IBM(000-020)

单选题System, machine, and user policies can be configured though AccessAdmin. How are changes  synchronized with the AccessAgent?()A written by the Administrators on the INI filesB propagated only with the Active Directory network serviceC propagated to the

题目
单选题
System, machine, and user policies can be configured though AccessAdmin. How are changes  synchronized with the AccessAgent?()
A

written by the Administrators on the INI files

B

propagated only with the Active Directory network service

C

propagated to the clients on the next Administrator access

D

propagated to clients the next time AccessAgent synchronizes with the IMS Server

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

The network administrator maps VLAN 10 through 20 to MST instance 2.  How will this information be propagated to all appropriate switches?()

  • A、 Information will be carried in the RSTP BPDUs.
  • B、 It will be propagated in VTP updates.
  • C、 Information stored in the Forwarding Information Base and the switch will reply on query.  
  • D、 Multiple Spanning Tree must be manually configured on the appropriate switches.

正确答案:D

第2题:

System, machine, and user policies can be configured though AccessAdmin. How are changes  synchronized with the AccessAgent?()

  • A、written by the Administrators on the INI files
  • B、propagated only with the Active Directory network service
  • C、propagated to the clients on the next Administrator access
  • D、propagated to clients the next time AccessAgent synchronizes with the IMS Server

正确答案:D

第3题:

How can it be determined if the IMS Server (below Version 8.0) is configured for "Active Directory (AD) deployment type 1" or "AD deployment type 2"?()

  • A、Check the server.xml on the IMS Server.
  • B、Check the database table IMSSyncDataType.
  • C、Check the System policies in the AccessAdmin.
  • D、Check the IMS Server settings of the IMS Configuration Utility.

正确答案:D

第4题:

You are the network administrator for Southridge Video. The network consists of a single Active  Directory domain named southridgevideo.com. The domain contains one domain controller. All servers  run Windows Server 2003. All client computers run Windows XP Professional. The company uses Group  Policy objects (GPOs) to configure user and computer settings. The Active Directory database and the  SYSVOL shared folder are stored on separate hard disks. The hard disk containing the SYSVOL folder  fails. Some Group Policy settings are still applied, but new users do not receive the Group Policy settings. You replace the failed disk. You discover that there are no valid backups of the SYSVOL folder. You have  a list of GUIDs and friendly names for each GPO. On the new disk, you create a new shared folder named  SYSVOL in the same location as the previous SYSVOL folder. You need to configure the network so that the user and computer settings will be applied to all users.  Which three courses of action should you take?()

  • A、 In the SYSVOL folder, create a folder named southridgevideo.com. In the southridgevideo.com folder, create a folder named Policies.
  • B、 In the SYSVOL folder, create a folder named System State. In the System State folder, create a folder named Policies.
  • C、 In the Policies folder, create a folder for each GPO. Name the folders by using the friendly name of each GPO. In the folder for each GPO, create a folder named MACHINE and a folder named USER.
  • D、 In the Policies folder, create a folder for each GPO. Name the folders by using the GUID of each GPO. In the folder for each GPO, create a folder named MACHINE and a folder named USER.
  • E、 Use Active Directory Users and Computers to open each GPO. Close each GPO without changing any settings.
  • F、 Use Active Directory Users and Computers to open each GPO. Change at least one setting in each GPO before closing it.

正确答案:A,D,F

第5题:

Your network contains a single Active Directory domain. Active Directory Rights Management  Services (AD RMS) is deployed on the network.     A user named User1 is a member of only the AD RMS Enterprise Administrators group. You need  to ensure that User1 can change the service connection point (SCP) for the AD RMS installation.  The solution must minimize the administrative rights of User1.     To which group should you add User1()

  • A、AD RMS Auditors
  • B、AD RMS Service Group
  • C、Domain Admins
  • D、Schema Admins

正确答案:C

第6题:

The IBM Tivoli Access Manager for Enterprise Single Sign-On IMS is configured to cache user’s wallets. The SLA for network reliability between the IMS Server and the desktop machines is 95%. The customer wants to use Graphical Identification and Authentication (GINA) replacement, and has enabled Active Directory (AD) password synchronization. The user has a cached wallet on their private desktop. Which statement is true when the network is unavailable?()

  • A、The user would not be able to log in to the wallet.
  • B、The user is able to log in with their wallet password, but the wallet is not synchronized with the server.
  • C、A user must be re-assigned to another policy template in order to change any aspects of the applied policy.
  • D、The user experiences normal operation, but AccessAgent will be unable to store newly captured  passwords.

正确答案:B

第7题:

How can you verify that you have correctly configured SSH access to your Junos device?()

  • A、user@router# show system services
  • B、user@router> show configuration services
  • C、user@router# show configuration system services
  • D、user@router# show system login

正确答案:A

第8题:

You install a read-only domain controller (RODC) named RODC1. You need to ensure that a user  named User1 can administer RODC1. The solution must minimize the number of permissions  assigned to User1.     Which tool should you use()

  • A、Active Directory Administrative Center
  • B、Active Directory Users and Computers
  • C、Dsadd
  • D、Dsmgmt

正确答案:D

第9题:

You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? () 

  • A、Enable the Require domain controller to unlock policy.
  • B、Set the Number of previous logons to cache policy to 0.  
  • C、Remove all user and group accounts from the Log on locally user right. 
  • D、Remove all user and group accounts from the Access this computer from the network user right. 

正确答案:B

第10题:

Your network consists of a single Active Directory domain. All servers run Windows Server 2008 R2. A server named Server1 has the Remote Desktop Services server role installed.   You notice that several users consume more than 30 percent of the CPU resources throughout the day. You need to prevent users from consuming more than 15 percent of the CPU resources. Administrators must not be limited by the amount of CPU resources that they can consume. What should you do?()

  • A、Implement Windows System Resource Manager (WSRM),and configure user policies.
  • B、Implement Windows System Resource Manager (WSRM),and configure session policies.
  • C、Configure Performance Monitor,and create a user-defined Data Collector Set.
  • D、Configure Performance Monitor,and create an Event Trace Session Data Collector Set.

正确答案:A

更多相关问题