Your company uses DHCP to lease IPv4 addresses to computers at the main office. A WAN link connects the main office to a branch office. All computers in the branch office are configured with static IP addresses. The branch office does not use DHCP and uses a different subnet. You need to ensure that the portable computers can connect to network resources at the main office and the branch office. How should you configure each portable computer?()
第1题:
Your company has an Active Directory domain. All computers are members of the domain. Your networkcontains an internal Web site that uses Integrated Windows Authentication. From a computer that runs Windows 7, you attempt to connect to the Web site and are prompted for authentication. You verify that youruser account has permission to access the Web site. You need to ensure that you are automaticallyauthenticated when you connect to the Web site. What should you do?()
第2题:
You are a database administrator for your company. The company uses a vendor company’s application that is based on a proprietary database. You query data from the application database and import the data into a SQL Server 2005 database. The application vendor provides you with a new OLE DB driver to be used when querying the application database. Company policy prohibits connections between the SQL Server database and the application database, except when querying this data. You need to provide a way to query data from the application database. What should you?()
第3题:
Your company has an Active Directory forest. The company has servers that run Windows Server 2008 R2 and client computers that run Windows 7. The domain uses a set of GPO administrative templates that have been approved to support regulatory compliance requirements. Your partner company has an Active Directory forest that contains a single domain. The company has servers that run Windows Server 2008 R2 and client computers that run Windows 7. You need to configure your partner companys domain to use the approved set of administrative templates. What should you do()
第4题:
You are the administrator of ExamSheet.net's network. Your Windows 2000 Professional computer has a removable disk device installed. The device can use storage modules of varying sizes. You use these storage modules to transfer graphics files between your location and a printing company. The printing company uses Windows 98. You insert a new 100 MB disk device into your computer and format the new disk device as NTFS with the default options. You then place large graphics files on the disk device and deliver it to the printing company. The printing company reports that they are unable to access the files. You want the printing company to be able to access the graphics files on the new disk device. What should you do?()
第5题:
Your Windows 2000 Professional computer has a removable disk device installed. The device can use storage modules of varying sizes. You use these storage modules to transfer graphics filed between your location and a printing company. The printing company uses Windows NT 4.0 service pack 3. You insert a new 20-Mailbox disk device into your computer. When you attempt to format it as FAT32 with the default options, you receive the following error message “Windows was unable to complete the format.” You need to format the device so that you can use it to send a large graphic file to the printing company. How should you format the device?()
第6题:
Use the Group Policy Management Console (GPMC) utility to back up the GPO to a file. In each site, import the GPO to the default domain policy.
Copy the ADMX files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PDC emulator
Copy the ADML files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PDC emulator
Download the conf.adm, system.adm, wuau.adm, and inetres.adm files from the Microsoft Updates Web site. Copy the ADM files to the PolicyDefinitions folder on thr partner company’s emulator.
第7题:
Create a FOR trigger.
Create an INSTEAD OF trigger.
Create an AFTER trigger.
Create a DDL trigger.
第8题:
第9题:
224.0.0.100
224.0.0.1
224.0.0.102
224.0.0.10
224.0.0.101
None of the other alternatives apply
第10题:
Deploy version 2 of the application by using Microsoft Application Virtualization (App-V).
Deploy version 2 of the application as a Remote Desktop Services RemoteApp.
Deploy version 2 of the application by using a Group Policy Software Installation policy.
Deploy version 2 of the application by using a Microsoft System Center Configuration Manager package.
第11题:
Format the new disk device as FAT16 with a 128 KB cluster size.
Format the new disk device as FAT32 with a 4 KB cluster size.
Format the new disk device as NTFS with a 4 KB cluster size.
Format the new disk device as NTFS with a 8 KB cluster size.
第12题:
第13题:
You work as a network technician at Company. Your boss, Mrs. , is interested in GLBP. In particular, she wants to know the multicast address that this protocol uses. What should you tell her? ()
第14题:
Your company has an Active Directory domain. AlI servers run Windows Server 2008. Your company uses an Enterprise Root certificate authority (CA). You need to ensure that revoked certificate information is highly available. What should you do()
第15题:
Your company uses a SQL Server 2005 database. Customer data from your trading partners is imported into the Customers table every night. You need to ensure that the customer record is updated if it already exists in the Customers table. If the record does not exist, the data needs to be inserted into the Customers table. What should you do?()
第16题:
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. You have to perform the backup of the default trace according to the requirement of your failure recovery plan. The default trace is contained in the subdirectory.You have to backup the subdirectory. Which SQL Server database engine subdirectory should be backed up?()
第17题:
Create a trigger that rolls back changes to the Price column that violate company policy.
Create a stored procedure that disallows changes to the Price column that violate company policy.
On the Price column, create a check constraint that requires a specified minimum value.
On the Price column, create a foreign key constraint to a table that contains valid prices.
第18题:
Configure the NWLink frame type of the network adapters to be ethernet 802.3.
Configure the NWLink frame type of the network adapters to be ethernet II.
Replace the network adapters with 10/100 BNC adapters.
Replace the network adapters with 10/100 UTP network adapters.
第19题:
you prefer to talk to your friends at the table
you value your calls more than your friends
you are enjoying the company of your friends
you are polite and considerate of your friends
第20题:
Use the Group Policy Management Console (GPMC) utility to back up the GPO to a file. In each site, import the GP
Copy the ADMX files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PDC
Copy the ADML files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PDC
Download the conf.adm, system.adm, wuau.adm, and inetres.adm files from the Microsoft Updates Web site.
第21题:
log.trc
default.trc
ERRORLOG
SQLAGENT
第22题:
As FAT 16 with a 4-KB cluster size
As FAT 32 with a 1-KB cluster size
As FAT 32 with a 4-KB cluster size
As NTFS with a 4-KB cluster size
第23题:
第24题:
It uses a Reliable transport mechanism.
It uses a Non-reliable transport mechanism
It is less bandwidth-intensive than connection oriented services
it uses handshaking