当前位置:MCITP(70-693)题库

问题:

[单选] You are planning to deploy two Windows Server 2008 R2 Hyper-V servers. You need to design the storage of VHD files for maximum security. What should you do?()

A . Store the VHD files on a dedicated NTFS volume
B . Store unencrypted VHD files on a volume that uses Windows BitLocker drive encryption
C . Encrypt the VHD files by using EFS on a volume that uses Windows BitLocker drive encryption
D . Encrypt the VHD files by using EFS on a volume that does not use Windows BitLocker drive encryptio

您有一台名为Computer1 的计算机运行Windows 7。Computer1 配置为从 Server1 获取更新。您在Server1上打开 WSUS 管理单元,并发现Computer1 未显示。您需要确保 Computer1 显示在 WSUS 管理单元中。您应该怎么做?() 在Server1 上,打开 Windows Update,然后选择“检查更新”。 在Server1 上,运行 Wsusutil.exe 并指定 /import 参数。 在Computer1 上,打开 Windows Update,然后选择“更改设置”。 在Computer1 上,运行 Wuauclt.exe 并指定 /detectnow 参数。 皮下出血的形成、性状及法医学意义 You want to upgrade 400 computers from Windows 95 to Windows 2000 Professional. Most of the computers in your company use the same hardware.  However, several different peripheral devices are used throughout the company. You want to verify that the hardware in use is compatible to Windows 2000 Professional. You want to accomplish this with least amount of administrative effort.  What should you do?()  Create several different computer configurations. Install Windows 2000 Professional and enable driver signing.。  Create a bootable floppy disk that contains and automatically runs winNT32.exe/checkupgradeOnlyQ. Send the floppy disk to each user on the network.。  Copy the contents of Windows 2000 Professional CD-ROM to a network share. From the network, modify your network logon scripts to run WinNT32.exe/Unattended:ReportOnly.。  Use setup manager to create a setup.inf file. Add the entry ReportOnly=Yes to the [Win9xUpg] section of the answer file. Run Winnt32.exe/unattended.setup.inf on all of the different computer configurations.。 党的纪律具有的特性是()。 自觉性。 严肃性。 规范性。 统一性。 You are creating a Web application that will run on an intranet. The Web application reads comma-delimited text files. The text files reside in a subdirectory below the Web application's root directory. Users must not be able to navigate directly to these files in a Web browser unless they are members of the Accounting role. You need to write an ASP.NET HTTP handler that will use the FileAuthorizationModule class. Which form of authentication should you use?() Anonymous。 Certificate。 Forms。 Microsoft Windows Integrated Security。 You are planning to deploy two Windows Server 2008 R2 Hyper-V servers. You need to design the storage of VHD files for maximum security. What should you do?()
参考答案:

  参考解析

本题暂无解析

在线 客服