第1题:
Your company has an Active Directory directory service domain. All servers run Windows Server 2003. You are developing a security monitoring plan. You must monitor the files that are stored in a specific directory on a member server. You have the following requirements. Log all attempts to access the files.Retain log information until the full weekly backup occurs. You need to ensure that the security monitoring plan meets the requirements. What should your plan include?()
第2题:
You and a co-worker have established wireless communication directly between your wireless laptops. What type of wireless topology has been created()。
第3题:
You configured the default backup device type as disk for RMAN backups. In your database,because of business requirements,you have to take a simultaneous duplicate backup of the data files when the RMAN BACKUP command is used. What must you set using the RMAN CONFIGURE command to achieve this?()
第4题:
You have a single Active Directory directory service domain. You use a Group Policy object (GPO) to apply security settings to your client computers. You configure the startup type for system services settings in a new GPO, and you link the GPO to an organizational unit (OU). You discover that the startup type for system services on one of the client computers has not been updated. You need to ensure that the Group Policy settings are applied to the client computer. What should you do?()
第5题:
Your company's corporate network uses Network Access Protection (NAP).Users are able to connect to the corporate network remotely.You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do?()
第6题:
You have an Exchange Server 2010 organization. Your company has a relationship with another company. The partner company has an Exchange Server 2010 organization. You need to recommend a security solution to meet the following requirements: .Ensure that all e-mail delivery between your servers and the partner companys servers is encrypted .Ensure that all communication between your servers and the partner companys servers is authenticated What should you include in the solution?()
第7题:
Your network consists of a single Active Directory domain. The network contains five Windows Server 2008 R2 servers that host Web applications. You need to plan a remote management strategy to manage the Web servers. Your plan must meet the following requirements: èAllow Web developers to configure features on the Web sites èPrevent Web developers from having full administrative rights on the Web servers What should you include in your plan?()
第8题:
Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2008 R2. You need to plan an auditing strategy that meets the following requirements: èAudits all changes to Active Directory Domain Services (AD?DS) èStores all auditing data in a central location. What should you include in your plan?()
第9题:
You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()
第10题:
第11题:
Meeting
Overtaking
Crossing
Passing
第12题:
MAXSETSIZE TO 2
DEVICE TYPE DISK PARALLELISM 2
RETENTION POLICY TO REDUNDANCY 2
DATAFILE BACKUP COPIES FOR DEVICE TYPE DISK TO 2
第13题:
You are the desktop administrator for your company's sales department. The IT manager for the sales department needs to distribute three custom applications to the department's Windows XP Professional computers. She deploys these applications by using Group Policy. Some users report that they must log on several times before the newly deployed applications are present on their computers. You need to ensure that all software is deployed the next time the users log on. What should you do?()
第14题:
Your Cisco network currently runs OSPF and you have a need to policy-route some specific traffic,regardless of what the routing table shows. Which one of these options would enable you to policy-route the traffic?()
第15题:
You need to design a security strategy for VPN2. Your solution must meet business requirements. What should you do?()
第16题:
Your organization has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 7. You use Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 to manage your Hyper-V hosts. Your environment includes Microsoft Enterprise Desktop Virtualization (MED-V). You plan to deploy a virtual machine (VM) image to all client computers. You need to ensure that user state information is maintained between sessions in the VM. What should you do? ()
第17题:
You need to call an unmanaged function from your managed code by using platform invoke services. What should you do?()
第18题:
You are developing a custom-collection class.You need to create a method in your class. You need to ensure that the method you create in your class returns a type that is compatible with the Foreach statement. Which criterion should the method meet?()
第19题:
All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()
第20题:
You upgrade your computer from Windows NT Workstation to a Windows 2000 Professional computer. Your computer is a member of justtalks.com domain. Prior to this upgrade your computer was configured by a system policy to require at-least a 12 alphanumeric character password. After the upgrade your computer will not apply security policy. What should you do?()
第21题:
第22题:
The method must return a type of either IEnumerator or IEnumerable.
The method must return a type of IComparable.
The method must explicitly contain a collection.
The method must be the only iterator in the class.
第23题: