最新MCITP_题库_Microsoft_70-642_题库

合集下载

MCITP认证考试科目介绍

MCITP认证考试科目介绍

MCITP认证微软IT技术专家相关考试科目介绍微软认证IT 专家 (Microsoft Certifications for IT Professionals, MCITP)全新的微软认证技术工程师 (MCTS) 和微软认证 IT 专家 (MCITP) 认证提供 IT 专家一个更清楚明确的架构,让他们展现其技术技巧、以及针对特殊开发人员之工作角色时所需的技能。

如数据库管理员或企业邮件管理员。

同时还可以通过升级考试获得更新版本的MCSE Windows Server 2012认证和MCSE SQL Server 2012认证。

大多数 MCITP 认证将在2014 年 7 月 31 日退休。

您退休的认证将继续在微软MCP网站上保留成绩单和认证记录。

一旦认证及相关的考试已退休,它们将被添加到退休的考试和退休的认证的名单。

MCITP认证具体科目设置下面的表格中列举了MCITP认证的个人技术方向的认证项目,您如要通过一项或多项考试才能获得相关认证。

Windows Client: These certifications will no longer be available for you to earn as of July 31, 2013.Certification title Required examMCITP: Enterprise Desktop Support Technician on Windows 7 680 685MCITP: Enterprise Desktop Administrator on Windows 7 680686MCITP: Consumer Support Technician on Windows Vista 620623MCITP: Enterprise Support Technician on Windows Vista 620622Windows Server: These certifications will no longer be available for you to earn as of July 31, 2013.Certification title RequiredexamMCITP: Enterprise Desktop Support Technician on Windows 7* 640642643647plus either 620or624or680or681MCITP: Server Administrator on Windows Server 2008* 640642646MCITP: Virtualization Administrator on Windows Server 2008 R2 669 693and either659or652*By passing these exams, you’ll earn your MCSA: Windows Server 2008 certification.Microsoft SQL Server: These certifications will no longer be available for you to earn as of July 31, 2013.Certification title RequiredexamMCITP: Database Administrator 2008 432 450MCITP: Database Developer 2008 433451Microsoft Office Project Server: These certifications will no longer be available for you to earn as of January 31, 2013.Certification title RequiredexamMCITP: Enterprise Project Management with Microsoft Office Project Server 2007 632 633634 Microsoft Exchange Server: Retirement dates for these exams will be announced in 2013.Certification title RequiredexamMCITP: Enterprise Messaging Administrator on Exchange 2010 662 663SharePoint Server: Retirement dates for these exams will be announced in 2013. Certification title RequiredexamMCITP: SharePoint Administrator 2010 667 668Microsoft Lync Server: Retirement dates for these exams will be announced in 2013. Certification title RequiredexamMCITP: Lync Server Administrator 2010 664 665代考MCITP认证:。

mcitp---win7题库

mcitp---win7题库

网络技能课阶段性测试Exam AQUESTION 1你要防止用户使用FTP上传文件到Internet上的FTP站点,但是允许他们使用SMTP协议发送出站e-mail。

你将配置防火墙的以下哪一条规则以达成这一目标?A.入站规则B.出站规则C.隔离规则D.认证豁免规则Answer:BQUESTION 2要使受BitLocker To Go保护的FAT移动磁盘在所有的操作系统上都能启用读取的权限,你应该配置下列哪个BitLocker策略?。

A.配置使用可移动设备密码B.允许来自早期版本的windows访问bitlocker保护的移动设备C.选择怎样的bitlocker移动设备能被发现D.在移动设备上控制Bitlocker应用Answer:BQUESTION 3你的计算的硬件配置如下:512 MB of RAM20 GB 硬盘933-MHz CPU主频64-MB 显卡显存你想在这台计算机上安装Windows 7。

你需要检查哪些硬件组件不能满足Windows 7的最低硬件需求。

你应该选择以下哪个组件?A.内存B.CPUC.硬盘D.显卡Answer:ABQUESTION 4你想在一台新的机器上安装双系统:Microsoft Windows XP Professional和Microsoft Windows 7。

你需要执行以下哪个步骤?(每个答案都是一个完整的解决方案.,选两项.)A.创建两个分区。

在第一个分区上安装Windows XP,再从光驱引导启动计算机,然后将Windows 7安装在第二个分区里。

B.创建两个分区。

在第一个分区上安装Windows 7,再从光驱引导启动计算机,然后将Windows XP 安装在第二个分区里。

C.创建一个分区。

在这个分区上安装Windows XP,在Windows XP的系统里启动Windows 7的安装向导,将Windows 7安装到同一个分区。

D.创建两个分区。

在第一个分区上安装Windows XP,在Windows XP的系统里启动Windows 7的安装向导,将Windows 7安装到第二个分区里。

最新MCITP 题库 Microsoft 70-647 题库

最新MCITP 题库 Microsoft 70-647 题库

70-647QUESTION 1Your company has three offices. Each office is configured as an Active Directory site.The network consists of one Active Directory domain. All domain controllers runWindows Server 2008 R2. The company has five departments.You use a domain-level Group Policy object (GPO) to install Microsoft Office on all clientcomputers. Youneed to deploy a GPO strategy to meet the following requirements:Install a custom application in one of the departments.Restrict access to removable storage devices for all users.Implement separate Windows Internet Explorer proxy settings for each physicallocation.What should you do?A. Create a new group for each department. Create a new GPO for each site. Create a new GPO for the domain aB. Create a new organizational unit (OU) for each department. Create a new GPO for each site and a new GPO foOU and use the GPO to install the application.C. Create a new organizational unit (OU) for each department. Create a single GPO for all the sites and a new GPdepartment OU and use the GPO to install the custom application.D. Create a new child domain for each department. Create a new GPO for each site and a new GPO for each newchild domains and use the GPO to install the custom application.Answer: BSection: 173 Q'sQUESTION 2Your network consists of one Active Directory forest named .The relevant portion of the network is configured as shown in the exhibit.(Click the Exhibit button.)Users in the domain frequently access resources on the products.corp. domain.Users report slow access times when they access resources on the products.corp. domain.You need to minimize access times when users access resources on the products. domain. What should you do?A. Create a realm trust.B. Create a shortcut trust.C. Create a new DNS application partition. Add the zone to the application partition.D. Enable Universal Group Membership Caching for all Active Directory sites.Answer: BSection: 173 Q'sQUESTION 3Your network consists of one Active Directory domain.All domain controllers run Windows Server 2008 R2 and are configured as global catalogservers.The relevant portion of the network is configured as shown in the exhibit.(Click the Exhibit button.)The Bridge all site links option is enabled.You are designing a failover strategy for domain controller availability.You need to ensure that client computers in SiteH only authenticate to DC1 or DC2 if DC8fails.What should you do?A. Change the B-H site link cost to 50.B. Remove the global catalog server attribute from DC3, DC4, DCS, DC6, DC7, and DC8.C. Disable the Bridge all site links option. In SiteB, install a new writable domain controller that runs Windows ServD. Prevent DC3, DC4, DC5, DC6, DC7, and DC8 from registering generic (non-site-specific) domain controller locaAnswer: DSection: 173 Q'sQUESTION 4Your company has a main office and nine branch offices. Each office is configured as aseparate TCP/IP subnet.You plan to deploy Active Directory domain controllers in all offices.You install the first domain controller for the forest in the main office.You need to prepare the environment for the deployment of domain controllers in all offices.The solution must ensure that users always authenticate to a domain controllerin their local office, unless it is unavailable.What should you do?A. Create 10 subnet objects and one site object. Link all subnet objects to the site. Install domain controllers in allB. Create a subnet object and a site object for each office. Link each subnet object to its respective site.Install domain controllers in all offices.C. Install domain controllers in all offices. Create 10 subnet objects and one site object. Link all subnet objects to thD. Install domain controllers in all offices. Create a subnet object and a site object for each office. Link each subneAnswer: BSection: 173 Q'sQUESTION 5Your network consists of one Active Directory domain. The functional level of the domain isWindows Server 2008 R2.Your company has 10 departments. Each department has a department manager and adepartment administrator.Some department administrators are responsible formultiple departments. You have an organizational unit (OU) named AllUsers that contains alluser accounts.You need to recommend a solution to simplify themanagement of all users in the domain. The solution must meet the following requirements:Department managers must only be able to reset passwords for users in theirrespective departments.Department administrators must only be able to modify user accounts in theirrespective departments.Only the respective department administrators and managers must be able tomanage the accounts of users who are transferred to their departmentsfrom other departments.What should you recommend?A. · Create an Ou for each department.· Delegate password control for each new Ou to the respective department manager.· Delegate administration of each new OU to the respective department administrator.B. · Create an OU for each department.· When the same administrator is responsible for multiple departments, create only one OU for those departmen · Delegate password control for each new OU to the respective department manager.· Delegate administration of each new OU to the respective department administrator.C. · Create an OU for each department.· When the same administrator is responsible for multiple departments, create a new OU and nest the OUs of th · Delegate password control for each new OU to the respective to the respective department manager.· Delegate administration of each new OU to the respective department administrator.D. · Create a global security group for each department.· Add all the users, department managers, and administrators from each department to the global security group · Delegate password control to the department managers of the AllUsers OU.· Delegate administration to the department administrators of the AllUsers OU.Answer: ASection: 173 Q'sQUESTION 6Your network consists of one Active Directory forest. The functional level of the forest isWindows Server 2003.You upgrade all domain controllers from Windows Server 2003 SP2 to Windows Server 2008R2.You plan to deploy the first read-only domain controller (RODC) in the forest.You need to prepare the network for the installation of the RODC.What should you do?A. Run adprep /rodcprep on any computer in the forest.B. Run adprep /forestprep on the schema operations master server.C. Raise the forest functional level to Windows Server 2008 R2.D. Raise the domain functional level to Windows Server 2008 R2.Answer: ASection: 173 Q'sQUESTION 7Your network consists of one Active Directory domain. The functional level of the domain is Windows Server 2008 R2.Your company has three departments named Sales, Marketing, and Engineering.All users in the domain are in an organizational unit (OU) named AllUsers.You have three custom applications. You deploy all custom applications by using a Group Policy object (GPO) named AppInstall.The Sales department purchases a new application that is only licensed for use by the Sales department.You need to recommend a solution to simplify the distribution ofthe new application. The solution must meet the following requirements:The application must only be distributed to licensed users.The amount of administrative effort required to manage the users must remain unaffected.The three custom applications must be distributed to all existing and new users onthe network.What should you recommend?A. Create a new child domain for each department and link the AppInstall GPO to each child domain.Create a new GPO. Link the new GPO to the Sales domain.B. Create a new child OU for each department. Link the AppInstall GPO to the Marketing OU and the Engineering OSales OU.C. Create a new group for each department and filter the AppInstall GPO to each group. Create a new GPO. Link ththe Sales group.D. Create a new group for each department. Filter the AppInstall GPO to the Marketing group and the Engineeringthe domain. Filter the new GPO to the Sales group.Answer: CSection: 173 Q'sQUESTION 8Your company named Contoso, Ltd. and another company named Fabrikam, Inc. establish apartnership.The Contoso network consists of one Active Directory forestnamed . The Fabrikam network consists of one Active Directory forest named.Users from plan to share files with users from . You need toprepare the environment so that users from can protect confidentialfiles from being copied or forwarded to unauthorized users.What should you do?A. Create a one-way forest trust from Contoso. Set the NTFS permissions to read-only for all confidential files.B. Create a one-way forest trust from Fabrikam. Set the NTFS permissions to read-only for al confidential files.C. Deploy Active Directory Federation Services (AD FS). Deploy Active Directory Rights Management Services (AD. Deploy Active Directory Federation Services (AD FS). Publish the files by using Microsoft SharePoint FoundatioAnswer: CSection: 173 Q'sQUESTION 9Your network consists of one Active Directory domain.All domain controllers run Windows Server 2008 R2.You need to deploy Active Directory Certificate Services on the network to support thefollowing requirements:Maintain availability if a single server fails.Delegate the enrollment of certificates for separate groups of users.Restrict the types of certificates that can be issued by a certificate manager.What should you do?A. Deploy two servers that run Windows Server 2008 R2 Enterprise. Configure a failover cluster.Configure an enterprise certification authority (CA).B. Deploy two servers that run Windows Server 2008 R2 Enterprise. Configure a failover cluster.Configure a standalone root certification authority (CA).C. Deploy two servers that run Windows Server 2008 R2 Enterprise. Configure an enterprise root certification authD. Deploy two servers that run Windows Server 2008 R2 Standard. Configure a standalone root certification authoAnswer: ASection: 173 Q'sQUESTION 10Your network consists of one Active Directory domain.All domain controllers run either Windows Server 2008 R2 or Windows Server 2003 SP2.A custom application stores passwords in Active Directory.You plan to deploy read-only domain controllers (RODCs) on the network.You need to prevent custom application passwords frombeing replicated to the ROOCs.What should you do?A. Upgrade the schema master to Windows Server 2008 R2. Configure a fine-gained password policy.B. Upgrade the infrastructure master to Windows Server 2008 R2. Mark the custom application password attributeC. Upgrade all domain controllers to Windows Server 2008 R2. Add the custom application password attribute to tattribute as confidential.D. Upgrade all domain controllers to Windows Server 2008 R2. Set the functional level of the forest and the domaifine-grained password policyAnswer: CSection: 173 Q'sQUESTION 11Your network contains two servers named Server1 and Server2. Server1l is a reverse proxy.Server2 runs Windows Server 2008 R2 and has the Web server (IIS) server role installed.Server2 hosts a secure Web site.You want users to connect to Server2 by using the https:// URL.You need to prepare the environment for the deployment of server certificates to meet thefoflowmg requirements:Users connecting from the local network must only connect directly to Server2.Users must be able to access the Web site on Server2when they connect from the Internet or the internal network. What should you do?A. Install a server certificate for the name on Server1 and Server2.B. Install a server certificate for the name on Server1 and Server2.C. Install a server certificate for the name on Server1. Install a server certificate for the nameD. Install a server certificate for the name on Server1. Install a server certificate for the name seAnswer: ASection: 173 Q'sQUESTION 12Your company has one main office and four branch offices.Each branch office has a read-only domain controller (RODC).The network consists of one Active Directory domain.All domain controllers run Windows Server 2008 R2. Some branch office users work in adepartment named Sales.Sales department users must be able to log on to all computers in their respective branchoffices, even if a wide area network (WAN) link fails.The company security policy has the following requirements:User account passwords must be replicated to the minimum number of locations.A minimum number of passwords must be replicated to the branch office domaincontrollers. You need to configure a password replication policy thatsupports the company security policy.What should you do?A. Install a writable domain controller in all branch offices. Create one global group that contains all Sales departmand apply the policy to the group.B. Install a writable domain controller in all branch offices, Create one global group that contains the computers ofAllowed RODC Password Replication Group in the domain.C. Create one global group for each branch office that contain the Sales department users and computers in the coWindows Authorization Access Group in the domain.D. Create one global group for each branch office that contains the Sales department users and computers in the cthe Password Replication Policy in the corresponding branch office.Answer: DSection: 173 Q'sQUESTION 13You network consist of one Active Directory domain and three Network Information Services (NIS) domains.All domain controllers run Windows Server 2008 R2. All NIS domain servers run UNIX-based operating systems.You need to plan the integration of the Active Directory domain and the NIS domains. Thesolution must meet the following requirements:Minimize the Costs required to implement the solution.Minimize the number of additional Windows servers required. · Provide centralized administration of Active Directory domain objects and NIS domainobjects.What should you include in your plan?A. Add the Server for Network Information Services role server.B. Install the subsystem for UNIX-based applications.C. Install Active Directory Federation Services (AD FS).D. Implement a Microsoft Forefront Identity Manager 2010 server.Answer: DSection: 173 Q'sQUESTION 14Your company has a main office and 10 branch offices.The network consists of one Active Directory domain.All domain controllers run Windows Server 2008 R2 and are located in the main office.Each branch office contains one member server.Branch office administrators in each branch office are assigned the necessary rights toadministrators only their member servers.You deploy one read-only domain controller (RODC) in each branch office.You need to recommend a security solution for the branch office Windows Server 2008R2 domain controllers. The solution must meet the following requirements:Branch office administrators must be granted rights on their local domain controlleronly.Branch office administrators must be able to administer the domain controller in theirbranch office. This includes changing device drivers and runningWindows updates.What should you recommend?A. Add each branch office administrator to the Administrators group of the domain.B. Add each branch office administrator to the local Administrators group of their respective domain controller.C. Grant each branch office administrator Full Control permission on their domain controller computer object in ActD. Move each branch office domain controller computer object to a new organizational unit (OU). Grant each localpermission on the new OU.Answer: BSection: 173 Q'sQUESTION 15Your network contains servers that run Windows Server 2008 R2 and client computers that runWindows 7.You deploy a public key infrastructure by using Certificate Services servers that run WindowsServer 2008 R2.You need to plan the implementation of smart card authentication on the network.The solution must meet the following requirements:Help desk users must only be able to enroll user certificates.Managers must be able to enroll smartcards for other employees.Managers must be able to use their client computers to manage certificates.What should you include in your plan?A. Enable Web enrollment.B. Configure Restricted Enrollment Agents.C. Upgrade all certificates to V3 templates.D. Configure Restricted Certificate Managers.Answer: BSection: 173 Q'sQUESTION 16Your network consists of one Active Directory domain that contains servers that n.ai Windows Server 2008 R2.The relevant servers are configured as shown in thefollowing table.The relevant portion of the network is shown in the exhibit. (Click the Exhibit button.)Server3 hosts a secure Web site.You want remote users to access the secure Web site by using a Secure Socket Layer (SSL) connection throu the Internet.A server certificate issued by Server2 is installed on Server3.You need to recommend a solution that will enable the distribution of certificates to the remote users.The solution must meet the following requirements:The certification authority must be automatically trusted.Remote users connecting to Server3 must use client certificates issued by Server4.A minimum amount of TCP/IP ports must be opened on the firewall that connects the perimeter network and the internal networkWhich certification authority should you recommend installing on Server4?A. enterprise rootB. enterprise subordinateC. standalone rootD. standalone subordinateAnswer: DSection: 173 Q'sQUESTION 17Your network consists of one Active Directory domain that contains only domain controllersthat run Windows Server 2008 R2.All domain controllers run DNS and DHCP services.All DNS zones are standard primary zones.You need to plan a solution that allows administrators to perform routine maintenance ondomain controllers. The solution must meet the following requirements:Minimize server downtime.Maximize the availability of DNS and DHCP services.What should you do?A. Instruct server administrators to run ntdsutil.B. Instruct server administrators to stop the NTDS service.C. Instruct server administrators to stop the Netlogon service.D. Instruct server administrators to restart the servers in Directory Services Restore Mode (DSRM).Answer: DSection: 173 Q'sQUESTION 18Your network consists of one Active Directory domain.All servers run Windows Server 2008 R2.You plan to publish a Web site on two Web servers.You need to recommend a solution for the deployment of the two Web servers. The solutionmust provide the following requirements:Session-state information for all usersAccess to the Web site if a single server fadsScalability to as many as seven Web serversSupport for multiple dedicated IP addresses for each Web server.what should you recommend?A. Install failover clustering on each Web server.B. Install Network Load Balancing on each Web server.C. Assign multiple binding5 in Internet Information Services (IIS).D. Create managed handler mappings in Internet Information Services (IIS).Answer: BSection: 173 Q'sQUESTION 19Your company has three offices.Each office contains servers that run Windows Server 2008 R2.The servers are configured as file servers.Users regularly travel between offices and require access to corporate data stored on fileservers in their home offices.You need to plan a data access policy for the users.The solution must ensure that users can access corporate data from a local server when theyare traveling.What should you include in your plan?A. On all servers, install and configure Distributed File System (DFS).B. On all servers0 install and configure the File Server Resource Manager (FSRM) and the File Replication ServicC. On one server, install and configure the File Server Resource Manager (FSRM). On the other two servers, insta(FRS).D. On one server, install and configure Distributed File System (DFS). On the other two servers, install and configu(BITS).Answer: ASection: 173 Q'sQUESTION 20Your network consists of one Active Directory domain.All servers run Windows Server 2008 R2.You need to implement a storage management policy for. failover clustering that uses storage area network (SAN)-based storage.The solution must support the following requirements:Maintain disk space usage informationQuota tracking by folder or by volumeEmail notifications when users exceed their quota limits.What should you do?A. Use the File Server Resource Manager (FSRM).B. Create and deploy NTFS file system disk quotas.C. Install and configure the Storage Manager for SANs.D. Use the Performance Monitor.Answer: ASection: 173 Q'sQUESTION 21Your company has one main office and one new branch office. The network consists of one Active Directory domain.The domain contains one domain controller that runs Windows Server 2008 R2.You create a new organizational unit (OU) that contains all the computer accounts for the newoffice.You configure a server in the main office to test and approve all new software updates.You configure Microsoft Windows Server Update Services (WSUS) to deploy all approvedupdates to the environment.You need to recommend a patch management solution for the new branch office that meetsthe following requirements:Ensures that only updates approved by main office administrators are installed.Reduces the amount of network bandwidth used to download updates from MicrosoftUpdate.What should you recommend?A. In the main office, install and configure a WSUS server as a replica server. Configure a Group Policy for the OUnew WSUS server.B. In the main office, install and configure a WSUS server as a stand-alone server. Configure a new Group Policyfrom the new WSUS server.C. In the new branch office, install and configure a WSUS server as a stand-alone server. Configure a Group Policyfrom the new WSUS server.D. In the new branch office, install and configure a WSUS server as a replica server. Configure a Group Policy for ththe new WSUS server.Answer: DSection: 173 Q'sQUESTION 22Your company has a main office and a new branch office. The network consists of one Activedirectory domain.The branch office contains two member servers that run Windows Server 2008 R2.One of the servers is configured as a file server that hosts shared folders.An administrator in the branch office is responsible for maintaining the servers.You have a single DNS zone that is hosted on a DNS server located in the main office.A wide area network (WAN) link between the branch office and the main office isunreliable. You need to recommend a network services solution for the new branch office. Thesolution must meet the following requirements:Users must be able to log on to the domain if a WAN link fails.Users must be able to access file shares on the local server if a WAN link fails.Branch office administrators must be prevented from initiating changes to ActiveDirectory.Branch office administrators must be able to make configuration changes to theservers in the branch office.What should you recommend?A. Promote the member server to a domain controller and add the branch office administrators to the Domain AdmB. Promote the member server to a read-only domain controller (RODC) and add the branch office administratorsC. Promote the member server to a read-only domain controller (RODC) and configure the DNS role.Delegate administrative rights to the local branch office administrator.D. Promote the member server to a domain controller and configure the DNS role. Create an organizational unit (Oadministrative nits to the local branch office administrator.Answer: CSection: 173 Q'sQUESTION 23Your network consists of one Active Directory forest that contains one root domain and twochild domains.All domain controllers run Windows Server 2008 R2.A domain controllers run the DNS Server service and host Active Directory-integrated zones.You design a name resolution solution to support single-label names.You need to prepare the environment to support single-label name resolution across the entireforest.What should you do?A. Deploy a GlobalNames zone.B. Deploy stub zones in each child domain.C. Configure conditional forwarders in each child domain.D. Configure A.A.AA resource records in the parent domain.Answer: ASection: 173 Q'sQUESTION 24Your company has a main office and two branch offices.The network contains one Active Directory domain named .All domain controllers and DNS servers for the domain are located in the mainoffice.All DNS servers are member servers.You plan to deploy two new Active Directory domains named and in the branch offices.You install a DNS server in each branch office.You need to prepare the environment for the installation of the new domains.What should you do next?A. Create a new standard primary zone on each branch office DNS server for the new domains Configure forwardebranch office servers.B. Create a new stub zone on each branch office DNS server for the new domains. Configure conditional forwardebranch office DNS servers.C. Configure a delegation subdomain DNS record on the main office DNS server for each new domain.Configure a stub zone on each branch office DNS server for the new domains. Configure zone transfer for the c servers.D. Configure a delegation subdomain DNS record on the main office DNS server for each new domain, Create a nDNS server for the new domains. Configure zone transfer for the zone to the branch office DNS seAnswer: DSection: 173 Q'sQUESTION 25Your network consists of one Active Directory domain.The domain contains servers that run Windows Server 2008 R2.The relevant servers are configured as shown in the following table.Your company has a department named Sales.Al client computers m the Sales department run Windows 7 and use an application namedApplication1.Application1 uses a dynamic-link library (DLL) named Salesapp.dll..You plan to deploy a new application named Apphcation2 that uses a different version ofSalesapp.dll.During testing, administrators report that Apphcabon2 causes Application1 to fail when bothapplications run on the same computer.You need to ensure that users can run both applications successfully on the same computer.What should you do?A. On Server1, create and link a Group Policy object (GPO) that publishes Appcation2 to all users in the Sales depB. On Server1, create and link a Group Policy object (GPO) that assigns Application2 to all computers in the Sales。

微软MCITP认证考试题库(643)

微软MCITP认证考试题库(643)

Microsoft_CertifyMe_70-643_v2010-08-02_175q_by-Paul Number: 70-643Passing Score: 800Time Limit: 120 minFile Version: 2010-08-02CertyfyMe 70-643Microsoft 70-643Ver : 2010-08-02Question : 175Good Luckby PaulExam AQUESTION 1Your company has a single Active Directory domain. You have a server named WDS1 that runsWindows Server 2008. You install the Windows Deployment Services (WDS) role on WDS1. Youcapture an image ofa reference computer. You deploy the image to 30 client computers. Theclient computers have the same name. You need to ensure that each client computer receives aunique security identifier. What should you do?A. Create an image group by using the WDS snap-in. Redeploy the image to the client computers.B. Run the imagex /append "computername" command at the command prompt on the WDS1 server. Redeploy the imC. Run the wdsutil /answerclients:all command at the command prompt on the WDS1 server.Redeploy the image to the client computers.D. Run the wdsutil /set-server /prestageusingMAC:yes command at the command prompt on the WDS1server. Redeploy the image to the client computers.Answer: DSection: (none)Explanation/Reference:QUESTION 2Your company has four regional offices. You install the Windows Deployment Services (WDS)role on the network. Your company creates three images for each office. There are a total of 12images for the company. The images will be used as standard images for workstations. Youdeploy the images by using WDS. You need to ensure that each administrator can view only theimages for his or her regional office. What should you do?A. Create a global group for each regional office and place the computers in the appropriate global group.B. Create an organizational unit (OU) for each regional office and place the computers in the appropriateOU.C. Place all images into a single image group on the WDS server. Grant each administrator permissions to the imageD. Place each regional office into a separate image group on the WDS server. Grant each administrator permissions to Answer: DSection: (none)Explanation/Reference:QUESTION 3You install the Windows Deployment Services (WDS) role on a server that runs Windows Server2008. You plan to install Windows Vista on a computer that does not support Preboot ExecutionEnvironment (PXE).You have a Windows Vista image that is stored on the WDS server. You need to start thecomputer and install the image that is stored on the WDS server. What should you create?A. a capture imageB. a CD-ROM that contains PXE driversC. a discover imageD. an install image。

MCITP题库

MCITP题库

MCITP题库1.单个Active Directory 域服务(AD DS)站点。

所用客户端计算机都运行windows 7。

市场营销部中的用户使用自定义的应用程序。

您创建新的组测略对象(GPO)并将其链接到此站点。

市场营销部中的用户报告他们无法自定义应用程序。

您需要确保市场营销部中的所有用户都可以使用自定义应用程序。

您需要确保所有其他用户可以继续接受新GPO。

您应该如何操作?(A)A.将市场营销用户添加到域组。

使用安全筛选授予组对GPO的“允许读取”权限“拒绝应用组策略”权限B.将市场营销用户添加到域组。

使用安全筛选授予组对GPO的“允许读取”权限“允许应用组策略”权限C.将市场营销用户移动到专用的组织单位(OU。

将“阻止继承”设置应用到OU。

D.将市场营销用户移动到专用的组织单位(OU)。

将“阻止继承”设置应用到域2.您公司的一个Active Directory域服务(AD DS)林中有一个域,名为。

下图显示了该域和组策略对象的设计。

您配置组策略首选项,以定义波士顿员工GPO中的映射驱动器。

波士顿组织单位(OU)中的用户报告的驱动器不可用。

您需要找出并解决组策略问题,以确保映射的驱动器可用。

您应该如何操作?(A)A. 启用用户配置设置B. 启用计算机配置设置。

C. 以合并模式启用环回处理。

D. 以替换模式启用环回处理。

3.司拥有使用自签名SSL证书的内部Web应用程序。

公司有使用自动注册的内部证书颁发机构(CA)当用户试图启动Web应用程序时,Intermet Explorer 显示错误消息,建议关闭网页而不是继续到此应用程序。

您需要确保Intermet Explorer不显示错误消息。

您应该如何操作?(A)A. 从内部CA颁发证书,并将其安装在应用程序服务器上。

B. 将Web应用程序的证书安装到每台客户端计算机的计算存储中。

C. 将Web应用程序的证书安装到每台客户端计算机的个人存储区中。

将应用程序的URL添加到Intermet Explorer中受信任的站点区域。

2022MCITP真题模拟及答案(1)

2022MCITP真题模拟及答案(1)

2022MCITP真题模拟及答案(1)1、以下关于SVC实施过程的描述,错误的是()。

(单选题)A. 需要将存储多路径软件统一更换为SVC的SDD多路径软件B. 如果想进一步优化随机I/O性能,可将Image Mode VDisk在线迁移成Striped Mode VDiskC. 将SVC加入到现有的生产系统中,完全不需要停止应用就可以实现SVC的实施D. 对于已经存在的生产数据LUN,可以使用ImageMode模式导入数据试题答案:C2、目前支持半高驱动器的磁带库产品有哪些?()(单选题)A. TS3310&TS3200B. TS3200&TS3100C. TS3500&TS3310D. TS3000全系列试题答案:B3、TPC软件由多个组件组成,下列哪一项不是TPCServer的组件()。

(单选题)A. CIMON AgentB. Data ServerC. Device ServerD. DB2 data repository试题答案:A4、β-内酰胺类、性激素类药品和()药品等特殊性质的药品的物料或产品取样设施,应符合GMP的生产设施要求。

(多选题)A. 高活性B. 高毒性C. 高致敏性D. 高致癌性试题答案:A,B,C5、一个客户有16台Intel平台服务器构建电子邮件平台,这些服务器超出了磁盘的适用容量,这个客户想做磁盘存储整合,下面哪个是您所推荐的?()(单选题)A. NAS N5300B. SAN Volume ControllerC. DS5000磁盘阵列D. TSM空间管理试题答案:B6、某客户准备购买一台N6040网关,该网关上配置了SnapManager for Exchange License,该客户的存储空间都在SVC的管理之下,请问该网关在逻辑上应该位于()。

(单选题)A. 在SVC和存储系统之间B. 在SVC和Email服务器之间C. 和SVC并列,email服务器同时映射到两者D. SVC所在的位置上试题答案:B7、厂房地面、墙壁、天棚等内表面有哪些要求()。

微软认证:MCITP认证

微软认证:MCITP认证

微软认证:MCITP认证的各类考试科目和顺序Windows Server 2008系列MCITP认证的考试途径认证全称考试全称服务器管理MCITP: Server Administrator70-640: TS: Windows Server 2008 Active Directory, Configuring70-642: TS: Windows Server 2008 Network Infrastructure, Configuring70-646: Pro: Windows Server 2008, Server Administrator企业管理MCITP: Enterprise Administrator70-620: TS: Windows Vista, Configuring70-640: TS: Windows Server 2008 Active Directory, Configuring70-642: TS: Windows Server 2008 Network Infrastructure, Configuring70-643: TS: Windows Server 2008 Applications Infrastructure, Configuring70-647: PRO: Windows Server 2008, Enterprise AdministratorWindows7系列MCITP认证的考试途径认证全称考试全称客户技术支持专家MCITP: Enterprise Desktop Administrator 770-680: TS: Windows 7, Configuring70-686: PRO: Windows 7, Enterprise Desktop Administrator企业技术支持专家MCITP: Windows 7, Enterprise Desktop Support Technician70-680: TS: Windows 7, Configuring70-685: PRO: Windows 7, Enterprise Desktop Support TechnicianSQL Server 2005系列MCITP认证的考试途径认证全称考试全称数据库开发MCITP: Database Developer70-431: TS: Microsoft SQL Server 2005 - Implementation and Maintenance70-441: PRO: Designing Database Solutions by Using Microsoft SQL Server 200570-442: PRO: Designing and Optimizing Data Access by Using Microsoft SQL ServerMCITP: Database Administrator70-431: TS: Microsoft SQL Server 2005 - Implementation and Maintenance70-443: TS: Designing a Database Server Infrastructure by Using Microsoft SQL Server 2005 70-444: PRO: Optimizing and Maintaining a Database Administration Solution by Using Microsoft SQL Server 2005MCITP: Business Intelligence Developer70-431: TS: Microsoft SQL Server 2005–Implementation and Maintenance70-445: TS: Designing Business Intelligence Solutions by Using Microsoft SQL Server 2005 Analy sis Services70-446: PRO: Designing a Business Intelligence Infrastructure by Using Microsoft SQL Server 200 5SQL Server 2008系列MCITP认证的考试途径认证全称考试全称SQL2008数据库管理 MCITP:Database Administrator 200870-432: TS:Microsoft SQL Server 2008 Implementation and Maintenance70-450:PRO:Designing, Optimizing and Maintaining a Database Server Infrastructure using Micros oft SQL Server 2008SQL2008数据库开发MCITP:Database Developer 200870-433: TS:Microsoft SQL Server 2008 Database Development70-451:PRO:Designing Database Solutions and Data Access Using Microsoft SQL Server 2008SQL 2008商务智能开发 MCITP:Business Intelligence Developer 200870-448: TS:Microsoft SQL Server 2008 Business Intelligence, Implementation and Maintenance70-452:PRO:Designing a Business Intelligence Infrastructure Using Microsoft SQL Server 2008 SQL2005升级SQL2008 MCITP认证的考试途径已获得证书升级考试科目升级后的证书数据库管理MCITP:Database Administrator on SQL Server 200570-453:Upgrade: Transition Your MCITP SQL Server 2005 DBA to MCITP SQL Server 2008 DB AMCITP:Database Administrator 2008和MCTS:SQL Server 2008, Implementation and Maintenance数据库开发MCITP:Database Developer on SQL Server 200570-454:Upgrade: Transition Your MCITP SQL Server 2005 Database Developer to MCITP SQL Se rver 2008 Database DeveloperMCITP:Database Developer 2008和MCTS:SQL Server 2008, Database Development商务智能开发MCITP:Business Intelligence Developer on SQL Server 200570-455:Upgrade: Transition Your MCITP SQL Server 2005 Business Intelligence Developer to MC ITP SQL Server 2008 Business Intelligence DeveloperMCITP:Business Intelligence Developer 2008和MCTS:SQL Server 2008, Business Intelligence Development and Maintenance。

微软MCITP-Database Administrator认证考试题库1

微软MCITP-Database Administrator认证考试题库1

70-450QUESTION 1You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo.You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle.In the company, your job is to implement solutions on security,troubleshooting, deployment and optimization. A SQL Server 2008 infrastructure is managed by you.A database is included by the instance, and a table named EmployeeData is contained by the database.There is a column named Profile in the EmployeeData table. Microsoft Office Word 2003 documents are stored in the column.The space utilized by the Profile column should be cut to the least.In addition, a reasonable performance should be maintained to retrieve the content of the column. Which action will you perform?A. ROW compression should be utilized for the EmployeeData table.B. The Profile column should be stored by utilizing filestream storage, and the NTFS file systemcompression should be utilized.C. PAGE LEVEL compression should be utilized for the EmployeeData table.D. The Profile column should be implemented as a CLR user-defined type.Answer: BExplanation/Reference:Much of the data that is created every day is unstructured data, such as text documents, images, and videos. This unstructured data is often stored outside the database, separate from its structured data. This separation can cause data management complexities. Or, if the data is associated with structured storage, the file streaming capabilities and performance can be limited. FILESTREAM integrates the SQL Server Database Engine with an NTFS file system by storing varbinary(max) binary large object (BLOB) data as files on the file system.Transact-SQL statements can insert, update, query, search, and back up FILESTREAM data. Win32 file system interfaces provide streaming access to the data.FILESTREAM uses the NT system cache for caching file data. This helps reduce any effect that FILESTREAM data might have on Database Engine performance. The SQL Server buffer pool is not used; therefore, this memory is available for query processing.Note:FILESTREAM data is not encrypted even when transparent data encryption is enabled. QUESTION 2You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo.You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle.In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization.A SQL Server 2008 instance should be managed.It is reported by the customers that the server performance degraded due to a newly implemented process.Dynamic Management Views is utilized to confirm that no long running queries exist. The operating system performance data should be correlated with the actual query execution trace, and the least administrative effort should be utilized.Which action will you perform to finish the task?A. To finish the task, Data Collector should be utilized.B. To finish the task, the SQLdiag.exe utility should be utilized.C. To finish the task, SQL Server Profiler and the tracerpt.exe utility should be utilized.D. To finish the task, SQL Server Profiler and System Monitor should be utilized.Answer: DExplanation/Reference:SQL Server profiler displays data about a large number of SQL Server events. Whereas Windows System Monitor graphically displays information about the server internals. You can merge the two sets of information and walk through a scenario viewing both perspectives using SQL Server Profiler.To set up the dual-perspective experience, you need to simultaneously capture server performance usin g both Performance Monitor’s Counter Logs and SQL Server Profiler. The steps to do this are listed below:1. Configure System Monitor with the exact counters you want to view later. Be sure to get thescale and everything just right. Set up the Counter Log to the exact same configuration.2. Configure Profiler with the right set of trace events. They must include the start and end timedata columns so that Profiler can integrate the two logs later. Save the profiler and close profiler.3. Manually start the Counter Log. Open SQL Profiler trace code to start the server-side trace.4. When the test is complete, stop both the counter Log and the server side trace. You need tostop the SQL Profiler which is a negative point in this.5. Open profiler and open the saved trace file.6. Use the File->Import Performance Data menu command to import the Counter Log. You havethe option of selecting only the important counters from the performance monitor. There will be performance issues if you select too many counters.Source:/faq/How_to_Integrate_Performance_Monitor_and_SQL_Profiler_p1.aspxQUESTION 3You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo.You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle.In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 infrastructure is managed by you.There is a database in the instance, and the day-to-day business of your company requires the database. When reports are executed, slow response time will be experienced by Users.A performance monitoring strategy will be implemented by you so as to have three aspects of data captured and stored:Blocking and deadlock information,Executed Transact-SQL statementsQuery activity and Counters for disk, CPU, and memory.You are required to utilize the least amount of administrative effort to implement the monitoring process.Which action will you perform to finish the task?A. To finish the task, the client-side profiler trace should be utilized.B. To finish the task, the dynamic management views should be utilized.C. To finish the task, the data collector should be utilized.D. To finish the task, the System Monitor counter log trace should be utilized.Answer: CExplanation/Reference:SQL Server 2008 provides a data collector that you can use to obtain and save data that is gathered from several sources. The data collector enables you to use data collection containers, which enable you to determine the scope and frequency of data collection on a SQL Server server system.The data collector provides predefined collector types that you can use for data collection. The collector types provide the actual mechanism for collecting data and uploading it to the management data warehouse. For this release of the data collector, the following collector type is provided.QUESTION 4You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo.You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle.In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance should be managed by you.The computer on which the instance run has the following three features: a 64-GB RAM, four quad-core processors, and several independent physical raid volumesA transactional database will be implemented on the instance. In addition, the database should have a high volume of INSERT, UPDATE, and DELETE activities.Creation of new tables is contained by the activities.You need to maximize disk bandwidth and decrease the contention in the storage allocation structures so as to have the performance of the database optimized.Which action will you perform to finish the task?A. To finish the task, database and log files should be placed on the same volume.B. To finish the task, the affinity mask option should be configured properly.C. To finish the task, multiple data files should be create for the database.D. To finish the task, the affinity I/O mask option should be configured properly.Answer: CExplanation/Reference:If your database is very large and very busy, multiple files can be used to increase performance. Here is one example of how you might use multiple files. Let's say you have a single table with 10 million rows that is heavily queried. If the table is in a single file, such as a single database file, then SQL Server would only use one thread to perform a read of the rows in the table. But if the table were divided into three physical files, then SQL Server would use three threads (one per physical file) to read the table, which potentially could be faster. In addition, if each file were on its own separate physical disk or disk array, the performance gain would even be greater.Essentially, the more files that a large table is divided into, the greater the potential performance. Of course there is a point where the additional threads aren't of much use when you max out the server's I/O. But up until you do max out the I/O, additional threads (and files) should increase performanceSOURCE:/tips/filegroups_p1.aspxQUESTION 5You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo.You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle.In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 infrastructure should be managed.Log shipping should be implemented for several databases on three SQL Server instances. Thelogs are migrated to a fourth SQL Server instance. A manual failover will be implemented.You need to ensure that the database applications utilize the secondary server after failover.Since you are the technical support, you are required to confirm that the latest data should be available to users.Which actions should you perform to achieve the goal? (Choose more than one)A. To achieve the goal, you should utilize the WITH RECOVERY option on the last log to apply anyunapplied transaction log backups in sequence to each secondary database.B. To achieve the goal, you should redirect client computers to the secondary instance.C. To achieve the goal, you should replicate all log shipping network shares to the secondary instance.D. To achieve the goal, you should utilize the WITH NORECOVERY option to back up the tail of thetransaction log of primary databases.E. To achieve the goal, you should back up all databases on the secondary instance.Answer: ABDExplanation/Reference:Log shipping consists of three operations:1. Back up the transaction log at the primary server instance.2. Copy the transaction log file to the secondary server instance.3. Restore the log backup on the secondary server instance.The log can be shipped to multiple secondary server instances. In such cases, operations 2 and 3are duplicated for each secondary server instance.A log shipping configuration does not automatically fail over from the primary server to thesecondary server. If the primary database becomes unavailable, any of the secondary databasescan be brought online manually.To make the target as the new source database you have to1. Backup the transaction log tail in order to have the latest transactions and to put the databasein recovery stateBACKUP LOG [AdventureWorks]TO DISK = N'C:\Program Files\Microsoft SQLServer\MSSQL10.MSSQLSERVER\MSSQL\Backup\Adv.trn'WITH NO_TRUNCATE ,NOFORMAT,NOINIT,NAME = N'AdventureWorks-Transaction Log Backup',SKIP,NOREWIND,NOUNLOAD,NORECOVERY ,STATS = 102. After having copied all the transaction log backup, restore them in order and, for the latest,use the WITH RECOVERY option3. Redirect all the clients to the new source databaseQUESTION 6You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo.You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization.A SQL Server 2008 infrastructure is managed by you. After a regular test, you find that performance degradation is experienced by an instance for the three reasons: Excessive CPU usage, Server processes paging and Deadlocks.A monitoring solution should be implemented to provide data, monitor and troubleshoot performance issues. And detailed deadlock information should be contained in the provided data.You should utilize the least amount of administrative effort to finish the task.Which tool will you utilize to finish the task?A. To finish the task, you should utilize Resource Governor.B. To finish the task, you should utilize Database Engine Tuning Advisor.C. To finish the task, you should utilize Extended Events.D. To finish the task, you should utilize Performance Monitor (SYSMON).Answer: CExplanation/Reference:Introducing SQL Server Extended EventsSQL Server Extended Events (Extended Events) is a general event-handling system for server systems. The Extended Events infrastructure supports the correlation of data from SQL Server, and under certain conditions, the correlation of data from the operating system and database applications. In the latter case, Extended Events output must be directed to Event Tracing for Windows (ETW) in order to correlate the event data with operating system or application event data.All applications have execution points that are useful both inside and outside an application. Inside the application, asynchronous processing may be enqueued using information that is gathered during the initial execution of a task. Outside the application, execution points provide monitoring utilities with information about the behavioral and performance characteristics of the monitored application.Extended Events supports using event data outside a process. This data is typically used by: Tracing tools, such as SQL Trace and System Monitor.Logging tools, such as the Windows event log or the SQL Server error log.Users administering a product or developing applications on a product.QUESTION 7You are a professional level SQL Sever 2008 Database Administrator in an internationalcorporation named Wiikigo.You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization.A SQL Server 2008 infrastructure is managed by you. There are 30 branch offices inDoubleSecurity Insurance, and in the branch offices, customer data are stored in SQL Server2008 databases.Customer data should be security compliant if it is stored through multiple database instances.You intend to utilize the Policy-Based Management feature to design a strategy for custompolicies. And the format of custom policies is XML format. The requirements listed below shouldbe satisfied.The company distributes custom policies to all instances. In addition, the company enforces the policies on all instances.A strategy should be thought out and the minimum amount of administrative effort should beutilized.Which action should you perform to finish the task?A. To finish the task, the Distributed File System Replication service should be utilized.B. To finish the task, a configuration server should be utilized.C. To finish the task, the policies should be distributed by utilizing Group Policy Objects.D. To finish the task, the policies should be distributed by utilizing the Active Directory directory service. Answer: BExplanation/Reference:Configuration Server or Central Management ServerIn SQL Server 2008, you can designate an instance of SQL Server as a Central ManagementServer. Central Management Servers store a list of instances of SQL Server that is organized intoone or more Central Management Server groups. Actions that are taken by using a Central Management Server group will act on all servers in the server group. This includes connecting to servers by using Object Explorer and executing Transact-SQL statements and Policy-Based Management policies on multiple servers at the same time. All Central Management Servers and subordinate servers must be registered by using Windows Authentication. Versions of SQLServer that are earlier than SQL Server 2008 cannot be designated as a Central Management Server.QUESTION 8You are a professional level SQL Sever 2008 Database Administrator in an internationalcorporation named Wiikigo.You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization.A SQL Server 2008 database solution is managed by you.All data changes are implemented through stored procedures, and only the INSERT, UPDATE, or DELETE statements are utilized by the procedures. A backup strategy should be implemented.The business requirements listed below should be satisfied. Point-in-time recovery for failure is supported by the backup strategy at any time of day.In addition, the least amount of disk space should be utilized by the transaction log.Which action should you perform to finish the task?A. To finish the task, hourly database snapshots should be utilized.B. To finish the task, the full-recovery model along with transaction log backups should be utilized.C. To finish the task, the full-recovery model along with differential backups should be utilized.D. To finish the task, the simple-recovery model along with differential backups should be utilized. Answer: BExplanation/Reference:Full-recovery ModelDescriptionRequires log backups.No work is lost due to a lost or damaged data file.Can recover to an arbitrary point in time (for example, prior to application or user error).Work loss exposureNormally none.If the tail of the log is damaged, changes since the most recent log backup must be redone.Recover to point in time?Can recover to a specific point in time, assuming that your backups are complete up to that point in time.QUESTION 9You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo.You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization.A SQL Server 2008 instance is managed by you.A database is utilized by the instance, and the database is utilized by a Web-based application. 15,000 transactions are processed by the application every minute. A column is contained by a table in the database, and the column is utilized only by the application. Sensitive data is stored in this column.The sensitive data should be stored with the highest security level. In addition, the least amount of memory space and processor time should be utilized.From the following four encryption types, which one should you utilize?A. Asymmetric key encryption should be utilized.B. Certificate-based encryption should be utilized.C. Symmetric key encryption should be utilized.D. Transparent data encryption should be utilized.Answer: CExplanation/Reference:Cryptographic Key HierarchyAt the root of encryption tree is the Windows Data Protection API (DPAPI), which secures the key hierarchy at the machine level and is used to protect the service master key (SMK) for the database server instance. The SMK protects the database master key (DMK), which is stored at the user database level and which in turn protects certificates and asymmetric keys. These in turn protect symmetric keys, which protect the data. TDE uses a similar hierarchy down to the certificate. The primary difference is that when you use TDE, the DMK and certificate must be stored in the master database rather than in the user database. A new key, used only for TDE and referred to as the database encryption key (DEK), is created and stored in the user database. This hierarchy enables the server to automatically open keys and decrypt data in both cell-level and database-level encryption. The important distinction is that when cell-level encryption is used, all keys from the DMK down can be protected by a password instead of by another key. This breaks the decryption chain and forces the user to input a password to access data. In TDE, the entire chain from DPAPI down to the DEK must be maintained so that the server can automatically provide access to files protected by TDE. In both cell-level encryption and TDE, encryption and decryption through these keys is provided by the Windows Cryptographic API (CAPI).Symmetric keys use the same password to encrypt and decrypt data, so it is the less space consuming, because one asymetric key will use one private and one public key.QUESTION 10You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo.You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization.A SQL Server 2008 instance is managed by you. a new database application is hosted by the instance.The security requirements should be designed for the application. A unique login to the SQL Server 2008 server is assigned to each application user.Stored procedures are included by the application database to execute stored procedures in the MSDB database. SQLAgent jobs are scheduled by the stored procedures in the MSDB database.Since you are the technical support, you are required to confirm that the stored procedures in theMSDB database should be executed by utilizing the security context of the application user.Which action should you perform?A. Each user should be added to the public role in the MSDB database.B. Each user should be added to the db_dtsltduser database role in the MSDB database.C. The MSDB database should be set to utilize the TRUSTWORTHY option, and then each user shouldbeadded to the MSDB database.D. The new database should be set to utilize the TRUSTWORTHY option, and then each user should beaddedto the MSDB database.Answer: DExplanation/Reference:The TRUSTWORTHY database property is used to indicate whether the instance of SQL Servertrusts the database and the contents within it. By default, this setting is OFF, but can be set to ONby using the ALTER DATABASE statement. For example, ALTER DATABASEAdventureWorks2008R2 SET TRUSTWORTHY ON;By default msdb has the option TRUSTWORTHY set to True.QUESTION 11You are a professional level SQL Sever 2008 Database Administrator in an internationalcorporation named Wiikigo.You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 infrastructure is managed byyou.A maintenance strategy should be designed for a mission-critical database, and a large tablenamed Orders is contained by the database.Index maintenance operations are contained in the design plan. When you design the strategy,the facts listed below should be taken into consideration.First, the users continuously access to the Orders table in the database.Secondly, a column of the xml data type is contained by Orders table.Thirdly, the new rows are regularly added to the Orders table.Fourthly, the average fragmentation for the clustered index of the Orders table is no more than 2 percent.A strategy should be designed to have the performance of the queries on the table optimized.Which action will you perform?A. The clustered index of the Orders table should be dropped.B. The clustered index of the Orders table offline should be rebuilt once a month.C. The clustered index of the Orders table should be excluded from scheduled reorganizing or rebuildingoperations.D. The clustered index of the Orders table should be reorganized by reducing the fill factor. Answer: CExplanation/Reference:As the users will continously access the database and there is one cluster index, the cluster index could not be unavaillable because the leaf pages of the clustered index contains the table data. Furthermore, the cluster index has never one fragmentation of more than 2%, this means itdoesn't need to be reordered.With this, you can be sure that answer A,B and D are wrong.QUESTION 12You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo.You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance is managed by you.The security requirements should be designed for a new database application.A code segment is utilized by the application, and the code segment includes the following components:A method that the registry is accessed on the SQL Server, a method that the file system is accessed on a network file server, and a class definition that public static fields are utilized.SQL CLR integration is utilized by the code segment, and the code segment is implemented as a single assembly.Since you are the technical support, you are required to make sure that the application should be successfully deployed to the instance.Which action will you perform?A. The SAFE code access security should be utilized for the assembly.B. All public static fields should be replaced with public fields.C. All public static fields should be utilized with public static read-only fields. And then the assemblyshouldbe registered by utilizing the regasm.exe utility before deployment.D. All public static fields should be replaced with public static read-only fields. And then theEXTERNAL_ACCESS code access security should be utilized for the assembly.Answer: DExplanation/Reference:Creates a managed application module that contains class metadata and managed code as an object in an instance of SQL Server. By referencing this module, common language runtime (CLR) functions, stored procedures, triggers, user-defined aggregates, and user-defined types can be created in the database.PERMISSION_SET { SAFE | EXTERNAL_ACCESS | UNSAFE }Specifies a set of code access permissions that are granted to the assembly when it is accessedby SQL Server. If not specified, SAFE is applied as the default.We recommend using SAFE. SAFE is the most restrictive permission set. Code executed by an assembly with SAFE permissions cannot access external system resources such as files, the network, environment variables, or the registry.EXTERNAL_ACCESS enables assemblies to access certain external system resources such asfiles, networks, environmental variables, and the registry.QUESTION 13You are a professional level SQL Sever 2008 Database Administrator in an internationalcorporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization,optimizing and sustaining the database life cycle.In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance is managed by you. The security requirements shouldbe designed for a new database application, and the application will be deployed to the instance.A table is consisted by the new database, and the table is created by utilizing the following code segment:CREATE TABLE CK_DISCOUNTS(ProductID INT NOT NULL IDENTITY(1,1)Discount VARBINARY (MAX) FILESTREAM)Since you are the technical support, you should utilize the maximum secure method to protect the BonusPlan column from the access of unauthorized users.Which action will you perform to finish the task?A. To finish the task, Transparent data encryption should be utilized.B. To finish the task, the NTFS file system security should be utilized and the access of the databasefilesshould be limited to the SQL Server 2008 Service account.C. To finish the task, the Trustworthy option for the database should be utilized.D. To finish the task, the Advanced Encryption Standard encryption should be utilized on all columns inthedatabase.Answer: BExplanation/Reference:The column BonusPln is of type FILESTREAM this means that the data of this column is saved outside of the database on the filesystem. So, you have to protect those files by the NTFSsecurity.QUESTION 14You are a professional level SQL Sever 2008 Database Administrator in an internationalcorporation named Wiikigo.。

微软MCITP考试70-646题库

微软MCITP考试70-646题库

Exam:70-646Title:PRO:Windows Server2008,Server AdministratorQUESTION 1You need to recommend a Windows Server 2008 R2 server configuration that meets the following requirements:·Supports the installation of Microsoft SQL Server 2008·Provides redundancy for SQL services if a single server failsWhat should you recommend?A.Install a Server Core installation of Windows Server 2008 R2 Enterprise on two servers. Configure theservers in a failover cluster.B.Install a full installation of Windows Server 2008 R2 Standard on two servers. Configure Network LoadBalancing on the two servers.C.Install a full installation of Windows Server 2008 R2 Enterprise on two servers. Configure Network LoadBalancing on the two servers.D.Install a full installation of Windows Server 2008 R2 Enterprise on two servers. Configure the servers in afailover cluster.Answer: DQUESTION 2Your network consists of a single Active Directory domain. Your main office has an Internet connection.Your company plans to open a branch office. The branch office will connect to the main office by using a WAN link. The WAN link will have limited bandwidth. The branch office will not have access to the Internet. The branch office will contain 30 Windows Server 2008 R2 servers. You need to plan the deployment of the servers in the branch office.The deployment must meet the following requirements:·Installations must be automated.·Computers must be automatically activated.·Network traffic between the offices must be minimized.What should you include in your plan?A.In the branch office, implement Key Management Service (KMS), a DHCP server, and WindowsDeployment Services (WDS).e Multiple Activation Key (MAK) Independent Activation on the servers. In the main office, implement aDHCP server and Windows Deployment Services (WDS).C.In the main office, implement Windows Deployment Services (WDS). In the branch office, implement aDHCP server and implement the Key Management Service (KMS).e Multiple Activation Key (MAK) Independent Activation on the servers. In the main office, implement aDHCP server. In the branch office, implement Windows Deployment Services (WDS).Answer: AQUESTION 3Your network contains a Webbasedapplication that runs on Windows Server 2003. You plan to migrate the Webbased application to Windows Server 2008 R2. You need to recommend a server configuration to support the Webbased application.The server configuration must meet the following requirements:·Ensure that the application is available to all users if a single server?fails·Support the installation of .NET applications·Minimize software costsWhat should you recommend?A.Install the Server Core installation of Windows Server 2008 R2 Standard on two servers. Configure theservers in a Network Load Balancing cluster.B.Install the full installation of Windows Server 2008 R2 Web on two servers. Configure the servers in aNetwork Load Balancing cluster.C.Install the full installation of Windows Server 2008 R2 Enterprise on two servers. Configure the servers in afailover cluster.D.Install the full installation of Windows Server 2008 R2 Datacenter on two servers. Configure the servers in afailover cluster.Answer: BQUESTION 4Your company purchases 15 new 64bit servers as follows:·Five of the servers have a single processor.·Five of the servers have a single dual core processor.·Five of the servers have two quad core processors.You plan to deploy Windows Server 2008 R2 on the new servers by using Windows Deployment Services (WDS). You need to recommend a WDS install image strategy that meets the following requirements: ·Minimizes the number of install images·Supports the deployment of Windows Server 2008 R2What should you recommend?A.one install image file that contains three install imagesB.one install image file that contains a single install imageC.two install image files that each contain a single install imageD.three install image files that each contain a single install imageAnswer: BQUESTION 5Your network contains a single Active Directory site.You plan to deploy 1,000 new computers that will run Windows 7 Enterprise. The new computers have Preboot Execution Environment (PXE) network adapters.You need to plan the deployment of the new computers to meet the following requirements:·Support 50 simultaneous installations of Windows 7·Minimize the impact of network operations during the deployment of the new computers·Minimize the amount of time required to install Windows 7 on the new computersWhat should you include in your plan?A.Deploy the Windows Deployment Services (WDS) server role. Configure the IP Helper tables on all routers.B.Deploy the Windows Deployment Services (WDS) server role. Configure each WDS server by using nativemode.C.Deploy the Windows Deployment Services (WDS) server role and the Transport Server feature. Configurethe Transport Server to use a custom network profile.D.Deploy the Windows Deployment Services (WDS) server role and the Transport Server feature. Configurethe Transport Server to use a static multicast address range.Answer: DQUESTION 6Your network consists of a single Active Directory site that includes two network segments. The network segments connect by using a router that is RFC 1542 compliant.You plan to use Windows Deployment Services (WDS) to deploy Windows Server 2008 R2 servers. All new servers support PreBoot Execution Environment (PXE).You need to design a deployment strategy to meet the following requirements:·Support Windows Server?2008 R2·Deploy the servers by using WDS in both network segments·Minimize the number of servers used to support WDSWhat should you include in your design?A.Deploy one server. Install WDS and DHCP on the server. Configure the IP Helper tables on the routerbetween the network segments.B.Deploy two servers. Install WDS and DHCP on both servers. Place one server on each of the networksegments. Configure both servers to support DHCP option 60.C.Deploy two servers. Install WDS and DHCP on both servers. Place one server on each of the networksegments. Configure both servers to support DHCP option 252.D.Deploy two servers. Install WDS and DHCP on one server. Install DHCP on the other server. Place oneserver on each of the network segments. Configure both servers to support DHCP option 60.Answer: AQUESTION 7Your company has 250 branch offices. Your network contains an Active Directory domain. The domain controllers run Windows Server 2008 R2. You plan to deploy Readonly Domain Controllers (RODCs) in the branch offices.You need to plan the deployment of the RODCs to meet the following requirements:·Build each RODC at the designated branch office.·Ensure that the RODC installation source files do not contain cached secrets.·Minimize the bandwidth used during the initial synchronization of Active Directory Domain Services(AD?DS).What should you include in your plan?e Windows Server Backup to perform a full backup of an existing domain controller. Use the backup tobuild the new RODCs.e Windows Server Backup to perform a custom backup of the critical volumes of an existing domaincontroller. Use the backup to build the new RODCs.C.Create a DFS namespace that contains the Active Directory database from one of the existing domaincontrollers. Build the RODCs by using an answer file.D.Create an RODC installation media. Build the RODCs from the RODC installation media.Answer: DQUESTION 8Your network consists of a single Active Directory domain. The network is located on the 172.16.0.0/23 subnet.The company hires temporary employees. You provide user accounts and computers to the temporary employees. The temporary employees receive computers that are outside the Active Directory domain. The temporary employees use their computers to connect to the network by using wired connections and wireless connections. The company's security policy specifies that the computers connected to the network must have the latest updates for the operating system.You need to plan the network's security so that it complies with the company's security policy. What shouldyou include in your plan?A.Implement a Network Access Protection (NAP) strategy for the 172.16.0.0/23 subnet.B.Create an extranet domain within the same forest. Migrate the temporary employees' user accounts to theextranet domain. Install the necessary domain resources on the 172.16.0.0/23 subnet.C.Move the temporary employees' user accounts to a new organizational unit (OU). Create a new GroupPolicy object (GPO) that uses an intranet Microsoft Update server. Link the new GPO to the new OU.D.Create a new subnet in a perimeter network. Relocate the wireless access point to the perimeter network.Require authentication through a VPN server before allowing access to the internal resources.Answer: AQUESTION 9Your company has a main office and two branch offices. The main office is located in London. The branch offices are located in New York and Paris. Your network consists of an Active Directory forest that contains three domains named , , and . All domain controllers run Windows Server 2008 R2 and have the DNS Server server role installed. The domain controllers for contoso. com are located in the London office. The domain controllers for are located in the Paris office. The domain controllers for are located in the New York office. A domain controller in the domain has a standard primary DNS zone for . Adomain controller in the domain has a standard primary DNS zone for . A domain controller in the domain has a standard primary DNS zone for newyork.contoso. com.You need to plan a name resolution strategy for the Paris office that meets the following requirements:·If a WAN link fails, clients must be able to resolve hostnames for .·If a WAN link fails, clients must be able to resolve hostnames for .·The DNS servers in Paris must be updated when new authoritative DNS servers are added to newyork. .What should you include in your plan?A.Configure conditional forwarding for . Configure conditional forwarding for newyork.contoso.com.B.Create a standard secondary zone for . Create a standard secondary zone for newyork..C.Convert the standard zone into an Active Directoryintegrated zone. Add all DNS servers in the forest to theroot hints list.D.Create an Active Directoryintegrated stub zone for . Create an Active Directoryintegrated stubzone for .Answer: BQUESTION 10Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2008 R2. You need to implement a Certificate Services solution that meets the following requirements:·Automates the distribution of certificates for internal users·Ensures that the network's certificate infrastructure is as secure as possible·Gives external users access to resources that use certificatebased authenticationWhat should you do?A.Deploy an online standalone root certification authority (CA). Deploy an offline standalone root CA.B.Deploy an offline enterprise root certification authority (CA). Deploy an offline enterprise subordinate CA.C.Deploy an offline standalone root certification authority (CA). Deploy an online enterprise subordinate CA.Deploy an online standalone subordinate CA.D.Deploy an online standalone root certification authority (CA). Deploy an online enterprise subordinate CA.Deploy an online standalone subordinate CA.Answer: CQUESTION 11Your network contains an Active Directory forest named .You plan to deploy a new child domain named . The child domain will contain two domain controllers. Both domain controllers will have the DNS Server server role installed. All users and computers in the branch office will be members of the domain. You need to plan the DNS infrastructure for the child domain to meet the following requirements:·Ensure resources in the root domain are accessible by fully qualified domain names.·Ensure resources in the child domain are accessible by fully qualified domain names.·Provide name resolution services in the event that a single server fails for a prolonged period of time.·Automatically recognize when new DNS servers are added to or removed from the domain. What should you include in your plan?A.On both domain controllers, add a conditional forwarder for and create a standard primaryzone for .B.On both domain controllers, modify the root hints to include the domain controllers for . On onedomain controller, create an Active Directoryintegrated zone for .C.On one domain controller create an Active Directoryintegrated zone for and create anActive Directoryintegrated stub zone for .D.On one domain controller, create a standard primary zone for . On the other domain controller,create a standard secondary zone for .Answer: CQUESTION 12Your network is configured as shown in the following diagram.You deploy an enterprise certification authority (CA) on the internal network. You also deploy a Microsoft Online Responder on the internal network. You need to recommend a secure method for Internet users to verify the validity of individual certificates.The solution must minimize network bandwidth.What should you recommend?A.Deploy a subordinate CA on the perimeter network.B.Install a standalone CA and the Network Device Enrollment Service (NDES) on a server on the perimeternetwork.C.Install a Network Policy Server (NPS) on a server on the perimeter network. Redirect authenticationrequests to a server on the internal network.D.Install Microsoft Internet Information Services (IIS) on a server on the perimeter network. Configure IIS toredirect requests to the Online Responder on the internal network.Answer: DQUESTION 13Your network contains two DHCP servers. The DHCP servers are named DHCP1 and DHCP2. The internal network contains 1,000 DHCP client computers that are located on a single subnet. A router separates the internal network from the Internet. The router has a single IP address on the internal interface. DHCP1 has the following scope information.·Starting IP address: 172.16.0.1·Ending IP address: 172.16.7.255·Subnet mask: 255.255.240.0You need to provide a faulttolerant DHCP infrastructure that supports the client computers on the internal network. In the event that a DHCP server fails, all client computers must be able to obtain a valid IP address. How should you configure DHCP2?A.Create a scope for the subnet 172.16.0.0/20. Configure the scope to use a starting IP address of 172.16.8.1and an ending IP address of 172.16.15.254.B.Create a scope for the subnet 172.16.0.0/21. Configure the scope to use a starting IP address of 172.16.0.1and an ending IP address of 172.16.15.254.C.Create a scope for the subnet 172.16.8.0/21. Configure the scope to use a starting IP address of 172.16.8.1and an ending IP address of 172.16.10.254.D.Create a scope for the subnet 172.17.0.0/16. Configure the scope to use a starting IP address of 172.17.0.1and an ending IP address of 172.17.255.254.Answer: AQUESTION 14Your company has a main office and three branch offices. The network consists of a single ActiveDirectory domain. Each office contains an Active Directory domain controller. You need to create a DNS infrastructure for the network that meets the following requirements:·The DNS infrastructure must allow the client computers in each office to register DNS names within their respective offices.·The client computers must be able to resolve names for hosts in all offices.What should you do?A.Create an Active Directoryintegrated zone at the main office site.B.Create a standard primary zone at the main office site and at each branch office site.C.Create a standard primary zone at the main office site. Create a secondary zone at each branch office site.D.Create a standard primary zone at the main office site. Create an Active Directoryintegrated stub zone ateach branch office site.Answer: AQUESTION 15Your network consists of a single Active Directory domain. The network contains two Windows Server 2008 R2 computers named Server1 and Server2. The company has two identical print devices. You plan to deploy print services. You need to plan a print services infrastructure to meet the following requirements:·Manage the print queue from a central location.·Make the print services available, even if one of the print devices fails.What should you include in your plan?A.Install and share a printer on Server1. Enable printer pooling.B.Install the Remote Desktop Services server role on both servers. Configure Remote Desktop ConnectionBroker (RD Connection Broker).C.Install and share a printer on Server1. Install and share a printer on Server2. Use Print Management toinstall the printers on the client computers.D.Add Server1 and Server2 to a Network Load Balancing cluster. Install a printer on each node of the cluster. Answer: AQUESTION 16Your network contains two servers that run the Server Core installation of Windows Server 2008 R2. The two servers are part of a Network Load Balancing cluster.The cluster hosts a Web site. Administrators use client computers that run Windows 7.You need to recommend a strategy that allows the administrators to remotely manage the Network Load Balancing cluster. Your strategy must support automation.What should you recommend?A.On the servers, enable Windows Remote Management (WinRM).B.On the servers, add the administrators to the Remote Desktop Users group.C.On the Windows 7 client computers, enable Windows Remote Management (WinRM).D.On the Windows 7 client computers, add the administrators to the Remote Desktop Users group. Answer: AQUESTION 17Your company has a main office and a branch office. You plan to deploy a Readonly Domain Controller (RODC) in the branch office. You need to plan a strategy to manage the RODC. Your plan must meet the following requirements:·Allow branch office support technicians to maintain drivers and disks on the RODC·Prevent branch office support technicians from managing domain user accountsWhat should you include in your plan?A.Configure the RODC for Administrator Role Separation.B.Configure the RODC to replicate the password for the branch office support technicians.C.Set NTFS permissions on the Active Directory database to Read & Execute for the branch office supporttechnicians.D.Set NTFS permissions on the Active Directory database to Deny Full Control for the branch office supporttechnicians.Answer: AQUESTION 18Your network consists of a single Active Directory domain. The network contains five Windows Server2008 R2 servers that host Web applications. You need to plan a remote management strategy to managethe Web servers. Your plan must meet the following requirements:·Allow Web developers to configure features on the Web sites·Prevent Web developers from having full administrative rights on the Web serversWhat should you include in your plan?A.Configure request filtering on each Web server.B.Configure authorization rules for Web developers on each Web server.C.Configure the security settings in Internet Explorer for all Web developers by using a Group Policy.D.Add the Web developers to the Account Operators group in the domain.Answer: BQUESTION 19Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2008 R2. The domain contains 200 Windows Server 2008 R2 servers. You need to plan a monitoring solution that meets the following requirements.·Sends a notification by email to the administrator if an application error occurs on any of the servers·Uses the minimum amount of administrative effortWhat should you include in your plan?A.On one server, create event subscriptions for each server. On the server, attach tasks to the applicationerror events.B.On one server, create an Event Trace Sessions Data Collector Set. On all servers, create a SystemPerformance Data Collector Set.C.On all servers, create event subscriptions for one server. On all servers, attach a task for the applicationerror events.D.On all servers, create a System Performance Data Collector Set. On one server, configure the reportsettings for the new Data Collector set.Answer: AQUESTION 20Your network consists of a single Active Directory domain. The network includes a branch office named Branch1. Branch1 contains 50 member servers that run Windows Server 2008 R2. An organizational unit (OU) named Branch1Servers contains the computer objects for the servers in Branch1. A global group named Branch1admins contains the user accounts for the administrators. Administrators maintain all member servers in Branch1. You need to recommend a solution that allows the members of Branch1admins group to perform the following tasks on the Branch1 member servers.·Stop and start services·Change registry settingsWhat should you recommend?A.Add the Branch1admins group to the Power Users local group on each server in Branch1.B.Add the Branch1admins group to the Administrators local group on each server in Branch1.C.Assign the Branch1admins group change permissions to the Branch1Servers OU and to all child objects.D.Assign the Branch1admins group Full Control permissions on the Branch1Servers OU and to all childobjects.Answer: BQUESTION 21Your network consists of a single Active Directory domain. The network includes a branch office named Branch1. Branch1 contains a Readonly Domain Controller (RODC) named Server1. A global group named Branch1?admins contains the user accounts for administrators. Administrators manage the client computers and servers in Branch1.You need to recommend a solution for delegating control of Server1. Your solution must meet the following requirements:·Allow the members of the Branch1admins group to administer Server1 including, change device drivers and install operating system updates by using Windows Update.·Provide the Branch1admins group rights on Server1 only.·Prevent Branch1admins group from modifying Active Directory objects.What should you recommend?A.Add the Branch1admins global group to the Server Operators builtin local group.B.Add the members of the Branch1admins global group to the Administrators builtin local group of Server1.C.Grant Full Control permission on the Server1 computer object in the domain to the Branch1admins group.D.Move the Server1 computer object to a new organizational unit (OU) named Branch1servers. Grant FullControl permission on the Branch1servers OU to the Branch1admins group.Answer: BQUESTION 22Your network consists of a single Active Directory forest. The forest functional level is Windows Server 2008R2. The forest contains two domains named and . contains a user named User1. contains an organizational unit (OU) named Security.You need to give User1 administrative rights so that he can manage Group Policies for the Security OU.You want to achieve this goal while meeting the following requirements:·User1 must be able to create and configure Group Policies in .·User1 must be able to link Group Policies to the Security OU.·User1 must be granted the least administrative rights necessary to achieve the goal.What should you do?A.Add User1 to the Administrators group for .B.Add User1 to the Group Policy Creator Owners group in . Modify the permissions on theSecurity OU.C.Run the Delegation of Control Wizard on the Security OU. In the Group Policy Management Console,modify the permissions of the Group Policy Objects container in the domain.D.Run the Delegation of Control Wizard on . In the Group Policy Management Console,modify the permissions of the Group Policy Objects container in the domain.Answer: CQUESTION 23Your network contains several branch offices. All servers run Windows Server 2008 R2. Each branch office contains a domain controller and a file server. The DHCP Server server role is installed on the branch office domain controllers. Each office has a branch office administrator.You need to delegate the administration of DHCP to meet the following requirements:·Allow branch office administrators to manage DHCP scopes for their own office·Prevent the branch office administrators from managing DHCP scopes in other offices·Minimize administrative effortWhat should you do?A.In the Active Directory domain, add the branch office administrators to the Server Operators builtin localgroup.B.In the Active Directory domain, add the branch office administrators to the Network Configuration Operatorsbuiltinlocal group.C.In each branch office, migrate the DHCP Server server role to the file server. On each file server, add thebranch office administrator to the DHCP Administrators local group.D.In each branch office, migrate the DHCP Server server role to the file server. In the Active Directory domain,add the branch office administrators to the DHCP Administrators domain local group.Answer: CQUESTION 24Your company has a single Active Directory domain. You have 30 database servers that run Windows Server 2008 R2.The computer accounts for the database servers are stored in an organizational unit (OU) named Data. The user accounts for the database administrators are stored in an OU named Admin. The database administrators are members of a global group named D_Admins. You must allow the database administrators to perform administrative tasks on the database servers. You must prevent the database administrators from performing administrative tasks on other servers. What should you do?A.Deploy a Group Policy to the Data OU.B.Deploy a Group Policy to the Admin OU.C.Add D_Admins to the Domain Admins global group.D.Add D_Admins to the Server Operators builtin local group.Answer: AQUESTION 25Your network consists of a single Active Directory forest that contains a root domain and two child domains. All servers run Windows Server 2008 R2. A corporate policy has the following requirements:·All local guest accounts must be renamed and disabled.·All local administrator accounts must be renamed.You need to recommend a solution that meets the requirements of the corporate policy.What should you recommend?A.Implement a Group Policy object (GPO) for each domain.B.Implement a Group Policy object (GPO) for the root domain.C.Deploy Network Policy and Access Services (NPAS) on all domain controllers in each domain.D.Deploy Active Directory Rights Management Services (AD RMS) on the root domain controllers.Answer: AQUESTION 26Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2008 R2. All domain controllers run Windows Server 2008 R2.A corporate policy requires that the users from the research department have higher levels of account and password security than other users in the domain. You need to recommend a solution that meets the requirements of the corporate policy. Your solution must minimize hardware and software costs.What should you recommend?A.Create a new Active Directory site. Deploy a Group Policy object (GPO) to the site.B.Create a new Password Settings Object (PSO) for the research department's users.C.Create a new organizational unit (OU) named Research in the existing domain. Deploy a Group Policyobject (GPO) to the Research OU.D.Create a new domain in the forest. Add the research department's user accounts to the new domain.Configure a new security policy in the new domain.Answer: B。

计算机系统与网络安全技术_电子科技大学中国大学mooc课后章节答案期末考试题库2023年

计算机系统与网络安全技术_电子科技大学中国大学mooc课后章节答案期末考试题库2023年

计算机系统与网络安全技术_电子科技大学中国大学mooc课后章节答案期末考试题库2023年1.以下关于TCP/IP协议族的说法不正确的是()答案:TCP/IP协议族中的TCP协议在设计之初考虑到了安全问题2.以下关于跨站点脚本攻击(Cross-Site Scripting Attack)的说法不正确的是()答案:如果用户输入不能用来生成静态内容,则跨站点脚本攻击无法实现3.整数29的欧拉函数等于()答案:284.下列关于RSA加密算法正确的说法是()RSA是非对称加密算法5.下列关于网络地址转换(NAT)正确的说法是()答案:NAT和防火墙能协同工作6.以下关于蜜罐(Honeypot)说法不正确的是()答案:蜜罐技术可以用来阻止网络攻击的发生7.以下关于Windows NT操作系统中安全标识SID(security identification)的说法正确的是()答案:SID可以作为用户或群组拥有访问权限的标志8.以下关于Windows操作系统注册表的说法正确的是()程序和系统的配置参数一般都存放在注册表中9.关于病毒和蠕虫的说法正确的是()答案:病毒需要依附于驻留文件来进行复制,而蠕虫不使用驻留文件也可在系统之间进行自我复制10.NP问题的含义是()答案:非确定性图灵机上能够在多项式时间内得到处理的问题11.下面关于TCP协议的说法中,不正确的是()答案:TCP是非面向连接的协议12.以下关于身份认证的说法不正确的有()答案:身份认证有单向和双向认证之分,且可以简单地重复两次单向认证来实现双向认证13.以下关于链路加密的说法不正确的是()答案:链路加密中每个用户可以选择自己的加密密钥14.按照加密和解密密钥是否相同,密码算法可分为()答案:对称密码算法和非对称密码算法15.后三位数字是()答案:40116.以下关于IPSec说法正确的是()答案:IPSec属于网络层的安全解决方案17.以下关于入侵检测系统(IDS)的说法正确的是()答案:入侵检测系统可分为主机入侵检测系统和网络入侵检测系统18.以下不属于ISO 7498-2和ITU-T X.800规定的安全服务的有()答案:加密(Encryption)19.以下关于UDP协议的说法不正确的是()答案:UDP是面向连接的协议20.以下关于安全漏洞的说法不正确的有()答案:软件是产生安全漏洞的唯一原因21.下列哪项不是动态路由选择协议()答案:CDP22.OSI关于7层通信协议模型从下到上依次为()答案:应用层表示层会话层传输层网络层链路层物理层23.按照每次处理数据块的长度不同,密码算法可分为()答案:分组密码算法和序列密码算法24.下列关于DES加密算法的说法中正确的是()答案:DES的中文意思是数据加密标准25.下列哪些方法可以防止重放攻击()答案:时戳机制26.下列关于数字签名说法正确的是()答案:数字签名不可改变27.已知明文攻击是指()答案:攻击者Oscar拥有具有明文串x和相应的密文y28.为了使用RSA加密算法,Alice选择了两个素数:pa=17,pb=11,以及随机数ea=7作为自己的公钥,则Alice的私钥是()答案:2329.RFC 1321中以下关于MD5的说法正确的有()答案:MD5的输入可以为任意长,但是其输出是128位30.美国国家标准学会(ANSI)制订的FIPS PUB 180和180-1中关于SHA-1说法正确的有()答案:SHA-1的输入不能为任意长,但其输出是160位31.以下关于IPSec中的密钥管理说法正确的有()答案:互联网络安全关联和密钥管理协议(IAKMP)是IPSec密钥管理的框架32.以下关于入侵检测系统的说法正确的是()答案:入侵检测系统分为主机入侵检测和网络入侵检测33.以下关于计算机犯罪(Computer Crime)说法最正确的是()答案:行为人通过计算机操作所实施的危害计算机信息系统(包括内存数据及程序)安全以及其他严重危害社会的并应当处以刑罚的行为34.目前,得到许多国家认可的信息安全管理标准是()答案:BS779935.MD5常用与数据()保护答案:机密36.拒绝服务攻击的后果是()答案:以上都是37.下列设备中属于物理层的设备是()答案:中继器38.ARP的功能是()答案:由目标的IP地址求目标的MAC地址39.以下哪项不是公钥密码体制的特点()答案:保密通信双方需共享密钥40.包过滤发生在哪一层()答案:网络层41.屏蔽子网结构过滤防火墙中,堡垒主机位于()答案:周边网络42.在某单位的网络安全方案中,采用隔离网闸实现物理隔离其中,网络物理隔离的基本思想是()答案:内外网隔开,但分时对一存储设备进行写和读,间接实现信息交换43.NAT(网络地址转换)的功能是什么()答案:实现私有IP地址与公共IP地址的相互转换44.在网络中分配IP地址可以采用静态地址或动态地址方案。

MCSE标准考试科目

MCSE标准考试科目

通过微软认证MCSE2003+security可同时获得5个证书:(MCP+MCSA+MCSAS+MCSE+MCSES):(1)MCP Microsoft Certified Professionals 微软认证专家(2)MCSA Microsoft Certified System Administrator 微软认证系统管理员(3)MCSAS Microsoft Certified System Administrator Security 微软认证系统管理员(安全)(4)MCSE Microsoft Certified System Engineer 微软认证系统工程师(5)MCSES Microsoft Certified System Engineer Security 微软认证系统工程师(安全)MCSE安全Exam 70–270:Installing, Configuring, and Administering Microsoft Windows XP1(安装,配置和管理windowsXP)Exam 70–290:Managing and Maintaining a Microsoft Windows Server 2003 Environment(管理和维护2003环境)Exam 70–291:Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure(实现,管理和维护2003网络架构)Exam 70–293:Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure(计划和维护2003网络架构)Exam 70–294:Planning, Implementing, and Maintaining a Microsoft Windows Server 2003Active Directory Infrastructure(计划,实现和管理2003活动目录架构)Exam 70–298:Designing Security for a Microsoft Windows Server 2003 Network(设计安全的2003网络)Exam 70-299(构建和管理Microsoft Server 2003的网络安全)Exam 70-350 Installing, Configuring, and Administering Microsoft Internet Security and Acceleration (ISA) Server 2004, Enterprise Edition(安装配置和管理ISA2004企业版)MCDBAExam 70–228:Installing, Configuring, and Administering Microsoft SQL Server 2000 EnterpriseEdition(安装,配置和管理SQL2000server企业版)Exam 70-229:SQL server 2000Database Design and Implementaton(设计和实现SQL2000server企业版)1、微软认证MCSE2008Openlab全国首推Windows Server 2008的课程,全新展示了Windows Server 2008新特性,让您更快,更好的去驾驭新的系统平台。

微软认证70-642模拟题2019年(4)_真题-无答案

微软认证70-642模拟题2019年(4)_真题-无答案

微软认证70-642模拟题2019年(4)(总分150,考试时间60分钟)多项选择题下列各题的备选答案中,至少有一个是符合题意的,请选出所有符合题意的备选答案。

1. 你的网络有一台名为Server1的WSUS服务器。

Server1为Site1和Site2两个站点的客户端计算机提供更新服务。

在Server1上,有一个名为Group1的计算机组中的计算机被配置为自动批准更新。

你要确保在site2站点中新加入的计算机会被自动添加到Group1中.你需要执行以下哪两个操作? (每一项是解决方案中的一部分,选择两项)A. 创建一个新的自动批准规则.B. 在WSUS控制台修改计算机选项.C. 在WSUS控制台修改自动审批选项.D. 创建一个GPO,将计算机加入到Group1.单项选择题下列各题的备选答案中,只有一个是符合题意的。

2. 你的网络中包含一台名为Server1的打印服务器。

Server 1上连接着三台共享的打印机,分别名为Printer1,Printer2和Printer3.三台打印机使用不同的驱动程序,你需要确保当Printer1出现异常后,用户依旧能够使用Printer2 和Printer3,请问如何才能实现这一目的?A. 添加一个驱动过滤.B. 添加一个打印机过滤.C. 修改打印进程设置.D. 修改驱动隔离设置.3. 你的网络中包含一个活动目录域,你有一台运行Windows Server 2008 R2名为Server1的打印服务器。

你部署了一个新的打印设备并创建了共享打印机。

你要确保只有市场部的用户可以使用这个打印机打印彩色图片,其他用户只能打印黑白文档.请问如何配置可以实现这一目标?A. 创建一个新的打印机接口.B. 创建一个额外的打印机共享.C. 修改域中的打印机对象.D. 修改打印机共享的属性.4. 你的网络中包含一个活动目录域,域中有一台名为Server1的打印服务器,Server1上运行Windows Server 2008 R2。

2024年卫生招聘考试之卫生招聘(计算机信息管理)通关提分题库及完整答案

2024年卫生招聘考试之卫生招聘(计算机信息管理)通关提分题库及完整答案

2024年卫生招聘考试之卫生招聘(计算机信息管理)通关提分题库及完整答案单选题(共45题)1、计算机源程序是( )。

A.计算机所有软件的集合B.计算机指令的集合C.用机器语言编写的程序D.用高级语言或汇编语言编写的程序【答案】 D2、专门为某种用途而设计的计算机,称为( )计算机。

A.专用B.通用C.普通D.模拟【答案】 A3、在C++语言中,打开一个文件就是将这个文件与一个什么建立关联( )A.流B.类C.结构D.对象【答案】 A4、在下列多路复用技术中,具有动态分配时隙的功能的是( )A.同步时分多路复用B.统计时分多路复用C.频分多路复用D.波分多路复用【答案】 B5、检索职工表中工资大于800元的职工号,正确的命令是A.SELECT职工号WHERE工资>800B.SELECT职工号FROM职工SET工资>800C.SELECT职工号FROM职工WHERE工资>800D.SELECT职工号FROM职工FOR工资>800【答案】 C6、如果表达式--x+y中,--是作为成员函数重载的,+是作为成员函数重载的,则该表达式还可为( )A.y.operator+(x.operator--(0))B.y.operator+(x.operator--())C.y.operator+(operator--(x,0))D.operator+(x.operator--())【答案】 B7、计算机之所以能够实现连续运算,是由于采用了( )工作原理。

A.布尔逻辑B.存储程序C.数字电路D.集成电路【答案】 B8、在EXCEL中,要使单元格中的值根据某一要求自动确定自身格式,可用功能A.自动套用格式B.条件格式C.“格式”菜单D.不能实现【答案】 B9、在下列不同进制中的四个数,最小的一个是A.(11011001)二进制B.(75)十进制C.(37)八进制D.(A7)十六进制【答案】 C10、关于构造函数A()的拷贝构造函数正确的是( )A.A(A*B);B.A(AB);C.A(A&B);D.A(A);【答案】 C11、下列各组设备中,全部属于输入设备的一组是A.键盘、磁盘和打印机B.键盘、扫描仪和鼠标C.键盘、鼠标和显示器D.硬盘、打印机和键盘【答案】 B12、将sk表的股票名称字段的宽度由8改为10,应使用SQL语句A.ALTERTABLEsk股票名称WlTHc1B.ALTERTABLEsk股票名称c1C.ALTERTABLEskALTER股票名称c1D.ALTERskALTER股票名称c1【答案】 C13、PPP协议是哪一层的协议?( )A.物理层B.数据链路层C.网络层D.高层【答案】 B14、用二维表数据来表示实体及实体之间联系的数据模型为A.层次模型B.网状模型C.关系模型D.E-R模型【答案】 C15、在软件测试设计中,软件测试的主要目的是A.实验性运行软件B.证明软件正确C.找出软件中全部错误D.发现软件错误而执行程序【答案】 D16、计算机病毒破坏的主要对象是A.软盘B.磁盘驱动器C.CPUD.程序和数据【答案】 D17、目前计算机病毒对计算机造成的危害主要是通过实现的。

2024年卫生招聘考试之卫生招聘(计算机信息管理)通关考试题库带答案解析

2024年卫生招聘考试之卫生招聘(计算机信息管理)通关考试题库带答案解析

2024年卫生招聘考试之卫生招聘(计算机信息管理)通关考试题库带答案解析单选题(共40题)1、目前使用的防杀病毒软件的作用是A.检查计算机是否感染病毒,清除已感染的任何病毒B.杜绝病毒对计算机的侵害C.检查计算机是否感染病毒,清除部分已感染的病毒D.查出已感染的任何病毒,清除部分已感染的病毒【答案】 C2、下列字符串中可以用作C++语言标识符的是A._1234B.foo~~barC.virtualD.34var【答案】 A3、为了实现资本最大限度的增值,企业必须要达到的目标不包括( )。

A.利润最大化B.企业产量最大化C.所有者权益最大化D.企业价值最大化【答案】 B4、程序设计语言的基本成分是数据成分、运算成分、控制成分和( )A.对象成分B.变量成分C.语句成分D.传输成分【答案】 D5、造成电信网络运营具有较高的市场退出壁垒的因素是( )。

A.产品同质B.产品异质C.沉没成本大D.无沉没成本【答案】 C6、数据库系统的核心是( )A.数据库B.数据库管理系统C.数据库模型D.软件工具【答案】 B7、计算机的三大应用领域是A.科学计算、信息处理和过程控制B.计算、打字和家教C.科学计算、辅助设计和辅助教学D.信息处理、办公自动化和家教【答案】 A8、Access数据库中数据的基本单位是( )。

A.字段B.字符C.数字D.表【答案】 B9、C++中,封装是借助于什么达到的?( )A.结构B.类C.数组D.函数【答案】 B10、以下各选项组中,均是C++语言关键字的组是A.public operator thisB.shod string staticC.it while >=D.private cout printf【答案】 A11、下列英文缩写中,( )表示计算机辅助教学。

A.CAIB.CAEC.CAMD.CAT【答案】 A12、软件工程的理论和技术性研究的内容主要包括软件开发技术和A.消除软件危机B.软件工程管理C.程序设计自动化D.实现软件可重用【答案】 B13、要同时打开多个数据表文件,选择不同的工作区可使用的命令是EB.OPENC.SELECTD.以上命令均可【答案】 C14、目前计算机高级语言有很多,例如( )。

2022年-2023年卫生招聘考试之卫生招聘(计算机信息管理)高分通关题型题库附解析答案

2022年-2023年卫生招聘考试之卫生招聘(计算机信息管理)高分通关题型题库附解析答案

2022年-2023年卫生招聘考试之卫生招聘(计算机信息管理)高分通关题型题库附解析答案单选题(共50题)1、Internet提供的服务有很多,( )表示电子邮件。

A.E-mailB.FTPC.WWWD.BBS【答案】 A2、在微机中存储一个汉字需( )个字节。

A.4B.3C.2D.1【答案】 C3、计算机系统由( )组成。

A.主机和显示器B.微处理器和软件组成C.硬件系统和应用软件系统D.硬件系统和软件系统【答案】 D4、若已定义的函数有返回值,则以下关于该函数调用的叙述中错误的是( )A.函数调用可以作为独立的语句存在B.函数调用可以无返回值C.函数调用可以出现在表达式中D.函数调用可以作为一个函数的形参【答案】 D5、下列说法正确的是A.内联函数在运行时是将该函数的目标代码插入每个调用该函数的地方B.内联函数在编译时是将该函数的目标代码插入每个调用该函数的地方C.类的内联函数必须在类体内定义D.类的内联函数必须在类体外通过加关键字inline定义【答案】 B6、执行语句 for(i=1;i++<4;);,后变量 i 的值是A.3B.4C.5D.不定【答案】 C7、下面是对将表移出数据库后的描述,其中正确的是A.将表移出数据库后就是将该表删除B.将表移出数据库后,该表就不存在了C.将该袁移出的操作不会影响当前数据库中与该表有联系的其他袁D.被移出的表成为自由表【答案】 D8、下列选项中,不属于计算机病毒特征的是A.破坏性B.潜伏性C.传染性D.免疫性【答案】 D9、函数UPPER(“12ab34CD”)的结果是A.12AB34CDB.12ab34CDC.12ab34cdD.12AB34cd【答案】 A10、利用Word提供的“模糊查找”功能,查找分散在文档的“色”前面一个汉字,可在“查找内容”文本框中输入( )。

A.*色B.?色C.?色,同时选择“高级”标签下的“使用通配符”选项D.?色,同时选择“高级”标签下的“全字匹配”选项【答案】 C11、( )是目前网上传播病毒的主要途径,此外,下载文件也存在病毒入侵的可能。

卫生招聘考试之卫生招聘(计算机信息管理)通关练习题库提供答案解析

卫生招聘考试之卫生招聘(计算机信息管理)通关练习题库提供答案解析

卫生招聘考试之卫生招聘(计算机信息管理)通关练习题库提供答案解析单选题(共20题)1. 在某个程序模块中使用命令PRIVATEXI定义一个内存变量,则变量XIA.可以在该程序的所有模块中使用B.只能在定义该变量的模块中使用C.只能在定义该变量的模块及其上层模块中使用D.只能在定义该变量的模块及其下属模块中使用【答案】 D2. 若所建立索引的字段值不允许重复,并且一个表中只能创建一个,它应该是A.主索引B.唯一索引C.候选索引D.普通索引【答案】 A3. 表示在输出时显示小数位,和在文件输入时判断文件尾的函数分别是( )A.showbase()和eof()B.showpoint()和eof()C.showpoint()和bad()D.showpoint()和good()【答案】 B4. 计算机病毒是指A.编译出现错误的计算机程序B.设计不完善的计算机程序C.遭到人为破坏的计算机程序D.以危害计算机软硬件系统为目的设计的计算机程序【答案】 D5. 利用SETRELATION命令可以建立两个表之间的关联,该关联是A.永久性联系B.临时性联系C.任意的联系D.以上说法均不正确【答案】 B6. 不能作为重载函数的调用的依据是A.参数个数B.参数类型C.函数类型D.函数名称【答案】 D7. CD.-R光盘的特性是( )。

A.只能读出,不能写入B.写入只能一次,但读出可以反复多次C.只能写入,不能读出D.既能多次读出,又能多次写入【答案】 B8. 下列选项中,不属于计算机病毒特征的是A.破坏性B.潜伏性C.传染性D.免疫性【答案】 D9. 通过改变载波信号的相位值来表示数字信号1和0的编码方式是( )A.ASKB.FSKC.PSKD.NRZ【答案】 C10. 下列说法中,不正确的是( )。

A.计算机黑客是指那些制造计算机病毒的人。

B.黑客多数是利用计算机进行犯罪活动,例如窃取国家机密C.黑客攻击网络的主要手段之一是寻找系统漏洞。

计算机考试试题(精选)bmc

计算机考试试题(精选)bmc

计算机考试试题(精选)一、单项选择题1.通过阻塞的方式使服务器停止服务是对网络()的威胁。

A 保密性B 完整性C 可用性D 一致性答案:C2.在Windows中,拖动鼠标执行复制操作时,鼠标光标的箭头尾部()。

A 带有“!”号B 带有“+”号C 带有“%”号D 不带任何符号答案:B3.下面不能登陆自己在搜狐的免费邮箱的是()。

A 在HTTP://页面中的搜狐通行证中输入自己邮箱帐号和密码B 在HTTP://页面开头的用户名和密码中输入自己邮箱帐号和密码C 在HTTP://页面中的VIP邮箱登录中输入自己邮箱帐号和密码D 点击HTTP://页面中的“通行证”或导航栏“邮件”到相关页面输入帐号密码答案:C4.在Windows中,下列关于应用程序窗口的描述,不正确的是()。

A 一个应用程序窗口可含多个文档窗口B 一个应用程序窗口与多个应用程序相对应C 应用程序窗口最小化后,其对应的程序仍占用系统资源D 应用程序窗口关闭后,其对应的程序结束运行答案:B5.微型计算机硬件中常说的 PentiumII ? PentiumIII 和 Pentium4 是指() ?A 微型计算机的存储器类型B 微型计算机的主板类型C 微型计算机主板的控制芯片类型D 微型计算机的微处理器类型答案:D6.微软公司的Word属于()。

A 计算工具B 文字处理系统C 操作系统D 动画处理工具答案:B7.在PowerPoint中打开文件,正确的说法是()。

A 只能打开一个演示文稿B 最多打开三个演示文稿C 能打开多个演示文稿,但不能同时将它们打开D 能打开多个演示文稿,可以同时将它们打开答案:D8.电脑电源盒中引出的供机内各部件使用的电源线中,黄线是()伏。

A +3.3VB CD B +12VC +10VD +5V答案:B9.ADSL宽带接入Internet,不需要()。

A 普通的ModemB 以太网网卡C ADSL ModemD 一条电话线并申请开通ADSL服务答案:A10.IE中给链接加下划线在哪个选项中设置()。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

1. Your company is designing its public network. The network will use an IPv4 range of 131.107.40.0/22. The network must be configured as shown in the following exhibit.You need to configure subnets for each segment.Which network addresses should you assign?A. Segment A: 131.107.40.0/23Segment B: 131.107.42.0/24Segment C: 131.107.43.0/25Segment D: 131.107.43.128/27B. Segment A: 131.107.40.0/25Segment B: 131.107.40.128/26Segment C: 131.107.43.192/27Segment D: 131.107.43.224/30C. Segment A: 131.107.40.0/23Segment B: 131.107.41.0/24Segment C: 131.107.41.128/25Segment D: 131.107.43.0/27D. Segment A: 131.107.40.128/23Segment B: 131.107.43.0/24Segment C: 131.107.44.0/25Segment D: 131.107.44.128/27Answer: A2. Your company has an IPv6 network that has 25 segments. You deploy a server on the IPv6 network.You need to ensure that the server can communicate with all segments on the IPv6 network.What should you do?A. Configure the IPv6 address as fd00::2b0:d0ff:fee9:4143/8.B. Configure the IPv6 address as fe80::2b0:d0ff:fee9:4143/64.C. Configure the IPv6 address as ff80::2b0:d0ff:fee9:4143/64.D. Configure the IPv6 address as 0000::2b0:d0ff:fee9:4143/64.Answer: A3. Your company is designing its network. The network will use an IPv6 prefix of 2001:DB8:BBCC:0000::/53.You need to identify an IPv6 addressing scheme that will support 2000 subnets.Which network mask should you use?A. /61B. /62C. /63D. /64Answer: D4. Your company uses DHCP to lease IPv4 addresses to computers at the main office. A WAN link connects the main office to a branch office. All computers in the branch office are configured with static IP addresses. The branch office does not use DHCP and uses a different subnet.You need to ensure that the portable computers can connect to network resources at themain office and the branch office.How should you configure each portable computer?A. Use a static IPv4 address in the range used at the branch office.B. Use an alternate configuration that contains a static IP address in the range used at the main office.C. Use the address that was assigned by the DHCP server as a static IP address.D. Use an alternate configuration that contains a static IP address in the range used at the branch office.Answer: D5. Your company has computers in multiple locations that use IPv4 and IPv6. Each location is protected by a firewall that performs symmetric NAT.You need to allow peer-to-peer communication between all locations.What should you do?A. Configure dynamic NAT on the firewall.B. Configure the firewall to allow the use of Teredo.C. Configure a link local IPv6 address for the internal interface of the firewall.D. Configure a global IPv6 address for the external interface of the firewall.Answer: B6. You have a Windows Server 2008 R2 computer that has an IP address of 172.16.45.9/21.The server is configured to use IPv6 addressing.You need to test IPv6 communication to a server that has an IP address of 172.16.40.18/21.What should you do from a command prompt?A. Type ping 172.16.45.9:::::.B. Type ping ::9.45.16.172.C. Type ping followed by the Link-local address of the server.D. Type ping followed by the Site-local address of the server.Answer: C7. Your company has four DNS servers that run Windows Server 2008 R2. Each server has a static IP address.You need to prevent DHCP from assigning the addresses of the DNS servers to DHCP clients.What should you do?A. Create a new scope for the DNS servers.B. Create a reservation for the DHCP server.C. Configure the 005 Name Servers scope option.D. Configure an exclusion that contains the IP addresses of the four DNS servers. Answer: D8. You have a DHCP server named Server1 and an application server named Server2. Both servers run Windows Server 2008 R2. The DHCP server contains one scope.You need to ensure that Server2 always receives the same IP address. Server2 must receive its DNS settings and its WINS settings from DHCP.What should you do?A. Create a multicast scope.B. Assign a static IP address to Server2.C. Create an exclusion range in the DHCP scope.D. Create a DHCP reservation in the DHCP scope.Answer: D9. You have a DHCP server that runs Windows Server 2008 R2.You need to reduce the size of the DHCP database.What should you do?A. From the DHCP snap-in, reconcile the database.B. From the folder that contains the DHCP database, run jetpack.exe dhcp.mdb temp.mdb.C. From the properties of the dhcp.mdb file, enable the File is ready for archiving attribute.D. From the properties of the dhcp.mdb file, enable the Compress contents to save disk space attribute.Answer: B10. You have a DHCP server that runs Windows Server 2008 R2. The DHCP server has two network connections named LAN1 and LAN2.You need to prevent the DHCP server from responding to DHCP client requests on LAN2. The server must continue to respond to non-DHCP client requests on LAN2.What should you do?A. From the DHCP snap-in, modify the bindings to associate only LAN1 with the DHCP service.B. From the DHCP snap-in, create a new multicast scope.C. From the properties of the LAN1 network connection, set the metric value to 1.D. From the properties of the LAN2 network connection, set the metric value to 1. Answer: A11. You have a DHCP server that runs Windows Server 2008 R2.You restore the DHCP database by using a recent backup.You need to prevent DHCP clients from receiving IP addresses that are currently in use on the network.What should you do?A. Add the DHCP server option 15.B. Add the DHCP server option 44.C. Set the Conflict Detection value to 0.D. Set the Conflict Detection value to 2.Answer: D12. Your network uses IPv4.You install a server that runs Windows Server 2008 R2 at a branch office. The server isconfigured with two network interfaces.You need to configure routing on the server at the branch office.Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)A. Install the Routing and Remote Access Services role service.B. Run the netsh ras ip set access ALL command.C. Run the netsh interface ipv4 enable command.D. Enable the IPv4 Router Routing and Remote Access option.Answer: AD13. Your company has an IPv4 Ethernet network.A router named R1 connects your segment to the Internet. A router named R2 joins your subnet with a segment named Private1. The Private1 segment has a network address of 10.128.4.0/26.Your computer named WKS1 requires access to servers on the Private1 network.The WKS1 computer configuration is as shown in the following table.The routers are configured as shown in the following table.WKS1 is unable to connect to the Private1 network by using the current configuration. You need to add a persistent route for the Private1 network to the routing table on WKS1. Which command should you run on WKS1?A. Route add -p 10.128.4.0/22 10.128.4.1B. Route add –p 10.128.4.0/26 10.128.64.10C. Route add –p 10.128.4.0 mask 255.255.255.192 10.128.64.1D. Route add –p 10.128.64.10 mask 255.255.255.192 10.128.4.0Answer: B14. Your network contains one Active Directory domain. You have a member server that runs Windows Server 2008 R2.You need to immediately disable all incoming connections to the server.What should you do?A. From the Services snap-in, disable the IP Helper.B. From the Services snap-in, disable the Netlogon service.C. From Windows Firewall, enable the Block all connections option on the Public Profile.D. From Windows Firewall, enable the Block all connections option on the Domain Profile. Answer: D15. Your network consists of a single Active Directory domain. The domain contains a server named Server1 that runs Windows Server 2008 R2. All client computers run Windows 7. All computers are members of the Active Directory domain.You assign the Secure Server (Require Security) IPsec policy to Server1 by using a Group Policy object (GPO).Users report that they fail to connect to Server1.You need to ensure that users can connect to Server1. All connections to Server1 must be encrypted.What should you do?A. Restart the IPsec Policy Agent service on Server1.B. Assign the Client (Respond Only) IPsec policy to Server1.C. Assign the Server (Request Security) IPsec policy to Server1.D. Assign the Client (Respond Only) IPsec policy to all client computers.Answer: D16. Your company uses Active Directory-integrated DNS. Users require access to the Internet.You run a network capture. You notice the DNS server is sending DNS name resolution queries to a server named .You need to prevent the DNS server from sending queries to . The server must be able to resolve names for Internet hosts.Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)A. Enable forwarding to your ISP’s DNS servers.B. Disable the root hints on the DNS server.C. Disable the netmask ordering option on the DNS server.D. Configure Reverse Lookup Zones for the IP subnets on the network.Answer: AB17. Your company has a single Active Directory forest that has six domains. All DNS servers in the forest run Windows Server 2008 R2.You need to ensure that all public DNS queries are channeled through a single-caching-only DNS server.Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)A. Disable the root hints.B. Enable BIND secondaries.C. Configure a forwarder to the caching DNS server.D. Configure a GlobalNames host (A) record for the hostname of the caching DNS server. Answer: AC18. Contoso Ltd. has a single Active Directory forest that has five domains. Each domain has two DNS servers. Each DNS server hosts Active Directory-integrated zones for all five domains. All domain controllers run Windows Server 2008 R2.Contoso acquires a company named T ailspin Toys. Tailspin Toys has a single Active Directory forest that contains a single domain.You need to configure the DNS system in the Contoso forest to provide name resolution for resources in both forests.What should you do?A. Configure client computers in the Contoso forest to use the Tailspin Toys DNS server as the alternate DNS server.B. Create a new conditional forwarder and store it in Active Directory. Replicate the new conditional forwarder to all DNS servers in the Contoso forest.C. Create a new application directory partition in the Contoso forest. Enlist the directory partition for all DNS servers.D. Create a new host (A) record in the GlobalNames folder on one of the DNS servers in the Contoso forest. Configure the host (A) record by using the Tailspin Toys domain name and the IP address of the DNS server in the Tailspin Toys forest.Answer: B19. Your company has a single Active Directory forest that has an Active Directory domain named . A server named Server1 runs the DNS Server server role.You notice stale resource records in the zone. You have enabled DNS scavenging on Server1. Three weeks later, you notice that the stale resource records remain in .You need to ensure that the stale resource records are removed from . What should you do?A. Stop and restart the DNS Server service on Server1.B. Enable DNS scavenging on the zone.C. Run the dnscmd Server1 /AgeAllRecords command on Server1.D. Run the dnscmd Server1 /StartScavenging command on Server1.Answer: B20. Your company has two servers that run Windows Server 2008 R2 named Server2 andServer3. Both servers have the DNS Server server role installed. Server3 is configured to forward all DNS requests to Server2.You update a DNS record on Server2.You need to ensure that Server3 is able to immediately resolve the updated DNS record. What should you do?A. Run the dnscmd . /clearcache command on Server3.B. Run the ipconfig /flushdns command on Server3.C. Decrease the Time-to-Live (TTL) on the Start of Authority (SOA) record of to 15 minutes.D. Increase the Retry Interval value on the Start of Authority (SOA) record of to 15 minutes.Answer: A21. Your company has a main office and a branch office. The company network has two WINS servers. You have an application that requires NetBIOS name resolution.The WINS servers are configured as shown in the following table.You discover that the WINS addresses on all client computers in both offices are configured in the following order of use:10.1.0.2310.6.0.254You reconfigure the WINS addresses on all client computers in the branch office in the following order of use:10.6.0.25410.1.0.23After the reconfiguration, users in the branch office are unable to connect to the servers that are located in the main office.You need to restore name resolution in the branch office.What should you do?A. Configure the burst handling option on DC2.B. Configure DC1 and DC2 as WINS push/pull replication partners.C. In the WINS server properties on DC1, increase the Renew interval setting to 1 day.D. In the WINS server properties on DC2, increase the Renew interval setting to 1 day. Answer: B22. Your company has a server named Server1 that runs a Server Core installation of Windows Server 2008 R2, and the DNS Server server role. Server1 has one network interface named Local Area Connection. The static IP address of the network interface is configured as 10.0.0.1.You need to create a DNS zone named on Server1.Which command should you use?A. ipconfig /registerdns:B. dnscmd Server1 /ZoneAdd /DSPrimaryC. dnscmd Server1 /ZoneAdd /Primary /file .dnsD. netsh interface ipv4 set dnsserver name=”” static 10.0.0.1 primary Answer: C23. Your company has a single domain named . The DNS zone is Active Directory-integrated.Your partner company has a single domain named . The DNS zone is Active Directory-integrated.The IP addresses of the DNS servers in the partner domain will change.You need to ensure name resolution for users in to resources in . What should you do?A. Create a stub zone for on each DNS server in .B. Configure the Zone Replication Scope for to replicate to all DNS servers in the forest.C. Configure an application directory partition in the forest. Enlist all DNS servers in the forest in the partition.D. Configure an application directory partition in the partner forest. Enlist all DNS servers in the partner forest in the partition.Answer: A24. Your company has an Active Directory forest. All domain controllers run the DNS Server server role.The company plans to decommission the WINS service.You need to enable forest-wide single name resolution.What should you do?A. Enable WINS-R lookup in DNS.B. Create Service Location (SRV) records for the single name resources.C. Create an Active Directory-integrated zone named LegacyWINS. Create host (A) records for the single name resources.D. Create an Active Directory-integrated zone named GlobalNames. Create host (A) records for the single name resources.Answer: D25. You manage a domain controller that runs Windows Server 2008 R2 and the DNS Server server role.The DNS server hosts an Active Directory-integrated zone for your domain.You need to provide a user with the ability to manage records in the zone. The user must not be able to modify the DNS server settings.What should you do?A. Add the user to the DNSUpdateProxy Global security group.B. Add the user to the DNSAdmins Domain Local security group.C. Grant the user permissions on the zone.D. Grant the user permissions on the DNS server.Answer: C26. Your company has multiple DNS servers in the main office.You plan to install DNS on a member server in a branch office.You need to ensure that the DNS server in the branch office is able to query any DNS server in the main office, and you need to limit the number of DNS records that are transferred to the DNS server in the branch office.What should you do?A. Configure a secondary zone on the DNS server in the branch office.B. Configure a stub zone on the DNS server in the branch office.C. Configure a stub zone on the DNS server in the main office.D. Configure a primary zone on the DNS server in the branch office.Answer: B27. Your company has a main office and two branch offices that are connected by WAN links. The main office runs the DNS Server service on three domain controllers. The zone for your domain is configured as an Active Directory-integrated zone.Each branch office has a single member server that hosts a secondary zone for the domain. The DNS servers in the branch offices use the main office DNS server as the DNS Master server for the zone.You need to minimize DNS zone transfer traffic over the WAN links.What should you do?A. Decrease the Retry Interval setting in the Start of Authority (SOA) record for the zone.B. Decrease the Refresh Interval setting in the Start of Authority (SOA) record for the zone.C. Increase the Refresh Interval setting in the Start of Authority (SOA) record for the zone.D. Disable the netmask ordering option in the properties of the DNS Master server for the zone.Answer: C28. Your company has a main office and two branch offices. Domain controllers in themain office host an Active Directory-integrated zone.The DNS servers in the branch offices host a secondary zone for the domain and use the main office DNS servers as the DNS Master servers for the zone.Each branch office has an application server. Users access the application server by using its fully qualified domain name.You need to ensure that users in the branch offices can access their local application server even if the WAN links are down for three days.What should you do?A. Increase the Expires After setting to 4 days on the Start of Authority (SOA) record for the zone.B. Increase the Refresh Interval setting to 4 days on the Start of Authority (SOA) record for the zone.C. Configure the Zone Aging / Scavenging Properties dialog box to enable Scavenge stale resource records, and set the Refresh setting to 4 days.D. Configure the Zone Aging / Scavenging Properties dialog box to enable Scavenge stale resource records, and set the No-refresh interval setting to 4 days.Answer: A29. Your company has a single Active Directory domain. All servers run Windows Server 2008 R2.You install an additional DNS server that runs Windows Server 2008 R2.You need to delete the pointer record for the IP address 10.3.2.127.What should you do?A. Use DNS manager to delete the 127.in-addr.arpa zone.B. Run the dnscmd /RecordDelete 10.3.2.127 command at the command prompt.C. Run the dnscmd /ZoneDelete 127.in-addr.arpa command at the command prompt.D. Run the dnscmd /RecordDelete 10.in-addr.arpa. 127.2.3 PTR command at the command prompt.Answer: D30. Your company has a server that runs Windows Server 2008 R2.You have a new application that locates remote resources by name. The new application requires IPv6.You need to ensure that the application can locate remote resources by using IPv6.What should you do?A. Create a new Pointer (PTR) DNS record.B. Create a new Quad-A (AAAA) DNS record.C. Create a new Signature (SIG) DNS record.D. Create a new Route Through (RT) DNS record.Answer: B31. You are building a test environment to evaluate DNS Security Extensions (DNSSEC). You have a domain controller named Server1 that runs Windows Server 2008 R2 in your test environment. Server1 has the DNS Server server role installed.You need to configure Server1 to support the DNSSEC evaluation.Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)A. Create a new Quad-A (AAAA) DNS record.B. Create a new Signature (SIG) DNS record.C. Create a new Public key (KEY) DNS record.D. Create a new Well-known service (WKS) DNS record.Answer: BC32. Your company has a domain controller that runs Windows Server 2008 R2 and the DNS role. The DNS domain is named .You need to ensure that inquiries about are sent to dnsadmin@.What should you do?A. Create a Signature (SIG) record for the domain controller.B. Modify the Name Server (NS) record for the domain controller.C. Modify the Service Location (SRV) record for the domain controller.D. Modify the Start of Authority (SOA) record on the domain controller.Answer: D33. Your company has a domain controller named Server1 that runs Windows Server 2008 R2 and the DNS server role. A server named Server2 runs Windows Server 2003 and Microsoft Exchange Server 2007.The company wants to deploy a new Exchange server named Server3 to receive all inbound e-mail traffic.You need to configure DNS to direct incoming e-mail traffic to the Exchange servers. You also need to ensure that higher priority is given to Server3.What should you do?A. Set the priority value of the Server2 Mail Exchanger (MX) record to 20. Create a new Mail Exchanger (MX) record for Server3. Set the priority value to 5.B. Set the priority value of the Server2 Mail Exchanger (MX) record to 5. Create a new Mail Exchanger (MX) record for Server3. Set the priority value to 20.C. Create a new Service Location (SRV) record in the domain for Server3. Set the port number value to 25. Configure the priority setting to 20.D. Create a new Service Location (SRV) record in the domain for Server3. Set the port number value to 110. Configure the priority setting to 5.Answer: A34. Your company has a domain controller named Server1 that runs Windows Server 2008 R2 and the DNS Server server role. A server named Server2 runs a custom application.You need to configure DNS to include the following parameters for the custom application: ·Service·Priority·Weight·Protocol·Port number·Host offering this serviceWhich record should you create?A. Host Info (HINFO)B. Service Location (SRV)C. Canonical Name (CNAME)D. Well-Known Service (WKS)Answer: B35. Your company has a domain controller named Server1 that runs Windows Server 2008 R2. Server1 has the DNS Server server role installed.You need to configure the DNS server to resolve IP addresses to host names.Which record should you create?A. Pointer (PTR)B. Host Info (HINFO)C. Service Location (SRV)D. Canonical Name (CNAME)Answer: A36. Your company has a main office and two branch offices. Domain controllers in the main office host an Active Directory-integrated zone.The DNS servers in the branch offices host a secondary zone for the domain and use the main office DNS servers as their DNS Master servers for the zone.The company adds a new branch office. You add a member server named Branch3 and install the DNS Server server role on the server. You configure a secondary zone for the domain. The zone transfer fails.You need to configure DNS to provide zone data to the DNS server in the new branch office.What should you do?A. Run dnscmd by using the ZoneResetMasters option.B. Run dnscmd by using the ZoneResetSecondaries option.C. Add the new DNS server to the Zone Transfers tab on one of the DNS servers in the main office.D. Add the new DNS server to the DNSUpdateProxy Global security group in Active Directory Users and Computers.Answer: C37. Your company has a main office and a branch office. The main office has a domain controller named DC1 that hosts a DNS primary zone. The branch office has a DNS server named SRV1 that hosts a DNS secondary zone. All client computers are configured to use their local server for DNS resolution.You change the IP address of an existing server named SRV2 in the main office.You need to ensure that SRV1 reflects the change immediately.What should you do?A. Restart the DNS Server service on DC1.B. Run the dnscmd command by using the /zonerefresh option on DC1.C. Run the dnscmd command by using the /zonerefresh option on SRV1.D. Set the refresh interval to 10 minutes on the Start of Authority (SOA) record. Answer: C38. Your company has a single Active Directory domain. The company has a main office and a branch office. Both the offices have domain controllers that run Active Directory-integrated DNS zones.All client computers are configured to use the local domain controllers for DNS resolution. The domain controllers at the branch office location are configured as Read-Only Domain Controllers (RODC).You change the IP address of an existing server named SRV2 in the main office.You need the branch office DNS servers to reflect the change immediately.What should you do?A. Run the dnscmd /ZoneUpdateFromDs command on the branch office servers.B. Run the dnscmd /ZoneUpdateFromDs command on a domain controller in the main office.C. Change the domain controllers at the branch offices from RODCs to standard domain controllers.D. Decrease the Minimum (default) TTL option to 15 minutes on the Start of Authority (SOA) record for the zone.Answer: A39. Your company has a single Active Directory domain.The company has a main office and three branch offices. The domain controller in the main office runs Windows Server 2008 R2 and provides DNS for the main office and all of the branch offices. Each branch office contains a file server that runs Windows Server 2008 R2.Users in the branch offices report that it takes a long time to access network resources. You confirm that there are no problems with WAN connectivity or bandwidth.You need to ensure that users in the branch offices are able to access network resources as quickly as possible.Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)A. Configure a standard primary zone in each of the branch offices.B. Configure forwarders that point to the DNS server in the main office.C. Configure a secondary zone in each of the branch offices that uses the main office DNS server as a master.D. Install DNS servers in each of the branch offices.Answer: CD40. Your company has a server named Server1 that runs Windows Server 2008 R2. Server1 runs the DHCP Server server role and the DNS Server server role. You also have a server named ServerCore that runs a Server Core installation of Windows Server 2008 R2.All computers are configured to use only Server1 for DNS resolution. The IP address of Server1 is 192.168.0.1. The network interface on all the computers is named LAN. Server1 is temporarily offline. A new DNS server named Server2 has been configured to use the IP address 192.168.0.254.You need to configure ServerCore to use Server2 as the preferred DNS server and Server1 as the alternate DNS server.What should you do?A. Run the netsh interface ipv4 add dnsserver "LAN" static 192.168.0.254 index=1 command.B. Run the netsh interface ipv4 set dnsserver "LAN" static 192.168.0.254 192.168.0.1 both command.C. Run the netsh interface ipv4 set dnsserver "LAN" static 192.168.0.254 primary command and the netsh interface ipv4 set dnsserver "LAN" static 192.168.0.1 both command.D. Run the netsh interface ipv4 set dnsserver "LAN" static 192.168.0.254 primary command and the netsh interface ipv4 add dnsserver "LAN" static 192.168.0.1 index=1 command.Answer: A41. Your company has an Active Directory domain named . All client computers run Windows 7.The company has recently acquired a company that has an Active Directory domain named . A two-way forest trust is established between the domain and the domain.You need to edit the domain Group Policy object (GPO) to enable users in the domain to access resources in the domain. What should you do?A. Configure the DNS Suffix Search List option to , .B. Configure the Allow DNS Suffix Appending to Unqualified Multi-Label Name Queries option to True.。

相关文档
最新文档