网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
You are a help desk technician for your company. Susan is an executive. Because Susan travels frequently, she uses a Windows XP Professional portable computer that has a smart card reader.  Susan asks you to configure her computer so that she can dial in to the company network when she is out of the office. Company security policy states that dial-in users must use a smart card when they connect to the network, and that the users must use the strongest form of data encryption possible. Company security policy also states that client computers must disconnect if the Routing and Remote Access server does not support both smart card authentication and the strongest possible authentication. You need to configure the dial-up connection properties on Susan’s computer to dial in to the company network. Your solution must ensure that company security policies are enforced.  Which three actions should you perform?()
A

Select the Advanced (custom settings) security option.

B

Select the Require data encryption check box.

C

Select the Typical (recommended settings) security option.

D

Select the Use smart card item from the Validate my identity as follows list.

E

Select the Maximum strength encryption item from the Data encryption list.

F

Select the Extensible Authentication Protocol (EAP) option, and select Smart Card or other Certificate from the EAP list.


参考答案

参考解析
解析: 暂无解析
更多 “多选题You are a help desk technician for your company. Susan is an executive. Because Susan travels frequently, she uses a Windows XP Professional portable computer that has a smart card reader.  Susan asks you to configure her computer so that she can dial in to the company network when she is out of the office. Company security policy states that dial-in users must use a smart card when they connect to the network, and that the users must use the strongest form of data encryption possible. Company security policy also states that client computers must disconnect if the Routing and Remote Access server does not support both smart card authentication and the strongest possible authentication. You need to configure the dial-up connection properties on Susan’s computer to dial in to the company network. Your solution must ensure that company security policies are enforced.  Which three actions should you perform?()ASelect the Advanced (custom settings) security option.BSelect the Require data encryption check box.CSelect the Typical (recommended settings) security option.DSelect the Use smart card item from the Validate my identity as follows list.ESelect the Maximum strength encryption item from the Data encryption list.FSelect the Extensible Authentication Protocol (EAP) option, and select Smart Card or other Certificate from the EAP list.” 相关考题
考题 根据写作要求,写出一篇作文。You are Susan. Your company will hold an opening ceremony for a new factory. You are asked to write an invitation letter to David, an important client of your company. The following information should he included:the reasons to invite him; the time for the event;the place for the event;early reply expected.

考题 Multiple users report that their Windows 7 computers take longer to start than when their computers were first installed. A help desk technician reports that the problem is related to installed applications. You need to recommend a solution that identifies the applications that run during the startup process. What should you recommend?()A.Event ForwardingB.MSConfig.exeC.Problem Steps RecorderD.Reliability Monitor

考题 You send a remote assistance invitation for help.You need to open a personal document without allowing the help desk to view the document. You also need to ensure that the remote assistance session remains connected.What should you do?()A.AB.BC.CD.D

考题 As an experienced technician, you are responsible for infrastructure design and global configuration changes. You are asked to deploy a Voice over Wireless LAN for your company. If the cells have the same channel, the separation between them should be:()A.19dbmB.10dbmC.67dbmD.86dbm

考题 资料:As a business owner, it is vital that you understand and use advanced technologies. Technology can help increase business efficiency and even expand operations. Accounting software. This is important, even if you have your own accountant or bookkeeper. Accounting software allows you to see your profits and losses at a glance. It can also help you design and maintain a budget for your business. Planning software or tools. A calendar system is a must There are many online planning systems that can be utilized to help you keep your calendar organized. Find a system that meets your business' needs and be sure to stick with it Time tracking software. A time tracking device will help you determine what tasks result in a profit and what tasks do not. This will help you determine what tasks can be eliminated, outsourced, or improved. If you're looking at software that requires a fee, ask for a free trial first to make sure it's the right software for you. Email management As a business owner, you probably use several email accounts to manage the various aspects of your company. If you streamline these emails to one account, you'll be able to stay organized and abreast of your emails. Mobile internet access. Access to the internet on your mobile device will not only make your life easier, it will also help you maintain a positive reputation for your business. For example, if you are able to follow up with a client by email immediately after a meeting. you will be showing that you are accessible, timely and professional. Once you decide which types of technology are right for you and your business, you'll be on your way to being more organized and efficient than ever. The underlined word “trial” is closest in meaning toA.审讯 B.检验 C.麻烦 D.试用

考题 资料:As a business owner, it is vital that you understand and use advanced technologies. Technology can help increase business efficiency and even expand operations. Accounting software. This is important, even if you have your own accountant or bookkeeper. Accounting software allows you to see your profits and losses at a glance. It can also help you design and maintain a budget for your business. Planning software or tools. A calendar system is a must There are many online planning systems that can be utilized to help you keep your calendar organized. Find a system that meets your business' needs and be sure to stick with it Time tracking software. A time tracking device will help you determine what tasks result in a profit and what tasks do not. This will help you determine what tasks can be eliminated, outsourced, or improved. If you're looking at software that requires a fee, ask for a free trial first to make sure it's the right software for you. Email management As a business owner, you probably use several email accounts to manage the various aspects of your company. If you streamline these emails to one account, you'll be able to stay organized and abreast of your emails. Mobile internet access. Access to the internet on your mobile device will not only make your life easier, it will also help you maintain a positive reputation for your business. For example, if you are able to follow up with a client by email immediately after a meeting. you will be showing that you are accessible, timely and professional. Once you decide which types of technology are right for you and your business, you'll be on your way to being more organized and efficient than ever. What’s the author's attitude towards advanced technology?A.Negative B.Critical C.Positive D.Neutral

考题 You are the domain administrator for your company. Roaming profiles are enabled for all users in the sales department. Roaming profiles are stored on a server named Server1, in a shared folder named Profiles. Roger is a user in the sales department. Susan is Roger's manager. Susan reports that Roger modifies his desktop settings, which results in the need for help desk assistance and in lost productivity for Roger. You want to ensure that Roger cannot modify his roaming profile. What should you do?() A、In Active Directory Users and Computers, on Roger's profile tab, change the profile path to //Server1/Profiles/%username%.dat. B、In Active Directory Users and Computers, on Roger's profile tab, change the profile path to //Server1/Profiles/%username%.man. C、In Roger's profile on Server1, change the file name of Ntuser.dat to Ntuser.man.D、In Roger's profile on his computer, change the file name of Ntuser.dat to Ntuser.man.

考题 You work as a network technician at Company. Your boss, Mrs., is interested in  the Cisco Compatible Extensions program.  What are three features of this program? ()A、 AccountingB、 Analog and digital voiceC、 MobilityD、 SecurityE、 Routing and switchingF、 VLAN and QoS

考题 As an experienced technician, you are responsible for infrastructure design and globalconfiguration changes. You are asked to deploy a Voice over Wireless LAN for your company. Ifthe cells have the same channel, the separation between them should be()A、 19dbmB、 10dbmC、 67dbmD、 86dbm

考题 You work as a network technician at Company. Your boss, Mrs.   , is interested in   GLBP. In particular, she wants to know the multicast address that this protocol uses.  What should  you tell her? ()A、 224.0.0.100B、 224.0.0.1C、 224.0.0.102D、 224.0.0.10E、 224.0.0.101F、 None of the other alternatives apply

考题 Your network contains an Active Directory domain. The domain contains three domain controllers.   One of the domain controllers fails.   Seven days later, the help desk reports that it can no longer create user accounts.  You need to ensure that the help desk can create new user accounts.  Which operations master role should you seize()A、domain naming masterB、infrastructure masterC、primary domain controller (PDC) emulatorD、RID masterE、schema master

考题 You are a help desk technician for your company. Susan is an executive. Because Susan travels frequently, she uses a Windows XP Professional portable computer that has a smart card reader.  Susan asks you to configure her computer so that she can dial in to the company network when she is out of the office. Company security policy states that dial-in users must use a smart card when they connect to the network, and that the users must use the strongest form of data encryption possible. Company security policy also states that client computers must disconnect if the Routing and Remote Access server does not support both smart card authentication and the strongest possible authentication. You need to configure the dial-up connection properties on Susan’s computer to dial in to the company network. Your solution must ensure that company security policies are enforced.  Which three actions should you perform?() A、Select the Advanced (custom settings) security option.B、Select the Require data encryption check box. C、Select the Typical (recommended settings) security option. D、Select the Use smart card item from the Validate my identity as follows list.E、Select the Maximum strength encryption item from the Data encryption list.F、Select the Extensible Authentication Protocol (EAP) option, and select Smart Card or other Certificate from the EAP list.

考题 You are a help desk technician for your company. All employees use Windows XP Professional computers. A salesperson named Philippe receives a removable disk drive cartridge from his supervisor. Philippe now reports that he cannot edit files on the cartridge. When he tries to open any files or folders on the cartridge, he receives an “access denied” error message. Philippe’s supervisor is currently out of the office. You place the cartridge in the removable drive on your computer. You receive the same “access denied” error message when you try to access the files and folders. You call Philippe’s supervisor. She asks you to grant permission to access the contents of the cartridge only to Philippe. However, she also wants to prevent Philippe from changing permissions on the contents of the cartridge. Which two actions should you take?()A、As Administrator, take ownership of the files and folders. B、As Administrator, grant your help desk user account Allow - Full Control permission on the files and folders.C、Grant Philippe Allow - Modify permission on the files and folders.D、Grant Philippe Allow - Full Control permission on the files and folders.E、Grant Philippe Allow - Take Ownership permission on the files and folders. 

考题 Multiple users report that their Windows 7 computers take longer to start than when their computers were first installed. A help desk technician reports that the problem is related to installed applications. You need to recommend a solution that identifies the applications that run during the startup process. What should you recommend?()A、Event ForwardingB、MSConfig.exeC、Problem Steps RecorderD、Reliability Monitor

考题 You need to recommend an administrative solution for the help desk technicians that meets the  museum’s technical requirements    What should you recommend?()A、Add the help desk technicians to the Domain Admins group.B、Add the help desk technicians to the Accounts Operators group.C、Assign permissions for the Groups OU and the Branch1 OU to the help desk technicians.D、Assign permissions for the domain object and the Users container to the help desk technicians.

考题 单选题As an experienced technician, you are responsible for infrastructure design and globalconfiguration changes. You are asked to deploy a Voice over Wireless LAN for your company. Ifthe cells have the same channel, the separation between them should be()A  19dbmB  10dbmC  67dbmD  86dbm

考题 单选题You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? ()A Enable the Require domain controller to unlock policy.B Set the Number of previous logons to cache policy to 0.  C Remove all user and group accounts from the Log on locally user right. D Remove all user and group accounts from the Access this computer from the network user right. 

考题 单选题You are the help desk manager for your company. The company network consists of a single Active Directory domain. All client computers run Windows XP Professional. All help desk technicians are members of the Help Desk Technicians group. They use Remote Assistance to remotely control user sessions to provide online support and training to users. The users currently use Windows Messenger to submit Remote Assistance invitations to the help desk technicians. You want to reduce the time required for help desk technicians to respond to Remote Assistance requests. To accomplish this goal, you want to configure the client computers to allow help desk technicians to establish a Remote Assistance session with a client computer without requiring an invitation from a user. What should you do?()A In the Default Domain Policy, set the Remote Assistance - Solicited Remote Assistance policy setting to Disabled. B In the Default Domain Policy, set the Remote Assistance - Offer Remote Assistance policy setting to Enabled and add the Help Desk Technicians group to the Helpers list. C In each computer's Local Security Policy, grant the Help Desk Technicians group the Allow logon through Terminal Services user right. D In the System properties for each computer, select the Allow users to connect remotely to this computer option, and add the Help Desk Technicians group to the list of allowed users. 

考题 单选题You are a help desk technician for your company. Stefan and Irene are software developers for the company. Stefan is developing a Web application on his Windows XP Professional computer. The computer is named Stefan132.  All client computers use Microsoft Internet Explorer 6. 0 or later as their Web browser. When Irene types http://Stefan132 in the Address bar of her Web browser, she cannot access the Web application. However, Stefan can access the Web application by typing http://localhost or http://Stefan132 in the Address bar of his Web browser. He can also access resources on the company network. When you run the Ping command on your computer, you cannot connect to Stefan’s computer. When you attempt to access http://Stefan132 from your computer, Internet Explorer displays “DNS or Server Error.” You need to ensure that Irene can access the Web application on Stefan’s computer. First, you establish a Remote Assistance connection to Stefan’s computer. What should you do next on Stefan’s computer?()A Run the IPconfig /renew command. B Stop and then restart the World Wide Web Publishing service. C Ensure that the Everyone group has Allow - Full Control permission on the Inetpub folder. D In the properties of the Local Area Connection connection, allow a Windows Firewall exception for port 80.

考题 问答题Practice 11  ● You are the Manager of a small printing company. A new employee, Mark McCabe, is joining your company on 10th May.  ● Write a short memo to your office administrator.  ● Saying who is starting work and when;  ● Telling him what Mark McCabe’s desk should be put;  ● Suggesting where Mark McCabe’s job will be.  ● Write 30—40 words on your answer sheet.

考题 单选题You have an Exchange Server 2010 organization.  You have a group named Help Desk that contains all the help desk users in the organization.  You need to ensure that the Help Desk group can manage all the mailboxes and mail-enabled contacts in the organization.  The solution must minimize the number of permissions assigned to the Help Desk group.  Which management role should you assign to the Help Desk group?()A Mail RecipientsB Mail Recipient CreationC Organization Client AccessD Recipient Policies

考题 单选题You are a security administrator for your company. The network consists of a single Active Directory domain. Servers run either Windows Server 2003 or Windows 2000 Server. All client computers run Windows XP Professional.    The company’s written security policy states that user accounts must be locked if an unauthorized user attempts to guess the users, passwords. The current account policy locks out a user after two invalid password attempts in five minutes. The user remains locked out until the account is reset by an administrator. Users frequently call the help desk to have their account unlocked. Calls related to account lockout constitute 25 percent of help desk calls.    You need to reduce the number of help desk calls related to account lockout.  What should you do?()A  Modify the Default Domain Controllers Policy Group Policy object(GPO). Increase the maximum lifetime for serviceB  Modify the Default Domain Policy Group Policy object(GPO). Configure an account lockout threshold of 10.C  Modify the Default Domain Controllers Policy Group Policy object(GPO). Disable the enforcement of user logon resD  Modify the Default Domain Policy Group Policy object(GPO). Increase the minimum password age.

考题 单选题“HELP US TO HELP YOU” means ______.A sometimes your help is not necessaryB you can make it easier for us to helpC usually we cannot help you

考题 多选题You work as a network technician at Company. Your boss, Mrs., is interested in  the Cisco Compatible Extensions program.  What are three features of this program? ()AAccountingBAnalog and digital voiceCMobilityDSecurityERouting and switchingFVLAN and QoS

考题 单选题If you need help and want to help others, you’d better ______.A invite your friend to a mealB make something with your friendsC become a member of a social groupD have a hobby

考题 单选题You are the network administrator for The network includes three office locations. Each office has one Windows Server 2003 computer that functions as a file and print server. This server hosts home folders for network users. In each office, a single printer is installed on the file and print server. The local help desk technicians have the necessary permissions to manage printers. A user named King notifies the local help desk that his documents are not printing. A help desk technician finds a list of documents waiting in the print queue. No user can successfully print. The technician cannot delete documents from the queue. You need to restore printing capabilities. What should you do?()A Install a second instance of the printer. Redirect the original printer to the new printer.B Stop and restart the Print Spooler service. Ask users to resubmit the documents for printing.C Pause the printer. Reconfigure the print queue to hold mismatched documents. Unpause the printer.D Install a second instance of the printer. Delete the original printer. Direct King to resubmit the documents for printing.

考题 问答题根据写作要求,写出一篇作文。 You are Susan. Your company will hold an opening ceremony for a new factory. You are asked to write an invitation letter to David, an important client of your company. The following information should he included:the reasons to invite him; the time for the event;the place for the event;early reply expected.

考题 单选题A: I noticed a copy of Scientific American on your desk. May I borrow it?  B: ______A Yes, you can.B Yes, you could.C Yes, go on.D Yes, help yourself.