written by the Administrators on the INI files
propagated only with the Active Directory network service
propagated to the clients on the next Administrator access
propagated to clients the next time AccessAgent synchronizes with the IMS Server
第1题:
System, machine, and user policies can be configured though AccessAdmin. How are changes synchronized with the AccessAgent?()
第2题:
Your network contains a single Active Directory domain. Active Directory Rights Management Services (AD RMS) is deployed on the network. A user named User1 is a member of only the AD RMS Enterprise Administrators group. You need to ensure that User1 can change the service connection point (SCP) for the AD RMS installation. The solution must minimize the administrative rights of User1. To which group should you add User1()
第3题:
You are the network administrator for Southridge Video. The network consists of a single Active Directory domain named southridgevideo.com. The domain contains one domain controller. All servers run Windows Server 2003. All client computers run Windows XP Professional. The company uses Group Policy objects (GPOs) to configure user and computer settings. The Active Directory database and the SYSVOL shared folder are stored on separate hard disks. The hard disk containing the SYSVOL folder fails. Some Group Policy settings are still applied, but new users do not receive the Group Policy settings. You replace the failed disk. You discover that there are no valid backups of the SYSVOL folder. You have a list of GUIDs and friendly names for each GPO. On the new disk, you create a new shared folder named SYSVOL in the same location as the previous SYSVOL folder. You need to configure the network so that the user and computer settings will be applied to all users. Which three courses of action should you take?()
第4题:
You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all client computers run Windows XP Professional. XML Web services for the internal network run on a member server named TestKingSrv1, which is configured with default settings. You are a member of the local Administrators group on TestKingSrv1. You need the ability to remotely manage TestKingSrv1. You have no budget to purchase any additional licensing for your network until the next fiscal year. How should you reconfigure TestKingSrv1?()
第5题:
You are the administrator of the desktop.com domain. You are configuring a roaming user profile for a user named Paul West. You create a user account named Paul West on the Windows 2000 server computer named server 1. You define a network profile by entering the path //server1/profile/%username% in Paul’s user account setting. When Paul logs on to a Windows 2000 Professional computer he sees the following message- “Windows can not locate your roaming profile and is attempting to log you on with your local profile which will not be propagated to the server.” The details of network cannot be found. You want to configure the roaming user profile for Paul. What should you do?()
第6题:
Enable the Require domain controller to unlock policy.
Set the Number of previous logons to cache policy to 0.
Remove all user and group accounts from the Log on locally user right.
Remove all user and group accounts from the Access this computer from the network user right.
第7题:
That there are no DHCP relay servers
That the user account on Active Directory is not locked
That the network card driver is not installed incorrectly
The network connection is functioning
第8题:
Disjoin and rejoin Client1 to the domain.
Add the computer account for Client1 to the Domain Computers Active Directory group.
Reset the account password for Client1 through Active Directory Users and Computers.
Reset the account password for the user through Active Directory Users and Computers.
第9题:
Administrators on VM1
Power Users on VM1
Hyper-V Administrators on Server1
Server Operators on Server1
第10题:
The user would not be able to log in to the wallet.
The user is able to log in with their wallet password, but the wallet is not synchronized with the server.
A user must be re-assigned to another policy template in order to change any aspects of the applied policy.
The user experiences normal operation, but AccessAgent will be unable to store newly captured passwords.
第11题:
MST configurations can be propagated to other switches using VTP.
After MST is configured on a Switch, PVST+ operations will also be enabled by default.
MST configurations must be manually configured on each switch within the MST region.
MST configurations only need to be manually configured on the Root Bridge.
MST configurations are entered using the VLAN Database mode on Cisco Catalyst switches.
第12题:
Check the server.xml on the IMS Server.
Check the database table IMSSyncDataType.
Check the System policies in the AccessAdmin.
Check the IMS Server settings of the IMS Configuration Utility.
第13题:
How can you verify that you have correctly configured SSH access to your Junos device?()
第14题:
You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? ()
第15题:
Your network consists of a single Active Directory domain. All servers run Windows Server 2008 R2. A server named Server1 has the Remote Desktop Services server role installed. You notice that several users consume more than 30 percent of the CPU resources throughout the day. You need to prevent users from consuming more than 15 percent of the CPU resources. Administrators must not be limited by the amount of CPU resources that they can consume. What should you do?()
第16题:
Your company’s network has client computers that run Windows 7. When a user attempts to log on to the domain from a computer named Client1,she receives the following message: The system cannot log you on to this domain because the system’s computer account in its primary domain is missing or the password on that account is incorrect. You need to ensure that the user can log on to the domain from Client1. What should you do?()
第17题:
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server! that runs Windows Server 2012 R2. Server1 contains a virtual machine named VM1 that runs Windows Server 2012 R2.You need to ensure that a user named User1 can install Windows features on VM1. The solution must minimize the number of permissions assigned to User1. To which group should you add User1?()
第18题:
AD RMS Auditors
AD RMS Service Group
Domain Admins
Schema Admins
第19题:
In the System Properties dialog box, enable Remote Desktop.
Add your user account to the Remote Desktop Users local group.
In the System Properties dialog box, enable Remote Assistance.
Install Terminal Services by using Add or Remove Programs.
第20题:
Information will be carried in the RSTP BPDUs.
It will be propagated in VTP updates.
Information stored in the Forwarding Information Base and the switch will reply on query.
Multiple Spanning Tree must be manually configured on the appropriate switches.
第21题:
Implement Windows System Resource Manager (WSRM),and configure user policies.
Implement Windows System Resource Manager (WSRM),and configure session policies.
Configure Performance Monitor,and create a user-defined Data Collector Set.
Configure Performance Monitor,and create an Event Trace Session Data Collector Set.
第22题:
Create a home folder for Paul.
Share the network profile directory.
Map a device to network profile directory.
Use the %username% variable to allow access.
第23题:
written by the Administrators on the INI files
propagated only with the Active Directory network service
propagated to the clients on the next Administrator access
propagated to clients the next time AccessAgent synchronizes with the IMS Server
第24题:
Change the %Username% variable to ScottP.
Create a home folder for the Client computer.
Map a device to network profile directory.
Share the directory, which holds his profile.