网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
You have a FAT32-formatted volume.You need to enable file-level security on the volume. The solution must maintain all files on the volume. What should you do?()
A
Run the sfc.exe command-line tool.
B
Run the convert.exe command-line tool.
C
From Disk Management, format the volume and select the NTFS file system.
D
From Disk Management, upgrade the disk that contains the volume to a dynamic disk.
参考答案
参考解析
解析:
暂无解析
更多 “单选题You have a FAT32-formatted volume.You need to enable file-level security on the volume. The solution must maintain all files on the volume. What should you do?()A Run the sfc.exe command-line tool.B Run the convert.exe command-line tool. C From Disk Management, format the volume and select the NTFS file system.D From Disk Management, upgrade the disk that contains the volume to a dynamic disk.” 相关考题
考题
It will enable you to plan your activities so that you have adequate time for both work and play.
考题
When do you need to configure the P1 interface?()A、 whenever you have an upstream proxyB、 whenever you intend to deploy the L4TM in blocking modeC、 whenever you want to enable the WSA proxyD、 whenever you have a separate management VLAN orsubnetwork
考题
You have a domain controller that runs Windows Server 2008 and is configured as a DNS server. You need to record all inbound DNS queries to the server. What should you configure in the DNS Manager console()A、Enable debug logging.B、Enable automatic testing for simple queries.C、Enable automatic testing for recursive queries.D、Configure event logging to log errors and warnings.
考题
You are an administrator of a small business network. You have one dial-up account at an ISP and want all computers on your network connect to the Internet. You have enabled Internet connection sharing. You do not want to initiate this connection automatically when a request for Internet reaches your computer. What should you do? ()A、You should uncheck “Enable on demand dialingB、Enable on-demand dialingC、Enable sharing a modem on one computer on the networkD、Configure a DHCP ServerE、Disable Internet Connection Sharing
考题
You have a domain controller that runs Windows Server 2008 R2 and is configured as a DNS server. You need to record all inbound DNS queries to the server. What should you configure in the DNS Manager console()A、Enable debug logging.B、Enable automatic testing for simple queries.C、Enable automatic testing for recursive queries.D、Configure event logging to log errors and warnings.
考题
You have a computer that runs Windows 7. Multiple users share the computer. The computer is joined to adomain. You need to prevent the users from using more than 2 GB of disk space on drive C. What should you do?()A、From a Group Policy object (GPO), enable the Limit profile size setting.B、Enable System Protection for Local Disk (C) and set the disk space usage.C、Enable disk quota management on Computer1 and configure a default quota limit.D、From a Group Policy object (GPO), enable the Limit the size of the entire roaming user profile cachesetting.
考题
You have a domain controller that runs Windows Server 2008 and is configured as a DNS server You need to record all inbound DNS queries to the server. What should you configure in the DNS Manager console()A、Enable debug logging.B、Enable automatic testing for simple queries.C、Enable automatic testing for recursrve queries.D、Configure event logging to log errors and warnings.
考题
You have an Exchange Server 2010 organization that contains five Hub Transport servers, five Mailboxservers and one Edge Transport server. You need to provide a solution to ensure that users can prevent legitimate inbound e-mail messages frombeing classified as spam. What should you do?()A、Enable sender filtering.B、Enable Sender ID filtering.C、Configure a custom MailTip.D、Configure safelist aggregation.
考题
You need to design a strategy to increase security for the client computers in the finance department. Which two actions should you perform?()A、Enable automatic certificate enrollmentB、Enforce smart card logonsC、Enable Encrypting File System (EFS) for offline filesD、Enable a screen saver password
考题
You have two computers named Computer1 and Computer2 that run Windows 7. You need to ensure thatyou can remotely execute commands on Computer2 from Computer1. What should you do?()A、Run Winrm quickconfig on Computer1.B、Run Winrm quickconfig on Computer2.C、Enable Windows Remote Management (WinRM) through Windows Firewall on Computer1.D、Enable Windows Remote Management (WinRM) through Windows Firewall on Computer2.
考题
You have three computers that run Windows 7. You use Windows PowerShell to perform remote administration tasks on all three computers. You need to remotely administer all three computers by usingPowerShell. Which PowerShell cmdlet should you use?()A、Enable-PSRemotingB、Enable-PSSessionConfigurationC、New-PSDriveD、New-PSSession
考题
You have a server that runs the Terminal Services Gateway (TS Gateway) role service. Users need to connect remotely through the gateway to desktop computers located in their offices. You create a security group named Remote1 for the users who need to connect to computers in their offices. You need to enable the users to connect to the TS Gateway. What should you do?()A、Add the Remote1 security group to the local remote desktop users group on the TS Gateway server.B、Create a client authorization policy. Add the Remote1 security group and enable Device redirection.C、Create a resource authorization policy. Add the Remote1 security group and enable Users to connect to any resource.D、Create a Group Policy object and enable the Set TS Gateway authentication method properties to Ask for credentials, use Basic protocol. Apply the policy to the TS Gateway server.
考题
Your network contains one Active Directory domainl. You have a member server that runs Windows Server 2008. You need to immediately disable all incoming connections to the server. What should you do?()A、From the Services snap-in disable the IP HelpderB、Fom the Services snap-in disable the Net Logon ServiceC、From Windows Firewall, enable the Block all connections option on the Public ProfileD、From the Windows Firewall, enable the Block all connections option on the Domain Profile
考题
You have a domain controller that runs Windows Server 2008 R2 and is configured as a DNS server. You need to record all inbound DNS queries to the server. What should you configure in the DNS Manager console()A、Enable debug logging.B、Enable automatic testing for simple queries. The safer , easier way to help you pass any IT exams. 9 / 90C、Enable automatic testing for recursive queries.D、Configure event logging to log errors and warnings.
考题
You have a FAT32-formatted volume.You need to enable file-level security on the volume. The solution must maintain all files on the volume. What should you do?()A、Run the sfc.exe command-line tool.B、Run the convert.exe command-line tool. C、From Disk Management, format the volume and select the NTFS file system.D、From Disk Management, upgrade the disk that contains the volume to a dynamic disk.
考题
You have a server that runs Windows Server 2003 Service Pack 2 (SP2). The server contains one volume. You install Certificate Services. You need to back up the Certificates Services database by using the minimum amount of storage space. Which tool should you use? ()A、Certification Authority snap-inB、Certificates snap-inC、Certificate Templates snap-inD、Windows Backup
考题
When you use Microsoft Windows Media Player to begin playback of a music file, you receive the following error message: "You do not have the rights to play this file." You need to configure Windows Media Player to ensure playback of protected digital media. What should you do? ()A、Disable the Set clock on devices automatically option.B、Enable the Automatically check if protected files need to be refreshed option.C、Enable the Update music files by retrieving media info from the Internet option.D、Enable the Download usage rights automatically when I play or sync a file option.
考题
Your network consists of a single Active Directory domain. You have a member server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You need to track all authentication attempts on Server1. What should you do?()A、Enable auditing of logon event events in Server1’s local policy.B、Enable auditing of logon event events in the Default Domain Controller Policy.C、Enable auditing of account logon event events in Server1’s local policy.D、Enable auditing of account logon event events in the Default Domain Controller Policy.
考题
You have a stand-alone server that runs Windows Server 2003 Service Pack 2 (SP2).You run the Runas command and receive the following error message: “1058: The service cannot be started, either because it is disabled or has no enabled devices associated with it.” You need to ensure that you can use Runas successfully. What should you do?()A、Enable the Remote Registry service.B、Enable the Secondary Logon service.C、Join the server to an Active Directory domain.D、From Device Manager, scan for hardware changes.
考题
You have a computer that runs Windows 7. Multiple users log on to the computer. The computer has fiveremovable devices. You need to ensure that users can only access removable devices that have beenpreviously installed on the computer. What should you modify in the Local Group Policy ?()A、Enable the Prevent redirection of USB devices setting.B、Enable the Prevent installation of removable devices setting.C、Disable the WPD Devices: Deny read access setting.D、Disable the Allow administrators to override Device Installation Restriction policies setting.
考题
You need to reduce the level of access that a malicious Web site might have to your computer. What should you do? ()A、Start a Windows Defender scan.B、Enable Microsoft Windows Internet Explorer Phishing Filter.C、Enable Microsoft Windows Internet Explorer Pop-up Blocker.D、Confirm that Microsoft Windows Internet Explorer Protected Mode is enabled on the Internet security zone.
考题
You have a computer that runs Windows 7 and Windows Internet Explorer 8. You open Internet Explorerand access a Web site. The Web site displays a page that has misaligned text and graphic images. Youverify that the Web page displays correctly in previous versions of Internet Explorer. You need to view theWeb page correctly. What should you do?()A、Modify the text size.B、Enable Caret Browsing.C、Enable Compatibility View.D、Disable the SmartScreen Filter.
考题
单选题You have a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). Server1 is configured as a VPN server.You need to enable trace logging for all Routing and Remote Access components. Which tool should you use?()A
Netdiag.exeB
Netcap.exeC
Netsh.exeD
Tracert.exe
考题
多选题In which scenarios would you rebuild an index?()Awhen you need to disable the index usageBwhen you need to change storage optionsCwhen you need to enable index monitoringDwhen you need to move the index to another tablespace
考题
单选题When do you need to configure the P1 interface?()A
whenever you have an upstream proxyB
whenever you intend to deploy the L4TM in blocking modeC
whenever you want to enable the WSA proxyD
whenever you have a separate management VLAN orsubnetwork
考题
单选题You have an Exchange Server 2010 organization.You plan to enable Federated Sharing.You need to create a DNS record to store the Application Identifier (AppID) of the domain for the federated trust. Which type of record should you create?()A
AB
CNAMEC
SRVD
TXT
考题
单选题You are an administrator at Certkiller .com. Certkiller has a network of 5 member servers acting as file servers. It has an Active Directory domain. You have installed a software application on the servers. As soon as the application is installed, one of the member servers shuts down itself. To trace and rectify the problem, you create a Group Policy Object (GPO). You need to change the domain security settings to trace the shutdowns and identify the cause of it. What should you do to perform this task()A
Link the GPO to the domain and enable System Events optionB
Link the GPO to the domain and enable Audit Object Access optionC
Link the GPO to the Domain Controllers and enable Audit Object Access optionD
Link the GPO to the Domain Controllers and enable Audit Process tracking optionE
Perform all of the above actions
热门标签
最新试卷