考题
You create an intranet Web site for management of project documents. You need to enable all users to browse documents on the site. Only members of the administrators group must be able to upload files. Which code segment of the Web.config file should you use? ()A. allow verbs=GET users=* /deny verbs=POST users=* /allow verbs=POST roles=Administrators /B. allow roles=Administrators /deny users=* /C. allow u sers=Administrators /allow users=* /D. allow v erbs = POST roles=Administrators /deny verbs=POST users=* /allow verbs=GET users=* /
考题
All client computers on your company network run Windows 7. A computer is unable to connect to network resources. The configuration of the computer is as shown in the following table.You need to ensure that the computer is able to connect to network resources. What should you do?()A.Change the IP address to 131.107.3.254.B.Change the subnet mask to 255.255.248.0.C.Change the default gateway to 131.107.0.1.D.Change the preferred DNS server to 131.107.3.1.
考题
Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only whe nyou are traveling. You need to configure the network adapter profile settings to ensure that the computer discovers other network devices only when you are at home.Which two actions should you perform?()A.AB.BC.CD.D
考题
Your computer has a wireless network adapter installed. However, the computer fails to connect to the wireless network. You need to ensure that the computer is able to connect to the wireless network.What should you do?()A.AB.BC.CD.D
考题
You need to back up the existing data on a computer before you install a new application. You also need to ensure that you are able to recover individual user files that are replaced or deleted during the installation.What should you do?()A.AB.BC.CD.D
考题
You have a computer that runs Windows Vista.You need to ensure that all local administrators can install applications without being prompted for approval.What should you do?()
A.AB.BC.CD.D
考题
Certkiller .com has asked you to develop an application that displays the properties for all Certkiller.com‘s network drives.The information generated by this application will be utilized by Certkiller .com‘s network administrators to verify client setups.You need to ensure that these requirements are fully satisfied.What should you do?()A.B.C.D.
考题
Your computer has a wireless network adapter installed. However, the computer fails to connect to the wireless network. You need to ensure that the computer is able to connect to the wireless network. What should you do?()A、Change the Network Category setting of the wireless connection to Public.B、Enable the Internet Connection Sharing feature on the wireless network adapter.C、Rename the wireless network adapter to match the Service Set Identifier (SSID) of the wireless network.D、Configure the wireless network adapter to connect to the appropriate wireless network from the Connect to a network list.
考题
You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain. The domain contains a Windows Server 2003 computer named Server1. You are planning a public key infrastructure (PKI) for the company. You want to deploy a certification authority (CA) on Server1. You create a new global security group named Cert Administrators. You need to delegate the tasks to issue, approve, and revoke certificates to members of the Cert Administrators group. What should you do?()A、 Add the Cert Administrators group to the Cert Publishers group in the domain.B、 Configure the Certificates Templates container in the Active Directory configuration naming context to assign the Cert Administrators group the Allow - Write permission.C、 Configure the CertSrv virtual directory on Server1 to assign the Cert Administrators group the Allow - Modify permission.D、 Assign the Certificate Managers role to the Cert Administrators group.
考题
You are a security administrator for your company. The company has one main office and five branch offices. Network administrators work in the main office and each branch office. Network administrators in the main office frequently create scripts that automate common administrative tasks. You review each script to ensure it does not introduce security vulnerabilities. Scripts that do not introduce security vulnerabilities are considered approved. Occasionally, branch office administrators modify these scripts and distribute the modified scripts to other branch office administrators. Branch office administrators often report that they accidentally run a modified version of a script. You need to ensure that branch office administrators can verify which scripts are approved scripts. What should you do?()A、 Maintain a list of the dates that the approved scripts were last modified. lnstruct branch office administrators to verifB、 Digitally sign All approved scripts. Instruct branch office administrators to verify the signature before using a script.C、 Distribute all approved scripts to branch office administrators in an e-mail message.D、 Place all approved scripts on a file server in the main office. Assign All branch office administrators only the Allow -the approved scripts. Instruct administrators to copy scripts from this file server.
考题
Your company's corporate network uses Network Access Protection (NAP).Users are able to connect to the corporate network remotely.You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do?()A、Apply an IPsec NAP policy.B、Configure a NAP policy for 802.1X wireless connections.C、Configure VPN connections to use MS-CHAP v2 authentication.D、Restrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP.
考题
Your company has an Active Directory forest. The company has branch offices in three locations. Each location has an organizational unit. You need to ensure that the branch office administrators are able to create and apply GPOs only to their respective organizational units. Which two actions should you perform()A、Add the user accounts of the branch office administrators to the Group Policy Creator Owners Group.B、Modify the Managed By tab in each organizational unit to add the branch office administrators to their respective orgC、Run the Delegation of Control Wizard and delegate the right to link GPOs for the domain to the branch office adminD、Run the Delegation of Control Wizard and delegate the right to link GPOs for their branch organizational units to the
考题
You work as a network Exchange administrator at Company.com.Company.com has its headquarters located in Miami and branch office located in Toronto.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently made the Toronto office administrators members of a custom management role group which is configured to allow members to manage recipients.During your routine maintenance you discover that Toronto office administrators are able to manage recipients in both offices.During the course of the business week you receive instruction from Company.com to ensure that the Toronto office administrators are able to manage recipients in the Toronto office only. What should you do?()A、You should consider having a new linked role group created.You should then have the Toronto office administrators added to the role group.B、You should consider having a new role created.You should then have the management role entries added to the role.C、You should consider having a management scope created and associated to the role group.D、You should consider having a management role assignment policy created and associated to the role group.
考题
You are planning to deploy Windows 7 to all client computers in your network. You need to ensure that domain administrators can manage domain Group Policy objects (GPOs) from their Windows 7 computers. What should you provide to the domain administrators?()A、Administration Tools PackB、GPOAccelerator ToolC、Local Group Policy EditorD、Remote Server Administration Tools
考题
Your company has an Active Directory forest. The company has branch offices in three locations. Each location has an organizational unit. You need to ensure that the branch office administrators are able to create and apply GPOs only to their respective organizational units. Which two actions should you perform()A、Add the user accounts of the branch office administrators to the Group Policy Creator Owners Group.B、Modify the Managed By tab in each organizational unit to add the branch office administrators to their respective organizational units.C、Run the Delegation of Control Wizard and delegate the right to link GPOs for the domain to the branch office administrators.D、Run the Delegation of Control Wizard and delegate the right to link GPOs for their branch organizational units to the branch office administrators.
考题
You need to design a remote administration solution for servers on the internal network. Your solution must meet business and security requirements. What should you do?()A、Permit administrators to use an HTTP interface to manage servers remotelyB、Permit only administrators to connect to the servers’ Telnet serviceC、Permit administrators to manage the servers by using Microsoft NetMeetingD、Require administrators to use Remote Desktop for Administration connections to manage the servers
考题
You create an intranet Web site for management of project documents. You need to enable all users to browse documents on the site. Only members of the administrators group must be able to upload files. Which code segment of the Web.config file should you use? ()A、allow verbs="GET" users="*" /deny verbs="POST" users="*" /allow verbs="POST" roles="Administrators" /B、allow role s="Administrators" /deny users="*" /C、allow u sers="Administrators" /allow users="*" /D、allow v erbs = "POST" roles="Administrators" /deny verbs="POST" users="*" /allow verbs="GET" users="*" /
考题
Your companys corporate network uses Network Access Protection (NAP). Users are able to connect to the corporate network remotely. You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do()? A、Apply an IPsec NAP policy.B、Configure a NAP Policy for 802.1x Wireless connectionsC、Configure VPN connections to use MS-CHAP v2 authenticationD、Restrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP
考题
You are the network administrator for TestKing. The network consists of a single Active Directory domain named testking.com. All domain controller run Windows Server 2003. employes three database administrators who administer seven databases servers that run Windows Server 2003. The database administrators occasionally restore a database server after a disaster. To restore a server, database administrators need the rights required to perform the following tasks: 1. Back up files and folders 2. Restore files and folders. 3. Restore the System State data. You need to assign the database administrators the rights that they require to perform the specified tasks. For security reasons, you must not assign the administrators more rights than they require to perform the tasks. What should you do?()A、Add the database administrators' user accounts to the Administrators group on each of the database servers.B、Add the database administrators' user accounts to the Power Users group on each of the database servers.C、Add the database administrators' user accounts to the Backup Operators group on each of the database servers.D、Add the database administrators' user accounts to the Backup Operators group on one of the domain controllers.E、Add the database administrators' user accounts to the Server Operators group on one of the domain controllers.
考题
单选题You are a security administrator for your company. The company has one main office and five branch offices. Network administrators work in the main office and each branch office. Network administrators in the main office frequently create scripts that automate common administrative tasks. You review each script to ensure it does not introduce security vulnerabilities. Scripts that do not introduce security vulnerabilities are considered approved. Occasionally, branch office administrators modify these scripts and distribute the modified scripts to other branch office administrators. Branch office administrators often report that they accidentally run a modified version of a script. You need to ensure that branch office administrators can verify which scripts are approved scripts. What should you do?()A
Maintain a list of the dates that the approved scripts were last modified. lnstruct branch office administrators to verifB
Digitally sign All approved scripts. Instruct branch office administrators to verify the signature before using a script.C
Distribute all approved scripts to branch office administrators in an e-mail message.D
Place all approved scripts on a file server in the main office. Assign All branch office administrators only the Allow -the approved scripts. Instruct administrators to copy scripts from this file server.
考题
单选题You have a Windows Server 2008 R2 Hyper-V server with a single network adapter that is connected to a virtual network. The virtual network is configured as External. Virtual machines (VMs) running on the server are not able to communicate with the host server over the network. You need to ensure that VMs running on the server are able to communicate with the host server over the network. In Virtual Network Manager,what should you do?()A
Select the Internal only connection type.B
Select the Private virtual machine network connection type.C
Select the Allow management operating system to share this network adapter check box.D
Clear the Allow management operating system to share this network adapter check box.
考题
单选题Your network environment includes two Windows Server 2008 R2 Hyper-V servers and one VMware ESX 3.5 host server. You are designing a Microsoft System Center Virtual Machine Manager (SCVMM) 2008 R2 implementation to manage your network environment. SCVMM must be able to perform management tasks that require file transfer operations between your VMware server and your Windows servers. You need to configure the ESX host server to ensure that file transfer operations are encrypted, and follow security best practices. What should you do?()A
Use the default root credentials as the virtual machine delegate, and enable SSH root loginB
Create a new virtual machine delegate account, add the account as a member of the VMware Administrators role, and enable SSH root loginC
Create a new virtual machine delegate account, add the account as a member of the VMware Administrators role, and disable SSH root loginD
Use the default root credentials as the virtual machine delegate, and disable SSH root login
考题
单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain. The domain contains a Windows Server 2003 computer named Server1. You are planning a public key infrastructure (PKI) for the company. You want to deploy a certification authority (CA) on Server1. You create a new global security group named Cert Administrators. You need to delegate the tasks to issue, approve, and revoke certificates to members of the Cert Administrators group. What should you do?()A
Add the Cert Administrators group to the Cert Publishers group in the domain.B
Configure the Certificates Templates container in the Active Directory configuration naming context to assign the Cert Administrators group the Allow - Write permission.C
Configure the CertSrv virtual directory on Server1 to assign the Cert Administrators group the Allow - Modify permission.D
Assign the Certificate Managers role to the Cert Administrators group.
考题
单选题You need to ensure the Client dimension is able to support new orders and new client records. Which setting should you configure?()A
ROLAP storageB
Lazy aggregationsC
Write Enabled propertyD
Unknown Member functionality
考题
单选题You are the network administrator for The network consists of a single Active Directory domain. The domain contains 20 Windows Server 2003 computers and 400 Windows XP Professional computers. Software Update Services (SUS) is installed on a server named Testking2. The network security administrator wants you to ensure that the administrative password is not compromised when an administrator connects to Testking2's SUSAdmin Web site remotely by using HTTP. You want only SSL to be used to connect to the SUSAdmin Web site. The network security administrator creates a digital certificate and enables communication for SSL on port 443 of Testking2. However, administrators are still able to connect to the SUSAdmin Web site by using HTTP. You need to ensure that communication to the SUSAdmin Web site is always secure. What should you do?()A
Disable port 80 on the SUSAdmin Web site.B
Require 128-Bit SSL on all directories related to the SUSAdmin Web site.C
Change the default Web site to require 128-Bit SSL.D
Enable IPSec on Testking2 with the Request Security IPsec template.