更多“Do you have a set of ______ (key)? ”相关问题
  • 第1题:

    Your company runs Remote Desktop Services. You have a Remote Desktop Session Host (RD Session Host) server. You need to ensure that remote desktop users can print only to the printers that are installed on the RD Session Host server. What should you do?()

    • A、Enable the Do not allow client printer redirection Group Policy setting.
    • B、Disable the Do not allow client printer redirection Group Policy setting.
    • C、Enable the Do not set default client printer to be default printer in a session Group Policy setting.
    • D、Disable the Do not set default client printer to be default printer in a session Group Policy setting.

    正确答案:A

  • 第2题:

    You are developing a Windows Presentation Foundation (WPF) application. The application contains stylized body text and heading text. The heading text is a slight variation of the body text. You need to ensure that if the body text changes, the heading text automatically inherits those changes. What should you do ?()

    • A、 Set the Value property of the style setter to point to a static resource
    • B、 Set the BasedOn property of the heading style to point to a static resource for the body text style
    • C、 Set the Key property of the heading style to start with the name of the body text style
    • D、 Set the TargetType property of the heading style to TextBlock

    正确答案:B

  • 第3题:

    You have an enterprise subordinate certification authority (CA) configured for key archival. Three key  recovery agent certificates are issued.   The CA is configured to use two recovery agents.   You need to ensure that all of the recovery agent certificates can be used to recover all new private keys.   What should you do()

    • A、Add a data recovery agent to the Default Domain Policy.
    • B、Modify the value in the Number of recovery agents to use box.
    • C、Revoke the current key recovery agent certificates and issue three new key recovery agent certificates.
    • D、Assign the Issue and Manage Certificates permission to users who have the key recovery agent  certificates.

    正确答案:B

  • 第4题:

    Your network consists of 1,000 client computers that run Windows XP. The computers do not have access to the Internet.   You plan to migrate 200 of the computers immediately to Windows 7. The remainder will be migrated over the next several months.   You need to plan the most efficient method for activating all of the computers.   What should you do?()

    • A、 Use the Key Management Service (KMS) for all the computers.
    • B、 Use Multiple Activation Key (MAK) Independent for all the computers.
    • C、 Use Multiple Activation Key (MAK) Proxy for the first 200 computers, and then use the Key Management Service(KMS) for the remaining computers.
    • D、 Use Multiple Activation Key (MAK) Independent for the first 200 computers, and then use Multiple Activation Key(MAK) Proxy for the remaining computers.

    正确答案:A

  • 第5题:

    You are creating a Windows Forms application by using the .NET Framework 3.5.You have resource files in five different languages.You need to test the application in each language. What should you do?()

    • A、Set the CurrentCulture property explicitly to the respective culture for each language.
    • B、Set the CurrentCulture property explicitly to IsNeutralCulture for each language.
    • C、Set the CurrentUICulture property explicitly to IsNeutralCulture for each language.
    • D、Set the CurrentUICulture property explicitly to the respective culture for each language.

    正确答案:D

  • 第6题:

    You are responsible for migrating client computers from Windows 98 and Windows NT Workstation 4.0 to Windows 2000 Professional. You have installed Windows 2000 Professional and reinstalled the necessary application on 10 computers. You have returned these computers to their users. The users of these computers report that their word processing application will not start. What should you do?()

    • A、Set the permission on the application to Execute.
    • B、Add the application to the Run key in the registry.
    • C、Apply the Securews.inf security template on the users’ computers.
    • D、Apply the compatws.inf security template on the users’ computers.

    正确答案:D

  • 第7题:

    What do you have to do to allow IRM-Protected messages in Outlook Web App?()

    • A、Add the Federation Mailbox to the AD RMS Super Users Group
    • B、Run the Set-irmconfiguration cmdlet
    • C、Run the Test-IRMconfiguration cmdlet
    • D、You must set-up an Outlook Web App Mailbox Policy

    正确答案:A,B

  • 第8题:

    单选题
    Your network consists of 1,000 client computers that run Windows XP. The computers do not have access to the Internet.   You plan to migrate 200 of the computers immediately to Windows 7. The remainder will be migrated over the next several months.   You need to plan the most efficient method for activating all of the computers.   What should you do?()
    A

     Use the Key Management Service (KMS) for all the computers.

    B

     Use Multiple Activation Key (MAK) Independent for all the computers.

    C

     Use Multiple Activation Key (MAK) Proxy for the first 200 computers, and then use the Key Management Service(KMS) for the remaining computers.

    D

     Use Multiple Activation Key (MAK) Independent for the first 200 computers, and then use Multiple Activation Key(MAK) Proxy for the remaining computers.


    正确答案: A
    解析: 暂无解析

  • 第9题:

    多选题
    What do you have to do to allow IRM-Protected messages in Outlook Web App?()
    A

    Add the Federation Mailbox to the AD RMS Super Users Group

    B

    Run the Set-irmconfiguration cmdlet

    C

    Run the Test-IRMconfiguration cmdlet

    D

    You must set-up an Outlook Web App Mailbox Policy


    正确答案: B,C
    解析: 暂无解析

  • 第10题:

    单选题
    All client computers in your environment run Windows 7. You virtualize applications by using Microsoft Application Virtualization (App-V). You need to reset the FileSystem cache on a client computer. What should you do?()
    A

    Use the AppVCacheSize tool to set the maximum cache size to 0.

    B

    Use the AppVCacheSize tool to set the minimum free disk space threshold to 0.

    C

    Set the HKLM/SOFTWARE/Microsoft/SoftGrid/4.5/Client/AppFS/State registry key to 0.

    D

    Set the HKLM/SOFTWARE/Microsoft/SoftGrid/4.5/Client/AppFS/FileSize registry key to 0.


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    For the V$SESSION_LONGOPS view, you find that some of the database users have long-running queries that consume a lot of CPU time. This causes performance problems for other users in the database, who have much shorter queries. You would like to make sure that the users with large queries do not use all the CPU time, but you still do not want to terminate them with an error message. Which method would you follow to achieve this?()
    A

     Set the CPU time per call in the users profile.

    B

     Set the CPU time per session in the users profile.

    C

     Set the CPU levels for the user’s group using Resource Manager.

    D

     Set the TIMED_STATISTICS parameter to TRUE in the parameter file.


    正确答案: C
    解析: 暂无解析

  • 第12题:

    填空题
    What are you advised to do if you have set the controls as a kitchen timer?Touch OFF/ CANCEL to cancel the ____.

    正确答案: Minute Timer
    解析:
    定位到表格第三行第三列“Touch OFF/ CANCEL to cancel the Minute Timer”。

  • 第13题:

    Which statement is true regarding the password-recovery process?()

    • A、You must have a console connection.
    • B、You cannot set the console port to an insecure mode.
    • C、You must press the Enter key so that you can boot into single-user mode.
    • D、When prompted to enter the full pathname of the shell, you must press the Enter key.

    正确答案:A

  • 第14题:

    You have a DHCP server that runs windows server 2008. You restore the DHCP database by using a recent backup. You need to prevent DHCP clients from receiveing IP addresses that are currently in use on the network. What should you do?()

    • A、Add the DHCP serve option 44.
    • B、Set the conflict detetion value to 0.
    • C、Set the conflict detection value to 2.

    正确答案:D

  • 第15题:

    You have a secured Windows Communication Foundation (WCF) service. You need to track unsuccessful attempts to access the service. What should you do?()

    • A、Set the authorization Manager Type attribute of the service Authorization behavior to Message.
    • B、Set the include Exception Detailsln Faults attribute of the service Debug behavior to true.
    • C、Set the Mode attribute of the security configuration element to Message.
    • D、Set the message Authentication AuditLevel attribute of the service Security Audit behavior to Failure.

    正确答案:D

  • 第16题:

    You are developing a class library. Portions of your code need to access system environment variables. You need to force a runtime SecurityException only when callers that are higher in the call stack do not have the necessary permissions. Which call method should you use?()

    • A、set.Demand();
    • B、set.Assert();
    • C、set.PermitOnly();
    • D、set.Deny();

    正确答案:A

  • 第17题:

    All client computers in your environment run Windows 7. You virtualize applications by using Microsoft Application Virtuali zation (App - V). You need to reset the FileSystem cache on a client computer. What should you do?()

    • A、Use the AppVCacheSize tool to set the maximum cache size to 0.
    • B、Use the AppVCacheSize tool to set the minimum free disk space threshold to 0.
    • C、Set the HKLM / SOFTWARE / Microsoft / SoftGrid / 4.5 / Client /AppFS/ State registry key to 0.
    • D、Set the HKLM / SOFTWARE / Microsoft / SoftGrid / 4.5 / Client /AppFS/ FileSize registry key to 0.

    正确答案:C

  • 第18题:

    You need to meet the requirements of the accounts team. What should you do?()

    • A、Set the Dimension type to Currency.
    • B、Set the Currency member name as a unique attribute.
    • C、Hide non-leaf data within the Currency dimension key attribute.
    • D、Disable the All member of the Currency dimension key attribute.

    正确答案:D

  • 第19题:

    You have an Exchange Server 2010 organization.A user reports that some meetings are missing from her calendar.You need to recover the missing calendar items.The solution must ensure that the missing calendar items are recovered automatically. What should you do?()

    • A、Create and then configure a sharing policy.
    • B、Set the schedule for the Managed Folder Assistant.
    • C、Run the Set-MailboxCalendarConfiguration cmdlet.
    • D、Set the schedule for the Calendar Repair Assistant (CRA).

    正确答案:D

  • 第20题:

    单选题
    Which statement is true regarding the password-recovery process?()
    A

    You must have a console connection

    B

    You cannot set the console port to an insecure mode

    C

    You must press the Enter key so that you can boot into single-user mode

    D

    When prompted to enter the full pah name of the shell you must press the Enter key


    正确答案: A
    解析: 暂无解析

  • 第21题:

    单选题
    From the V$SESSION_LONGOPS view, you find that some of the database users have long-running queries that consume a lot of CPU time. This causes performance problems for other users in the database, who have much shorter queries. You would like to make sure that the users with large queries do not use all the CPU time, but you still do not want to terminate them with an error message. Which method would you follow to achieve this?()
    A

     set the CPU time per call in the users profile

    B

     set the CPU time per session in the users profiles

    C

     set the TIMED_STATISTICS parameter to TRUE in the parameter file

    D

     set the CPU levels for the users’ group using Resource Manager


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    Which statement is true regarding the password-recovery process?()
    A

    You must have a console connection.

    B

    You cannot set the console port to an insecure mode.

    C

    You must press the Enter key so that you can boot into single-user mode.

    D

    When prompted to enter the full pathname of the shell, you must press the Enter key.


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    You need to identify the hardware failures have occurred on your computer in the past six months. What should you do?()
    A

    Open Device Manager.

    B

    Open Reliability Monitor.

    C

    Create a User Defined Data Collector Set.

    D

    Create a new Event Trace Sessions Data Collector Set.


    正确答案: C
    解析: 暂无解析