You are using ADU and are authenticated and associated to an access point. You are unable toobtain an IP address. Which of the following will cause this problem?()
第1题:
You want to check the EMP table in the user, Scott’s schema for block corruption. You also want to fix the corrupted blocks, if any. How will you accomplish the required task?()
第2题:
You deploy an Active Directory Federation Services (AD FS) Federation Service Proxy on a server named Server1. You need to configure the Windows Firewall on Server1 to allow external users to authenticate by using AD FS. Which inbound TCP port should you allow on Server1()
第3题:
An administrator account is granted the CREATE SESSION and SET CONTAINER system privileges.A multitenant container database (CDB) instant has the following parameter set:THREADED_EXECUTION = FALSEWhich four statements are true about this administrator establishing connections to root in a CDB that has been opened in read only mode?()
A. You can conned as a common user by using the connect statement.
B. You can connect as a local user by using the connect statement.
C. You can connect by using easy connect.
D. You can connect by using OS authentication.
E. You can connect by using a Net Service name.
F. You can connect as a local user by using the SET CONTAINER statement.
第4题:
You work as the exchange administrator at company.com.the company.com network contains an exchange server 2010 organization.you are responsible for managing the exchange organization for company.com.during the course of the week you receive an instruction from the cio to change the exchange specific cost for a site link named kinglink1.what should you do?()
第5题:
You have an Exchange Server 2010 organization and an Active Directory Rights Management Services(AD RMS) server. All users access their mailboxes by using Outlook Web App (OWA). You need to plan a security solution for the organization to meet the following requirements:.Secure messages by using administrator-defined templates .Ensure that e-mail messages sent by users can be stored in an encrypted format What should you include in the plan?()
第6题:
You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5. An exception management framework is not used in the Web application. You need to ensure thatthe application log the unhandled exceptions automatically to the event log. You need to configurethe Web.config file to accomplish this. Identify the configuration that will assist you in thisscenario?()
第7题:
Active Directory Rights Management Services (AD RMS) is deployed on your network. Users who have Windows Mobile 6 devices report that they cannot access documents that are protected by AD RMS. You need to ensure that all users can access AD RMS protected content by using Windows Mobile 6 devices. What should you do()
第8题:
Your company has an Active Directory Domain Services (AD DS) domain. You virtualize applications by using Microsoft Application Virtualization (App-V).You are creating an application virtualization package.Which should you use?()
A.Microsoft Application Virtualization Sequencer
B.Microsoft Application Virtualization Desktop Client
C.Microsoft System Center Application Virtualization Streaming Server
D.Microsoft System Center Application Virtualization Management Server
第9题:
Certkiller .com has a main office and a branch office. Certkiller .com’s network consists of a single Active Directory forest. Some of the servers in the network run Windows Server 2008 and the rest run Windows server 2003. You are the administrator at Certkiller .com. You have installed Active Directory Domain Services (AD DS) on a computer that runs Windows Server 2008. The branch office is located in a physically insecure place. It has not IT personnel onsite and there are no administrators over there. You need to setup a Read-Only Domain Controller (RODC) on the Server Core installation computer in the branch office. What should you do to setup RODC on the computer in branch office()
第10题:
Your network contains an Active Directory domain named contoso.com. The network contains client computers that run either Windows Vista or Windows 7. Active Directory Rights Management Services (AD RMS) is deployed on the network. You create a new AD RMS template that is distributed by using the AD RMS pipeline. The template is updated every month. You need to ensure that all the computers can use the most up-to-date version of the AD RMS template. You want to achieve this goal by using the minimum amount of administrative effort. What should you do()