当前位置:MCP(70-210)题库

问题:

[多选]

You are the administrator of your company's network. Your network has 20 Windows 2000 server computers in the contoso.com domain. Your network also has 250 Windows 98 computers. You want to perform a clean installation of Windows 2000 Professional on all of the Windows 98 computers. All of the Windows 98 computers are identical models and are PXE complaint.  
You want to accomplish the following goals:  
• An unattended installation of Windows 2000 Professional will be performed. 
• An unattended installation of company's standard applications will be performed during the     installation of Windows 2000 Professional. 
• Each computer will be assigned a unique security identifier description. 
• The unattended installation script will be modified so that the computers automatically join the    contoso.com domain.  
You take the following actions: 
• Install Windows 2000 Professional on a Windows 98 computer named computer1. • Install and configure computer standard applications on computer1. 
• Use Setup Manager on computer1 to create an unattended.txt file based on the current    configuration including domain membership. 
• Start the remaining Windows 98 computers and then install Windows 2000 Professional. Use    the unattended.txt file to provide the setting for the installation.  
Which result or results do these actions produce?()

A .  An unattended installation of Windows 2000 Professional will be performed.
B .  An unattended installation of company’s standard applications will be performed during the   Installation of Windows 2000 Professional.
C .  Each computer will be assigned a unique security identifier description.
D .  The unattended installation script will be modified so that the computers automatically join the  contoso.com domain.

如图片1到图片2是由一块块的长方块组成,要完成它要一个一个的复制移动不断的重复,虽然很简单可是很麻烦,我们可以创建一个()来帮我们完成这种重复性很高的工作。 自动。 组。 动作。 图层。 场地平整土方量计算方法一般采用()。 断面法。 方格网法。 体积法。 高程法。 世界银行的主要任务是向会员国政府提供()。 邵飘萍的对新闻活动的贡献。 You are the network administrator for your company. The network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2003. All client computers in the domain run Windows XP Professional. An application named Inventory.exe is installed on all computers in the domain to remotely gather software inventory information. The application runs as a service in the security context of the Local System. The startup type of the service is set to Automatic.In the Default Domain Policy Group Policy object (GPO), the security administrator has configured a software restriction policy that is applied to all computers in the domain. The policy contains a hash rule for the Inventory.exe application, and the hash rule is configured with a security level of Unrestricted. The client computers on the network are attacked by a worm that is distributed by e-mail messages received over the Internet. The worm detects the presence of Inventory.exe on a computer, then starts a new instance of the application in the security context of the logged-on user. The worm exploits a bug in the application to cause the computer to fail.You need to ensure that Inventory.exe cannot be started by the worm, while still allowing the application to run as a service.   What should you do?() In the computer settings section of the Default Domain Policy GPO, configure a software restriction policy that contains a zone rule for the Internet zone. Configure the zone rule with a security level of Disallowed.。 In the user settings section of the Default Domain Policy GPO, configure a software restriction policy that contains a zone rule for the Internet zone. Configure the zone rule with a security level of Disallowed.。 In the user settings section of the Default Domain Policy GPO, configure a software restriction policy that contains a hash rule for the Inventory.exe application. Configure the hash rule with a security level of Disallowed.。 In the computer settings section of the Default Domain Policy GPO, modify the existing software restriction policy hash rule for the Inventory.exe application so that the hash rule has a security level of Disallowed.。

You are the administrator of your company's network. Your network has 20 Windows 2000 server computers in the contoso.com domain. Your network also has 250 Windows 98 computers. You want to perform a clean installation of Windows 2000 Professional on all of the Windows 98 computers. All of the Windows 98 computers are identical models and are PXE complaint.  
You want to accomplish the following goals:  
• An unattended installation of Windows 2000 Professional will be performed. 
• An unattended installation of company's standard applications will be performed during the     installation of Windows 2000 Professional. 
• Each computer will be assigned a unique security identifier description. 
• The unattended installation script will be modified so that the computers automatically join the    contoso.com domain.  
You take the following actions: 
• Install Windows 2000 Professional on a Windows 98 computer named computer1. • Install and configure computer standard applications on computer1. 
• Use Setup Manager on computer1 to create an unattended.txt file based on the current    configuration including domain membership. 
• Start the remaining Windows 98 computers and then install Windows 2000 Professional. Use    the unattended.txt file to provide the setting for the installation.  
Which result or results do these actions produce?()

参考答案:

  参考解析

本题暂无解析

相关题目:

在线 客服