网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A PC administrator is trying to implement BitLocker full disk encryption but the PC reports that asecurity module is not found. Which of the following should the administrator do to correct this?()
A

Enable the BIOS password

B

Turn UAC off

C

Create a separate partition with EFS

D

Enable TPM in the BIOS


参考答案

参考解析
解析: 暂无解析
更多 “单选题A PC administrator is trying to implement BitLocker full disk encryption but the PC reports that asecurity module is not found. Which of the following should the administrator do to correct this?()A Enable the BIOS passwordB Turn UAC offC Create a separate partition with EFSD Enable TPM in the BIOS” 相关考题
考题 The lawyer listened with full attention,________to miss any point.A.not tryingB.trying notC.to try notD.not to try

考题 A PC administrator is trying to implement BitLocker full disk encryption but the PC reports that asecurity module is not found. Which of the following should the administrator do to correct this?() A. Enable the BIOS passwordB. Turn UAC offC. Create a separate partition with EFSD. Enable TPM in the BIOS

考题 An administrator is using a protocol analyzer to monitor traffic between two servers. However, theonly traffic that appears is broadcast and traffic originating from the administrator‘s PC.Which of the following devices is the administrator plugged into? ()A.HubB. BridgeC. SwitchD. Router

考题 Which of the following describes the FINAL step in the troubleshooting process?() A. Verify full system functionality.B. Implement the change.C. Test the theory to determine the cause.D. Root cause analysis.

考题 An administrator has been having problems with server security. Many of the servers have been infected with viruses in the past. Which of the following can be done to ensure that systems avoid OS exploits?()A. Implement an intrusion detection system (IDS).B. Implement a dual-factor authentication method.C. Implement a patch management process.D. Implement stronger user passwords.

考题 Refer to the exhibit. ROUTE.com has just implemented this EIGRP network. A network administrator came to you for advice while trying to implement load balancing across part of their EIGRP network. If the variance value is configured as 2 on all routers and all o ther metric and K values are configured to their default values, traffic from the Internet to the data center will be load balanced across how many paths? ()A. 1B. 2C. 3D. 4E. 5

考题 Which of the following should be the FINAL step according to the troubleshooting theory?()A、Verify full system functionalityB、Implement preventative measuresC、Implement the solutionD、Document findings and outcomes

考题 A PC administrator is trying to implement BitLocker full disk encryption but the PC reports that asecurity module is not found. Which of the following should the administrator do to correct this?()A、Enable the BIOS passwordB、Turn UAC offC、Create a separate partition with EFSD、Enable TPM in the BIOS

考题 An administrator has been having problems with server security. Many of the servers have been infected with viruses in the past. Which of the following can be done to ensure that systems avoid OS exploits? ()A、 Implement an intrusion detection system (IDS).B、 Implement a dual-factor authentication method.C、 Implement a patch management process.D、 Implement stronger user passwords.

考题 An administrator attempts to install the latest security patches for an older server. When the administrator runs the patch installer, the install fails. The administrator tries again, and the installer fails again.  Which of the following is the MOST likely reason for this?()A、 The administrator improperly configured the virtual memory settings on the server.B、 The administrator is using incorrect patch switches for the install.C、 The administrator is trying to install security patches for software that is not installed.D、 The administrator is trying to install patches that require hard drive encryption on the server.

考题 An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again. Which of the following is the NEXT step that the administrator should take?()A、Implement preventative measures.B、Close the issue.C、Document the outcome.D、Question other users to make sure they are not having the same issue

考题 Which of the following is the LAST step an administrator should take when troubleshooting an issue?()A、 Identify changes to the system.B、 Replicate the problem in the system.C、 Verify full system functionality. D、 Implement the solution.

考题 A technician wants to secure a Windows 7 Ultimate notebook hard drive. Which of the following should the technician do to implement BitLocker?() (Select TWO).A、Disable TPM in the system BIOSB、Run the BitLocker wizard and any necessary partitionsC、Enable TPM in the system BIOSD、Enable TPM in the Windows 7 OS filesE、Set up the OS and the system files on the same partition

考题 Which of the following describes the FINAL step in the troubleshooting process?()A、Verify full system functionality.B、Implement the change.C、Test the theory to determine the cause.D、Root cause analysis.

考题 A server administrator implements a solution that should fix an issue. Which of the following should the administrator do NEXT in the troubleshooting process?()A、Notify users impacted by the problemB、Verify full system functionalityC、Document the actions and outcomesD、Identify the scope of the problem

考题 An administrator is using a protocol analyzer to monitor traffic between two servers. However, the only traffic that appears is broadcast and traffic originating from the administrator's PC. Which of the following devices is the administrator plugged into? ()A、HubB、BridgeC、SwitchD、Router

考题 After successfully testing a probable cause to an issue, which of the following is the NEXT troubleshooting step?()A、Implement the solution or escalate.B、Perform a root cause analysis.C、Establish a plan of action to resolve the problem.D、Verify full system functionality and if applicable implement preventative measures.

考题 Which of the following should be completed NEXT, after testing the theory of probable cause?()A、Verify full system functionalityB、Implement preventative measuresC、Establish a plan of action to resolve the problemD、Implement the solution to the problem

考题 A system administrator thinks that a filesystem may be full and that is what caused the machine to crash. Which command will show the administrator if they are correct?()A、 du B、 df C、 fsck D、 ncheck

考题 A system administrator received the following message while trying to ssh to a server:  connection timed out.The administrator pinged the server and had no response. The administrator then pinged the gateway, and was successful. Which tool could the administrator use next to isolate the problem?()A、routeB、tracerouteC、netstat -nrD、broadcast ping

考题 A network for a two-node cluster has been planned. The network administrator has explained that the networkdoes not support gratuitous ARP. Which of the following steps will ensure that clients are able to connect tothe cluster after a failover takes place?()A、Implement heartbeating over IP aliasesB、Implement persistent service IP addressesC、Implement IPAT aliasing with hardware address takeover (HWAT)D、Implement IPAT replacement with hardware address takeover (HWAT)

考题 You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB1 inthe instance. You have set the recovery model of DB1 to Full. You deploy a new process. The process modifies 10,000 records from the Accounts table at 18:00 every day. Any modification made by the process to the data must be reverted and database keeps online. You must make sure of this. So which strategy should you implement?()  A、You should implement Differential backup B、You should implement Database snapshotsC、You should implement Primary filegroup backup D、You should implement Transaction log backup

考题 单选题You need to design an administrative model that meets all business and technical requirements. What should you do?()A Place the mailboxes for each region on a separate server. Create an administrative group for each region. Assign each regional technician Exchange Full Administrator permission over that region’s administrative groups. Assign the main office IT staff Exchange Full Administrator permission over each administrative group.B Place the mailboxes for each region on a separate server. Create an administrative group for each region. Assign each regional technician Exchange Full Administrator permission over all administrative groups. Assign the main office IT staff Exchange Full Administrator permission over each administrative groupC Place the mailboxes from multiple regions on each server. Create an administrative group for each server. Assign each regional technician Exchange Full Administrator permission over the administrative groups that contain servers that hold mailboxes for that region. Assign the main office IT staff Exchange Full Administrator permission over each administrative groupD Place the mailboxes from multiple regions on each server. Create a single administrative group for all servers. Assign each regional technician and the main office IT Staff Exchange Full Administrator permission over the administrative group

考题 多选题A technician wants to secure a Windows 7 Ultimate notebook hard drive. Which of the following should the technician do to implement BitLocker?() (Select TWO).ADisable TPM in the system BIOSBRun the BitLocker wizard and any necessary partitionsCEnable TPM in the system BIOSDEnable TPM in the Windows 7 OS filesESet up the OS and the system files on the same partition

考题 单选题During a routine maintenance visit to a client, an administrator noticed that the last full backup did not complete. Which of the following should the administrator do FIRST?()A Schedule and perform an incremental backup as soon as possible.B Inspect backup report logs.C Schedule and perform a full backup as soon as possible.D Inspect alert notification settings.

考题 单选题An administrator attempts to install the latest security patches for an older server. When the administrator runs the patch installer, the install fails. The administrator tries again, and the installer fails again. Which of the following is the MOST likely reason for this?()A The administrator improperly configured the virtual memory settings on the server.B The administrator is using incorrect patch switches for the install.C The administrator is trying to install security patches for software that is not installed.D The administrator is trying to install patches that require hard drive encryption on the server.

考题 单选题Which of the following is the LAST step an administrator should take when troubleshooting an issue?()A  Identify changes to the system.B  Replicate the problem in the system.C  Verify full system functionality. D  Implement the solution.

考题 单选题A system administrator thinks that a filesystem may be full and that is what caused the machine to crash. Which command will show the administrator if they are correct?()A  du B  df C  fsck D  ncheck