单选题Recently three new applications were installed on all the desktops in a company branch. One of the applications causes Windows to crash on startup, but the technician is unable to find out which application it is. Without removing all three application

题目
单选题
Recently three new applications were installed on all the desktops in a company branch. One of the applications causes Windows to crash on startup, but the technician is unable to find out which application it is. Without removing all three applications, which of the following is the BEST way to determine the cause of the crash?()
A

Launch REGEDIT and remove the offending applications from the Run key.

B

Start the computer in Safe Mode and check Event Viewer.

C

Put in the ERD and when the window pops up select the option for Repair Broken Links and Applications.

D

Hit the F6 key as Windows loads and run Repair Broken Links and Applications.


相似考题

1.You are a network administrator for The network consists of a single Active Directory domain named.The domain contains two Windows Server 2003 terminal servers that host applications that are used by company employees. An organization unit (OU) named TerminalServers contains only the computer accounts for these two Terminal servers. A Group Policy object (GPO) named TSPolicy is linked to the TerminalServers OU, and you have been granted the right to modify the GPO.Users should use the terminal servers to run only authorized applications. A custom financial application suite is currently the only allowed application. The financial application suite is installed in the folder C:\Program Files\MT Apps. The financial application suite contains many executable files.Users must also be able to use Internet Explorer to access a browser-based application on the company intranet. The browser-based application makes extensive use of unsigned ActiveX components.The financial application suite and the browser-based application are frequently updates with patches or new versions.You need to configure the terminal servers to prevent users from running unauthorized applications. You plan to configure software restriction policies in the TSPolicy GPO. To reduce administrative overhead, you want to create a solution that can be implemented once, without requiring constant reconfiguration.Which three actions should you perform to configure software restriction polices?()(Each correct answer presents part of the solution. Choose three)

更多“单选题Recently three new applications were installed on all the desktops in a company branch. One of the applications causes Windows to crash on startup, but the technician is unable to find out which application it is. Without removing all three application”相关问题
  • 第1题:

    A SAN needs to undergo disruptive maintenance, which will effect a hosted production system with multiple applications and related volume groups, one of which, datavg, resides on the SAN. There is one spare disk in the system but it is smaller than datavg. How can application outages and risk of corruption be minimized?()

    • A、Stop the applications in all data volume groups and shut the system down during the outage period.
    • B、Stop the applications in datavg, unmount all datavg filesystems, varyoff datavg, and export datavg.
    • C、Stop the applications in datavg, unmount all datavg filesystems, and reduce datavg by the SAN disks.
    • D、Use the 'cpvg' command with the -z option to copy and compress datavg to different physical volumes.

    正确答案:B

  • 第2题:

    Which three applications or protocols are accelerated by AppFlow?() (Choose three.)

    • A、UNIX NFS protocol
    • B、Web-based e-mail
    • C、Secure Sockets Layer
    • D、Microsoft's Common Internet File System
    • E、Microsoft's Messaging Application Programming Interface

    正确答案:B,D,E

  • 第3题:

    You create a Microsoft ASP.NET Web application by using the Microsoft .NET Framework version 3.5.  You deploy the application on a Microsoft IIS 6.0 Web server. The server runs on a worker process isolation mode, and it hosts the .NET Framework version 1.1 Web applications. When you attempt to browse the application, the following error message is received:  "It is not possible to run different versions of ASP.NET in the same IIS process. Please use the IIS Administration Tool to reconfigure your server to run the application in a separate process."    You need to ensure that the following requirements are met: all the applications run on the server  all the applications remain in process isolation mode all the applications do not change their configuration.   Which two actions should you perform?()

    • A、Create a new application pool and add the new application to the pool. 
    • B、Configure the IIS 6.0 to run the WWW service in the IIS 5.0 isolation mode. 
    • C、Configure the new application to use the .NET Framework version 2.0 in the IIS 6.0 Manager. 
    • D、Set autoConfig="false" on the <processModel> property in the machine.config file. 
    • E、Disable the Recycle worker processes option in the Application Pool Properties dialog box.

    正确答案:A,C

  • 第4题:

    You use Microsoft Application Virtualization for Desktops to virtualize applications for client computers.A virtual application that was installed by using a Windows Installer Package (.msi) file has become corrupted. You need to restore access to the virtual application. Which two actions should you perform?()

    • A、Reload the virtual application package.
    • B、Reinstall the virtual application package.
    • C、Use the Repair function in the Windows Installer Package. Use the Microsoft Application Virtualization (App-V) to re-sequence the application.
    • D、Use the Microsoft Application Virtualization (App-V) Sequencer to edit the virtual application package.

    正确答案:B,C

  • 第5题:

    You are a network administrator for The network consists of a single Active Directory domain named. The domain contains two Windows Server 2003 terminal servers that host applications that are used by company employees. An organization unit (OU) named TerminalServers contains only the computer accounts for these two Terminal servers. A Group Policy object (GPO) named TSPolicy is linked to the TerminalServers OU, and you have been granted the right to modify the GPO. Users should use the terminal servers to run only authorized applications. A custom financial application suite is currently the only allowed application. The financial application suite is installed in the folder C:/Program Files/MT Apps. The financial application suite contains many executable files. Users must also be able to use Internet Explorer to access a browser-based application on the company intranet. The browser-based application makes extensive use of unsigned ActiveX components. The financial application suite and the browser-based application are frequently updates with patches or new versions. You need to configure the terminal servers to prevent users from running unauthorized applications. You plan to configure software restriction policies in the TSPolicy GPO. To reduce administrative overhead, you want to create a solution that can be implemented once, without requiring constant reconfiguration. Which three actions should you perform to configure software restriction polices?() (Each correct answer presents part of the solution. Choose three)

    • A、Set the default security level to Disallowed.
    • B、Set the default security level to Unrestricted.
    • C、Create a new certificate rule.
    • D、Create a new hash rule.
    • E、Create a new Internet zone rule.
    • F、Create a new path rule.

    正确答案:A,E,F

  • 第6题:

    As the administrator of your company’s network you are asked to upgrade several Windows NT 4.0 computers to Windows 2000 Professional. All user settings and application settings must be preserved.  Most applications currently running are compatible with Windows 2000 and all the Windows NT 4.0 computers meet the minimum hardware requirements. After you upgrade several computers to Windows 2000 Professional, you find that some applications did not upgrade properly.   What utilities and/or applications should be disabled (or removed) before upgrading?()

    • A、Custom printer third-party software.
    • B、APM and Anti-virus software
    • C、All Non-Microsoft Products
    • D、All 32-bit applications
    • E、Third-party video drivers

    正确答案:B

  • 第7题:

    多选题
    You are a systems administrator responsible for managing a Windows Server 2008 Web Server Currently,there are no Web sites configured on the server. You need to configure the server to host two Web applications: Engineering App and Sales App. Both Web applications must be accessible by using HTTPport 80 without the use of host headers. Also, you must protect against problems in one Web applicationaffecting the performance or reliability of the other Web application. Which two steps should you take tomeet these requirements?()
    A

    Create a single Web site that contains both Web applications.

    B

    Create two Web sites, one for each Web application.

    C

    Assign both Web applications to the same application pool.

    D

    Assign each Web application to its own application pool.


    正确答案: B,D
    解析: 暂无解析

  • 第8题:

    单选题
    A SAN needs to undergo disruptive maintenance, which will effect a hosted production system with multiple applications and related volume groups, one of which, datavg, resides on the SAN. There is one spare disk in the system but it is smaller than datavg. How can application outages and risk of corruption be minimized?()
    A

    Stop the applications in all data volume groups and shut the system down during the outage period.

    B

    Stop the applications in datavg, unmount all datavg filesystems, varyoff datavg, and export datavg.

    C

    Stop the applications in datavg, unmount all datavg filesystems, and reduce datavg by the SAN disks.

    D

    Use the 'cpvg' command with the -z option to copy and compress datavg to different physical volumes.


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. Your environment includes Microsoft Application Virtualization (App-V), Microsoft Enterprise Desktop Virtualization (MED-V), and Remote Desktop Services. You have three applications that are in one package and require authorization to run. You need to deploy the applications for offline use. What should you do? ()
    A

    Configure a MED-V revertible workspace policy.

    B

    Configure the Remote Desktop Connection Broker (RD Connection Broker). Create a Group Policy object (GPO) to configure the Configure server authentication for client setting.

    C

    Use Microsoft Application Virtualization for Desktops. On each client computer, set the client cache configuration settings to Use free disk space threshold and configure the ApplicationSourceRoot registry key.

    D

    Use Microsoft Application Virtualization for Desktops. On each client computer, configure the AutoLoad Triggers, AutoLoadTarget andRequireAuthorizationIfCached registry parameters. Then launch any one of the applications while logged in with the computer user is credentials


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    A technician installed a new application on a Windows XP desktop. When the technician tries to launch the application it crashes. Which of the following can the technician use to troubleshoot the application?()
    A

    System logs

    B

    Security logs

    C

    Application logs

    D

    Application installation logs


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    As the administrator of your company’s network you are asked to upgrade several Windows NT 4.0 computers to Windows 2000 Professional. All user settings and application settings must be preserved.  Most applications currently running are compatible with Windows 2000 and all the Windows NT 4.0 computers meet the minimum hardware requirements. After you upgrade several computers to Windows 2000 Professional, you find that some applications did not upgrade properly.   What utilities and/or applications should be disabled (or removed) before upgrading?()
    A

    Custom printer third-party software.

    B

    APM and Anti-virus software

    C

    All Non-Microsoft Products

    D

    All 32-bit applications

    E

    Third-party video drivers


    正确答案: C
    解析: You should disable or remove all the antivirus softwares and advance power management  softwares. Antivirus softwares restrict the entry of the operating system in the boot sector during the installation of the operating system. APM is used to manage the power utilization of the system in an efficient way.    To check the compatibility of all the softwares, application and third party drivers before the installation, you can run winnt32 /checkupgradeonly to see the compatibility report of the system.

  • 第12题:

    单选题
    Your company has 1,000 client computers.  You are planning to deploy Windows 7 and a new line-of-business application.   You have the following requirements:   Install the application as part of the standard Windows 7 deployment. Use a single Windows 7 image for the deployment.  The application must be available for use on client computers that are not connected to the network.   You need to ensure that the application is installed on all new client computers.   What should you do?()
    A

    Publish the application by using Group Policy Software Installation.

    B

    Deploy the application by using Windows Server Update Services (WSUS).

    C

    Service an online image of Windows 7 to add the new application.

    D

    Service an offline image of Windows 7 to add the new application.


    正确答案: B
    解析: 暂无解析

  • 第13题:

    Company.com has installed HACMP and is configuring a three-node cluster. One of the Applications  uses the AIX hostname as a key for authorization to execute on the specific computer. The application vendor was contacted and consented to having multiple copies of the application but required that only one application be active at any one point in time.  How can the AIX host name dependency be managed in an HACMP environment.()  

    • A、 It cannot be managed because the application will not work properly with HACMP.
    • B、 The application start and stop script for the application can manage the hostname.
    • C、 HACMP will require customization to correctly manage a change in the hostname since it is tied to the primary network adapter.
    • D、 HACMP will have to be restarted if the hostname is changed. This can be done with customization in the node_up and node_down event scripts.

    正确答案:B

  • 第14题:

    Your company has a main office and four br anch offices. You have an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. You virtualize applications by using Microsoft Application Virtualization (App - V). You need to ensure tha t all users access virtualized applications from their local branch office, and allow for active upgrades. Which should you install in each branch office?()

    • A、a server with the File Services role installed
    • B、a server with the Web Server (IIS) role installed
    • C、Microsoft System Center Configuration Manager 2007 R2
    • D、Microsoft System Center Application Virtualization Streaming Server

    正确答案:D

  • 第15题:

    Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. Your environment includes Microsoft Application Virtualization (App-V), Microsoft Enterprise Desktop Virtualization (MED-V), and Remote Desktop Services. You have three applications that are in one package and require authorization to run. You need to deploy the applications for offline use. What should you do? ()

    • A、Configure a MED-V revertible workspace policy.
    • B、Configure the Remote Desktop Connection Broker (RD Connection Broker). Create a Group Policy object (GPO) to configure the Configure server authentication for client setting.
    • C、Use Microsoft Application Virtualization for Desktops. On each client computer, set the client cache configuration settings to Use free disk space threshold and configure the ApplicationSourceRoot registry key.
    • D、Use Microsoft Application Virtualization for Desktops. On each client computer, configure the AutoLoad Triggers, AutoLoadTarget andRequireAuthorizationIfCached registry parameters. Then launch any one of the applications while logged in with the computer user is credentials

    正确答案:D

  • 第16题:

    All servers on your company’s network run Windows Server 2008 R2. All users have thin client computers. You need to recommend a virtualization solution that allows users to use applications that run only on Windows 7.   Which technology should you recommend?()

    • A、Windows Virtual PC
    • B、Microsoft Application Virtualization (App-V)
    • C、Microsoft Virtual Desktop Infrastructure (VDI)
    • D、Microsoft Enterprise Desktop Virtualization (MED-V)

    正确答案:C

  • 第17题:

    Your company has an Active Directory Domain Servic es (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. Your environment includes Microsoft Application Virtualization (App - V), Microsoft Enterprise Desktop Virtualization (MED - V), and Remote Desktop Services. You hav e three applications that are in one package and require authorization to run. You need to deploy the applications for offline use. What should you do?()

    • A、Configure a MED - V revertible workspace policy.
    • B、Configure the Remote Desktop Connection Broker (RD Co nnection Broker). Create a Group Policy object (GPO) to configure the Configure server authentication for client setting.
    • C、Use Microsoft Application Virtualization for Desktops. On each client computer, set the client cache configuration settings to Use f ree disk space threshold and configure the ApplicationSourceRoot  registry key.
    • D、Use Microsoft Application Virtualization for Desktops. On  each client computer, configure the AutoLoad Triggers, AutoLoadTarget andRequireAuthorizationIfCached registry paramet ers. Then launch any one of the applications while logged in with the computer user is credentials.

    正确答案:D

  • 第18题:

    单选题
    A technician works for a company that has recently been affected by a virus. The virus entered the network by using port 6000. Port 6000 is used by an application located on a server. The technician has been asked to block this port on all servers and computers except for the one server which uses this port. Which of the following should the technician do?()
    A

    Update the antivirus application

    B

    Install critical update security patches

    C

    Adjust the software firewall settings

    D

    Replace the current antivirus program


    正确答案: C
    解析: 暂无解析

  • 第19题:

    多选题
    Which three applications or protocols are accelerated by AppFlow?() (Choose three.)
    A

    UNIX NFS protocol

    B

    Web-based e-mail

    C

    Secure Sockets Layer

    D

    Microsoft's Common Internet File System

    E

    Microsoft's Messaging Application Programming Interface


    正确答案: B,A
    解析: 暂无解析

  • 第20题:

    单选题
    During system startup, many applications are starting that are not needed. Which of the following can be used to evaluate all startup applications?()
    A

    Computer Management Utility

    B

    Add/Remove Programs

    C

    Autoexec.bat file

    D

    MSCONFIG


    正确答案: A
    解析: 暂无解析

  • 第21题:

    单选题
    Your company has an Active Directory Domain Servic es (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. Your environment includes Microsoft Application Virtualization (App - V), Microsoft Enterprise Desktop Virtualization (MED - V), and Remote Desktop Services. You hav e three applications that are in one package and require authorization to run. You need to deploy the applications for offline use. What should you do?()
    A

    Configure a MED - V revertible workspace policy.

    B

    Configure the Remote Desktop Connection Broker (RD Co nnection Broker). Create a Group Policy object (GPO) to configure the Configure server authentication for client setting.

    C

    Use Microsoft Application Virtualization for Desktops. On each client computer, set the client cache configuration settings to Use f ree disk space threshold and configure the ApplicationSourceRoot  registry key.

    D

    Use Microsoft Application Virtualization for Desktops. On  each client computer, configure the AutoLoad Triggers, AutoLoadTarget andRequireAuthorizationIfCached registry paramet ers. Then launch any one of the applications while logged in with the computer user is credentials.


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    Recently three new applications were installed on all the desktops in a company branch. One of the applications causes Windows to crash on startup, but the technician is unable to find out which application it is. Without removing all three applications, which of the following is the BEST way to determine the cause of the crash?()
    A

    Launch REGEDIT and remove the offending applications from the Run key.

    B

    Start the computer in Safe Mode and check Event Viewer.

    C

    Put in the ERD and when the window pops up select the option for Repair Broken Links and Applications.

    D

    Hit the F6 key as Windows loads and run Repair Broken Links and Applications.


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    Multiple users report that their Windows 7 computers take longer to start than when their computers were first installed. A help desk technician reports that the problem is related to installed applications. You need to recommend a solution that identifies the applications that run during the startup process. What should you recommend?()
    A

    Event Forwarding

    B

    MSConfig.exe

    C

    Problem Steps Recorder

    D

    Reliability Monitor


    正确答案: D
    解析: 暂无解析

  • 第24题:

    单选题
    Your company has a main office and four branch offices. You have an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2.All client computers run Windows 7. You virtualize applications by using Microsoft Application Virtualization (App-V). You need to ensure that all users access virtualized applications from their local branch office, and allow for active upgrades. Which should you install in each branch office?()
    A

    a server with the File Services role installed

    B

    a server with the Web Server (IIS) role installed

    C

    Microsoft System Center Configuration Manager 2007 R2

    D

    Microsoft System Center Application Virtualization Streaming Server


    正确答案: C
    解析: 暂无解析