首页/ 题库 / [单选题]You need 的答案

You need to recommend a strategy for managing Windows Firewall that meets the companys technical requirements. What should you include in the recommendation?()

单选题
2023-03-06 13:44
A、domain-based Group Policy objects (GPOs)
B、local Group Policy objects (GPOs)
C、Starter Group Policy objects (GPOs)
D、System Starter Group Policy objects (GPOs)
查看答案

正确答案
A

试题解析

标签: MCITP(70-646)
感兴趣题目

You need to recommend an administrative solution for the help desk technicians that meets the  museum’s technical requirements   
What should you recommend?()

Your company has deployed Network Access Protection (NAP) enforcement for VPNs. You need to ensure that the health of all clients can be monitored and reported. What should you do?()
一 Good morning. ,- Good morning! I need a check to send to my publisher in New York.() 
Your database is in NOARCHIVELOG mode. You start to do a backup, but your users complain that they dont want you to shut down the database to perform the backup. What options are available to you?()  
ou have a server that runs Windows Server 2003 Service Pack 2 (SP2).You need to view a list of current TCP/IP network connections. The list should refresh itself every 30 seconds.What should you do?()
You have a server that runs Windows Server 2003 Service Pack 2 (SP2). You need to view a list of current TCP/IP network connections. The list should refresh itself every 30 seconds. What should you do?()
A customers has asked you to investigate their current x86 server environment to determinate if they can achieve a reduction in power and rack consumption. They plan to implement VMware and the local storage shared. Which of the following consolidation proposals meets these needs?()
You are the administrator of a Windows 2000 network. You use a user account named User1 to log on to a Windows 2000 Professional computer. Different students in a classroom use this Computer. User does not have administrative rights. However, you prefer to use this account for most of your daily activities, because it is not a security breach if you fail to log off. You want to schedule a task to run a command file named AddUsers.cmd that automatically adds six more student user accounts. What should you do?()

You deploy a new Exchange Server 2010 organization.You send a test message to an external recipient and immediately receive the following nondelivery report (NDR): Delivery has failed to these recipients or groups: [email protected] ([email protected]).
The recipient’s e-mail system isn’t accepting messages now.Please try resending this message later or contact the recipient directly.± You verify that you can succesfully send an e-mail message to [email protected] from an external e-mail system.You need to ensure that you can send e-mails to external recipients from within the Exchange organization.
What should you create?()

You work as a database administrator for Certkiller .com. You want to be notified when the number of disk I/O increases by 10% of what it was yesterday. You create a baseline metric for yesterday’s disk I/O performance. How do you use the baseline metrics to achieve your objective?()
You need to recommend a strategy for managing Windows Firewall that meets the companys technical requirements. What should you include in the recommendation?()
You work as a database administrator for Supportcenter.cn. You have been asked to use a centralized administrative tool to administer your database servers and application servers. In order to achieve the objective, which component would you configure on each database server?()
相关题目
You are implementing an ASP.NET page in an e-commerce application. Code in abtnAddToCart_Click event handler adds a product to the shopping cart. The page should check the status of the shopping cart and always show a cart icon when one or more items are in the shopping cart. The page should hide the icon when the shopping cart has no items. You need to add an event handler to implement this requirement. Which event handler should you add?()
Do you want to pay _____ cash or _____ credit card.
Excuse me, sir. You need to ________ the form.
Your network contains a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).  You create a domain account named Admin1. You need to configure the security for Admin1 to meet the following requirements: Allow Admin1 to monitor events in the system event log and the application event logAllow Admin1 to create and view counter logs in Performance MonitorMinimize the user rights assigned to Admin1 To .which group should you add Admin1?()
You need to design Group Policy object (GPO) settings to support the use of the Encrypting File System (EFS). Your solution must meet business and security requirements. Which two actions should you perform?()
Your network uses IPv4. You install a server that runs Windows Server 008 at a brach office. The server is configured with two network interfaces. You need to configure routing on the server at the branch office. Which two actions should you perform?() 
Your company has a main office and a branch office You deploy a read-only domain controller (RODC) that runs Microsoft Windows Server 2008 to the branch office You need to ensure that users at the branch office are able to log on to the domain by using the RODC What should you do()
You need to relocate the existing user and computer objects in your company to different organizational units. What are two possible ways to achieve this goal()
You have a server that runs Windows Server 2003 Service Pack 2 (SP2). The server contains a single network connection named Local Area Connection. A user reports that when he copies a large file to a shared folder on the server, it seems unusually slow. You need to view the current network utilization on the server. What should you do?()
You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed.You need to identify why a remote SMTP server rejects e-mail sent from the organization. What should you do?()
You need to recommend a strategy for using managed service accounts on the Web servers.How many managed service accounts should you recommend?()
You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()
Which of the following is NOT one of the three details you need to fill in on the New Custom Control dialog?()
Which task would you perform before you run Oracle Universal Installer (OUI) in silent or suppressedmode for an installation()
Which task would you perform before you run Oracle Universal Installer (OUI) in silent or suppressed mode foran installation?()
You are the administrator of your company's network. You attempt to install a printer driver on a Windows 2000 computer for a user named Linda. You receive the following error message: “Error 11-Cannot install printer driver.” The driver was originally downloaded from the printer manufacturer’s Web site. You have successfully used the driver in the past on their Windows 2000 Professional computers. You want to configure Linda’s computer to check for driver integrity and to allow you to install this printer driver. What should you do? ()
You need to create a trigger to locate the Product report in the Rpt_Server, run the report, and test the status of the report. Which three built-ins would you use to accomplish this task?()

You need to recommend a solution for the research documents that meets the museum’s technical requirements.  
What should you recommend?()

You need to recommend a high-availability solution for the file servers in Branch2 that supports the museum's planned changes   
What should you include in the recommendation?()

You need to recommend an access solution for the users in the sales department that meets the  museum's technical requirements.   
What should you include in the recommendation?()

广告位招租WX:84302438

免费的网站请分享给朋友吧