网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Your organization has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 7. You create a Windows XP image. You need to deploy the image as a virtual machine (VM) to the client computers so that the image can run in Windows Virtual PC. Which should you use? ()

  • A、Microsoft System Center Virtual Machine Manager (VMM) 2008 with a template
  • B、Microsoft Virtual Desktop Infrastructure (VDI)
  • C、Microsoft System Center Configuration Manager 2007 R2
  • D、Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 with a template

参考答案

更多 “ Your organization has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 7. You create a Windows XP image. You need to deploy the image as a virtual machine (VM) to the client computers so that the image can run in Windows Virtual PC. Which should you use? ()A、Microsoft System Center Virtual Machine Manager (VMM) 2008 with a templateB、Microsoft Virtual Desktop Infrastructure (VDI)C、Microsoft System Center Configuration Manager 2007 R2D、Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 with a template” 相关考题
考题 Your organization has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2.You need to deploy Microsoft Application Virtualization (App-V) 4.6 in a stand-alone configuration.Which should you install?()A.Microsoft Application Virtualization DatabaseB.Microsoft Application Virtualization Desktop ClientC.Microsoft System Center Application Virtualization Streaming ServerD.Microsoft System Center Application Virtualization Management Server

考题 Your company has a branch office that is configured as a separate Active Directory site and has  an Active Directory domain controller.     The Active Directory site requires a local Global Catalog server to support a new application.     You need to configure the domain controller as a Global Catalog server.     Which tool should you use()A、The Dcpromo.exe utilityB、The Server Manager consoleC、The Computer Management consoleD、The Active Directory Sites and Services consoleE、The Active Directory Domains and Trusts console

考题 Your network consists of a single Active Directory domain. All domain controllers run Windows Server2008 R2. Your company and an external partner plan to collaborate on a project. The external partner has an Active Directory domain that contains Windows Server 2008 R2 domain controllers. You need to design a collaboration solution that meets the following requirements:   èAllows users to prevent sensitive documents from being forwarded to untrusted recipients or from being  printed.   èAllows users in the external partner organization to access the protected content to which they have been granted rights.   èSends all inter-organizational traffic over port 443.   èMinimizes the administrative effort required to manage the external users. What should you include in your design?()A、Establish a federated trust between your company and the external partner. Deploy a Windows Server 2008 R2 server that has Microsoft SharePoint Foundation 2010 installed.B、Establish a federated trust between your company and the external partner. Deploy a Windows Server 2008 R2 server that runs Microsoft SharePoint 2010 and that has the Active Directory Rights  Management Services (AD?RMS) role installed.C、Establish an external forest trust between your company and the external partner. Deploy a Windows Server 2008 R2 server that has the Active Directory Certificate Services server role installed. Implement Encrypting File System (EFS).D、Establish an external forest trust between your company and the external partner. Deploy a Windows Server 2008 R2 server that has the Active Directory Rights Management Service (AD?RMS)role installed  and Microsoft SharePoint Foundation 2010 installed.

考题 Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system .Which two of these are characteristics of an IDS sensor?()A、 has a permissive interface that is used to monitor networksB、 is an active device in the traffic pathC、 passively listens to network trafficD、 has a promiscuous interface that is used to monitor the network

考题 Your network contains an Active Directory domain that has two sites.    You need to identify whether logon scripts are replicated to all domain controllers.   Which folder should you verify()A、GroupPolicyB、NTDSC、SoftwareDistributionD、SYSVOL

考题 You have an Exchange Server 2010 organization.  Your company acquires another company that has an Exchange Server 2010 organization.  You need to recommend a solution for the Exchange Server 2010 organization to meet the followingrequirements:  .All users must be able to view the global address lists (GALs) for both organizations.All users must be able to view free/busy information for users in both organizations  What should you include in the solution?()A、.Implement Active Directory Federation Services (AD FS) .Run the Microsoft Exchange Inter-Organization Replication toolB、.Implement Microsoft Identity Lifecycle Manager (ILM) 2007 .Create a two-way cross-forest trust between both organizationsC、.Create a federation trust between both organizations .Implement Microsoft Identity Lifecycle Manager (ILM) 2007 .Run the New Organization Relationship wizardD、.Create a two-way cross-forest trust between both organizations .Implement Active Directory Federation Services (AD FS).Run the Microsoft Exchange Inter-Organization Replication tool

考题 Your network consists of an Active Directory forest named contoso.com. Contoso.com has an Exchange Server 2010 organization.  A subsidiary company has a separate Active Directory forest named fabrikam.com. Fabrikam.com has an Exchange Server 2007 organization. You plan to consolidate both organizations.  Your companys consolidation strategy includes the following requirements:.Support costs must be minimized .Mailbox access must be easily shared between users .All e-mail messages must be hosted on Exchange Server 2010 mailbox servers  You need to recommend a solution to meet the requirements of the consolidation strategy. What should you recommend?()A、Move all recipients from fabrikam.com to contoso.com.B、Transition all servers in fabrikam.com to Exchange Server 2010.C、In contoso.com, create a resource mailbox for each recipient in fabrikam.com.D、Move all computer accounts for the Exchange servers in fabrikam.com to contoso.com. On each server, run Setup.com /M:RecoverServer.

考题 Your network contains a single Active Directory domain.  You have an Exchange Server 2010 organization that contains a Hub Transport server named Hub1. Hub1 receives all e-mail messages that are sent to your organization from the Internet.  A new company security policy states that domain-joined servers must not be accessible directly from theInternet.  You need to create a message hygiene solution to meet the following requirements: .Comply with the new security policy .Minimize the amount of spam that is delivered to the internal Exchange servers in the organization  What should you do first?()A、Deploy an Edge Transport server, and then configure EdgeSync synchronization.B、Deploy a new Hub Transport server, and then install the anti-spam transport agents.C、Deploy a new Hub Transport server, and then deploy Active Directory Federation Services (AD FS).D、Deploy an Edge Transport server, and then disable Active Directory Lightweight Directory Services(AD LDS).

考题 You have an Exchange Server 2010 organization.  Your company has a relationship with another company.  The partner company has an Exchange Server 2010 organization.  You need to recommend a security solution to meet the following requirements:  .Ensure that all e-mail delivery between your servers and the partner companys servers is encrypted .Ensure that all communication between your servers and the partner companys servers is authenticated What should you include in the solution?()A、Active Directory Rights Management Services (AD RMS)B、Domain SecurityC、Forms-based AuthenticationD、Secure/Multipurpose Internet Mail Extensions (S/MIME)

考题 Your company has three Active Directory domains in a single forest. You install a new Active Directory enabled application. The application ads new user attributes to the Active Directory schema. You discover that the Active Directory replication traffic to the Global Catalogs has increased. You need to prevent the new attributes from being replicated to the Global Catalog. You must achieve this goal without affecting application functionality. What should you do()A、Change the replication interval for the DEFAULTIPSITELINK object to 9990.B、Change the cost for the DEFAULTIPSITELINK object to 9990.C、Make the new attributes in the Active Directory as defunct.D、Modify the properties in the Active Directory schema for the new attributes.

考题 Your network contains an Active Directory domain named contoso.com. The domain contains a   server named Server1. The Active Directory Federation Services (AD FS) role is installed on Server1. Contoso.com is defined as an account store.   A partner company has a Web-based application that uses AD FS authentication. The partner company  plans to provide users from contoso.com access to the Web application.   You need to configure AD FS on contoso.com to allow contoso.com users to be authenticated by the   partner company.   What should you create on Server1()A、a new applicationB、a resource partnerC、an account partnerD、an organization claim

考题 Your company has a main office and 40 branch offices. Each branch office is configured as a  separate Active Directory site that has a dedicated read-only domain controller (RODC). An  RODC server is stolen from one of the branch offices.     You need to identify the user accounts that were cached on the stolen RODC server.     Which utility should you use()A、Dsmod.exeB、Ntdsutil.exeC、Active Directory Sites and ServicesD、Active Directory Users and Computers

考题 Your organization has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 7. You need to create a single distribution file containing Windows Virtual PC and a virtual machine image that will be deployed to all client computers. Which should you use?()A、Microsoft System Center Virtual Machine Manager ( VMM) 2008 with a templateB、Deployment Image Servicing and Management (DISM)C、Microsoft Enterprise Desktop Virtualization (MED - V) Packaging WizardD、Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 with a template

考题 Your organization has Exchange Server 2010.You need to ensure that users in the organization are notified before they send e-mail messages to external recipients. Which cmdlet should you run?()A、set-MailboxB、set-OrganizationConfigC、set-TransportAgentD、set-TransportConfig

考题 单选题Your company has a branch office that is configured as a separate Active Directory site and has an Actrve Directory domain controller. The Active Directory site requires a local Global Catalog server to support a new application. You need to configure the domain controller as a Global Catalog server. Which tool should you use()A The Dcpromo.exe utilityB The Server Manager consoleC The Computer Management consoleD The Active Directory Sites and Services consoleE The Actrve Directory Domains and Trusts console

考题 单选题Your organization has Exchange Server 2010.You need to ensure that users in the organization are notified before they send e-mail messages to external recipients. Which cmdlet should you run?()A set-MailboxB set-OrganizationConfigC set-TransportAgentD set-TransportConfig

考题 单选题Your organization has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. You need to deploy Microsoft Application Virtualization (App-V) 4.6 in a stand-alone configuration. Which should you install?()A Microsoft Application Virtualization DatabaseB Microsoft Application Virtualization Desktop ClientC Microsoft System Center Application Virtualization Streaming ServerD Microsoft System Center Application Virtualization Management Server

考题 单选题Your company has a single Active Directory directory service domain. All servers in your environment run Windows Server 2003. All domain controllers run Active DirectoryCintegrated DNS. You create several static host (A) resource records. You need to verify that the DNS server is sending the correct host records to all client computers.  Which command-line tool should you use?()A  netshB  tracertC  ntdsutilD  nslookup

考题 单选题Your company has a branch office that is configured as a separate Active Directory site and has an  Active Directory domain controller.   The Active Directory site requires a local Global Catalog server to support a new application.  You need to configure the domain controller as a Global Catalog server.  Which tool should you use()A The Dcpromo.exe utilityB The Server Manager consoleC The Computer Management consoleD The Active Directory Sites and Services consoleE The Active Directory Domains and Trusts console

考题 单选题You have an Exchange Server 2010 organization.  Your company acquires another company that has an Exchange Server 2010 organization.  You need to recommend a solution for the Exchange Server 2010 organization to meet the followingrequirements:  .All users must be able to view the global address lists (GALs) for both organizations.All users must be able to view free/busy information for users in both organizations  What should you include in the solution?()A .Implement Active Directory Federation Services (AD FS) .Run the Microsoft Exchange Inter-Organization Replication toolB .Implement Microsoft Identity Lifecycle Manager (ILM) 2007 .Create a two-way cross-forest trust between both organizationsC .Create a federation trust between both organizations .Implement Microsoft Identity Lifecycle Manager (ILM) 2007 .Run the New Organization Relationship wizardD .Create a two-way cross-forest trust between both organizations .Implement Active Directory Federation Services (AD FS).Run the Microsoft Exchange Inter-Organization Replication tool

考题 单选题You have an Exchange Server 2010 organization.  Your company has a relationship with another company.  The partner company has an Exchange Server 2010 organization.  You need to recommend a security solution to meet the following requirements:  .Ensure that all e-mail delivery between your servers and the partner companys servers is encrypted .Ensure that all communication between your servers and the partner companys servers is authenticated What should you include in the solution?()A Active Directory Rights Management Services (AD RMS)B Domain SecurityC Forms-based AuthenticationD Secure/Multipurpose Internet Mail Extensions (S/MIME)

考题 单选题The company has a Windows 2008 Active Directory-based network.The network contains an Exchange Server 2003 organization.The management instructs you to deploy Exchange Server 2010 in your network.You decide to prepare the schema and domain first.Which of the following commands should you run prior to performing the normal schema and domain preparation?()A Setup /PrepareSchemaB Setup /PrepareLegacyExchangePermissionsC Setup /PrepareADD Setup /PrepareLegacyExchangePermissions:child.Xxx

考题 单选题Your company has a single Active Directory directory service forest with multiple domains. The  company has a main office with 1,000 users and a single branch office with 500 users. Each office is aseparate Active Directory site. The main office Active Directory site has two domain controllers with Global  Catalog services. Company employees must be able to work in both offices. You need to plan the  placement and configuration of domain controllers.  What should you do?()A  Deploy two additional domain controllers in the main office Active Directory site.B  Deploy global catalog servers in the branch office Active Directory site.C  Enable change notification on the site link between the main office Active Directory site and the branch office Active Directory site.D  Disable change notification on the site link between the main office Active Directory site and the branch office Active Directory site.