当前位置:MCSE(70-270)题库

问题:

[单选]

You are the desktop administrator for one of your company's branch offices. The network in the branch office contains 20 Windows XP Professional computers. Windows XP Professional was installed on the computers by using a RIS image. The computers also use a security template named Standard.inf, which you created and applied to the computers. The company's information security department releases a new security template named Corporate.inf. You are instructed to apply Corporate.inf to all 20 Windows XP Professional computers in your office. You are also instructed to make a list of all policies that are defined in Corporate.inf but that are not already enforced on the Windows XP Professional computers. You import Corporate.inf into the Security Configuration and Analysis console on your Windows XP Professional computer. The analysis is shown in the exhibit.

You need to document the security policies that will be enforced for the first time when Corporate.inf is applied to the computers in your office.
Which policies should you document?()

A . the policies that are displayed with an X or an exclamation point in the analysis
B . the policies that are displayed with a check mark in the analysis 
C . the policies that are displayed as Enabled in the Computer Setting column
D . the policies that are displayed as Disabled in the Computer Setting colum

You configure a Windows Server 2008 R2 Hyper-V server with several virtual machines (VMs). A software vendor releases a software update for an application that runs on only one of the VMs. You need to plan a strategy that enables you to install and test the update without interrupting business operations and without corrupting data.   What should you do first?() Export the VM。 Create a snapshot of the affected VM。 Enable the Windows Volume Snapshot Service on the affected VM。 Enable the Windows Volume Snapshot Service on the Hyper-V server。 《建设工程工程量清单计价规范(GB50500-2013)》明确规定招标工程量清单必须作为招标文件的组成部分,其准确性和完整性由招标人负责。 The IP network 210.106.14.0 is subnetted using a /24 mask. How many usable networks and host addresses can be obtained from this?() 1 network with 254 hosts。 4 networks with 128 hosts。 2 networks with 24 hosts。 6 networks with 64 hosts。 8 networks with 36 host。 下列哪些机制可以协调经营者与所有者目标的背离()。 经理人才市场对经理的评价。 经理遭解雇的威胁。 对经理的奖励制度。 法律调节。 适合于编码策略的企业,主要依靠哪种知识管理模式?() 人到文档。 人到人。 规模效应。 专家模式。

You are the desktop administrator for one of your company's branch offices. The network in the branch office contains 20 Windows XP Professional computers. Windows XP Professional was installed on the computers by using a RIS image. The computers also use a security template named Standard.inf, which you created and applied to the computers. The company's information security department releases a new security template named Corporate.inf. You are instructed to apply Corporate.inf to all 20 Windows XP Professional computers in your office. You are also instructed to make a list of all policies that are defined in Corporate.inf but that are not already enforced on the Windows XP Professional computers. You import Corporate.inf into the Security Configuration and Analysis console on your Windows XP Professional computer. The analysis is shown in the exhibit.

You need to document the security policies that will be enforced for the first time when Corporate.inf is applied to the computers in your office.
Which policies should you document?()

参考答案:

  参考解析

本题暂无解析

在线 客服