Do you have a set of ______ (key)?
第1题:
Your company runs Remote Desktop Services. You have a Remote Desktop Session Host (RD Session Host) server. You need to ensure that remote desktop users can print only to the printers that are installed on the RD Session Host server. What should you do?()
第2题:
You are developing a Windows Presentation Foundation (WPF) application. The application contains stylized body text and heading text. The heading text is a slight variation of the body text. You need to ensure that if the body text changes, the heading text automatically inherits those changes. What should you do ?()
第3题:
You have an enterprise subordinate certification authority (CA) configured for key archival. Three key recovery agent certificates are issued. The CA is configured to use two recovery agents. You need to ensure that all of the recovery agent certificates can be used to recover all new private keys. What should you do()
第4题:
Your network consists of 1,000 client computers that run Windows XP. The computers do not have access to the Internet. You plan to migrate 200 of the computers immediately to Windows 7. The remainder will be migrated over the next several months. You need to plan the most efficient method for activating all of the computers. What should you do?()
第5题:
You are creating a Windows Forms application by using the .NET Framework 3.5.You have resource files in five different languages.You need to test the application in each language. What should you do?()
第6题:
You are responsible for migrating client computers from Windows 98 and Windows NT Workstation 4.0 to Windows 2000 Professional. You have installed Windows 2000 Professional and reinstalled the necessary application on 10 computers. You have returned these computers to their users. The users of these computers report that their word processing application will not start. What should you do?()
第7题:
What do you have to do to allow IRM-Protected messages in Outlook Web App?()
第8题:
Use the Key Management Service (KMS) for all the computers.
Use Multiple Activation Key (MAK) Independent for all the computers.
Use Multiple Activation Key (MAK) Proxy for the first 200 computers, and then use the Key Management Service(KMS) for the remaining computers.
Use Multiple Activation Key (MAK) Independent for the first 200 computers, and then use Multiple Activation Key(MAK) Proxy for the remaining computers.
第9题:
Add the Federation Mailbox to the AD RMS Super Users Group
Run the Set-irmconfiguration cmdlet
Run the Test-IRMconfiguration cmdlet
You must set-up an Outlook Web App Mailbox Policy
第10题:
Use the AppVCacheSize tool to set the maximum cache size to 0.
Use the AppVCacheSize tool to set the minimum free disk space threshold to 0.
Set the HKLM/SOFTWARE/Microsoft/SoftGrid/4.5/Client/AppFS/State registry key to 0.
Set the HKLM/SOFTWARE/Microsoft/SoftGrid/4.5/Client/AppFS/FileSize registry key to 0.
第11题:
Set the CPU time per call in the users profile.
Set the CPU time per session in the users profile.
Set the CPU levels for the user’s group using Resource Manager.
Set the TIMED_STATISTICS parameter to TRUE in the parameter file.
第12题:
第13题:
Which statement is true regarding the password-recovery process?()
第14题:
You have a DHCP server that runs windows server 2008. You restore the DHCP database by using a recent backup. You need to prevent DHCP clients from receiveing IP addresses that are currently in use on the network. What should you do?()
第15题:
You have a secured Windows Communication Foundation (WCF) service. You need to track unsuccessful attempts to access the service. What should you do?()
第16题:
You are developing a class library. Portions of your code need to access system environment variables. You need to force a runtime SecurityException only when callers that are higher in the call stack do not have the necessary permissions. Which call method should you use?()
第17题:
All client computers in your environment run Windows 7. You virtualize applications by using Microsoft Application Virtuali zation (App - V). You need to reset the FileSystem cache on a client computer. What should you do?()
第18题:
You need to meet the requirements of the accounts team. What should you do?()
第19题:
You have an Exchange Server 2010 organization.A user reports that some meetings are missing from her calendar.You need to recover the missing calendar items.The solution must ensure that the missing calendar items are recovered automatically. What should you do?()
第20题:
You must have a console connection
You cannot set the console port to an insecure mode
You must press the Enter key so that you can boot into single-user mode
When prompted to enter the full pah name of the shell you must press the Enter key
第21题:
set the CPU time per call in the users profile
set the CPU time per session in the users profiles
set the TIMED_STATISTICS parameter to TRUE in the parameter file
set the CPU levels for the users’ group using Resource Manager
第22题:
You must have a console connection.
You cannot set the console port to an insecure mode.
You must press the Enter key so that you can boot into single-user mode.
When prompted to enter the full pathname of the shell, you must press the Enter key.
第23题:
Open Device Manager.
Open Reliability Monitor.
Create a User Defined Data Collector Set.
Create a new Event Trace Sessions Data Collector Set.