Your network consists of a single Active Directory domain. The domain contains a server that runs Windows Server 2008 R2 and that has the Remote Desktop Services server role installed.
The server has six custom applications installed.The custom applications are configured as Remote Apps.
You notice that when a user runs one of the applications,other users report that the server seems slow and that some applications become unresponsive.
You need to ensure that active user sessions receive equal access to system resources.
What should you do?()
A.Implement Remote Desktop Web Access.
B.Implement Remote Desktop Connection Broker.
C.Configure Performance Monitor.
D.Implement Windows System Resource Manager.
您可能感兴趣的试卷
你可能感兴趣的试题
Your network consists of a single Active Directory domain. The domain contains a server that runs Windows Server 2008 R2 and that has the Remote Desktop Services server role installed.
The server has six custom applications installed. The custom applications are configured as RemoteApps.
You notice that when a user runs one of the applications, other users report that the server seems slow and that some applications become unresponsive.
You need to ensure that active user sessions receive equal access to system resources.
What should you do?()
A.Implement Remote Desktop Web Access.
B.Implement Remote Desktop Connection Broker.
C.Configure Performance Monitor.
D.Implement Windows System Resource Manager.
Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2008 R2. All client computers run Windows 7. All user accounts are stored in an organizational unit (OU) named Staff. All client computer accounts are stored in an OU named Clients. You plan to deploy a new application. You need to ensure that the application deployment meets the following requirements:
èUsers must access the application from an icon on the Start menu.
èThe application must be available to remote users when they are offline.
What should you do?()
A.Publish the application to users in the Staff OU.
B.Publish the application to users in the Clients OU.
C.Assign the application to computers in the Staff OU.
D.Assign the application to computers in the Clients OU.
Your network consists of a single Active Directory domain. Your network contains 10 servers and 500 client computers. All domain controllers run Windows Server 2008 R2. A Windows Server 2008 R2 server has Remote Desktop Services installed. All client computers run Windows XP Service Pack 3. Youplan to deploy a new line-of-business application. The application requires desktop themes to be enabled.
You need to recommend a deployment strategy that meets the following requirements:
èOnly authorized users must be allowed to access the application.
èAuthorized users must be able to access the application from any client computer.
èYour strategy must minimize changes to the client computers. èYour strategy must minimize software costs.
What should you recommend?()
A.Migrate all client computers to Windows 7. Deploy the application to all client computers by using a Group Policy object (GPO).
B.Migrate all client computers to Windows 7. Deploy the application to the authorized users by using a Group Policy object (GPO).
C.Deploy the Remote Desktop Connection (RDC) 7.0 software to the client computers. Install the application on the Remote Desktop Services server. Implement Remote Desktop Connection Broker (RD Connection Broker).
D.Deploy the Remote Desktop Connection (RDC) 7.0 software to the client computers. Enable the Desktop Experience feature on the Remote Desktop Services server. Install the application on the Remote Desktop Services server.
Your network consists of a single Active Directory domain. All domain controllers run Windows Server2008 R2. Your company and an external partner plan to collaborate on a project. The external partner has an Active Directory domain that contains Windows Server 2008 R2 domain controllers.
You need to design a collaboration solution that meets the following requirements:
èAllows users to prevent sensitive documents from being forwarded to untrusted recipients or from being printed.
èAllows users in the external partner organization to access the protected content to which they have been granted rights.
èSends all inter-organizational traffic over port 443.
èMinimizes the administrative effort required to manage the external users.
What should you include in your design?()
A.Establish a federated trust between your company and the external partner. Deploy a Windows Server 2008 R2 server that has Microsoft SharePoint Foundation 2010 installed.
B.Establish a federated trust between your company and the external partner. Deploy a Windows Server 2008 R2 server that runs Microsoft SharePoint 2010 and that has the Active Directory Rights Management Services (AD?RMS) role installed.
C.Establish an external forest trust between your company and the external partner. Deploy a Windows Server 2008 R2 server that has the Active Directory Certificate Services server role installed. Implement Encrypting File System (EFS).
D.Establish an external forest trust between your company and the external partner. Deploy a Windows Server 2008 R2 server that has the Active Directory Rights Management Service (AD?RMS)role installed and Microsoft SharePoint Foundation 2010 installed.
Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2008 R2. All servers run Windows Server 2008 R2. All client computers run Windows 7.
You need to generate a monthly report on the status of software updates for the client computers.
Your solution must meet the following requirements:
èDisplay all of the operating system updates that installed successfully
èDisplay all of the Microsoft application updates that installed successfully
èDisplay all of the operating system updates that failed to install
èDisplay all of the Microsoft application updates that failed to install
èMinimize administrative effort
èMinimize costs
What should you do?()
A.Install Microsoft System Center Essentials (Essentials) 2007. Deploy management agents on all client computers.
B.Install Microsoft System Center Configuration Manager (SysMgr) 2007. Deploy management agents on all client computers.
C.Install Windows Server Update Services(WSUS)3.0SP2.Configure Windows Update byusing a Group Policy object (GPO).
D.Deploy Microsoft Baseline Security Analyzer (MBSA) 2.1 on the client computers. Run MBSA on each client computer, and save the report to a shared folder on the network.
Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2008 R2. The network contains 100 servers and 5,000 client computers. The client computers run either Windows XP Service Pack 1 or Windows 7.
You need to plan a VPN solution that meets the following requirements:
èStores VPN passwords as encrypted text
èSupports Suite B cryptographic algorithms
èSupports automatic enrollment of certificates
èSupports client computers that are configured as members of a workgroup
What should you include in your plan?()
A.Upgrade the client computers to Windows XP Service Pack 3. Implement a stand-alone certification authority (CA). Implement an IPsec VPN that uses certificate-based authentication.
B.Upgrade the client computers to Windows XP Service Pack 3. Implement an enterprise certification authority (CA) that is based on Windows Server?2008 R2. Implement an IPsec VPN that uses Kerberos authentication.
C.Upgrade the client computers to Windows 7. Implement an enterprise certification authority (CA) that is based on Windows Server 2008 R2. Implement an IPsec VPN that uses pre-shared keys.
D.Upgrade the client computers to Windows 7. Implement an enterprise certification authority (CA) that is based on Windows Server 2008 R2. Implement an IPsec VPN that uses certificate-based authentication.
Your network contains a single Active Directory domain. All domain controllers run Windows Server
2008 R2. There are 1,000 client computers that run Windows 7 and that are connected to managedswitches.
You need to recommend a strategy for network access that meets the following requirements:
èUsers are unable to bypass network access restrictions.
èOnly client computers that have up-to-date service packs installed can access the network.
èOnly client computers that have up-to-date anti-malware software installed can access the network.
What should you recommend?()
A.Implement Network Access Protection (NAP) that uses DHCP enforcement.
B.Implement Network Access Protection (NAP) that uses 802.1x enforcement.
C.Implement a Network Policy Server (NPS), and enable IPsec on the domain controllers.
D.Implement a Network Policy Server (NPS), and enable Remote Authentication Dial-In User Service (RADIUS) authentication on the managed switches.
Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2008 R2.
You need to plan an auditing strategy that meets the following requirements:
èAudits all changes to Active Directory Domain Services (AD?DS)
èStores all auditing data in a central location.
What should you include in your plan?()
A.Configure an audit policy for the domain. Configure Event Forwarding.
B.Configure an audit policy for the domain controllers. Configure Data Collector Sets.
C.Implement Windows Server Resource Manager (WSRM) in managing mode.
D.Implement Windows Server Resource Manager (WSRM) in accounting mode.
Your network contains a stand-alone root certification authority (CA). You have a server named Server1 that runs Windows Server 2008 R2.
You issue a server certificate to Server1. You deploy Secure Socket Tunneling Protocol (SSTP) on Server1.
You need to recommend a solution that allows external partner computers to access internalnetwork resources by using SSTP.
What should you recommend?()
A.Enable Network Access Protection (NAP) on the network.
B.Deploy the Root CA certificate to the external computers.
C.Implement the Remote Desktop Connection Broker role service.
D.Configure the firewall to allow inbound traffic on TCP Port 1723.
Your network consists of a single Active Directory domain. All servers run Windows Server 2008 R2.
A server named Server1 has the Remote Desktop Services server role installed.
You notice that several users consume more than 30 percent of the CPU resources throughout the day.
You need to prevent users from consuming more than 15 percent of the CPU resources. Administrators must not be limited by the amount of CPU resources that they can consume.
What should you do?()
A.Implement Windows System Resource Manager (WSRM),and configure user policies.
B.Implement Windows System Resource Manager (WSRM),and configure session policies.
C.Configure Performance Monitor,and create a user-defined Data Collector Set.
D.Configure Performance Monitor,and create an Event Trace Session Data Collector Set.
最新试题
You need to recommend a monitoring solution for App1 that meets the museum’s technical requirements. What should you include in the recommendation?()
You need to recommend changes to the network that address the user problems statement.What should you recommend?()
You need to recommend a solution for the USB storage devices on the client computers.The solution must meet the company’s security requirements.What should you include in the recommendation?()
You need to recommend a solution for managing the service accounts for SQL1 and SQL2. The solution must meet the company’s security requirements.What should you include in the recommendation?()
You need to recommend a solution for managing the address information of the user accounts. The solution must meet the company’s security requirements.What should you include in the recommendation?()
You need to recommend a delegation solution for CA1 that meets the company’s security requirements. What should you include in the recommendation?()
You need to ensure that all servers meet the company’s security requirements.Which tool should you use?()
You need to recommend a solution to ensure that all of the client computers that run Windows 7 meet the company’s security requirements. What should you include in the recommendation?()
You need to recommend a solution for the file servers that meets the company's technical requirements. What should you include in the recommendation?()
You need to recommend a solution for deploying App1. The solution must support the company’s planned changes. What should you include in the recommendation?()