网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You have a FAT32-formatted volume.You need to enable file-level security on the volume. The solution must maintain all files on the volume. What should you do?()
A

Run the sfc.exe command-line tool.

B

Run the convert.exe command-line tool. 

C

From Disk Management, format the volume and select the NTFS file system.

D

From Disk Management, upgrade the disk that contains the volume to a dynamic disk.


参考答案

参考解析
解析: 暂无解析
更多 “单选题You have a FAT32-formatted volume.You need to enable file-level security on the volume. The solution must maintain all files on the volume. What should you do?()A Run the sfc.exe command-line tool.B Run the convert.exe command-line tool. C From Disk Management, format the volume and select the NTFS file system.D From Disk Management, upgrade the disk that contains the volume to a dynamic disk.” 相关考题
考题 It will enable you to plan your activities so that you have adequate time for both work and play.

考题 What kind of knowledge do you need to have if you say you know a word?

考题 When do you need to configure the P1 interface?()A、 whenever you have an upstream proxyB、 whenever you intend to deploy the L4TM in blocking modeC、 whenever you want to enable the WSA proxyD、 whenever you have a separate management VLAN orsubnetwork

考题 You have a domain controller that runs Windows Server 2008 and is configured as a DNS server. You need to record all inbound DNS queries to the server. What should you configure in the DNS Manager console()A、Enable debug logging.B、Enable automatic testing for simple queries.C、Enable automatic testing for recursive queries.D、Configure event logging to log errors and warnings.

考题 You are an administrator of a small business network. You have one dial-up account at an ISP and want all computers on your network connect to the Internet.  You have enabled Internet connection sharing. You do not want to initiate this connection automatically when a request for Internet reaches your computer. What should you do? ()A、You should uncheck “Enable on demand dialingB、Enable on-demand dialingC、Enable sharing a modem on one computer on the networkD、Configure a DHCP ServerE、Disable Internet Connection Sharing

考题 You have a domain controller that runs Windows Server 2008 R2 and is configured as a DNS  server.     You need to record all inbound DNS queries to the server.     What should you configure in the DNS Manager console()A、Enable debug logging.B、Enable automatic testing for simple queries.C、Enable automatic testing for recursive queries.D、Configure event logging to log errors and warnings.

考题 You have a computer that runs Windows 7. Multiple users share the computer. The computer is joined to adomain. You need to prevent the users from using more than 2 GB of disk space on drive C.  What should you do?()A、From a Group Policy object (GPO), enable the Limit profile size setting.B、Enable System Protection for Local Disk (C) and set the disk space usage.C、Enable disk quota management on Computer1 and configure a default quota limit.D、From a Group Policy object (GPO), enable the Limit the size of the entire roaming user profile cachesetting.

考题 You have a domain controller that runs Windows Server 2008 and is configured as a DNS server You need to record all inbound DNS queries to the server. What should you configure in the DNS Manager console()A、Enable debug logging.B、Enable automatic testing for simple queries.C、Enable automatic testing for recursrve queries.D、Configure event logging to log errors and warnings.

考题 You have an Exchange Server 2010 organization that contains five Hub Transport servers, five Mailboxservers and one Edge Transport server.  You need to provide a solution to ensure that users can prevent legitimate inbound e-mail messages frombeing classified as spam.  What should you do?()A、Enable sender filtering.B、Enable Sender ID filtering.C、Configure a custom MailTip.D、Configure safelist aggregation.

考题 You need to design a strategy to increase security for the client computers in the finance department. Which two actions should you perform?()A、Enable automatic certificate enrollmentB、Enforce smart card logonsC、Enable Encrypting File System (EFS) for offline filesD、Enable a screen saver password

考题 You have two computers named Computer1 and Computer2 that run Windows 7. You need to ensure thatyou can remotely execute commands on Computer2 from Computer1.  What should you do?()A、Run Winrm quickconfig on Computer1.B、Run Winrm quickconfig on Computer2.C、Enable Windows Remote Management (WinRM) through Windows Firewall on Computer1.D、Enable Windows Remote Management (WinRM) through Windows Firewall on Computer2.

考题 You have three computers that run Windows 7. You use Windows PowerShell to perform remote administration tasks on all three computers. You need to remotely administer all three  computers by usingPowerShell.  Which PowerShell cmdlet should you use?()A、Enable-PSRemotingB、Enable-PSSessionConfigurationC、New-PSDriveD、New-PSSession

考题 You have a server that runs the Terminal Services Gateway (TS Gateway) role service. Users need to connect remotely through the gateway to desktop computers located in their offices.  You create a security group named Remote1 for the users who need to connect to computers in their offices.  You need to enable the users to connect to the TS Gateway. What should you do?()A、Add the Remote1 security group to the local remote desktop users group on the TS Gateway server.B、Create a client authorization policy. Add the Remote1 security group and enable Device redirection.C、Create a resource authorization policy. Add the Remote1 security group and enable Users to connect to any resource.D、Create a Group Policy object and enable the Set TS Gateway authentication method properties to Ask for credentials, use Basic protocol. Apply the policy to the TS Gateway server.

考题 Your network contains one Active Directory domainl. You have a member server that runs Windows Server 2008. You need to immediately disable all incoming connections to the server. What should you do?()A、From the Services snap-in disable the IP HelpderB、Fom the Services snap-in disable the Net Logon ServiceC、From Windows Firewall, enable the Block all connections option on the Public ProfileD、From the Windows Firewall, enable the Block all connections option on the Domain Profile

考题 You have a domain controller that runs Windows Server 2008 R2 and is configured as a DNS server.  You need to record all inbound DNS queries to the server.  What should you configure in the DNS Manager console()A、Enable debug logging.B、Enable automatic testing for simple queries.  The safer , easier way to help you pass any IT exams.  9 / 90C、Enable automatic testing for recursive queries.D、Configure event logging to log errors and warnings.

考题 You have a FAT32-formatted volume.You need to enable file-level security on the volume. The solution must maintain all files on the volume. What should you do?()A、Run the sfc.exe command-line tool.B、Run the convert.exe command-line tool. C、From Disk Management, format the volume and select the NTFS file system.D、From Disk Management, upgrade the disk that contains the volume to a dynamic disk.

考题 You have a server that runs Windows Server 2003 Service Pack 2 (SP2). The server contains one volume. You install Certificate Services. You need to back up the Certificates Services database by using the minimum amount of storage space. Which tool should you use? ()A、Certification Authority snap-inB、Certificates snap-inC、Certificate Templates snap-inD、Windows Backup

考题 When you use Microsoft Windows Media Player to begin playback of a music file, you receive the following error message: "You do not have the rights to play this file."  You need to configure Windows Media Player to ensure playback of protected digital media.  What should you do? ()A、Disable the Set clock on devices automatically option.B、Enable the Automatically check if protected files need to be refreshed option.C、Enable the Update music files by retrieving media info from the Internet option.D、Enable the Download usage rights automatically when I play or sync a file option.

考题 Your network consists of a single Active Directory domain. You have a member server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You need to track all authentication attempts on Server1. What should you do?()A、Enable auditing of logon event events in Server1’s local policy.B、Enable auditing of logon event events in the Default Domain Controller Policy.C、Enable auditing of account logon event events in Server1’s local policy.D、Enable auditing of account logon event events in the Default Domain Controller Policy.

考题 You have a stand-alone server that runs Windows Server 2003 Service Pack 2 (SP2).You run the Runas command and receive the following error message: “1058: The service cannot be started, either because it is disabled or has no enabled devices associated with it.” You need to ensure that you can use Runas successfully.  What should you do?()A、Enable the Remote Registry service.B、Enable the Secondary Logon service.C、Join the server to an Active Directory domain.D、From Device Manager, scan for hardware changes.

考题 You have a computer that runs Windows 7. Multiple users log on to the computer. The computer has fiveremovable devices. You need to ensure that users can only access removable  devices that have beenpreviously installed on the computer.  What should you modify in the Local Group Policy ?()A、Enable the Prevent redirection of USB devices setting.B、Enable the Prevent installation of removable devices setting.C、Disable the WPD Devices: Deny read access setting.D、Disable the Allow administrators to override Device Installation Restriction policies setting.

考题 You need to reduce the level of access that a malicious Web site might have to your computer.  What should you do? ()A、Start a Windows Defender scan.B、Enable Microsoft Windows Internet Explorer Phishing Filter.C、Enable Microsoft Windows Internet Explorer Pop-up Blocker.D、Confirm that Microsoft Windows Internet Explorer Protected Mode is enabled on the Internet security zone.

考题 You have a computer that runs Windows 7 and Windows Internet Explorer 8. You open Internet Explorerand access a Web site. The Web site displays a page that has misaligned text and graphic images. Youverify that the Web page displays correctly in previous versions of Internet Explorer.  You need to view theWeb page correctly. What should you do?()A、Modify the text size.B、Enable Caret Browsing.C、Enable Compatibility View.D、Disable the SmartScreen Filter.

考题 单选题You have a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).  Server1 is configured as a VPN server.You need to enable trace logging for all Routing and Remote Access components.  Which tool should you use?()A Netdiag.exeB Netcap.exeC Netsh.exeD Tracert.exe

考题 多选题In which scenarios would you rebuild an index?()Awhen you need to disable the index usageBwhen you need to change storage optionsCwhen you need to enable index monitoringDwhen you need to move the index to another tablespace

考题 单选题When do you need to configure the P1 interface?()A  whenever you have an upstream proxyB  whenever you intend to deploy the L4TM in blocking modeC  whenever you want to enable the WSA proxyD  whenever you have a separate management VLAN orsubnetwork

考题 单选题You have an Exchange Server 2010 organization.You plan to enable Federated Sharing.You need to create a DNS record to store the Application Identifier (AppID) of the domain for the federated trust. Which type of record should you create?()A AB CNAMEC SRVD TXT

考题 单选题You are an administrator at Certkiller .com. Certkiller has a network of 5 member servers acting as file servers. It has an Active Directory domain. You have installed a software application on the servers. As soon as the application is installed, one of the member servers shuts down itself. To trace and rectify the problem, you create a Group Policy Object (GPO). You need to change the domain security settings to trace the shutdowns and identify the cause of it. What should you do to perform this task()A Link the GPO to the domain and enable System Events optionB Link the GPO to the domain and enable Audit Object Access optionC Link the GPO to the Domain Controllers and enable Audit Object Access optionD Link the GPO to the Domain Controllers and enable Audit Process tracking optionE Perform all of the above actions