itgle.com

单选题System, machine, and user policies can be configured though AccessAdmin. How are changes  synchronized with the AccessAgent?()A written by the Administrators on the INI filesB propagated only with the Active Directory network serviceC propagated to the

题目
单选题
System, machine, and user policies can be configured though AccessAdmin. How are changes  synchronized with the AccessAgent?()
A

written by the Administrators on the INI files

B

propagated only with the Active Directory network service

C

propagated to the clients on the next Administrator access

D

propagated to clients the next time AccessAgent synchronizes with the IMS Server


相似考题
更多“单选题System, machine, and user policies can be configured though AccessAdmin. How are changes  synchronized with the AccessAgent?()A written by the Administrators on the INI filesB propagated only with the Active Directory network serviceC propagated to the”相关问题
  • 第1题:

    System, machine, and user policies can be configured though AccessAdmin. How are changes  synchronized with the AccessAgent?()

    • A、written by the Administrators on the INI files
    • B、propagated only with the Active Directory network service
    • C、propagated to the clients on the next Administrator access
    • D、propagated to clients the next time AccessAgent synchronizes with the IMS Server

    正确答案:D

  • 第2题:

    Your network contains a single Active Directory domain. Active Directory Rights Management  Services (AD RMS) is deployed on the network.     A user named User1 is a member of only the AD RMS Enterprise Administrators group. You need  to ensure that User1 can change the service connection point (SCP) for the AD RMS installation.  The solution must minimize the administrative rights of User1.     To which group should you add User1()

    • A、AD RMS Auditors
    • B、AD RMS Service Group
    • C、Domain Admins
    • D、Schema Admins

    正确答案:C

  • 第3题:

    You are the network administrator for Southridge Video. The network consists of a single Active  Directory domain named southridgevideo.com. The domain contains one domain controller. All servers  run Windows Server 2003. All client computers run Windows XP Professional. The company uses Group  Policy objects (GPOs) to configure user and computer settings. The Active Directory database and the  SYSVOL shared folder are stored on separate hard disks. The hard disk containing the SYSVOL folder  fails. Some Group Policy settings are still applied, but new users do not receive the Group Policy settings. You replace the failed disk. You discover that there are no valid backups of the SYSVOL folder. You have  a list of GUIDs and friendly names for each GPO. On the new disk, you create a new shared folder named  SYSVOL in the same location as the previous SYSVOL folder. You need to configure the network so that the user and computer settings will be applied to all users.  Which three courses of action should you take?()

    • A、 In the SYSVOL folder, create a folder named southridgevideo.com. In the southridgevideo.com folder, create a folder named Policies.
    • B、 In the SYSVOL folder, create a folder named System State. In the System State folder, create a folder named Policies.
    • C、 In the Policies folder, create a folder for each GPO. Name the folders by using the friendly name of each GPO. In the folder for each GPO, create a folder named MACHINE and a folder named USER.
    • D、 In the Policies folder, create a folder for each GPO. Name the folders by using the GUID of each GPO. In the folder for each GPO, create a folder named MACHINE and a folder named USER.
    • E、 Use Active Directory Users and Computers to open each GPO. Close each GPO without changing any settings.
    • F、 Use Active Directory Users and Computers to open each GPO. Change at least one setting in each GPO before closing it.

    正确答案:A,D,F

  • 第4题:

    You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all client computers run Windows XP Professional. XML Web services for the internal network run on a member server named TestKingSrv1, which is configured with default settings. You are a member of the local Administrators group on TestKingSrv1. You need the ability to remotely manage TestKingSrv1. You have no budget to purchase any additional licensing for your network until the next fiscal year. How should you reconfigure TestKingSrv1?()

    • A、In the System Properties dialog box, enable Remote Desktop.
    • B、Add your user account to the Remote Desktop Users local group.
    • C、In the System Properties dialog box, enable Remote Assistance.
    • D、Install Terminal Services by using Add or Remove Programs.

    正确答案:A

  • 第5题:

    You are the administrator of the desktop.com domain. You are configuring a roaming user profile for a user named Paul West. You create a user account named Paul West on the Windows 2000 server computer named server 1. You define a network profile by entering the path //server1/profile/%username% in Paul’s user account setting. When Paul logs on to a Windows 2000 Professional computer he sees the following message- “Windows can not locate your roaming profile and is attempting to log you on with your local profile which will not be propagated to the server.” The details of network cannot be found. You want to configure the roaming user profile for Paul. What should you do?()

    • A、Create a home folder for Paul.
    • B、Share the network profile directory.
    • C、Map a device to network profile directory.
    • D、Use the %username% variable to allow access.

    正确答案:B

  • 第6题:

    单选题
    You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? ()
    A

    Enable the Require domain controller to unlock policy.

    B

    Set the Number of previous logons to cache policy to 0.  

    C

    Remove all user and group accounts from the Log on locally user right. 

    D

    Remove all user and group accounts from the Access this computer from the network user right. 


    正确答案: B
    解析: 暂无解析

  • 第7题:

    单选题
    A user reports they cannot access the network share folder, the users workstation is configured to use automatic IP. When the administrator checks the IP address the response returns as 169.254.0.5. Which of the following should the administrator verify?()
    A

     That there are no DHCP relay servers

    B

     That the user account on Active Directory is not locked

    C

     That the network card driver is not installed incorrectly

    D

     The network connection is functioning


    正确答案: B
    解析: 暂无解析

  • 第8题:

    单选题
    Your company’s network has client computers that run Windows 7.    When a user attempts to log on to the domain from a computer named Client1,she receives the following message:   The system cannot log you on to this domain because the system’s computer account in its primary domain is missing or the password on that account is incorrect.  You need to ensure that the user can log on to the domain from Client1.   What should you do?()
    A

    Disjoin and rejoin Client1 to the domain.

    B

    Add the computer account for Client1 to the Domain Computers Active Directory group.

    C

    Reset the account password for Client1 through Active Directory Users and Computers.

    D

    Reset the account password for the user through Active Directory Users and Computers.


    正确答案: B
    解析: 暂无解析

  • 第9题:

    单选题
    Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server! that runs Windows Server 2012 R2. Server1 contains a virtual machine named VM1 that runs Windows Server 2012 R2.You need to ensure that a user named User1 can install Windows features on VM1. The solution must minimize the number of permissions assigned to User1. To which group should you add User1?()
    A

    Administrators on VM1

    B

    Power Users on VM1

    C

    Hyper-V Administrators on Server1

    D

    Server Operators on Server1


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    The IBM Tivoli Access Manager for Enterprise Single Sign-On IMS is configured to cache user’s wallets. The SLA for network reliability between the IMS Server and the desktop machines is 95%. The customer wants to use Graphical Identification and Authentication (GINA) replacement, and has enabled Active Directory (AD) password synchronization. The user has a cached wallet on their private desktop. Which statement is true when the network is unavailable?()
    A

    The user would not be able to log in to the wallet.

    B

    The user is able to log in with their wallet password, but the wallet is not synchronized with the server.

    C

    A user must be re-assigned to another policy template in order to change any aspects of the applied policy.

    D

    The user experiences normal operation, but AccessAgent will be unable to store newly captured  passwords.


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    Which MST configuration statement is correct?  ()
    A

     MST configurations can be propagated to other switches using VTP.

    B

     After MST is configured on a Switch, PVST+ operations will also be enabled by default.

    C

     MST configurations must be manually configured on each switch within the MST region.

    D

     MST configurations only need to be manually configured on the Root Bridge.

    E

     MST configurations are entered using the VLAN Database mode on Cisco Catalyst switches.


    正确答案: E
    解析: 暂无解析

  • 第12题:

    单选题
    How can it be determined if the IMS Server (below Version 8.0) is configured for "Active Directory (AD) deployment type 1" or "AD deployment type 2"?()
    A

    Check the server.xml on the IMS Server.

    B

    Check the database table IMSSyncDataType.

    C

    Check the System policies in the AccessAdmin.

    D

    Check the IMS Server settings of the IMS Configuration Utility.


    正确答案: A
    解析: 暂无解析

  • 第13题:

    How can you verify that you have correctly configured SSH access to your Junos device?()

    • A、user@router# show system services
    • B、user@router> show configuration services
    • C、user@router# show configuration system services
    • D、user@router# show system login

    正确答案:A

  • 第14题:

    You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? () 

    • A、Enable the Require domain controller to unlock policy.
    • B、Set the Number of previous logons to cache policy to 0.  
    • C、Remove all user and group accounts from the Log on locally user right. 
    • D、Remove all user and group accounts from the Access this computer from the network user right. 

    正确答案:B

  • 第15题:

    Your network consists of a single Active Directory domain. All servers run Windows Server 2008 R2. A server named Server1 has the Remote Desktop Services server role installed.   You notice that several users consume more than 30 percent of the CPU resources throughout the day. You need to prevent users from consuming more than 15 percent of the CPU resources. Administrators must not be limited by the amount of CPU resources that they can consume. What should you do?()

    • A、Implement Windows System Resource Manager (WSRM),and configure user policies.
    • B、Implement Windows System Resource Manager (WSRM),and configure session policies.
    • C、Configure Performance Monitor,and create a user-defined Data Collector Set.
    • D、Configure Performance Monitor,and create an Event Trace Session Data Collector Set.

    正确答案:A

  • 第16题:

    Your company’s network has client computers that run Windows 7.    When a user attempts to log on to the domain from a computer named Client1,she receives the following message:   The system cannot log you on to this domain because the system’s computer account in its primary domain is missing or the password on that account is incorrect.  You need to ensure that the user can log on to the domain from Client1.   What should you do?()

    • A、Disjoin and rejoin Client1 to the domain.
    • B、Add the computer account for Client1 to the Domain Computers Active Directory group.
    • C、Reset the account password for Client1 through Active Directory Users and Computers.
    • D、Reset the account password for the user through Active Directory Users and Computers.

    正确答案:A

  • 第17题:

    Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server! that runs Windows Server 2012 R2. Server1 contains a virtual machine named VM1 that runs Windows Server 2012 R2.You need to ensure that a user named User1 can install Windows features on VM1. The solution must minimize the number of permissions assigned to User1. To which group should you add User1?()

    • A、Administrators on VM1
    • B、Power Users on VM1
    • C、Hyper-V Administrators on Server1
    • D、Server Operators on Server1

    正确答案:A

  • 第18题:

    单选题
    Your network contains a single Active Directory domain. Active Directory Rights Management  Services (AD RMS) is deployed on the network.     A user named User1 is a member of only the AD RMS Enterprise Administrators group. You need  to ensure that User1 can change the service connection point (SCP) for the AD RMS installation.  The solution must minimize the administrative rights of User1.     To which group should you add User1()
    A

    AD RMS Auditors

    B

    AD RMS Service Group

    C

    Domain Admins

    D

    Schema Admins


    正确答案: C
    解析: 暂无解析

  • 第19题:

    单选题
    You are the network administrator for The network consists if a single Active Directory domain named All network servers run Windows Server 2003, and all client computers run Windows XP Professional. XML Web services for the internal network run on a member server named TK1,which is configured with default settings. You are a member of the local Administrators group on TK1. You need the ability to remotely manage TK1. You have no budget to purchase any additional licensing for your network until the next fiscal year. How should you reconfigure TK1?()
    A

    In the System Properties dialog box, enable Remote Desktop.

    B

    Add your user account to the Remote Desktop Users local group.

    C

    In the System Properties dialog box, enable Remote Assistance.

    D

    Install Terminal Services by using Add or Remove Programs.


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    The network administrator maps VLAN 10 through 20 to MST instance 2.  How will this information be propagated to all appropriate switches?()
    A

     Information will be carried in the RSTP BPDUs.

    B

     It will be propagated in VTP updates.

    C

     Information stored in the Forwarding Information Base and the switch will reply on query.  

    D

     Multiple Spanning Tree must be manually configured on the appropriate switches.


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    Your network consists of a single Active Directory domain. All servers run Windows Server 2008 R2. A server named Server1 has the Remote Desktop Services server role installed.   You notice that several users consume more than 30 percent of the CPU resources throughout the day. You need to prevent users from consuming more than 15 percent of the CPU resources. Administrators must not be limited by the amount of CPU resources that they can consume. What should you do?()
    A

    Implement Windows System Resource Manager (WSRM),and configure user policies.

    B

    Implement Windows System Resource Manager (WSRM),and configure session policies.

    C

    Configure Performance Monitor,and create a user-defined Data Collector Set.

    D

    Configure Performance Monitor,and create an Event Trace Session Data Collector Set.


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    You are the administrator of the desktop.com domain. You are configuring a roaming user profile for a user named Paul West. You create a user account named Paul West on the Windows 2000 server computer named server 1. You define a network profile by entering the path //server1/profile/%username% in Paul’s user account setting. When Paul logs on to a Windows 2000 Professional computer he sees the following message- “Windows can not locate your roaming profile and is attempting to log you on with your local profile which will not be propagated to the server.” The details of network cannot be found. You want to configure the roaming user profile for Paul. What should you do?()
    A

    Create a home folder for Paul.

    B

    Share the network profile directory.

    C

    Map a device to network profile directory.

    D

    Use the %username% variable to allow access.


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    System, machine, and user policies can be configured though AccessAdmin. How are changes  synchronized with the AccessAgent?()
    A

    written by the Administrators on the INI files

    B

    propagated only with the Active Directory network service

    C

    propagated to the clients on the next Administrator access

    D

    propagated to clients the next time AccessAgent synchronizes with the IMS Server


    正确答案: A
    解析: 暂无解析

  • 第24题:

    单选题
    You are configuring a roaming user profile for a Scott Peters. You create a user account named ScottP on a Windows 2000 Server. You define a network profile directory path named //Server1/Profiles/%Username%. When Scott logs onto the computer, he receives the error message, "Windows cannot locate your roaming profile and is attempting to log you on with your local profile which will not be propagated to the server. The details of network cannot be found". What should you do?()
    A

    Change the %Username% variable to ScottP.

    B

    Create a home folder for the Client computer.

    C

    Map a device to network profile directory.

    D

    Share the directory, which holds his profile.


    正确答案: D
    解析: 暂无解析