题目内容

YourcompanyusesMicrosoftApplicationVirtualization(App-V). Yourenvironmentincludesmultipleclientcomputerconfigurations,asshowninthefollowingtable. Youneedtodeploya32-bitapplicationtoallclientcomputers. Whichreferencecomputerconfigurationshouldyouuse?()

A. Config1withApp-VSequencer4.532-bit
B. Config2withApp-VSequencer4.664-bit
Config3withApp-VSequencer4.632-bit
D. Config4withApp-VSequencer4.664-bit

查看答案
更多问题

You are the desktop administrator for your company. The company's network contains 500 Windows XP Professional computers. The information security department releases a new security template named NewSec.inf. You import NewSec.inf into a security database named NewSec.sdb. You analyze the result, and you review the changes that the template makes. You examine the security policies that are defined in NewSec.inf. You discoverthat the settings in NewSec.inf have not been implemented on your computer. You need to ensure that the settings in NewSec.inf overwrite the settings in your computer's local security policy. What are two possible ways to achieve this goal?()

A. Run the Secedit /configure /db C:\NewSec.sdb command.
B. Run the Secedit /refreshpolicy machine_policy command.
Copy NewSec.inf to the C:\Windows\Inf folder.
D. Copy NewSec.sdb to the C:\Windows\System32\Microsoft\Protect folder.
E. Use the Security Configuration and Analysis console to open NewSec.sdb and then to perform a Configure operation.
F. Use the Security Configuration and Analysis console to export NewSec.sdb to the Defltwk.inf security template.

You are employed as a system administrator at Certkiller.com. You are in the process of creatingan ASP.NET application using Microsoft .NET Framework v3.5. You decide to create a JavaScript file named DataScript.js. The following code segment waswritten to create this file:functiondivide(x, y) { if (y == 0) { var errorMsg = Messages.DivideByZero; alert(errorMsg);return null; } returnx/y; } The DataScript.js file is inserted as a resource in a Class Library project. The namespace for thisproject is Data.Resources. The JavaScript Messages object is used by the JavaScript function inorder to retrieve messages from a resource file. This resource file is named TestMsgResources.resx. In the ASP.NET application you add an AJAX Web form as well as referencing the Class Library. Thereafter an ASP.NET AJAX ScriptReference element is added tothe AJAX Web form. You receive an instruction from management to make sure that the JavaScript function is able toaccess the error messages defined in the resource file. You should thus determine the appropriatecode segment that should be added to the AssemblyInfo.vb file. What should you do?()

A
B
C
D

You are the desktop administrator for one of your company's branch offices. The network in your branch office contains 100 Windows XP Professional computers. The computers are configured with the Compatws.inf security template. One of the network administrators in the company's main office creates a new security template named CompanySec.inf. The new template is designed to be applied to each of the company's Windows XP Professional computers. The users in your branch office have different security requirements from the users in the main office. You need to find out whether the new security template will violate the security requirements of the users in the branch office. What should you do?()

A. Run the Secedit.exe command in validation mode and specify the new security template.
B. Run the Secedit.exe command in configuration mode and specify the new security template.
C. Use the Security Configuration and Analysis console to import both templates into a security database, and then perform an Analyze operation.
D. Use the Security Configuration and Analysis console to import both templates into a security database, and then perform a Configure operation.

You have an Exchange Server 2010 organization.You need to ensure that a user can open a resource mailbox.What are two possible ways to achieve this goal?()

A. From Microsoft Office Outlook, modify the properties of the resource mailbox.
B. From the Exchange Management Console, create a new sharing policy.
C. From the Exchange Management Shell, set the Resource Delegates parameter for the resource mailbox.
D. From the Active Directory Users and Computers console, reset the password for the account associated to the resource mailbox, and then provide the password to the user.

答案查题题库