You are using AD

题目

You are using ADU and are authenticated and associated to an access point. You are unable toobtain an IP address. Which of the following will cause this problem?()

  • A、AES encryption enabled
  • B、TKIP enabled
  • C、third-party wireless supplicant enabled
  • D、802.1X authentication type enabled
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You want to check the EMP table in the user, Scott’s schema for block corruption. You also want to fix the corrupted blocks, if any. How will you accomplish the required task?()

  • A、by using the ANALYZE utility
  • B、by using the DBVERIFY utility
  • C、by using the DB_BLOCK_CHECKING parameter
  • D、by using the DBMS_REPAIR package

正确答案:D

第2题:

You deploy an Active Directory Federation Services (AD FS) Federation Service Proxy on a  server named Server1.   You need to configure the Windows Firewall on Server1 to allow external users to authenticate by  using AD FS.     Which inbound TCP port should you allow on Server1()

  • A、88
  • B、135
  • C、443
  • D、445

正确答案:C

第3题:

An administrator account is granted the CREATE SESSION and SET CONTAINER system privileges.A multitenant container database (CDB) instant has the following parameter set:THREADED_EXECUTION = FALSEWhich four statements are true about this administrator establishing connections to root in a CDB that has been opened in read only mode?()

A. You can conned as a common user by using the connect statement.

B. You can connect as a local user by using the connect statement.

C. You can connect by using easy connect.

D. You can connect by using OS authentication.

E. You can connect by using a Net Service name.

F. You can connect as a local user by using the SET CONTAINER statement.


参考答案:C, D, E, F

第4题:

You work as the exchange administrator at company.com.the company.com network contains an exchange server 2010 organization.you are responsible for managing the exchange organization for company.com.during the course of the week you receive an instruction from the cio to change the exchange specific cost for a site link named kinglink1.what should you do?()

  • A、you should consider setting up a site link bridge using the active directory sites and services snap-in.
  • B、you should consider running the set-ad site cmdlet on the exchange management shell.
  • C、you should consider having the properties of kinglink1 modified using the active directory users and computers snap-in.
  • D、you should consider running the set-ad site link cmdlet on the exchange management shell.

正确答案:D

第5题:

You have an Exchange Server 2010 organization and an Active Directory Rights Management Services(AD RMS) server.  All users access their mailboxes by using Outlook Web App (OWA).  You need to plan a security solution for the organization to meet the following requirements:.Secure messages by using administrator-defined templates  .Ensure that e-mail messages sent by users can be stored in an encrypted format  What should you include in the plan?()

  • A、a legal hold
  • B、Domain Security
  • C、Outlook Protection Rules
  • D、Secure/Multipurpose Internet Mail Extensions (S/MIME)

正确答案:C

第6题:

You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5.  An exception management framework is not used in the Web application. You need to ensure thatthe application log the unhandled exceptions automatically to the event log. You need to configurethe Web.config file to accomplish this. Identify the configuration that will assist you in thisscenario?()

  • A、You should consider using the <healthMonitoring enabled="true"/> configuration.
  • B、You should consider using the <deployment retail="true"/> configuration.
  • C、You should consider using the <customErrors mode="On"/> configuration.
  • D、You should consider using the <trace enabled="true"/> configuration.

正确答案:A

第7题:

Active Directory Rights Management Services (AD RMS) is deployed on your network. Users who have Windows Mobile 6 devices report that they cannot access documents that are protected by  AD RMS.   You need to ensure that all users can access AD RMS protected content by using Windows  Mobile 6 devices.  What should you do()

  • A、Modify the security of the ServerCertification.asmx file.
  • B、Modify the security of the MobileDeviceCertification.asmx file.
  • C、Enable anonymous authentication for the _wmcs virtual directory.
  • D、Enable anonymous authentication for the certification virtual directory.

正确答案:B

第8题:

Your company has an Active Directory Domain Services (AD DS) domain. You virtualize applications by using Microsoft Application Virtualization (App-V).You are creating an application virtualization package.Which should you use?()

A.Microsoft Application Virtualization Sequencer

B.Microsoft Application Virtualization Desktop Client

C.Microsoft System Center Application Virtualization Streaming Server

D.Microsoft System Center Application Virtualization Management Server


参考答案:A

第9题:

Certkiller .com has a main office and a branch office. Certkiller .com’s network consists of a single Active Directory forest. Some of the servers in the network run Windows Server 2008 and the rest run Windows server 2003.  You are the administrator at Certkiller .com. You have installed Active Directory Domain Services (AD DS) on a computer that runs Windows Server 2008. The branch office is located in a physically insecure place. It has not IT personnel onsite and there are no administrators over there. You need to setup a Read-Only Domain Controller (RODC) on the Server Core installation computer in the branch office. What should you do to setup RODC on the computer in branch office()

  • A、Execute an attended installation of AD DS
  • B、Execute an unattended installation of AD DS
  • C、Execute RODC through AD DS
  • D、Execute AD DS by using deploying the image of AD DS
  • E、none of the above

正确答案:B

第10题:

Your network contains an Active Directory domain named contoso.com. The network contains  client computers that run either Windows Vista or Windows 7. Active Directory Rights  Management Services (AD RMS) is deployed on the network.     You create a new AD RMS template that is distributed by using the AD RMS pipeline. The  template is updated every month.   You need to ensure that all the computers can use the most up-to-date version of the AD RMS  template. You want to achieve this goal by using the minimum amount of administrative effort.     What should you do()

  • A、Upgrade all of the Windows Vista computers to Windows 7.
  • B、Upgrade all of the Windows Vista computers to Windows Vista Service Pack 2 (SP2).
  • C、Assign the Microsoft Windows Rights Management Services (RMS) Client Service Pack 2 (SP2) to all users by usin
  • D、Assign the Microsoft Windows Rights Management Services (RMS) Client Service Pack 2 (SP2) to all computers by

正确答案:B

更多相关问题