Pack 2 (SP2) to all  users by using a Software Installation extension of Group Policy.D Assign the Microsoft Windows Rights Management Services (RMS) Client Service Pack 2 (SP2) to all  computers by using a Software Installation extension of Group Policy.

考题 单选题Your company has an Active Directory domain. You log on to the domain controller. The Active Directory Schema snap-in is not available in the Microsoft Management Console (MMC). You need to access the Active Directory Schema snap-in. What should you do()A Register Schmmgmt.dll.B Log off and log on again by using an account that is a member of the Schema Administrators group.C Use the Ntdsutil.exe command to connect to the Schema Master operations master and open the schema for writing.D Add the Active Directory Lightweight Directory Services (AD LDS) role to the domain controller by using Server Manager.

考题 单选题Certkiller.com has installed a server. You are assigned to install and run an instance of Active Directory Lightweight Directory Service (AD LDS). After doing necessary configurations, you start an instance of AD LDS successfully.  Now you need to create new Organizational Units in the AD LDS application directory partition. What should you do to create new OUs in the AD LDS application directory partition()A To create the OUs, use the dsmod OU  commandB Employ ADSI Edit Snap-in to create the OUs on the AD LDS application directory partition.C Create OUs by executing dsadd OU  commandD Create OUs on the AD LDS application directory partition by using Active Directory Users and computers snap-in.

考题 单选题Your Network contains a single AD Site.You install 10 new Exchange Server 2010 CAS.All servers are configured to use a wildcard certificate.Users connect to their Mailboxes by using Windows Mobile 6.5 devices.All devices are configured to connect to cas.contoso.com.You need to ensure that users can connect to their Mailboxes by using mail.contoso.com. Which cmdlet should you run?()A set-activesyncdeviceaccessruleB set-activesyncmailboxpolicyC set-activesyncorganizationsettingD set-activesyncvirtualdirectory