网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Your company’s client computers run Windows 7.   Your company’s network has a wireless access point (WAP). A user reports that he regularly loses connectivity to the WAP.    You need to display information about client connectivity to the WAP.   What should you do?()

  • A、Use Event Viewer to view events from a source of WlanConn.
  • B、Use Event Viewer to view events from a source of WLAN AutoConfig.
  • C、Use auditpol.exe to enable failed attempts in the Object Access category.
  • D、Use auditpol.exe to enable successful attempts in the Object Access category.

参考答案

更多 “ Your company’s client computers run Windows 7.   Your company’s network has a wireless access point (WAP). A user reports that he regularly loses connectivity to the WAP.    You need to display information about client connectivity to the WAP.   What should you do?()A、Use Event Viewer to view events from a source of WlanConn.B、Use Event Viewer to view events from a source of WLAN AutoConfig.C、Use auditpol.exe to enable failed attempts in the Object Access category.D、Use auditpol.exe to enable successful attempts in the Object Access category.” 相关考题
考题 Your company uses network access protection (NAP) to enforce policies on client computers that connect to the network. Client computers run windows vista. A group Policy is used to configure client computers to obtain updates from WSUS. Company policy requires that updates labeled important and critical must be applied before client computers can access network resources. You need to ensure that client computes meet the company policy requirement. What should you do?()A.Enable automatic updates on each client.B.Enable the security center on each client.C.Quarantine clients that do not have all available security updates installed.D.Disconnect the remote connection until the required updates are installed.

考题 Your company network has 500 client computers that run Windows 7. Your team consists of 20 desktop support technicians. Two technicians troubleshoot a hardware-related performance issue on a computer. The technicians obtain different results by using their own User Defined Data Collector Sets. You need to create a standardized Data Collector Set on a network share that is accessible to your team. What should you create?()A.Event Trace Data Collector SetB.Performance Counter Data Collector SetC.Performance Counter Alert Data Collector SetD.System Configuration Information Data Collector Set

考题 Your company has client computers that run Windows 7 and client computers that run Windows XP Professional. You enable the Network Discovery feature on the Windows 7 computers. You discover that the Windows XP computers do not appear on the network map. You need to ensure that all client computers appear on the network map. What should you do?()A.Configure the IPv6 protocol on the Windows 7 computers.B.Configure the network shares on the Windows 7 computers to include the user names of all employees.C.Configure the network shares on the Windows XP computers to include the user names of all employees.D.Install the Link Layer Topology Discovery (LLTD) Responder on the Windows XP computers.

考题 You administer your company‘s network. All client computers run Microsoft Windows Vista. A standard user reports that they are unable to install an application. You need to install the applicatin.What should you do?()A.AB.BC.CD.D

考题 Your company has 250 client computers connected to the office LAN. The company has a pool of five public IP addresses. All client computers have dynamically assigned IP addresses. You need to provide all client computers with Internet access.  What should you use?()A、 DHCP Relay AgentB、 Routing Information Protocol (RIP)C、 Internet Group Management Protocol (IGMP)D、 Network Address Translation (NAT)/Basic Firewall

考题 Your company has an Active Directory forest. The company has servers that run Windows Server 2008 amd client computers that run Windows Vista. The domain uses a set of GPO administrative templates that have been approved to support regulatory compliance requirements. Your partner company has an Active Directory forest that contains a single domain, The company has servers that run Windows Server 2008 and client computers that run Windows Vista. You need to configure your partner company’s domain to use the approved set of administrative templates. What should you do()A、Use the Group Policy Management Console (GPMC) utility to back up the GPO to a file. In each site, import the GPO to the default domain policy.B、Copy the ADMX files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PDC emulatorC、Copy the ADML files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PDC emulatorD、Download the conf.adm, system.adm, wuau.adm, and inetres.adm files from the Microsoft Updates Web site. Copy the ADM files to the PolicyDefinitions folder on thr partner company’s emulator.

考题 Your company uses Network Access Protection (NAP) to enforce policies on client computers taht connect to the network. Client computers run Windows Vista. A Group Policy is used to configure client computers to obtain updates from WSUS. Company policy requires that updates labeled important and Critical must be applied before client computers can access network resources. You need to ensure that client computers meet the company policy requirement. What should you do()A、 Enable automatic updates on each clientB、 enable the Security Center on each clientC、 Quarantine clients that do nto have all availible security updates installedD、 Disconnect the remote connection until the required updates are installed.

考题 Your company has client computers that run Windows 7 and client computers that run Windows XP Professional. You enable the Network Discovery feature on the Windows 7 computers. You discover that the Windows XP computers do not appear on the network map. You need to ensure that all client computers appear on the network map. What should you do?()A、Configure the IPv6 protocol on the Windows 7 computers.B、Configure the network shares on the Windows 7 computers to include the user names of all employees.C、Configure the network shares on the Windows XP computers to include the user names of all employees.D、Install the Link Layer Topology Discovery (LLTD) Responder on the Windows XP computers.

考题 Your company’s network includes client computers that run Windows 7. You design a wireless network to use Extensible Authentication Protocol-Transport Level Security (EAP-TLS).   The Network Policy Server has a certificate installed.   Client computers are unable to connect to the wireless access points.    You need to enable client computers to connect to the wireless network.   What should you do?()A、Configure client computers to use Protected Extensible Authentication Protocol-Microsoft Challenge Handshake Authentication Protocol version 2 (PEAP-MS-CHAP v2).B、Configure client computers to use Protected Extensible Authentication Protocol-Transport Layer Security (PEAP-TLS).C、Install a certificate in the Trusted Root Certification Authorities certificate store.D、Install a certificate in the Third-Party Root Certification Authorities certificate store.

考题 All servers on your company’s network run Windows Server 2008 R2. All client computers run Windows 7. The company is planning to virtualize an application that runs only on Windows XP. You need to recommend a Virtualization solution that enables users to access the virtualized application while their computers are disconnected from the corporate network. Which technology should you recommend?()A、Microsoft Virtual Desktop Infrastructure (VDI)B、Microsoft Enterprise Desktop Virtualization (MED-V)C、Microsoft Application Virtualization (App-V)D、Remote Desktop Services (RDS)

考题 Your network has client computers that run Windows XP.   Users do not have administrative rights to their local computers.   You use Windows Server Update Services (WSUS) to manage software updates. You are planning to deploy Windows 7.   Your company uses a custom application that is not compatible with Windows?7.   You need to ensure that all users are able to run the custom application.    What are two possible ways to achieve this goal?()A、Deploy and register the compatibility-fix database file to the client computers by using a user startup script.B、Deploy and register the compatibility-fix database file to the client computers by using a computer startup script.C、Install and register a shim on the client computers by using Group Policy.D、Install and register a shim on the WSUS server.

考题 Your company uses network access protection (NAP) to enforce policies on client computers that connect to the network. Client computers run windows vista. A group Policy is used to configure client computers to obtain updates from WSUS. Company policy requires that updates labeled important and critical must be applied before client computers can access network resources. You need to ensure that client computes meet the company policy requirement. What should you do?()A、Enable automatic updates on each client.B、Enable the security center on each client.C、Quarantine clients that do not have all available security updates installed.D、Disconnect the remote connection until the required updates are installed.

考题 Your company uses Network Access Protection (NAP) to enforce policies on client computers that connect to the network. Client computers run Windows 7. A Group Policy is used to configure client computers to obtain updates from Windows Server Update Services (WSUS).Company policy requires that updates labeled Important and Critical must be applied before client computers can access network resources.You need to ensure that client computers meet the company policy requirement. What should you do?()A、Enable automatic updates on each client.B、Enable the Security Center on each client.C、Quarantine clients that do not have all available security updates installed.D、Disconnect the connection until the required updates are installed.

考题 All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()A、Configure the Network authentication (Shared mode) setting.B、Apply a Wireless Network Policy to set the network type to WPA-PSK.C、Apply a Wireless Network Policy to automatically connect to the company wireless network.D、Apply a Wireless Network Policy to set the company wireless network as the preferred network.

考题 Your company’s network has client computers that run Windows 7.    When a user attempts to log on to the domain from a computer named Client1,she receives the following message:   The system cannot log you on to this domain because the system’s computer account in its primary domain is missing or the password on that account is incorrect.  You need to ensure that the user can log on to the domain from Client1.   What should you do?()A、Disjoin and rejoin Client1 to the domain.B、Add the computer account for Client1 to the Domain Computers Active Directory group.C、Reset the account password for Client1 through Active Directory Users and Computers.D、Reset the account password for the user through Active Directory Users and Computers.

考题 Your network consists of an Active Directory domain. The domain controllers run Windows Server 2008 R2. Client computers run Windows 7.   You need to implement Encrypting File System (EFS) for all client computers. You want to achieve this goal while meeting the following requirements:   èYou must minimize the amount of data that is transferred across the network when a user logs on to or off from a client computer.   èUsers must be able to access their EFS certificates on any client computers. èIf a client computer s disk fails, EFS certificates must be accessible    What should you do?()A、Enable credential roaming.B、Enable roaming user profiles.C、Enable a Data Recovery Agent.D、Issue smart cards to all users.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain named . All domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. All client computer accounts are stored in the Computer container. A user named Peter reports that he cannot log on to the domain from his computer. Peter receives the logon message shown in the exhibit. Exhibit: Logon Message Your account is configured to prevent you from using this computer. Please try another computer. You need to enable Peter to log on. What should you do?()A、Create an account for Peter's computer in the Computers container.B、Grant the Log on locally user right to Peter's user account.C、Enable Peter's user account.D、Change the properties of Peter's user account so he can log on to any computer.

考题 Your company network has 500 client computers that run Windows 7. Your team consists of 20 desktop support technicians. Two technicians troubleshoot a hardware-related performance issue on a computer. The technicians obtain different results by using their own User Defined Data Collector Sets. You need to create a standardized Data Collector Set on a network share that is accessible to your team. What should you create?()A、Event Trace Data Collector SetB、Performance Counter Data Collector SetC、Performance Counter Alert Data Collector SetD、System Configuration Information Data Collector Set

考题 Your company has client computers that run Windows XP Professional.   You are planning to install Windows 7 Enterprise on the existing client computers.    You need to ensure that the user state can be viewed after it has been collected and saved.    What are two possible ways to achieve this goal?()A、Use a hard-link migration storeB、Use an uncompressed migration storeC、Perform an offline migration by using WindowsoldD、Perform an offline migration by using Windows PE

考题 All servers in your environment run Windows Server 2003. Your companys network includes multiple network segments and multiple routers. A member server that has the Routing and Remote Access service (RRAS) installed provides Internet connectivity for all client computers. The RRAS server is located in a perimeter network (also known as DMZ). A client computer named Client1 is unable to connect to the Internet. The RRAS server is able to connect to the Internet. You need to pinpoint the location of the network issue.  What should you do?()A、 Use the nbtstat command-line tool on Client1.B、 Use the pathping command-line tool on Client1.C、 Run the nbtstat -r command on the RRAS server.D、 Run the ping -a Client1 command on the RRAS server.

考题 Your company has an Active Directory forest that contains Windows Server 2008 R2 domain  controllers and DNS servers. All client computers run Windows XP SP3. You need to use your client computers to edit domain-based GPOs by using the ADMX files that  are stored in the ADMX central store.     What should you do()A、Add your account to the Domain Admins group.B、Upgrade your client computers to Windows 7.C、Install .NET Framework 3.0 on your client computers.D、Create a folder on PDC emulator for the domain in the PolicyDefinitions path. Copy the ADMX files to the PolicyDef

考题 Your company has an Active Directory forest. The company has servers that run Windows Server  2008 R2 and client computers that run Windows 7. The domain uses a set of GPO administrative  templates that have been approved to support regulatory compliance requirements.     Your partner company has an Active Directory forest that contains a single domain. The company  has servers that run Windows Server 2008 R2 and client computers that run Windows 7.     You need to configure your partner company’s domain to use the approved set of administrative  templates.   What should you do()A、Use the Group Policy Management Console (GPMC) utility to back up the GPO to a file. In each site, import the GPB、Copy the ADMX files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PC、Copy the ADML files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PD、Download the conf.adm, system.adm, wuau.adm, and inetres.adm files from the Microsoft Updates Web site. Copy

考题 You are the network administrator for your company. The network consists of a single Active Directorydomain. All network servers run Windows Server 2003. Three thousand client computers run Windows 2000Professional, and 1,500 client computers run Windows XP Professional.A new employee named Peter is hired to assist you in installing Windows XP Professional on 150 new client computers.You need to ensure that Peter has only the minimum permissions required to add new computer accounts to the domain and to own the accounts that he creates. Peter must not be able to delete computer accounts.What should you do()?A、Add Peter's user account to the Server Operators group.B、Add Peter's user account to the Account Operators group.C、Use the Delegation of Control Wizard to permit Peter's user account to create new computer objects in the Computers container.D、Create a Group Policy object (GPO) and link it to the domain. Configure the GPO to permit Peter's user account to add client computers to the domain.

考题 单选题Your company’s network has client computers that run Windows 7.   A software vendor releases version 2 of an application that your company uses.  Your company currently uses version 1.  Version 1 and version 2 are not compatible. You plan to deploy version 2 of the application.   You have the following requirements:Users must be able to run both versions of the application on their computers.   Version 2 must be available when a client computer is not connected to the network.  You need to plan a software deployment process that meets the requirements.   What should you do?()A  Deploy version 2 of the application by using Microsoft Application Virtualization (App-V). B  Deploy version 2 of the application as a Remote Desktop Services RemoteApp.C  Deploy version 2 of the application by using a Group Policy Software Installation policy.D  Deploy version 2 of the application by using a Microsoft System Center Configuration Manager package.

考题 单选题Your company uses Network Access Protection (NAP) to enforce policies on client computers that connect to the network.Client computers run Windows Vista. A Group Policy is used to configure client computers to obtain updates from Windows Server Update Services (WSUS).Company policy requires that updates labeled Important and Critical must be applied before client computers can access network resources. You need to ensure that client computers meet the company policy requirement. What should you do?()A Enable automatic updates on each client.B Enable the Security Center on each client.C Quarantine clients that do not have all available security updates installed.D Disconnect the connection until the required updates are installed.