微软认证考试

Your companys network includes an Active Directory Domain Services (AD DS) domain. You manage Hyper-V servers by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You install Windows Server 2008 R2 Datacenter (Server Core Installation)

题目

Your companys network includes an Active Directory Domain Services (AD DS) domain. You manage Hyper-V servers by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You install Windows Server 2008 R2 Datacenter (Server Core Installation) on 100 new servers, and you add the servers to the domain. You need to add the Hyper-V role to the 100 new servers. You must accomplish this goal by using the least amount of administrative effort. What should you do?()

  • A、Run the Add-WindowsFeature RSAT-Hyper-V PowerShell cmdlet.
  • B、In Server Manager, use the Add Roles Wizard to add the Hyper-V role.
  • C、In the VMM Administrator Console, use the Add Hosts Wizard to individually add each new server to VMM.
  • D、In the VMM Administrator Console, use the Add Hosts Wizard to simultaneously add all 100 new servers to VMM.
如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system .Which two of these are characteristics of an IDS sensor?()

  • A、 has a permissive interface that is used to monitor networks
  • B、 is an active device in the traffic path
  • C、 passively listens to network traffic
  • D、 has a promiscuous interface that is used to monitor the network

正确答案:C,D

第2题:

Your network contains a computer named Computer1. Computer1 is assigned an IP address of 39 / 84 192.168.1.112/26.Your companys corporate policy states that the first usable address in each subnet is allocated to the default gateway.You need to configure the default gateway for Computer1.Which address should you choose?()

  • A、192.168.1.1
  • B、192.168.1.63
  • C、192.168.1.65
  • D、192.168.1.93

正确答案:C

第3题:

Your wireless network is not listed in the Connect to a network window of your computer. You need to connect to your wireless network.Which two actions should you perform?()

A.A

B.B

C.C

D.D

E.E


参考答案:C, D

第4题:

You have an Exchange Server 2010 organization.  Your company has a relationship with another company.  The partner company has an Exchange Server 2010 organization.  You need to recommend a security solution to meet the following requirements:  .Ensure that all e-mail delivery between your servers and the partner companys servers is encrypted .Ensure that all communication between your servers and the partner companys servers is authenticated What should you include in the solution?()

  • A、Active Directory Rights Management Services (AD RMS)
  • B、Domain Security
  • C、Forms-based Authentication
  • D、Secure/Multipurpose Internet Mail Extensions (S/MIME)

正确答案:B

第5题:

Your network contains a single Active Directory domain named contoso.com.The domain contains a DNS server named Server1 that hosts the contoso.com zone.The network is connected to the network of a partner company. The partner companys network contains a DNS server that hosts a zone named nwtraders.com.You need to ensure that computers in contoso.com can resolve the names of computers in nwtraders.com.The solution must not require any changes to the zone configuration of nwtraders.com.What should you configure on Server1?()

  • A、a conditional forwarder
  • B、a GlobalNames zone
  • C、a secondary zone
  • D、a zone delegation

正确答案:A

第6题:

Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()

  • A、 core layer
  • B、 bridging two VLANs on one switch
  • C、 between two Layer 2 devices with trunking
  • D、 between two Layer 2 devices without trunking

正确答案:C,D

第7题:

You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker.  You need to prevent your co-worker from modifying your wireless network profile.  What should you do?()

  • A、Disable the Connect even if the network is not broadcasting option.
  • B、In the Network and Sharing Center window, click the Diagnose and repair option.
  • C、Set the default wireless profile type to the Use all-users only profile (recommended) option. Recreate the wireless network.
  • D、Set the default wireless profile type to the Use all-users and per-user profiles option. Recreate the wireless network by using the Save this network for me only option.

正确答案:D

第8题:

You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()

  • A、STP
  • B、GVRP
  • C、SNMP
  • D、VTP
  • E、DHCP

正确答案:D

第9题:

Your company has an Active Directory forest. The company has servers that run Windows Server   2008 R2 and client computers that run Windows 7. The domain uses a set of GPO administrative  templates that have been approved to support regulatory compliance requirements.   Your partner company has an Active Directory forest that contains a single domain. The company has  servers that run Windows Server 2008 R2 and client computers that run Windows 7.   You need to configure your partner companys domain to use the approved set of administrative  templates.   What should you do()

  • A、Use the Group Policy Management Console (GPMC) utility to back up the GPO to a file. In each site,  import the GPO to the default domain policy.
  • B、Copy the ADMX files from your companys PDC emulator to the PolicyDefinitions folder on the partner  companys PDC emulator.
  • C、Copy the ADML files from your companys PDC emulator to the PolicyDefinitions folder on thepartner  companys PDC emulator.
  • D、Download the conf.adm, system.adm, wuau.adm, and inetres.adm files from the Microsoft Updates  Web site. Copy the ADM files to the PolicyDefinitions folder on the partner companys PDC emulator.

正确答案:B

第10题:

All servers on your companys network run Windows Server 2008 R2. All client computers run Windows Vista. The company is planning to virtualize an application that runs only on Windows 2000 Professional.  You need to recommend a virtualization solution that enables users to run the virtualized application while their computers are disconnected from the corporate network.  Which technology should you recommend?()

  • A、Remote Desktop Services (RDS)
  • B、Microsoft Application Virtualization (App-V)
  • C、Microsoft Virtual Desktop Infrastructure (VDI)
  • D、Microsoft Enterprise Desktop Virtualization (MED-V)

正确答案:D

更多相关问题