网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
.Your companys virtual environment includes Windows Server 2008 R2 Hyper-V servers. You manage the environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to provide a user with the ability to perform only the Create, Delete, Start, Stop, Pause, Resume, and Shut Down virtual machine (VM) management tasks on your host servers . What should you do?()
- A、In VMM,create a Self-Service user role.
- B、In VMM,create a Delegated Administrator user role.
- C、In VMM,assign the Local Administrator permission for the host servers to the user.
- D、In Authorization Manager, create a role on the users client computer and add the user to this role.
参考答案
更多 “ .Your companys virtual environment includes Windows Server 2008 R2 Hyper-V servers. You manage the environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to provide a user with the ability to perform only the Create, Delete, Start, Stop, Pause, Resume, and Shut Down virtual machine (VM) management tasks on your host servers . What should you do?()A、In VMM,create a Self-Service user role.B、In VMM,create a Delegated Administrator user role.C、In VMM,assign the Local Administrator permission for the host servers to the user.D、In Authorization Manager, create a role on the users client computer and add the user to this role.” 相关考题
考题
有如下程序:includeusing namespace std;classA{public:virtua1 voidfunc1(){cout
有如下程序: #include<iostream> using namespace std; classA{ public: virtua1 voidfunc1(){cout<<“A1”;} voidfunc2(){cout<<“A2”;}}; class B:publicA{ public: void funcl(){cout<<“B1”;} void func2(){cout<<“B2”;}}; intmain(){ A*p=neA.B1B2B.A1A2C.B1A2D.A1B2
考题
VLAN是的()缩写.
A.virtual local area networkB.virtual long area networkC.virtual local area networkingD.virtua llong area networking
考题
VLAN是的()缩写.A、virtual local area networkB、virtual long area networkC、virtual local area networkingD、virtua llong area networking
考题
Your network contains a computer named Computer1. Computer1 is assigned an IP address of 39 / 84 192.168.1.112/26.Your companys corporate policy states that the first usable address in each subnet is allocated to the default gateway.You need to configure the default gateway for Computer1.Which address should you choose?()A、192.168.1.1B、192.168.1.63C、192.168.1.65D、192.168.1.93
考题
You have an Exchange Server 2010 organization. You design a deployment of multiple Mailbox servers. Your companys Service Level Agreement (SLA) states that servers must support 1,000 concurrent connections to mailboxes while maintaining an RPC latency of less than 20 milliseconds. You need to verify that your design meets the requirements of the SLA before you deploy servers in the production environment. Which tool should you use?()A、Exchange Server Jetstress 2010B、Exchange Server User Monitor (ExMon)C、Exchange Server Load Generator (LoadGen) 2010D、Exchange Server Remote Connectivity Analyzer (ExRCA)
考题
Your company has an Active Directory forest. The company has servers that run Windows Server 2008 R2 and client computers that run Windows 7. The domain uses a set of GPO administrative templates that have been approved to support regulatory compliance requirements. Your partner company has an Active Directory forest that contains a single domain. The company has servers that run Windows Server 2008 R2 and client computers that run Windows 7. You need to configure your partner companys domain to use the approved set of administrative templates. What should you do()A、Use the Group Policy Management Console (GPMC) utility to back up the GPO to a file. In each site, import the GPO to the default domain policy.B、Copy the ADMX files from your companys PDC emulator to the PolicyDefinitions folder on the partner companys PDC emulator.C、Copy the ADML files from your companys PDC emulator to the PolicyDefinitions folder on thepartner companys PDC emulator.D、Download the conf.adm, system.adm, wuau.adm, and inetres.adm files from the Microsoft Updates Web site. Copy the ADM files to the PolicyDefinitions folder on the partner companys PDC emulator.
考题
You have an Exchange Server 2010 organization. Your company has a relationship with another company. The partner company has an Exchange Server 2010 organization. You need to recommend a security solution to meet the following requirements: .Ensure that all e-mail delivery between your servers and the partner companys servers is encrypted .Ensure that all communication between your servers and the partner companys servers is authenticated What should you include in the solution?()A、Active Directory Rights Management Services (AD RMS)B、Domain SecurityC、Forms-based AuthenticationD、Secure/Multipurpose Internet Mail Extensions (S/MIME)
考题
You have an Exchange Server 2010 organization. You have a global security group named Legal that contains all the members of your companys legaldepartment. The companys security policy states that the Legal group must be able to search all mailboxes for e-mailmessages that contain specific keywords. You need to recommend a solution for the organization that complies with the security policy. What should you include in the solution?()A、a Discovery Management role groupB、a legal holdC、administrator audit loggingD、Mailbox journaling
考题
You have an Exchange Server 2010 organization. Your companys security policy states that users must not be able to encrypt e-mail messages by usingOutlook Web App (OWA). You need to recommend a client access solution that meets the requirements of the security policy. What should you include in the solution?()A、managed folder mailbox policiesB、multiple OWA virtual directoriesC、OWA segmentationD、WebReady Document Viewing
考题
You have an Exchange Server 2010 organization. Your companys legal department sends compliance e-mail messages by adding recipients to the blindcarbon copy (Bcc) field. The companys compliance policy includes the following requirements: .All e-mail messages sent to external recipients must be archived in a central repository .Compliance officers must be able to identify all the recipients of archived e-mail messages You need recommend a solution to meet the compliance policy requirements. What should you recommend?()A、journal rulesB、message trackingC、Personal ArchivesD、transport rules
考题
单选题All servers on your companys network run Windows Server 2008 R2. All users have thin client computers. You need to recommend a virtualization solution that allows users to use applications that run only on Windows 7. Which technology should you recommend?()A
Windows Virtual PCB
Microsoft Application Virtualization (App-V)C
Microsoft Virtual Desktop Infrastructure (VDI)D
Microsoft Enterprise Desktop Virtualization (MED-V)
考题
单选题The Company should ensure that the master is fully () with the Companys SMS.A
familiarB
understandC
conversationD
confused
考题
单选题You have an Exchange Server 2010 organization. Your companys legal department sends compliance e-mail messages by adding recipients to the blindcarbon copy (Bcc) field. The companys compliance policy includes the following requirements: .All e-mail messages sent to external recipients must be archived in a central repository .Compliance officers must be able to identify all the recipients of archived e-mail messages You need recommend a solution to meet the compliance policy requirements. What should you recommend?()A
journal rulesB
message trackingC
Personal ArchivesD
transport rules
考题
多选题Your company uses SQL Server 2005. You are implementing a series of views that are used in ad hoc queries. The views are used to enforce your companys security policy of abstracting data. Some of these views perform slowly. You create indexes on those views to increase performance, while still maintaining the companys security policy. One of the views returns the current date as one of the columns. The view returns the current date by using the GETDATE( ) function. This view does not allow you to create an index. You need to create an index on the view. Which two actions should you perform?()ARemove all deterministic function calls from within the view.BRemove all nondeterministic function calls from within the view.CSchema-bind all functions that are called from within the view.DCreate the view and specify the WITH CHECK OPTION clause.
考题
单选题You deploy your companys Internet Web site. You need to deny anonymous access to the Web site, allowing only authenticated users. Which code segment should you use?()A
authorization allow users=?/ /authorizationB
authorization deny users=?/ /authorizationC
authorization deny users=*//authorizationD
authorization allow users=*/ /authorization
热门标签
最新试卷