-
Your company has an Active Directory domain. All servers run Windows Server 2008 R2. Your company uses an Enterprise Root certificate authority (CA). You need to ensure that revoked certificate information is highly available. What should you do()
A . Implement an Online Certificate Status Protocol (OCSP) responder by using Network Load Balancing.
B . Implement an Online Certificate Status Protocol (OCSP) responder by using an Internet Security and Acceleration S
C . Publish the trusted certificate authorities list to the domain by using a Group Policy Object (GPO).
D . Create a new Group Policy Object (GPO) that allows users to trust peer certificates. Link the GPO to the domain.
-
You want to configure your Windows NT Workstation 4.0 computer Company1 to run both Windows NT Workstation and Windows 2000 Professional. What should you do before installing Windows 2000 Professional on Company1? ()
A . Run Check Disk in Windows NT Workstation 4.0.
B . Disable disk compression in Windows NT Workstation 4.0.
C . Install Service Pack 4 or later for Windows NT Workstation 4.0.
D . Install the Distributed file system (Dfs) client in Windows NT Workstation 4.0.
-
When talking to people within your company don’t speak your language, you may have to use English.()
A . who
B . which
C . whose
-
Your company has an Active Directory domain. All servers run Windows Server 2008. Your company runs an Enterprise Root certification authority (CA). You need to ensure that only administrators can sign code. Which two tasks should you perform()
A . Publish the code signing template.
B . Edit the local computer policy of the Enterprise Root CA to allow users to trust peer certificates and allow only administrators to apply the policy.
C . Edit the local computer policy of the Enterprise Root CA to allow only administrators to manage Trusted Publishers.
D . Modify the security settings on the template to allow only administrators to request code signing certificates.
-
Your company is planning to deploy Windows 7. You have an image that is used to deploy Windows 7 on client computers. You need to add a volume image to the existing Windows image. What should you do?()
A . Service the image online.
B . Use DiskPart to attach a new volume.
C . Use ImageX to append the volume image.
D . Use the Deployment Image Servicing and Management (DISM) tool to mount the image.
-
Your company uses a Windows 2008 Enterprise certificate authority (CA) to issue certificates. You need to implement key archival. What should you do()
A . Archive the private key on the server.
B . Apply the Hisecdc security template to the domain controllers.
C . Configure the certificate for automatic enrollment for the computers that store encrypted files.
D . Install an Enterprise Subordinate CA and issue a user certificate to users of the encrypted files.
-
Your company has a domain controller that runs Windows Server 2008. The domain controller has the backup features installed. You need to perform a non-authoritative restore of the doman controller using an existing backup file. What should you do()
A . Boot into Directory Services Restore Mode and use wbadmin to restore critical volume.
B . Boot into Directory Services Restore Mode and use the backup snap-in to restore critical volume
C . Boot into Safe Mode and use wbadmin to restore critical volume
D . Boot into Safe Mode and use the backup snap-in to restore critical volume
-
You deploy your companys Internet Web site. You need to deny anonymous access to the Web site, allowing only authenticated users. Which code segment should you use?()
A . <authorization> <allow users="?"/> </authorization>
B . <authorization> <deny users="?"/> </authorization>
C . <authorization> <deny users="*"/></authorization>
D . <authorization> <allow users="*"/> </authorization>
-
Your company has servers that run Windows Server 2008. All client computers run Windows XP Service Pack 2 (SP2). Windows 2003 Professional, or Windows Vista. You need to ensure all computers can use the IPv6 protocol. What should you do()
A . Install Serivce Pack 4 on all Windows 2000 Professional computers
B . Upgrade the Windows 2000 professional computers to Windows XP SP2
C . Run the IPv6.exe tool on the Windows 200 Professional and Windows XP computers
D . Install Active Directory Client extention (DSClient.exe) on the Windows 2000 Professional and Windows XP computers.
-
Your company has an Active Directory domain. All servers run Windows Server 2008 R2. Your company uses an Enterprise Root certificate authority (CA). You need to ensure that revoked certificate information is highly available. What should you do()
A . Implement an Online Certificate Status Protocol (OCSP) responder by using Network Load Balancing.
B . Implement an Online Certificate Status Protocol (OCSP) responder by using an Internet Security and Acceleration Server array.
C . Publish the trusted certificate authorities list to the domain by using a Group Policy Object (GPO).
D . Create a new Group Policy Object (GPO) that allows users to trust peer certificates. Link the GPO to the domain.
-
You have 20 computers that run Windows XP Professional. You need to configure the computers to use your company’s internal Windows Server Update Services (WSUS) server. What should you do?()
A . Create a scheduled task that runs wuauclt.exe.
B . Modify the Automatic Updates settings from Control Panel.
C . Modify the Automatic Updates settings in the Local Computer Policy.
D . Connect to the Windows Update Web site and select Change settings.
-
You are designing an Active Directory implementation strategy to present to executives from your company and from Contoso, Ltd. Which implementation strategy should you use?()
A . Upgrade the New York domain. Upgrade the Chicago domain. Create a pristine forest for Contoso, Ltd.
B . Create a pristine forest. Upgrade the New York domain. Upgrade the Chicago domain. Do nothing further.
C . Create pristine forest. Upgrade the New York domain.Upgrade the Chicago domain.Create a pristine forest for Contoso, Ltd.
D . Create a pristine forest.Upgrade the New York domain. Upgrade the Chicago domain.Create a new child domain for Contoso, Ltd.
-
You are designing an Active Directory implementation strategy to present to executives from your company and from Contoso, Ltd. Which implementation strategy should you use?()
A . Upgrade the New York domain. Upgrade the Chicago domain. Create a pristine forest for Contoso, Ltd.
B . Create a pristine forest. Upgrade the New York domain. Upgrade the Chicago domain. Do nothing further.
C . Create pristine forest. Upgrade the New York domain. Upgrade the Chicago domain. Create a pristine forest for Contoso, Ltd.
D . Create a pristine forest. Upgrade the New York domain. Upgrade the Chicago domain. Create a new child domain for Contoso, Ltd. &e
-
Your company has an Active Directory Domain Services (AD DS) domain. You virtualize applications by using Microsoft Application Virtualization (App-V). You are creating an application virtualization package. Which should you use?()
A . Microsoft Application Virtualization Sequencer
B . Microsoft Application Virtualization Desktop Client
C . Microsoft System Center Application Virtualization Streaming Server
D . Microsoft System Center Application Virtualization Management Server
-
You are the administrator of your company’s network. Using Windows Installer packages, you want to install customized versions of Microsoft Excel on different departments in the company. Which type of file should you apply to the installation database?()
A . msi
B . mst
C . zap
D . zi
-
1.You can use self-depreciating humor when addressing the president of your company about budget cuts.
-
There’s a new machine in your company ,but you don’t know how to use it , so you may ask:________
-
Your company uses Microsoft Application Virtualization (App-V). Your environment includes
Your company uses Microsoft Application Virtualization (App-V). Your environment includes multiple client computer configurations, as shown in the following table.Configuration Operating s ystem Processor App-V c lientConfig1 Windows Vista 32-bit 4.5Config 2 Windows Vista 64-bit 4.6Config 3 Windows 7 32-bit 4.5Config 4 Windows 7 64-bit 4.6You need to deploy a 32-bit application to all client computers.Which reference computer configuration should you use?()
A.Config1 with App-V Sequencer 4.5 32-bit
B.Config2 with App-V Sequencer 4.6 64-bit
C.Config3 with App-V Sequencer 4.6 32-bit
D.Config4 with App-V Sequencer 4.6 64-bit
-
The initial cost of your project is $25,000, which will save the company $6,000 per year for the next four years. Using the above table If your company wants a 12% ROI, what is the NPV of the project?
A.-$1,000
B._$6,772
C.+$1,758
D.+$6,772
-
You are the network administrator for your company. The network originally consists of a single Windows NT 4.0 domain.
You upgrade the domain to a single Active Directory domain. All network servers now run Windows Server 2003, and all client computers run Windows XP Professional.
Your staff provides technical support to the network. They frequently establish Remote Desktop connections with a domain controller named DC1.
You hire 25 new support specialists for your staff. You use Csvde.exe to create Active Directory user accounts for all 25.
A new support specialist named Paul reports that he cannot establish a Remote Desktop connection with DC1. He receives the message shown in the Logon Message exhibit. (Click the Exhibit button.)
<img src='https://img2.soutiyun.com/ask/uploadfile/2019-03-27/c1ca10b5ef7976b1e62efd8e32fc3420.jpg' />
You open Gpedit.msc on DC1. You see the display shown in the Security Policy exhibit. (Click the Exhibit button.)
<img src='https://img2.soutiyun.com/ask/uploadfile/2019-03-27/35218487c59e1ec9d3305e8d5fd23b81.jpg' />
You need to ensure that Paul can establish Remote Desktop connections with DC1.
What should you do? ()
-
Your company network includes 6,000 Windows 2000 Professional client computers and 35 Windows 2000 Server computers in a single domain.
Your company has a print device that is used to print payroll checks. The print device is physically attached to the parallel port of one of the client computers. This print device's tray is loaded with checks at all times. You have shared this printer on the network as ChkPrinter and retained the default permissions.
A payroll application runs on a server named HRserv. Every Wednesday at 5:00P.M, the application prints paychecks from employees on this printer. The payroll application runs as a Windows 2000 service on HRserv.
You need to configure ChkPrinter so that only the payroll application will be able to use the printer.
What should you do?
A.Configure the share name for ChkPrinter to be ChkPrinter$. Configure the payroll application to print to this new share name.
B.Configure ChkPrinter so that it is available only from5:00 P.Mto5:30 P.M
C.Configure ChkPrinter to allow the HRserv domain account print permissions for ChkPrinter. Remove print permissions for the Everyone group.
D.Configure ChkPrinter to allow all HRserv domain accounts Print permissions for ChkPrinter. Change the permissions to deny print on ChkPrinter for the Everyone group.
-
You are the network administrator for your company. The network consists of a single Active Directorydomain. All network servers run Windows Server 2003, and all client computers run Windows XPProfessional.A user named Peter uses a client computer named Client1. This computer has a locally attached tapedevice.You grant Peter the necessary permissions to perform backups of a member server named Server1. Peter runs the Backup utility on Client1 to back up the files located on Server1.You need use your client computer to view the most recent backup logs for Server1.What should you do? ()
A. Use Notepad to view the contents of the backup report located on Server1.
B. Use Notepad to view the contents of the backup report located on Client1.
C. Use Event Viewer to view the contents of the application log located on Server1.
D. Use Event Viewer to view the contents of the application log located on Client1.
-
Your company has a server named Server1 that runs a Server Core installation of Windows Server 2008 R2, and the DNS Server server role. Server1 has one network interface named Local Area Connection. The static IP address of the network interface is configured as 10.0.0.1. You need to create a DNS zone named local.contoso.com on Server1.Which command should you use?()
A. ipconfig /registerdns:local.contoso.com
B. dnscmd Server1 /ZoneAdd local.contoso.com /DSPrimary
C. dnscmd Server1 /ZoneAdd local.contoso.com /Primary /file local.contoso.com.dns
D. netsh interface ipv4 set dnsserver name=±local.contoso.co¡± static 10.0.0.1 prima
-
Your company has a main office and 15 branch offices. The company has a single Active Directory domain. All servers run Windows Server 2008 R2.You need to ensure that the VPN connections between the main office and the branch offices meet the following requirements:¡¤All data must be encrypted by using en-to-end encryption.¡¤The VPN connection must use compute-level authentication.¡¤User names and passwords cannot be used for authenticationWhat should you do?()
A. Configure an IPsec connection to use tunnel mode and preshared key authentication.
B. Configure a PPTP connection to use version 2 of the MS-CHAP v2 authentication.
C. Configure a L2TP/IPsec connection to use the EAP-TLS authentication.
D. Configure a L2TP/IPsec connection to use version 2 of the MS-CHAP v2 authentication.