-
You need to design a patch management strategy for Northwind Traders. What should you do?()
A . Configure the Default Domain Policy Group Policy object (GPO) for the northwindtraders.com domain to configure client computers to download updates from the SUS server in New York. Configure the Default Domain Policy GPO for the boston.northwindtraders.com domain to configure client computers to download updates from the SUS server in New York
B . Use Group Policy to configure client computers to download updates from a Windows Update server on the Internet. Configure the Default Domain Policy Group Policy object (GPO) with a startup script that runs Mbsacli.exe. Configure it to scan the computers in both of the branch offices
C . Install and configure a SUS server in the Boston branch office. Configure the server to download updates from a Windows Update server on the Internet. Configure Microsoft Baseline Security Analyzer (MBSA) to scan for updates and computers in the New York office
D . Install and configure a SUS server in each branch office. Configure the SUS servers to download updates from the New York SUS server. Configure Microsoft Baseline Security Analyzer (MBSA) to scan for updates on computers in the New York office
-
You need to design a strategy to meet the company’s requirements for e-mail. What should you do?()
A . Configure and publish a certificate template that is suitable for S/MIME, Deploy a Group Policy object (GPO) so that a certificate that is based on this template is automatically issued to all domain users
B . Specify Group Policy objects (GPOs) and IPSec policies that require all client computers to use Kerberos authentication to connect to mail servers
C . For each mail server, acquire an SSL server certificate from a commercial CA whose root certificate is already trusted
D . Require IPSec encryption on all TCP connections that are used to send or receive e-mail message
-
You need to design a storage mode for the ProductOrderStatus measure group. What should you do?()
A . Use ROLAP for the Historical partition and MOLAP for the CurrentDay partition.
B . Use MOLAP for the Historical partition and ROLAP for the CurrentDay partition.
C . Use ROLAP for the Historical partition and Automatic MOLAP for the CurrentDay partition.
D . Use HOLAP for the Historical partition and Low-latency MOLAP for the CurrentDay partition.
-
You need to enable hibernation support for a computer that runs Windows XP Professional. What should you do?()
A . From Control Panel, configure the Power Options.
B . From the System properties, configure the Data Execution Prevention settings.
C . From the Services console, set the Startup type for the Human Interface Devices service to Automatic.
D . From the Services console, set the Startup type for the Uninterruptable Power Supply service to Automatic.&e
-
You are designing a strategy for adding the additional hardware necessary to support Contoso, Ltd. What should you do?()
A . Add a T1 Wan Link Between Chicago and San Francisco.
B . Add a T3 Wan Link Between Chicago and San Francisco.
C . Add a Basic ISDN Connection between Chicago and San Francisco.
D . Configure HighSpeed modems in Chicago and San Francisco to support demand-dial routing.
-
You need to design a PKI for the Northwind Traders internal network. What should you do?()
A . Add an enterprise root CA to the northwindtraders.com domain. Configure cross-certification between the northwindtraders.com domain and the boston.northwindtraders.com domain
B . Add an enterprise subordinate issuing CA to the northwindtraders.com domain. Configure qualified subordination for the enterprise subordinate issuing CA in Boston
C . Add enterprise subordinate issuing CAs to the New York, Boston, and Seattle LANs. Configure qualified subordinations for each enterprise subordinate issuing CA
D . Add a stand-alone commercial issuing CA to only the northwindtraders.com domain. Configure cross-certification between the commercial CA and the boston.northwindtraders.com domai
-
You need to design a PKI for Litware, Inc. What should you do?()
A . Add one offline stand-alone root certificate authority(CA).Add two online enterprise subordinate CAs
B . Add one online stand-alone root certification authority(CA).Add two online enterprise subordinate CAs
C . Add one online enterprise root certification authority CA).Add one offline enterprise subordinate CA
D . Add one online enterprise root certification authority(CA).Add two online enterprise subordinate CA
-
You need to design a configuration for the mailbox servers. What should you do?()
A . Create two Exchange Server 2003 computers. Place the mailboxes for main office users on one server, and place the mailboxes for remote users on the other server
B . Create a Network Load Balancing cluster that contains two Exchange Server 2003 computers. Place half of the user mailboxes on one server, and place half of the user mailboxes on the other server
C . Create a Microsoft Cluster Server cluster that contains two Exchange Server 2003 computers. Place all of the user mailboxes on one server and configure the other server as a failover node
D . Create a Microsoft Cluster Server cluster that contains two Exchange Server 2003 computers. Place half of the user mailboxes on one server, and place half of the user mailboxes on the other server
-
You are designing a site topology for the new Active Directory environment. What should you do? ()
A . Create one site for all offices. Place the subnets for the four branch offices and the Sydney main office in this site.
B . Create two sites: one site for the four branch offices and one site for the Sydney main office. Place the subnets for the branch offices in one site. Place the subnet for the Sydney main office in the other site.
C . Create three sites: one site for the four branch offices, one site for the Sydney main office, and one site for the Sydney satellite offices.
D . Create four sites: one for the Melbourne and Perth branch offices, one site for the Berlin and Paris branch offices, one site for the Sydney main office, and one site for the Sydney satellite offices.
E . Create five sites; one site for the Melbourne branch office, one site for the Perth branch office, one site for the Berlin branch office, one site for the Paris branch office, and one site for the Sydney main office. Place the subnets for each branch office and the Sydney main office in their respective sites.
-
You are designing a client computer upgrade strategy for Contoso.Ltd. What should you do?()
A . Use the ldifde command to migrate user settings.
B . Use the User State Migration Tool (USMT) to Migrate user settings.
C . Create trust relationships between the Chicago domain and the San Francisco domain. Use the Active Directory Migration Tool (ADMT) to migrate user settings.
D . Create trust relationships between the forest root domain and the San Francisco domain. Use the Active Directory Migration Tool (ADMT) to migrate user settings.
-
You need to design a certificate management process for internal users. What should you do?()
A . Establish a Web enrollment service for internal users to request access to resources
B . Grant Enrollment Agent rights to users
C . Establish enrollment stations and store user certificates in a smart card
D . Create Connection Manager scripts to identify the client computer operating system, and configure Web proxy settings to specify the appropriate Web enrollment service
-
You need to design a configuration for the Microsoft Outlook Web Access servers. What should you do?()
A . Create a Network Load Balancing cluster that contains the Outlook Web Access servers
B . Create a Microsoft Cluster Server cluster that contains the Outlook Web Access servers
C . Create public DNS host (A) resource records for each Outlook Web Access server. Instruct each user to connect to the server that contains his or her mailbox
D . Install Microsoft Application Center 2000 on the Outlook Web Access servers. Create a Web cluster that contains all of the Outlook Web Access server
-
You are designing a strategy for adding the additional hardware necessary to support Contoso, Ltd. What should you do?()
A . Add a T1 Wan Link Between Chicago and San Francisco.
B . Add a T3 Wan Link Between Chicago and San Francisco.
C . Add a Basic ISDN Connection between Chicago and San Francisco.
D . Configure HighSpeed modems in Chicago and San Francisco to support demand-dial routing.
-
You need to design a Security strategy for the wireless network at all resort locations.What should you do?()
A . Connect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Require company users to establish a VPN to access company resources
B . Install Internet Authentication Service (IAS) on a domain controller.Configure the wireless access points to require IEEE 802.1x authentication
C . Establish IPSec policies on all company servers to request encryption from all computers that connect from the wireless IP networks
D . Configure all wireless access points to require the Wired Equivalent Privacy (WEP) protocol for all connections. Use a Group Policy object (GPO) to distribute the WEP keys to all computers in the domai
-
You need to design a security strategy for a remote e-mail access. What should you do?()
A . Require remote users to access e-mails by using Outlook Mobile Access
B . Require Outlook Web Access users to install the secure MIME ActiveX-Control and to encrypt all messages
C . On Outlook Web Access servers that accept connections from the Internet configure IIS to require SSL for all connections
D . On Outlook Web Access servers that accept connections from the Internet configure IIS to require Integrated Windows Authenticatio
-
You need to design a group membership strategy for the EditorialAdmins group. What should you do?()
A . Move the EditorialAdmins group to the Servers OU in the editorial department
B . Move the members of the EditorialAdmins group to the Editorial OU
C . Move the members of the EditorialAdmins group to the New York OU
D . Move the EditorialAdmins group to the New York OU
-
You are designing a client computer upgrade strategy for Contoso.Ltd. What should you do?()
A . Use the ldifde command to migrate user settings.
B . Use the User State Migration Tool (USMT) to Migrate user settings.
C . Create trust relationships between the Chicago domain and the San Francisco domain. Use the Active Directory Migration Tool (ADMT) to migrate user settings.
D . Create trust relationships between the forest root domain and the San Francisco domain. Use the Active Directory Migration Tool (ADMT) to migrate user settings.
-
You are designing a site topology for the new Active Directory environment. What should you do?()
A . Create one site for all offices. Place the subnets for the four branch offices and the Sydney main office in this site.
B . Create two sites: one site for the four branch offices and one site for the Sydney main office. Place the subnets for the branch offices in one site. Place the subnet for the Sydney main office in the other site.
C . Create three sites: one site for the four branch offices, one site for the Sydney main office, and one site for the Sydney satellite offices.
D . Create four sites: one for the Melbourne and Perth branch offices, one site for the Berlin and Paris branch offices, one site for the Sydney main office, and one site for the Sydney satellite offices.
E . Create five sites; one site for the Melbourne branch office, one site for the Perth branch office, one site for the Berlin branch office, one site for the Paris branch office, and one site for the Sydney main office. Place the subnets for each branch office and the Sydney main office in their respective sites.
-
5. Darlene brought up a lot of new stuff at the meeting, but I don't know what we should do.
-
What we should do when we want to have a good chat with someone?
-
Some traditional Chinese food is dispearing gradually. What should we do to protect it? Do you think traditional Chinese food is a part of culture in our country?
-
You should always focus on explaining what you can do for the company not what they can do for you when writing a cover letter.
-
Explain what we should do and should not do when citing references.
-
If we were asked exactly what we were doing a year ago,we should probably have to say that we could not remember. But if we had kept a book and had written in it an account of what we did each day, we should be able to give an answer to the question.
It is the same in history. Many things have been forgotten because we do not have any written account of them. Sometimes men did keep a record of the most important happenings in their country,but often it was destroyed by fire or in a war. Sometimes there was never any written record at all because the people of that time and place did not know how to write. For example, we know a good deal about the people who lived in China 4, 000 years ago, because they could write and leave written records for those who lived after them. But we know almost nothing about the people who lived even 200 years ago in central Africa because they had not learned to write.
Sometimes, of course, even if the people cannot write, they may know something of the past. They have heard about it from older people and often songs and dances and stories have been made about the most important happenings, and these have been sung and acted and told for many generations, for most people are proud to tell what their fathers did in the past. This we may call ?remembered history ” . Some of it has now been written down. It is not so exact or so valuable to us as written history is, because words are much more easily changed when used again and again in speech than when copied in writing. But if there are no written records, such spoken stories are often very helpful.
Which of the following is NOT suggested in the passage?
A.Written history is more reliable.
B.Written records play an important role in learning about history.
C.A written account of our daily activities helps to answer many questions.
D.Where there are no written records, there is no history.
Little is known about the central Africa 200 years ago because ______.A.there was nothing worth writing down at that time
B.people there ignored the importance of keeping a record
C.people there did not know how to write
D.the written records were perhaps destroyed by a fire
“ Remembered history” refers to ______.A.history based on a person’s imagination
B.stories of important happenings passed down from mouth to mouth
C.songs and dances about the most important events.
D.both B and C
“ Remembered history” is regarded as valuable only when ______.A.it is written down
B.No written account is available
C.it proves to be timely
D.People are interested in it
It is suggested that we could have learned more about our past if ancient people had ______.A.kept a written record of every past event
B.burnt their written records in wars
C.told exact stories of the most important happenings
D.made more songs and dances
请帮忙给出每个问题的正确答案和分析,谢谢!