A customer has installed UAC in their network. They have both Windows and Linux endpoints andmust choose a deployment method that everyone can use. Which deployment method allows for multiple platforms? ()
第1题:
A Customer has a functional server deployment solution that uses a combination of disk imaging and application pushing technology. They need to get a working Windows 2003 image for their new servers as soon as possible. What method can achieve this?()
第2题:
You are deploying an ASP.NET Web application to a remote server. You need to choose a deployment method that will ensure that all IIS settings, in addition to the Web content, will deploy to the remote server. Which deployment method should you choose?()
第3题:
A Customer has a proprietary server deployment solution that uses a combination of disk imaging and application pushing technology. They need to get a working Windows 2003 image for their new servers as soon as possible for deployment with their provisioning system. Which of the following methods can achieve this? ()
第4题:
A Customer has a proprietary server deployment solution that uses a combination of disk imaging and application pushing technology. They need to get a working Windows 2003 image for their new servers as soon as possible for deployment with their provisioning system. Which of the following methods can achieve this?()
第5题:
All servers on your network run Windows Server 2008 R2. You are planning a deployment of a virtual desktop infrastructure (VDI). You need to estimate the number of servers required for the deployment. Which factor should you consider?()
第6题:
Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows 7 computers. You are planning to deploy a custom application. You need to schedule the deployment to occur outside of business hours and without user interaction. Which deployment method should you choose?()
第7题:
Your company has a single Active Directory Domain Services (AD DS) domain with Windows Server 2008 R2 member servers and 1,000 Windows 7 client computers. You are designing the deployment of a custom application. You have the following requirements: The application must be available to only users who need it. Minimize network traffic during deployment. You need to design a deployment strategy that meets the requirements. Which deployment method should you use?()
第8题:
All client computers in your network run Windows XP. Some of the computers are part of a secure network. Some of the computers connect to the network by using virtual private networking (VPN). You are planning to deploy Windows 7. You have the following requirements: Use a dedicated server for deployment. Use a single operating system image for deployment. Ensure that you can use removable media to deploy the image. Ensure that you can select which applications are installed onto a client computer at the time of deployment. You need to design a deployment strategy that meets the requirements. What should you do?()
第9题:
Is there a need for a PKI Management System?
Is there a need for end-to-end encryption?
Do they currently have a Kerberos domain in place?
Which clients are installed on their desktops -- SSH, Telnet or both?
第10题:
IPsec enforcement
802.1X enforcement
Source IP enforcement
Odyssey Access Client
第11题:
edge
central
Layer2
Layer3
第12题:
the number of static and dynamic sessions for the VDI clients
the Remote Desktop Protocol (RDP) version that clients will connect with
the deployment method for VDI operating systems
the provisioning method for VDI desktops
第13题:
Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows Vista computers. You are planning to deploy Windows 7 and a custom application. You have the following requirements: The application must be available to only a specific group of users. You must be able to monitor application usage. You need to design a deployment method for the custom application that meets the requirements. Which deployment method should you use in your design?()
第14题:
Your network has 1,000 client computers that run Windows XP. You are planning to deploy Windows 7. You plan to use the Microsoft Deployment Toolkit Lite Touch Installation deployment method to deploy the Windows 7 image. You have the following requirements: Migrate 20 computers at a time. Ensure that you conserve network bandwidth. You need to design a deployment strategy that meets the requirements. What should you do?()
第15题:
You must configure access to the corporate network for employees using a client access method. Users require IPsec tunneling to protected resources and an 802.1X supplicant. Users will access the network using Windows platforms.Which two client access methods would support these requirements?()
第16题:
Which two statements are true about using the isUserInRole method to implement security in a Java EEapplication?()
第17题:
Your network has a single domain with 1,000 client computers that run Windows Vista. You are planning a deployment of Windows 7. Your company has multiple departments. Only the sales department will use the existing target computers to run Windows 7. You have the following requirements:Migrate the user state for each user. Preserve the file system and existing applications for only the sales department computers. You need to recommend the deployment method that is appropriate for the environment. Which combination of deployment scenarios should you recommend?()
第18题:
Your company has an Active Directory Domain Services (AD DS) forest with a single domain. A server has the Windows Deployment Services (WDS) role installed. You create a Windows 7 image. You plan to use the Lite Touch Installation deployment method to deploy the Windows 7 image. You need to design a deployment strategy that will install an image on unknown client computers only if administrative approval is granted. What should you do?()
第19题:
You use Microsoft .NET Framework 4 to create a Windows application. You use ClickOnce technology to install the application on computers that run Windows 7 with User Access Control (UAC) enabled. The application requires access to environment variables on each computer. You need to ensure that users who do not have administrative permissions can install the application. Which deployment method should you use? ()
第20题:
You are planning a Windows 7 deployment infrastructure. You have the following requirements: Enable network deployments of WIM images or VHDs. Support multicast with the use of multiple stream transfer functionality. Allow drivers to be stored centrally,and use dynamic driver provisioning. You need to design an infrastructure that meets the requirements. Which deployment method should you recommend?()
第21题:
Microsoft Deployment Toolkit (MDT) 2008
Microsoft Deployment Toolkit (MDT) 2010
Deployment Image Servicing and Management (DISM)
Windows Deployment Services in Windows Server 2008 R2
第22题:
the XCOPY command-line tool
the Copy Web Site tool
the Web Deployment tool
the Publish Web Site utility
第23题:
It can be invoked only from the doGet or doPost methods.
It can be used independently of the getRemoteUser method.
Can return true even when its argument is NOT defined as a valid role name in the deployment descriptor.
Using the isUserInRole method overrides any declarative authentication related to the method in which it is invoked.