网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

All servers in your environment run Windows Server 2008 R2. All client computers ru n Windows 7. Each client computer has at least 2 5 GB free disk space. You virtualize applications by using Microsoft Application Virtualization (App - V). The App - V client cache is set to 4096 MB. User profiles are virtualized and stored on a server. You ne ed to increase the size of the file system cache on a client computer to at least 10 GB. What should you do?()

  • A、Use the AppVCacheSize tool to set the maximum cache size to 10240.
  • B、Use the AppVCacheSize tool to set the minimum free disk space threshold to 1 0240.
  • C、Set the HKLM / SOFTWARE / Microsoft / SoftGrid / 4.5 / Client /AppFS/ State registry key to 10240.
  • D、Set the HKLM / SOFTWARE / Microsoft / SoftGrid / 4.5 / Client /AppFS/ FileSize registry key to 10240.

参考答案

更多 “ All servers in your environment run Windows Server 2008 R2. All client computers ru n Windows 7. Each client computer has at least 2 5 GB free disk space. You virtualize applications by using Microsoft Application Virtualization (App - V). The App - V client cache is set to 4096 MB. User profiles are virtualized and stored on a server. You ne ed to increase the size of the file system cache on a client computer to at least 10 GB. What should you do?()A、Use the AppVCacheSize tool to set the maximum cache size to 10240.B、Use the AppVCacheSize tool to set the minimum free disk space threshold to 1 0240.C、Set the HKLM / SOFTWARE / Microsoft / SoftGrid / 4.5 / Client /AppFS/ State registry key to 10240.D、Set the HKLM / SOFTWARE / Microsoft / SoftGrid / 4.5 / Client /AppFS/ FileSize registry key to 10240.” 相关考题
考题 Your company has a single Active Directory directory service domain. All servers in your environment run Windows Server 2003. Client computers run Windows XP or Windows Vista. You plan to create a security update scan procedure for client computers. You need to choose a security tool that supports all the client computers.  Which tool should you choose? ()A、 UrlScan Security ToolB、 Enterprise Scan Tool (EST)C、 Malicious Removal Tool (MRT)D、 Microsoft Baseline Security Analyzer (MBSA)

考题 Rate your level of proficiency with managing and maintaining a server environment, including monitoring system and server performance, managing Web servers, monitoring and analyzing events, managing software updates and site licenses, monitoring file and print servers, and managing servers remotely. ()A、Very HighB、HighC、ModerateD、LowE、Very Low

考题 Your network contains two Exchange Server 2010 Edge Transport servers and five Exchange Server2010 Hub Transport servers.  All e-mail sent from your organization to the Internet is transferred by the Edge Transport servers. You need to recommend a security solution for the organization to meet the following requirements: .Ensure that users can send encrypted messages to any other organization on the Internet  .Ensure that all Exchange-related communication between Hub Transport servers and Edge Transport servers is encrypted What should you recommend?()A、Deploy IPsec.B、Deploy SMTP over SSL.C、Implement Domain Security.D、Implement Secure/Multipurpose Internet Mail Extensions (S/MIME).

考题 .Your companys virtual environment includes Windows Server 2008 R2 Hyper-V servers. You manage the environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to provide a user with the ability to perform only the Create, Delete, Start, Stop, Pause, Resume, and Shut Down virtual machine (VM) management tasks on your host servers .  What should you do?()A、In VMM,create a Self-Service user role.B、In VMM,create a Delegated Administrator user role.C、In VMM,assign the Local Administrator permission for the host servers to the user.D、In Authorization Manager, create a role on the users client computer and add the user to this role.

考题 You manage your virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You monitor the environment by using Microsoft System Center Operations Manager 2007 R2. You have three Windows Server 2008 R2 Hyper-V servers in a failover cluster. You need to ensure that all virtual machines (VMs) are distributed automatically across the host servers, and that the VMs will automatically fail over to the most appropriate host server. What should you do?()A、Configure network load balancing on the VMs.B、Configure Performance and Resource Optimization (PRO) Tips for the VMs.C、In VMM, create a host group. Move the three host servers into the host group.D、Configure a Fiber Channel logical unit number (LUN) on a SAN device. Configure your VMs to store the configuration files on the Fiber Channel LUN

考题 You have an Exchange Server 2010 organization.  Your company has a relationship with another company.  The partner company has an Exchange Server 2010 organization.  You need to recommend a security solution to meet the following requirements:  .Ensure that all e-mail delivery between your servers and the partner companys servers is encrypted .Ensure that all communication between your servers and the partner companys servers is authenticated What should you include in the solution?()A、Active Directory Rights Management Services (AD RMS)B、Domain SecurityC、Forms-based AuthenticationD、Secure/Multipurpose Internet Mail Extensions (S/MIME)

考题 Your virtual environment includes several Windows Server 2008 R2 Hyper-V servers. Some servers have 16 GB of RAM, and some servers have 32 GB of RAM. Each server has a dedicated management network adapter. Several virtual machines (VMs) are configured on local disk arrays.  You plan to enable live migration between all Hyper-V host servers. Your plan must optimize the environment for live migration and enable the live migration of all VMs among all servers. You need to specify the components to add or upgrade.  What should you do?()A、On each Hyper-V host server, provision additional disk resources on the local storage volumes. Add a second network adapter to each host server, and assign this network adapter to a local switchB、On each Hyper-V host server, provision additional disk resources on shared storage volumes. Add a second network adapter to each host server, and assign this network adapter to a local switchC、On each Hyper-V host server, provision additional disk resources on the local storage volumes. Install additional RAM as necessary so that all host servers have the same amount of RAMD、Install additional RAM as necessary so that all host servers have the same amount of RAM. Add a second network adapter to each host server, and assign this network adapter to a local switch

考题 You have a Microsoft Internet Security and Accelerator (ISA) 2006 server that provides all Internet accessfor your company.  You have two Mailbox servers configured in a database availability group (DAG), two Client Accessservers, and two Hub Transport servers.  You need to recommend changes to the environment to ensure that users can access Outlook Web App(OWA) from the Internet if any single server fails.  What should you recommend?()A、Configure a Client Access server array.B、Deploy a second ISA server and create an ISA server array.C、Implement Windows Network Load Balancing for the Client Access servers.D、Deploy two Edge Transport servers that are configured to use EdgeSync synchronization.

考题 Your company has a Microsoft Hyper-V Server 2008 R2 environment. You manage the virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You are creating a virtual test environment by installing two child partitions. The test environment must be completely isolated from all production servers. You need to ensure that the child partitions can communicate with each other. Which connection type should you configure?()A、PrivateB、InternalC、ExternalD、Dedicated host

考题 Your company has a single Active Directory directory service domain. Servers in your environment run Windows Server 2003. Client computers run Windows XP or Windows Vista. You plan to create an internal centrally managed security update infrastructure for client computers. You need to choose a security update management tool that supports all the client computers.  Which tool should you choose? ()A、 Microsoft Assessment and Planning (MAP) ToolkitB、 Microsoft Baseline Security AnalyzerC、 Microsoft System Center Operations ManagerD、 Windows Server Update Services (WSUS)

考题 Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. Your environment includes Microsoft Enterprise Desktop Virtualization (MED - V). You use M ED - V to support temporary test environments. You need to ensure that the disk space used by obsolete Workspaces is automatically minimized. Which two actions should you perform? ()A、Configure t he Workspace as revertible.B、Set an expiration date for the Workspace.C、Specify the number of image versions to keep.D、Configure automatic deletion of the Workspace.

考题 单选题Rate your level of proficiency with managing and maintaining a server environment, including monitoring system and server performance, managing Web servers, monitoring and analyzing events, managing software updates and site licenses, monitoring file and print servers, and managing servers remotely. ()A Very HighB HighC ModerateD LowE Very Low

考题 单选题A company has several legacy servers that upper management would like to move into a virtual environment. Which of the following is the FIRST step an administrator should take to evaluating whether the servers can be moved into the virtual environment?()A  Compare the costs of maintenance between the physical and virtual servers.B  Run SYSPREP on each legacy server.C  Check the HCL on each legacy server.D  Verify that all the latest OS service packs are installed on each server.

考题 单选题Your company has a single Active Directory directory service domain. All servers in your environment run Windows Server 2003. All domain controllers run Active DirectoryCintegrated DNS. You create several static host (A) resource records. You need to verify that the DNS server is sending the correct host records to all client computers.  Which command-line tool should you use?()A  netshB  tracertC  ntdsutilD  nslookup

考题 单选题Your company has a single Active Directory directory service domain. All servers in your environment run Windows Server 2003. Client computers run Windows XP or Windows Vista. You plan to create a security update scan procedure for client computers. You need to choose a security tool that supports all the client computers.  Which tool should you choose? ()A  UrlScan Security ToolB  Enterprise Scan Tool (EST)C  Malicious Removal Tool (MRT)D  Microsoft Baseline Security Analyzer (MBSA)

考题 单选题Your network consists of a single Active Directory domain. You have 10 file servers that run Windows Server 2003 Service Pack 2 (SP2).You need to monitor the bandwidth usage on all the file servers from a central location. What should you do?()A Open the Shared Folders snap-in on one of the servers. Examine the Sessions folder.B Install Simple TCP/IP Services on all file servers. From one of the servers, run Netcap.exe.C Install Network Monitor Tools on all file servers. From one of the servers, create a new capture.D Open the Performance Logs and Alerts snap-in on one of the servers and create a new counter log.

考题 单选题You manage your virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You monitor the environment by using Microsoft System Center Operations Manager 2007 R2. You have three Windows Server 2008 R2 Hyper-V servers in a failover cluster. You need to ensure that all virtual machines (VMs) are distributed automatically across the host servers, and that the VMs will automatically fail over to the most appropriate host server. What should you do?()A Configure network load balancing on the VMs.B Configure Performance and Resource Optimization (PRO) Tips for the VMs.C In VMM, create a host group. Move the three host servers into the host group.D Configure a Fiber Channel logical unit number (LUN) on a SAN device. Configure your VMs to store the configuration files on the Fiber Channel LUN

考题 多选题Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. Your environment includes Microsoft Enterprise Desktop Virtualization (MED-V). You use MED-V to support temporary test environments. You need to ensure that the disk space used by obsolete Workspaces is automatically minimized. Which two actions should you perform?()AConfigure the Workspace as revertible.BSet an expiration date for the Workspace.CSpecify the number of image versions to keep.DConfigure automatic deletion of the Workspace.

考题 单选题Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2008 R2. The domain contains 200 Windows Server 2008 R2 servers. You need to plan a monitoring solution that meets the following requirements.   èSends a notification by e-mail to the administrator if an application error occurs on any of the servers   èUses the minimum amount of administrative effort What should you include in your plan?()A On one server, create event subscriptions for each server. On the server, attach tasks to the application  error events.B On one server, create an Event Trace Sessions Data Collector Set. On all servers, create a System Performance Data Collector Set.C On all servers, create event subscriptions for one server. On all servers, attach a task for the  application error events.D On all servers, create a System Performance Data Collector Set. On one server, configure the report settings for the new Data Collector set.