niusouti.com

单选题A customer has installed UAC in their network. They have both Windows and Linux endpoints andmust choose a deployment method that everyone can use. Which deployment method allows for multiple platforms? ()A IPsec enforcementB 802.1X enforcementC Source

题目
单选题
A customer has installed UAC in their network. They have both Windows and Linux endpoints andmust choose a deployment method that everyone can use. Which deployment method allows for multiple platforms? ()
A

IPsec enforcement

B

802.1X enforcement

C

Source IP enforcement

D

Odyssey Access Client


相似考题
参考答案和解析
正确答案: A
解析: 暂无解析
更多“单选题A customer has installed UAC in their network. They have both Windows and Linux endpoints andmust choose a deployment method that everyone can use. Which deployment method allows for multiple platforms? ()A IPsec enforcementB 802.1X enforcementC Source”相关问题
  • 第1题:

    You are deploying an ASP.NET Web application to a remote server. You need to choose a deployment method that will ensure that all IIS settings, in addition to the Web content, will deploy to the remote server. Which deployment method should you choose?()

    • A、the XCOPY command-line tool
    • B、the Copy Web Site tool
    • C、the Web Deployment tool
    • D、the Publish Web Site utility

    正确答案:C

  • 第2题:

    A Customer has a proprietary server deployment solution that uses a combination of disk imaging and application pushing technology. They need to get a working Windows 2003 image for their new servers as soon as possible for deployment with their provisioning system. Which of the following methods can achieve this?()

    • A、UseServerGuide to install Windows 2003rchase PowerVM Standard Edition for the entire system
    • B、Install Windows 2003 using the F6 supply Mass Storage Controller option
    • C、Replace Customer’s deployment solution with Tivoli Provisioning Manager for OS Deployment Director Edition
    • D、Deploy Customer’s existing image and useUXSPi to update IBM specific drivers

    正确答案:A

  • 第3题:

    A customer has installed UAC in their network. They have both Windows and Linux endpoints andmust choose a deployment method that everyone can use. Which deployment method allows for multiple platforms? ()

    • A、IPsec enforcement
    • B、802.1X enforcement
    • C、Source IP enforcement
    • D、Odyssey Access Client

    正确答案:C

  • 第4题:

    Your network has a single domain with 1,000 client computers that run Windows Vista. You are planning a deployment of Windows 7. Your company has multiple departments.   Only the sales department will use the existing target computers to run Windows 7.   You have the following requirements:Migrate the user state for each user.  Preserve the file system and existing applications for only the sales department computers.    You need to recommend the deployment method that is appropriate for the environment.    Which combination of deployment scenarios should you recommend?()

    • A、 Use the Refresh Computer method for the sales department computers. Use the New Computer method for all other computers.
    • B、 Use the Refresh Computer method for the sales department computers. Use the Replace Computer method for all other computers.
    • C、 Use the Upgrade Computer method for the sales department computers. Use the Refresh Computer method for all other computers.
    • D、 Use the Upgrade Computer method for the sales department computers. Use the Replace Computer method for all other computers.

    正确答案:D

  • 第5题:

    Your company has a single Active Directory Domain Services (AD DS) domain with Windows Server 2008 R2 member servers and 1,000 Windows 7 client computers. You are designing the deployment of a custom application.   You have the following requirements:   The application must be available to only users who need it. Minimize network traffic during deployment.   You need to design a deployment strategy that meets the requirements.   Which deployment method should you use?()

    • A、RemoteApp and Desktop Connections
    • B、software installation in Group Policy
    • C、Microsoft Application Virtualization (App-V)
    • D、Microsoft System Center Configuration Manager 2007

    正确答案:A

  • 第6题:

    单选题
    A customer asks the pSeries technical specialist to recommend which remote access (SSH or Telnet) method to use.  What question should the customer be asked to best determine the proper recommendation?()
    A

    Is there a need for a PKI Management System?

    B

    Is there a need for end-to-end encryption?

    C

    Do they currently have a Kerberos domain in place?

    D

    Which clients are installed on their desktops -- SSH, Telnet or both?


    正确答案: D
    解析: 暂无解析

  • 第7题:

    单选题
    Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows Vista computers.  You are planning to deploy Windows 7 and a custom application.   You have the following requirements:   The application must be available to only a specific group of users. You must be able to monitor application usage.   You need to design a deployment method for the custom application that meets the requirements.  Which deployment method should you use in your design?()
    A

    software installation in Group Policy

    B

    startup scripts in Group Policy

    C

    Microsoft Application Virtualization (App-V)

    D

    baseline Windows 7 image that includes the custom application


    正确答案: D
    解析: 暂无解析

  • 第8题:

    单选题
    A customer has installed UAC in their network. They have both Windows and Linux endpoints andmust choose a deployment method that everyone can use. Which deployment method allows for multiple platforms? ()
    A

    IPsec enforcement

    B

    802.1X enforcement

    C

    Source IP enforcement

    D

    Odyssey Access Client


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    You use Microsoft .NET Framework 4 to create a Windows application. You use ClickOnce technology to install the application on computers that run Windows 7 with User Access Control (UAC) enabled. The application requires access to environment variables on each computer. You need to ensure that users who do not have administrative permissions can install the application. Which deployment method should you use? ()
    A

     Start from Web.

    B

     Install from Web.

    C

     Start from network share

    D

     Install from network share.


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    A Customer has a proprietary server deployment solution that uses a combination of disk imaging and application pushing technology. They need to get a working Windows 2003 image for their new servers as soon as possible for deployment with their provisioning system. Which of the following methods can achieve this?()
    A

    UseServerGuide to install Windows 2003rchase PowerVM Standard Edition for the entire system

    B

    Install Windows 2003 using the F6 supply Mass Storage Controller option

    C

    Replace Customer’s deployment solution with Tivoli Provisioning Manager for OS Deployment Director Edition

    D

    Deploy Customer’s existing image and useUXSPi to update IBM specific drivers


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    Your network has a single domain with 1,000 client computers that run Windows Vista. You are planning a deployment of Windows 7. Your company has multiple departments.   Only the sales department will use the existing target computers to run Windows 7.   You have the following requirements:Migrate the user state for each user.  Preserve the file system and existing applications for only the sales department computers.    You need to recommend the deployment method that is appropriate for the environment.    Which combination of deployment scenarios should you recommend?()
    A

     Use the Refresh Computer method for the sales department computers. Use the New Computer method for all other computers.

    B

     Use the Refresh Computer method for the sales department computers. Use the Replace Computer method for all other computers.

    C

     Use the Upgrade Computer method for the sales department computers. Use the Refresh Computer method for all other computers.

    D

     Use the Upgrade Computer method for the sales department computers. Use the Replace Computer method for all other computers.


    正确答案: D
    解析: 暂无解析

  • 第12题:

    多选题
    Which two statements are true about using the isUserInRole method to implement security in a Java EEapplication?()
    A

    It can be invoked only from the doGet or doPost methods.

    B

    It can be used independently of the getRemoteUser method.

    C

    Can return true even when its argument is NOT defined as a valid role name in the deployment descriptor.

    D

    Using the isUserInRole method overrides any declarative authentication related to the method in which it is invoked.


    正确答案: D,C
    解析: 暂无解析

  • 第13题:

    You must configure access to the corporate network for employees using a client access method. Users require IPsec tunneling to protected resources and an 802.1X supplicant. Users will access the network using Windows platforms.Which two client access methods would support these requirements?()

    • A、Junos Pulse
    • B、Java Agent
    • C、Odyssey Access Client
    • D、Native 802.1X supplicant

    正确答案:A,C

  • 第14题:

    Which two statements are true about using the isUserInRole method to implement security in a Java EEapplication?()

    • A、It can be invoked only from the doGet or doPost methods.
    • B、It can be used independently of the getRemoteUser method.
    • C、Can return "true" even when its argument is NOT defined as a valid role name in the deployment descriptor.
    • D、Using the isUserInRole method overrides any declarative authentication related to the method in which it is invoked.

    正确答案:B,C

  • 第15题:

    All servers on your network run Windows Server 2008 R2. You are planning a deployment of a virtual desktop infrastructure (VDI). You need to estimate the number of servers required for the deployment. Which factor should you consider?()

    • A、the number of static and dynamic sessions for the VDI clients
    • B、the Remote Desktop Protocol (RDP) version that clients will connect with
    • C、the deployment method for VDI operating systems
    • D、the provisioning method for VDI desktops

    正确答案:A

  • 第16题:

    Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows 7 computers.  You are planning to deploy a custom application.   You need to schedule the deployment to occur outside of business hours and without user interaction.   Which deployment method should you choose?()

    • A、software installation with Group Policy
    • B、Microsoft Application Virtualization (App-V)
    • C、Lite Touch Installation
    • D、software deployment with Microsoft System Center Configuration Manager 2007

    正确答案:D

  • 第17题:

    You are planning a Windows 7 deployment infrastructure. You have the following requirements:   Enable network deployments of WIM images or VHDs.   Support multicast with the use of multiple stream transfer functionality. Allow drivers to be stored centrally,and use dynamic driver provisioning.    You need to design an infrastructure that meets the requirements.   Which deployment method should you recommend?()

    • A、Microsoft Deployment Toolkit (MDT) 2008
    • B、Microsoft Deployment Toolkit (MDT) 2010
    • C、Deployment Image Servicing and Management (DISM)
    • D、Windows Deployment Services in Windows Server 2008 R2

    正确答案:D

  • 第18题:

    单选题
    A Customer has a functional server deployment solution that uses a combination of disk imaging and application pushing technology. They need to get a working Windows 2003 image for their new servers as soon as possible. What method can achieve this?()
    A

    Install Windows 2003 using the F6 supply Mass Storage Controller option

    B

    Replace Customer’s deployment solution with Tivoli Provisioning Manager for OS Deployment Director Edition

    C

    Deploy Customer’s existing image and use UXSPi to update IBM specific drivers

    D

    Use ServerGuide to install Windows 2003


    正确答案: A
    解析: 暂无解析

  • 第19题:

    单选题
    You are planning a Windows 7 deployment infrastructure. You have the following requirements:   Enable network deployments of WIM images or VHDs.   Support multicast with the use of multiple stream transfer functionality. Allow drivers to be stored centrally,and use dynamic driver provisioning.    You need to design an infrastructure that meets the requirements.   Which deployment method should you recommend?()
    A

    Microsoft Deployment Toolkit (MDT) 2008

    B

    Microsoft Deployment Toolkit (MDT) 2010

    C

    Deployment Image Servicing and Management (DISM)

    D

    Windows Deployment Services in Windows Server 2008 R2


    正确答案: A
    解析: 暂无解析

  • 第20题:

    单选题
    You are deploying an ASP.NET Web application to a remote server. You need to choose a deployment method that will ensure that all IIS settings, in addition to the Web content, will deploy to the remote server. Which deployment method should you choose?()
    A

    the XCOPY command-line tool

    B

    the Copy Web Site tool

    C

    the Web Deployment tool

    D

    the Publish Web Site utility


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    Your company has a single Active Directory Domain Services (AD DS) domain with Windows Server 2008 R2 member servers and 1,000 Windows 7 client computers. You are designing the deployment of a custom application.   You have the following requirements:   The application must be available to only users who need it. Minimize network traffic during deployment.   You need to design a deployment strategy that meets the requirements.   Which deployment method should you use?()
    A

    RemoteApp and Desktop Connections

    B

    software installation in Group Policy

    C

    Microsoft Application Virtualization (App-V)

    D

    Microsoft System Center Configuration Manager 2007


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    Your company has an Active Directory Domain Services (AD DS) forest with a single domain.  A server has the Windows Deployment Services (WDS) role installed. You create a Windows 7 image.  You plan to use the Lite Touch Installation deployment method to deploy the Windows 7 image.    You need to design a deployment strategy that will install an image on unknown client computers only if administrative approval is granted.   What should you do?()
    A

    Create a multicast transmission for the Windows 7 image.

    B

    Create a unicast transmission for the Windows 7 image.

    C

    Use DHCP rogue detection on the WDS server.

    D

    Use an Auto-Add policy on the WDS server.


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows 7 computers.  You are planning to deploy a custom application.   You need to schedule the deployment to occur outside of business hours and without user interaction.   Which deployment method should you choose?()
    A

    software installation with Group Policy

    B

    Microsoft Application Virtualization (App-V)

    C

    Lite Touch Installation

    D

    software deployment with Microsoft System Center Configuration Manager 2007


    正确答案: D
    解析: 暂无解析

  • 第24题:

    单选题
    All servers on your network run Windows Server 2008 R2. You are planning a deployment of a virtual desktop infrastructure (VDI). You need to estimate the number of servers required for the deployment. Which factor should you consider?()
    A

    the number of static and dynamic sessions for the VDI clients

    B

    the Remote Desktop Protocol (RDP) version that clients will connect with

    C

    the deployment method for VDI operating systems

    D

    the provisioning method for VDI desktops


    正确答案: B
    解析: 暂无解析