网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Your company uses Network Access Protection (NAP) to enforce policies on client computers taht connect to the network. Client computers run Windows Vista. A Group Policy is used to configure client computers to obtain updates from WSUS. Company policy requires that updates labeled important and Critical must be applied before client computers can access network resources. You need to ensure that client computers meet the company policy requirement. What should you do()

  • A、 Enable automatic updates on each client
  • B、 enable the Security Center on each client
  • C、 Quarantine clients that do nto have all availible security updates installed
  • D、 Disconnect the remote connection until the required updates are installed.

参考答案

更多 “Your company uses Network Access Protection (NAP) to enforce policies on client computers taht connect to the network. Client computers run Windows Vista. A Group Policy is used to configure client computers to obtain updates from WSUS. Company policy requires that updates labeled important and Critical must be applied before client computers can access network resources. You need to ensure that client computers meet the company policy requirement. What should you do()A、 Enable automatic updates on each clientB、 enable the Security Center on each clientC、 Quarantine clients that do nto have all availible security updates installedD、 Disconnect the remote connection until the required updates are installed.” 相关考题
考题 – () – We are headquartered in Shanghai. A、How about the departmental structure in the headquartersB、What is your company profileC、Where are your headquarters

考题 Your Web site uses custom Themes. Your Web site must support additional Themes based on the user‘s company name. The company name is set when a user logs on to the Web site. The company‘s Theme name is stored in a variable named ThemeName. You need to use this variable to dynamically set the Web site‘s Theme.What should you do?()A.B.C.D.

考题 A brand new network application is required for the Acme Company, and they are considering the use of a connectionless service. What are the characteristics of a connectionless service?() A. It uses a Reliable transport mechanism.B. It uses a Non-reliable transport mechanismC. It is less bandwidth-intensive than connection oriented servicesD. it uses handshaking

考题 A brand new network application is required for the Acme Company, and they are considering the use of a connectionless service. What are the characteristics of a connectionless service?()A、It uses a Reliable transport mechanism.B、It uses a Non-reliable transport mechanismC、It is less bandwidth-intensive than connection oriented servicesD、it uses handshaking

考题 Your company has an Active Directory domain. All computers are members of the domain. Your networkcontains an internal Web site that uses Integrated Windows Authentication. From a computer that runs Windows 7, you attempt to connect to the Web site and are prompted for authentication. You verify that youruser account has permission to access the Web site. You need to ensure that you are automaticallyauthenticated when you connect to the Web site.  What should you do?()A、Create a complex password for your user account.B、Open Credential Manager and modify your credentials.C、Add the URL of the Web site to the Trusted sites zone.D、Add the URL of the Web site to the Local intranet zone.

考题 You work as a network technician at Company. Your boss, Mrs.   , is interested in   GLBP. In particular, she wants to know the multicast address that this protocol uses.  What should  you tell her? ()A、 224.0.0.100B、 224.0.0.1C、 224.0.0.102D、 224.0.0.10E、 224.0.0.101F、 None of the other alternatives apply

考题 You are a database administrator for your company. The company uses a vendor company’s application that is based on a proprietary database. You query data from the application database and import the data into a SQL Server 2005 database. The application vendor provides you with a new OLE DB driver to be used when querying the application database. Company policy prohibits connections between the SQL Server database and the application database, except when querying this data. You need to provide a way to query data from the application database. What should you?()A、Configure a Linked Server connection to the application database.B、Write a query that uses an OPENDATASOURCE command.C、Write a query that uses an OPENQUERY command.D、Configure a Remote Server connection to the application database.

考题 Your company has an Active Directory domain. AlI servers run Windows Server 2008. Your company uses an Enterprise Root certificate authority (CA). You need to ensure that revoked certificate information is highly available. What should you do()A、Implement an Online Certificate Status Protocol (OCSP) responder by using Network Load Balancing.B、Implement an Online Certificate Status Protocol (OCSP) responder by using an Internet Security and Acceleration Server array.C、Publish the trusted certificate authorities list to the domain by using a Group Policy Object (GPO).D、Create a new Group Policy Object (GPO) that allows users to trust peer certificates. Link the GPO to the domain.

考题 Your company has an Active Directory forest. The company has servers that run Windows Server   2008 R2 and client computers that run Windows 7. The domain uses a set of GPO administrative  templates that have been approved to support regulatory compliance requirements.   Your partner company has an Active Directory forest that contains a single domain. The company has  servers that run Windows Server 2008 R2 and client computers that run Windows 7.   You need to configure your partner companys domain to use the approved set of administrative  templates.   What should you do()A、Use the Group Policy Management Console (GPMC) utility to back up the GPO to a file. In each site,  import the GPO to the default domain policy.B、Copy the ADMX files from your companys PDC emulator to the PolicyDefinitions folder on the partner  companys PDC emulator.C、Copy the ADML files from your companys PDC emulator to the PolicyDefinitions folder on thepartner  companys PDC emulator.D、Download the conf.adm, system.adm, wuau.adm, and inetres.adm files from the Microsoft Updates  Web site. Copy the ADM files to the PolicyDefinitions folder on the partner companys PDC emulator.

考题 Your company uses a SQL Server 2005 database. Customer data from your trading partners is imported into the Customers table every night. You need to ensure that the customer record is updated if it already exists in the Customers table. If the record does not exist, the data needs to be inserted into the Customers table. What should you do?()A、 Create a FOR trigger. B、 Create an INSTEAD OF trigger. C、 Create an AFTER trigger. D、 Create a DDL trigger.

考题 You are the administrator of ExamSheet.net's network.   Your Windows 2000 Professional computer has a removable disk device installed. The device can use storage modules of varying sizes. You use these storage modules to transfer graphics files between your location and a printing company. The printing company uses Windows 98. You insert a new 100 MB disk device into your computer and format the new disk device as NTFS with the default options. You then place large graphics files on the disk device and deliver it to the printing company. The printing company reports that they are unable to access the files.  You want the printing company to be able to access the graphics files on the new disk device. What should you do?()A、Format the new disk device as NTFS with a 4 KB cluster size.B、Format the new disk device as FAT32 with a 4 KB cluster size.C、Format the new disk device as FAT32 with a 1 KB cluster size.D、Format the new disk device as FAT16 with a 4 KB cluster size.

考题 You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. You have to perform the backup of the default trace according to the requirement of your failure recovery plan. The default trace is contained in the subdirectory.You have to backup the subdirectory.  Which SQL Server database engine subdirectory should be backed up?()A、DATAB、INSTALL C、LOG D、BINN

考题 Your Windows 2000 Professional computer has a removable disk device installed. The device can use storage modules of varying sizes. You use these storage modules to transfer graphics filed between your location and a printing company. The printing company uses Windows NT 4.0 service pack 3. You insert a new 20-Mailbox disk device into your computer. When you attempt to format it as FAT32 with the default options, you receive the following error message “Windows was unable to complete the format.” You need to format the device so that you can use it to send a large graphic file to the printing company. How should you format the device?()A、As FAT 16 with a 4-KB cluster sizeB、As FAT 32 with a 1-KB cluster sizeC、As FAT 32 with a 4-KB cluster sizeD、As NTFS with a 4-KB cluster size

考题 单选题You are a database administrator for your company. The company uses a SQL Server 2005 database that includes a table named Inventory. The table contains a column named Price. A company policy states that the value in the Price column cannot be decreased by more than 10 percent in any single database operation. Updates to the Price column are made by various means, including by using ad hoc queries. You need to ensure that this company policy is enforced. What should you do?()A Create a trigger that rolls back changes to the Price column that violate company policy.B Create a stored procedure that disallows changes to the Price column that violate company policy.C On the Price column, create a check constraint that requires a specified minimum value.D On the Price column, create a foreign key constraint to a table that contains valid prices.

考题 单选题Your company has an Active Directory forest. The company has servers that run Windows Server 2008 amd client computers that run Windows Vista. The domain uses a set of GPO administrative templates that have been approved to support regulatory compliance requirements. Your partner company has an Active Directory forest that contains a single domain, The company has servers that run Windows Server 2008 and client computers that run Windows Vista. You need to configure your partner company’s domain to use the approved set of administrative templates. What should you do()A Use the Group Policy Management Console (GPMC) utility to back up the GPO to a file. In each site, import the GPO to the default domain policy.B Copy the ADMX files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PDC emulatorC Copy the ADML files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PDC emulatorD Download the conf.adm, system.adm, wuau.adm, and inetres.adm files from the Microsoft Updates Web site. Copy the ADM files to the PolicyDefinitions folder on thr partner company’s emulator.

考题 单选题Your company has just upgraded its CATAGORY 5 Ethernet network from 10Mbps to 100Mbps. After the upgrade, the 20 Windows 2000 Professional computers in the marketing department can no longer connect to the network. The remaining 80 Windows 2000 computers in the company can connect, however. Your company uses NWLink as the only network protocol.You need to connect the computers in the marketing department to the network. What must you do? ()A Configure the NWLink frame type of the network adapters to be ethernet 802.3.B Configure the NWLink frame type of the network adapters to be ethernet II.C Replace the network adapters with 10/100 BNC adapters.D Replace the network adapters with 10/100 UTP network adapters.

考题 单选题Your company uses a SQL Server 2005 database. Customer data from your trading partners is imported into the Customers table every night. You need to ensure that the customer record is updated if it already exists in the Customers table. If the record does not exist, the data needs to be inserted into the Customers table. What should you do?()A  Create a FOR trigger. B  Create an INSTEAD OF trigger. C  Create an AFTER trigger. D  Create a DDL trigger.

考题 单选题Putting your mobile phone on a restaurant table may make your friends think _____.A you prefer to talk to your friends at the tableB you value your calls more than your friendsC you are enjoying the company of your friendsD you are polite and considerate of your friends

考题 问答题Task I (10 marks)  Write a letter to a company declining a job offer. In the letter, you:  ● Express your gratitude to the company for the job offer  ● Explain the reason(s) why you have to decline the offer  ● Apologise and extend your good wishes to the company  Write a letter of between 100 and 120 words in an appropriate style on the answer sheet. Do not write your name or address.

考题 单选题Your company has an Active Directory forest. The company has servers that run Windows Server  2008 R2 and client computers that run Windows 7. The domain uses a set of GPO administrative  templates that have been approved to support regulatory compliance requirements.     Your partner company has an Active Directory forest that contains a single domain. The company  has servers that run Windows Server 2008 R2 and client computers that run Windows 7.     You need to configure your partner company’s domain to use the approved set of administrative  templates.   What should you do()A Use the Group Policy Management Console (GPMC) utility to back up the GPO to a file. In each site, import the GPB Copy the ADMX files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PDCC Copy the ADML files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PDC D Download the conf.adm, system.adm, wuau.adm, and inetres.adm files from the Microsoft Updates Web site. 

考题 单选题You work as a network technician at Company. Your boss, Mrs.   , is interested in   GLBP. In particular, she wants to know the multicast address that this protocol uses.  What should  you tell her? ()A  224.0.0.100B  224.0.0.1C  224.0.0.102D  224.0.0.10E  224.0.0.101F  None of the other alternatives apply

考题 单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. Now you get an order from your company CIO, you have to identify whether a database integrity check (DBCC CHECKDB) was run for a particular database.  Which log file should you examine?()A log.trc B default.trc C ERRORLOG D SQLAGENT

考题 单选题Your company’s network has client computers that run Windows 7.   A software vendor releases version 2 of an application that your company uses.  Your company currently uses version 1.  Version 1 and version 2 are not compatible. You plan to deploy version 2 of the application.   You have the following requirements:Users must be able to run both versions of the application on their computers.   Version 2 must be available when a client computer is not connected to the network.  You need to plan a software deployment process that meets the requirements.   What should you do?()A  Deploy version 2 of the application by using Microsoft Application Virtualization (App-V). B  Deploy version 2 of the application as a Remote Desktop Services RemoteApp.C  Deploy version 2 of the application by using a Group Policy Software Installation policy.D  Deploy version 2 of the application by using a Microsoft System Center Configuration Manager package.

考题 单选题Your Windows 2000 Professional computer has a removable disk device installed. The device can use storage modules of varying sizes. You use these storage modules to transfer graphics filed between your location and a printing company. The printing company uses Windows NT 4.0 service pack 3. You insert a new 20-Mailbox disk device into your computer. When you attempt to format it as FAT32 with the default options, you receive the following error message “Windows was unable to complete the format.” You need to format the device so that you can use it to send a large graphic file to the printing company. How should you format the device?()A As FAT 16 with a 4-KB cluster sizeB As FAT 32 with a 1-KB cluster sizeC As FAT 32 with a 4-KB cluster sizeD As NTFS with a 4-KB cluster size

考题 单选题You are the administrator of Company’s network.  Your Windows 2000 Professional computer has a removable disk device installed. The device can use storage modules of varying sizes. You use these storage modules to transfer graphics files between your location and a printing company. The printing company uses Windows 98. You insert a new 1 GB disk device into your computer and format the new disk device as NTFS with the default options. You then place large graphics files on the disk device and deliver it to the printing company. The printing company reports that they are unable to access the files.  You want the printing company to be able to access the graphics files on the new disk device.   What should you do? ()A Format the new disk device as FAT16 with a 128 KB cluster size.B Format the new disk device as FAT32 with a 4 KB cluster size.C Format the new disk device as NTFS with a 4 KB cluster size.D Format the new disk device as NTFS with a 8 KB cluster size.

考题 问答题Practice 2  ● Recently your company is planning to bid for hosting an exhibition and now the manager of your company has asked you to write a letter to the organizing committee to introduce your company to them.  ● Write a letter to introduce the details about your company.  ● introducing the department structure and service,  ● introducing previous exhibitions you have hosted,  ● expressing your confidence in the success if you are permitted to host it.

考题 问答题Practice 9  ● You are the Purchasing Manager for a large company. Last month you decided to look for a new supplier for the stationery and office equipment that your company uses. You have found a new supplier, Compass Office Goods Ltd.  ● Write a memo to your company’s department heads:  ● explaining why you looked for a new supplier.  ● saying who the new supplier is.  ● asking for feedback about the goods that they supply.  ● Write 40—50 words.

考题 多选题A brand new network application is required for the Acme Company, and they are considering the use of a connectionless service. What are the characteristics of a connectionless service?()AIt uses a Reliable transport mechanism.BIt uses a Non-reliable transport mechanismCIt is less bandwidth-intensive than connection oriented servicesDit uses handshaking