Launch REGEDIT and remove the offending applications from the Run key.
Start the computer in Safe Mode and check Event Viewer.
Put in the ERD and when the window pops up select the option for Repair Broken Links and Applications.
Hit the F6 key as Windows loads and run Repair Broken Links and Applications.
第1题:
A SAN needs to undergo disruptive maintenance, which will effect a hosted production system with multiple applications and related volume groups, one of which, datavg, resides on the SAN. There is one spare disk in the system but it is smaller than datavg. How can application outages and risk of corruption be minimized?()
第2题:
Which three applications or protocols are accelerated by AppFlow?() (Choose three.)
第3题:
You create a Microsoft ASP.NET Web application by using the Microsoft .NET Framework version 3.5. You deploy the application on a Microsoft IIS 6.0 Web server. The server runs on a worker process isolation mode, and it hosts the .NET Framework version 1.1 Web applications. When you attempt to browse the application, the following error message is received: "It is not possible to run different versions of ASP.NET in the same IIS process. Please use the IIS Administration Tool to reconfigure your server to run the application in a separate process." You need to ensure that the following requirements are met: all the applications run on the server all the applications remain in process isolation mode all the applications do not change their configuration. Which two actions should you perform?()
第4题:
You use Microsoft Application Virtualization for Desktops to virtualize applications for client computers.A virtual application that was installed by using a Windows Installer Package (.msi) file has become corrupted. You need to restore access to the virtual application. Which two actions should you perform?()
第5题:
You are a network administrator for The network consists of a single Active Directory domain named. The domain contains two Windows Server 2003 terminal servers that host applications that are used by company employees. An organization unit (OU) named TerminalServers contains only the computer accounts for these two Terminal servers. A Group Policy object (GPO) named TSPolicy is linked to the TerminalServers OU, and you have been granted the right to modify the GPO. Users should use the terminal servers to run only authorized applications. A custom financial application suite is currently the only allowed application. The financial application suite is installed in the folder C:/Program Files/MT Apps. The financial application suite contains many executable files. Users must also be able to use Internet Explorer to access a browser-based application on the company intranet. The browser-based application makes extensive use of unsigned ActiveX components. The financial application suite and the browser-based application are frequently updates with patches or new versions. You need to configure the terminal servers to prevent users from running unauthorized applications. You plan to configure software restriction policies in the TSPolicy GPO. To reduce administrative overhead, you want to create a solution that can be implemented once, without requiring constant reconfiguration. Which three actions should you perform to configure software restriction polices?() (Each correct answer presents part of the solution. Choose three)
第6题:
As the administrator of your company’s network you are asked to upgrade several Windows NT 4.0 computers to Windows 2000 Professional. All user settings and application settings must be preserved. Most applications currently running are compatible with Windows 2000 and all the Windows NT 4.0 computers meet the minimum hardware requirements. After you upgrade several computers to Windows 2000 Professional, you find that some applications did not upgrade properly. What utilities and/or applications should be disabled (or removed) before upgrading?()
第7题:
Create a single Web site that contains both Web applications.
Create two Web sites, one for each Web application.
Assign both Web applications to the same application pool.
Assign each Web application to its own application pool.
第8题:
Stop the applications in all data volume groups and shut the system down during the outage period.
Stop the applications in datavg, unmount all datavg filesystems, varyoff datavg, and export datavg.
Stop the applications in datavg, unmount all datavg filesystems, and reduce datavg by the SAN disks.
Use the 'cpvg' command with the -z option to copy and compress datavg to different physical volumes.
第9题:
Configure a MED-V revertible workspace policy.
Configure the Remote Desktop Connection Broker (RD Connection Broker). Create a Group Policy object (GPO) to configure the Configure server authentication for client setting.
Use Microsoft Application Virtualization for Desktops. On each client computer, set the client cache configuration settings to Use free disk space threshold and configure the ApplicationSourceRoot registry key.
Use Microsoft Application Virtualization for Desktops. On each client computer, configure the AutoLoad Triggers, AutoLoadTarget andRequireAuthorizationIfCached registry parameters. Then launch any one of the applications while logged in with the computer user is credentials
第10题:
System logs
Security logs
Application logs
Application installation logs
第11题:
Custom printer third-party software.
APM and Anti-virus software
All Non-Microsoft Products
All 32-bit applications
Third-party video drivers
第12题:
Publish the application by using Group Policy Software Installation.
Deploy the application by using Windows Server Update Services (WSUS).
Service an online image of Windows 7 to add the new application.
Service an offline image of Windows 7 to add the new application.
第13题:
Company.com has installed HACMP and is configuring a three-node cluster. One of the Applications uses the AIX hostname as a key for authorization to execute on the specific computer. The application vendor was contacted and consented to having multiple copies of the application but required that only one application be active at any one point in time. How can the AIX host name dependency be managed in an HACMP environment.()
第14题:
Your company has a main office and four br anch offices. You have an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. You virtualize applications by using Microsoft Application Virtualization (App - V). You need to ensure tha t all users access virtualized applications from their local branch office, and allow for active upgrades. Which should you install in each branch office?()
第15题:
Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. Your environment includes Microsoft Application Virtualization (App-V), Microsoft Enterprise Desktop Virtualization (MED-V), and Remote Desktop Services. You have three applications that are in one package and require authorization to run. You need to deploy the applications for offline use. What should you do? ()
第16题:
All servers on your company’s network run Windows Server 2008 R2. All users have thin client computers. You need to recommend a virtualization solution that allows users to use applications that run only on Windows 7. Which technology should you recommend?()
第17题:
Your company has an Active Directory Domain Servic es (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. Your environment includes Microsoft Application Virtualization (App - V), Microsoft Enterprise Desktop Virtualization (MED - V), and Remote Desktop Services. You hav e three applications that are in one package and require authorization to run. You need to deploy the applications for offline use. What should you do?()
第18题:
Update the antivirus application
Install critical update security patches
Adjust the software firewall settings
Replace the current antivirus program
第19题:
UNIX NFS protocol
Web-based e-mail
Secure Sockets Layer
Microsoft's Common Internet File System
Microsoft's Messaging Application Programming Interface
第20题:
Computer Management Utility
Add/Remove Programs
Autoexec.bat file
MSCONFIG
第21题:
Configure a MED - V revertible workspace policy.
Configure the Remote Desktop Connection Broker (RD Co nnection Broker). Create a Group Policy object (GPO) to configure the Configure server authentication for client setting.
Use Microsoft Application Virtualization for Desktops. On each client computer, set the client cache configuration settings to Use f ree disk space threshold and configure the ApplicationSourceRoot registry key.
Use Microsoft Application Virtualization for Desktops. On each client computer, configure the AutoLoad Triggers, AutoLoadTarget andRequireAuthorizationIfCached registry paramet ers. Then launch any one of the applications while logged in with the computer user is credentials.
第22题:
Launch REGEDIT and remove the offending applications from the Run key.
Start the computer in Safe Mode and check Event Viewer.
Put in the ERD and when the window pops up select the option for Repair Broken Links and Applications.
Hit the F6 key as Windows loads and run Repair Broken Links and Applications.
第23题:
Event Forwarding
MSConfig.exe
Problem Steps Recorder
Reliability Monitor
第24题:
a server with the File Services role installed
a server with the Web Server (IIS) role installed
Microsoft System Center Configuration Manager 2007 R2
Microsoft System Center Application Virtualization Streaming Server