题目
A. Junos Pulse should be configured with location awareness rules configured.
B. Odyssey Access Client should be installed with Host Checker configured to check the client‘s location.
C. Junos Pulse should be configured with all components installed.
D. Agentless access should be enabled so that clients can connect to any service without concern for installing an agent.
第2题
选出应填入下面一段英语中______内的正确答案。
You want to use the Web to let(1)users or your customers look(2)corporate information. But you want to keep installation at the user end(3)and you don't want just(4)to get(5)your databases.
That may be where an application server enters the picture. For more user machine independent, these software packages, typically written in the(6)programming language for use on Windows(7)-based systems, act as go-betweens(8)browser-equipped end users to the databases that(9)the information they need to(10).
第3题
You want to minimize changes to your security model and to your database applications. How should you modify the database?
A.Create a filegroup named LOOKUP. Move the lookup tables to this filegroup. Select the read only check box for the filegroup.
B.Create a database role named datamodifier. Grant SELECT permissions to the datamodifier role. Add all users to the role.
C.Deny INSERT, UPDATE, and DELETE permissions for all users. Create stored procedures that modify data in all tables except lookup tables. Require users to modify data through these stored procedures.
D.Create a view of the lookup tables. Use the view to allow users access to the lookup tables.
第4题
You log on to the computer by using the local Administrator account. You install Microsoft Office 97, a virus scanner, and other company-standard applications. You then create a RIS image of the computer you configured.
You want to configure the RIS image so that the standard applications will be accessible to the user when the user first logs on to the network. What should you do?
A.Run Rbfg.exe before installing the standard applications.
B.Run RIPrep.exe before installing the standard applications.
C.Copy the All Users profile to the Default Users profile.
D.Copy the local Administrator account profile to the Default Users profile
第5题
A. When you want all unauthenticated traffic to be redirected
B. When you want all clear text traffic to be redirected.
C. When you want all authenticated traffic to be redirected.
D. When you want all encrypted traffic to be redirected.
第6题
A. Assign the Authenticated Users group the Allow - Read & Execute permission.
B. Assign the Anonymous group the Allow - Modify permission.
C. Assign the Creator Owner group the Allow - Modify permission.
D. Assign the Creator Owner group the Allow - Full Control permission
第7题
A.
B.
C.
D.
第8题
You are the network administrator for TestKing. Your network consists of a single
Active Directory domain. You manage a Terminal Server farm that includes five
terminal servers and a Terminal Services Licensing server named testking9. All
servers run Windows 2000 Server. There are 2,500 users who log on to the terminal
servers to access a custom human resource (HR) application.
You install Windows Server 2003 on a new server named testking10. Testking10 is
configured with all default settings enabled. You install Terminal Services and the
HR application on testking10. You instruct some users to access the HR application
on testking10.
Four months later, users report that they can no longer establish Terminal Services
sessions to testking10. You verify that users can connect to the other terminal
servers in your Terminal Server farm.
You need to ensure that users can run the HR application on all terminal servers on
the network.
What should you do?()
为了保护您的账号安全,请在“赏学吧”公众号进行验证,点击“官网服务”-“账号验证”后输入验证码“”完成验证,验证成功后方可继续查看答案!