-
You need to prevent a custom application from connecting to the Internet. What should you do?()
A . From Windows Firewall, add a program.
B . From Windows Defender, modify the Allowed items list.
C . From Windows Firewall with Advanced Security, create an inbound rule.
D . From Windows Firewall with Advanced Security, create an outbound rule.
-
You have a computer that runs Windows 7. You install Windows XP in a new partition on the computer anddiscover that you can no longer start Windows 7. You need to start Windows 7 in the minimum amount oftime. What should you do?()
A . From Windows XP, modify the default path in the boot.ini file.
B . From Windows XP Recovery Console, run the Fixboot command.
C . Start the computer from the Windows 7 installation media and select Install now.
D . Start the computer from the Windows 7 installation media and run Startup Repair.
-
You need to design a PKI for Litware, Inc. What should you do?()
A . Add one offline stand-alone root certificate authority(CA).Add two online enterprise subordinate CAs
B . Add one online stand-alone root certification authority(CA).Add two online enterprise subordinate CAs
C . Add one online enterprise root certification authority CA).Add one offline enterprise subordinate CA
D . Add one online enterprise root certification authority(CA).Add two online enterprise subordinate CA
-
You need to design a configuration for the mailbox servers. What should you do?()
A . Create two Exchange Server 2003 computers. Place the mailboxes for main office users on one server, and place the mailboxes for remote users on the other server
B . Create a Network Load Balancing cluster that contains two Exchange Server 2003 computers. Place half of the user mailboxes on one server, and place half of the user mailboxes on the other server
C . Create a Microsoft Cluster Server cluster that contains two Exchange Server 2003 computers. Place all of the user mailboxes on one server and configure the other server as a failover node
D . Create a Microsoft Cluster Server cluster that contains two Exchange Server 2003 computers. Place half of the user mailboxes on one server, and place half of the user mailboxes on the other server
-
You need to meet the requirements of the accounts team. What should you do?()
A . Set the Dimension type to Currency.
B . Set the Currency member name as a unique attribute.
C . Hide non-leaf data within the Currency dimension key attribute.
D . Disable the All member of the Currency dimension key attribute.
-
You need to design a method to enable remote encryption on Server5. What should you do?()
A . Configure the editor’s user account properties to enable Store password using reversible encryption
B . Configure the editor’s user account properties to enable Use DES encryption for this account
C . Configure the Local Security Policy on Server to enable the System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing security policy
D . Configure the Server5 computer account properties to enable Trust computer for delegatio
-
You need to provide ad hoc reporting capabilities to fulfill business requirements. What should you do?()
A . Create a SQL Server Reporting Services (SSRS) report. Enable customers to modify the report by using Report Builder.
B . Create an ASP.NET application that will enable customers to view and modify reports by calling the SQL Server Reporting Services (SSRS) API.
C . Create an ASP.NET application that will enable customers to view and modify reports by using a SQL Server Reporting Services (SSRS) ActiveX control.
D . Create a SQL Server Reporting Services (SSRS) Report Model. Enable customers to modify reports based on the model by using Report Builder.
-
You need to design a method to deploy security configuration settings to servers. What should you do?()
A . Run the Resultant Set of Policy wizard with a Windows Management Instrumentation (WMI) filter on each department’s Server OU
B . Log on to each server and use local policy to configure and manage the security settings
C . Create a customer security template. Log on to a domain controller and run the seceditcommand to import the security template
D . Create a customer security template. Create a GPO and import the security template. Link the GPO to each department’s Server OU
-
You need to block messages from senders that do not comply sender policy framework (SPF).What do you need to implement?()
A . Receive connector
B . Sender ID Filtering
C . Sender Filtering
D . Send connector
-
You need to meet the fraud detection requirements. What should you do?()
A . Use Percentage Sampling in SSIS.
B . Use a Neural Network Data mining algorithm.
C . Create an SSAS Key Performance Indicator for each account.
D . Monitor transactions by using SQL Server Profiler.
-
You need to configure Windows Update to meet the company’s technical requirements. What should you do?()
A . Configure WSUS2 as an autonomous server.
B . Create a Network Load Balancing (NLB) cluster.
C . Create multiple Host (A) records and use round robin DNS.
D . Configure multiple service location (SRV) records and use round robin DNS.
-
You need to design access to e-mail by Internet users. What should you do?()
A . Configure front-end servers to use HTTP to communicate with back-end servers
B . Configure the internal firewall to allow IPSec traffic between front-end and back-end Exchange servers
C . Require all users to encrypt all outbound e-mail messages
D . Issue digital certificates to all remote users. Require the certificates to be used when authenticating to Outlook Web Acce
-
You need to design the deployment of antivirus software. What should you do?()
A . Install the antivirus software on each mailbox storage server
B . Install the antivirus software on each Outlook Web Access server
C . Install the antivirus software on one Outlook Web Access server at each office
D . Install the antivirus software on a back-end server that contains no mailboxe
-
You need to create a VPN connection. What should you do?()
A . From Windows Explorer, right-click Computer and then click Map network drive.
B . From Windows Explorer, right-click Computer and then click Add a network location.
C . From Network and Sharing Center, click Set up a new connection or network and then click Set up anew network.
D . From Network and Sharing Center, click Set up a new connection or network and then click Connect to aworkplace.
-
Do you commute to work? No, I work at home.()
A . You work?
B . How about you?
C . You do not work.
D . You work by train.
-
This is our ______. so you can do what you need to do
here.
-
______ we are not asked to fill the readers feedback, we have no need to do it.
A.So that
B.At that
C.Since that
D.Now that
-
________is no need for you to come if you don’t wnt to.ItB.ThereC.ThtD.This________is no need for you to come if you don’t wnt to.It B.There C.Tht D.This
A.It
B.There
C.That
D.This
-
“What do you expect me to do?” “The house needs___.”
A、to be paint
B、to painting
C、painting
D、painted
-
You are the administrator of a Windows Server 2003 computer named Testking1.An application on Testking1 gradually uses more and more memory until it causesTestking1 to stop responding. If you restart the application before it uses theavailable memory, there is no interruption of user services.You need to configure Testking1 to notify you when it encounters a low-memorycondition.What should you do?()
A. Using Task Scheduler, schedule a repeating task that runs the tracert command.
B. Using Performance Logs and Alerts, configure an alert for the appropriate performance object.
C. Using System Monitor, configure the appropriate performance object to display.
D. Using Startup and Recovery Settings, configure Testking1 to send an Administrative Alert.
-
Excuse me, ___ wht exctly you wnt me to do now butB.ndC.soD.orExcuse me, ___ wht exctly you wnt me to do now but B.nd C.so D.or
A.but
B.and
C.so
D.or
-
—Could you tell me when________ in Bngkok —Sorry, I don’t know. I even wnt to know wht to do when—Could you tell me when________ in Bngkok —Sorry, I don’t know. I even wnt to know wht to do when ________.torrive, torrive B.rriving, torrive C.torrive,rriving D.should werrive,rriving
A.to arrive,to arrive
B.arriving, to arrive
C.to arrive,arriving
D.should we arrive,arriving
-
Why don’t you bring _____to histtention tht youre too busy to do it it B.thisC.thtD.whtWhy don’t you bring _____to histtention tht youre too busy to do it it B.this C.tht D.wht
A.it
B.this
C.that
D.what
-
If you _____ him yesterdy, you _____ wht to do now.sked … would knowB.hdsked … would hve kIf you _____ him yesterdy, you _____ wht to do now.sked … would know B.hdsked … would hve known C.sked him … know D.hdsked … would know
A.asked … would know
B.had asked … would have known
C.asked him … know
D.had asked … would know