Confirm that Windows Defender is not subscribed to the Microsoft Spynet online community. Select the Use heuristics to detect potentially harmful or unwanted behavior by software that hasnt been analyzed for risks checkbox in Windows Defender.
Configure Windows Defender with a basic membership to the Spynet online community.
Configure Windows Defender with an advanced membership to the Spynet online community.
Configure the Software Explorer option in Windows Defender to display software for all users.
第1题:
You install Windows Vista on a new computer. You update the video card driver and restart the computer.When you start the computer, the screen flickers and then goes blank. You restart the computer and receive the same result.You need to configure the video card driver.What should you do first?()

A.A
B.B
C.C
D.D
第2题:
Cisco Software Advisor allows you to search either for software that is compatible with your hardware or for software with the specific features you need. Identify two items that are only available for selection when searching for specific features? (Choose two.)()
第3题:
In which scenarios would you rebuild an index?()
第4题:
You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003. All client computers run Windows 2000 Professional with Service Pack 4 or Windows XP Professional. You install Software Update Services (SUS) on a computer named TestKing1. You create a GPO that configures all client computers to receive their software update from TestKing1. One week later, you run Microsoft Baseline Security Analyzer (MBSA) on all client computers to find out whether all updates are being applied. You discover that all the Windows 2000 Professional client computer received updates, but the Windows XP Professional client computers do not receive updates. You verify that the GPO setting was applied on all Windows XP Professional computers. You need to ensure that the Windows XP Professional client computers receive their updates from TestKing1. What should you do?()
第5题:
You need to receive alerts when unanalyzed software is detected on your computer. You must achieve this goal without sending information to Microsoft. What should you do?()
第6题:
You create 200 new user accounts. The users are located in six different sites. New users report that they receive the following error message when they try to log on: "The username or password is incorrect." You confirm that the user accounts exist and are enabled. You also confirm that the user name and password information supplied are correct. You need to identify the cause of the failure. You also need to ensure that the new users are able to log on Which utility should you run()
第7题:
Category
Type
Series
Model
OS
Engine/CPU
第8题:
The AccessAgent DOES need to be uninstalled and the IMS Server software DOES need to be uninstalled.
The AccessAgent DOES need to be uninstalled and the IMS Server software DOES NOT need to be uninstalled.
The AccessAgent DOES NOT need to be uninstalled and the IMS Server software DOES need to be uninstalled.
The AccessAgent DOES NOT need to be uninstalled and the IMS Server software DOES NOT need to be uninstalled.
第9题:
Start a data collector
Start an event viewer subscription
Add a task to the application event log
Modify the properties of the mailbox database
第10题:
Use the Alerts option in the Performance Logs and Alerts snap-in to configure an alert to trigger when the Datagrams/sec counter in the UDPv4 object is high.
Use System Monitor and configure it to monitor the Segments/sec counter in the TCPv4 object.
Use System Monitor and configure it to monitor the Datagrams/sec counter in the UDPv4 object.
Use the Alerts option in the Performance Logs and Alerts snap-in to configure an alert to trigger when the Datagrams/sec counter in the TCPv4 object is high.
第11题:
Modify the software installation package to use the Published deployment method. Clear the Auto-install this application by file extension activation check box. Redeploy the software installation package.
Modify the software installation package to clear the Install this application at logon option. Redeploy the software installation package.
Modify the software installation package to select the Uninstall this application when it falls out of the scope of management option. Retain the software installation package in the GPO.
Modify the software installation package to select the Uninstall this application when it falls out of the scope of management option. Delete the software installation package from the GPO.
第12题:
Disk Quota settings
My Documents properties
Offline Files properties
Synchronization settings
第13题:
If you have Cisco integrated services router and need to upgrade the Cisco IOS image,which kind of Cisco Support services do you need?()
第14题:
When upgrading the AccessAgent and IMS Server from V3.6.x or V8.0.0 to V8.0.1, which statement is true about the existing AccessAgent and IMS Server?()
第15题:
You create a Microsoft ASP.NET application by using the Microsoft .NET Framework version 3.5. When you access the application in a Web browser, you receive the following error message: "Service Unavailable". You need to access the application successfully. What should you do? ()
第16题:
You are one of the network administrators for All network servers run Windows Server 2003. TestKing operates a total of four offices. The office where you work has 15 servers. You are responsible for supporting and maintaining all of these servers. You need to design a monitoring plan that will achieve the following goals: 1. Track all performance changes on the servers. 2. Record performance data to anticipate the need for future upgrades. What should you do?()
第17题:
When you use Microsoft Windows Media Player to begin playback of a music file, you receive the following error message: "You do not have the rights to play this file." You need to configure Windows Media Player to ensure playback of protected digital media. What should you do? ()
第18题:
You need to block messages from senders that do not comply sender policy framework (SPF).What do you need to implement?()
第19题:
Install Systems Management Server (SMS) on a computer on the internal network. Use the Default Domain Policy GPO to distribute the SMS client software to all computers in the domain
Install Microsoft Operations Manager (MOM) on a computer on the internal network. Use the Default Domain Policy GPO to distribute the MOM client software to all computers in the domain
Install Software Update Services (SUS) on a Web server, and configure it to synchronize and approve updates nightly. Configure client computers to receive automatic updates from the Web server. Ensure that users restart their client computers daily
Install Software Update Services (SUS) on a domain controller, and configure it to synchronize and approve updates nightly. Configure client computers to receive automatic updates from the domain controller. Ensure that users restart their client computers daily
第20题:
MaxRetryCount
MaxTransferWindowSize
MaxPendingChannels
InactivityTimeout
第21题:
Computer Configuration/Software Settings/Software Installation
User Configuration/Software Settings/Software Installation
Computer Configuration/Administrative Templates/Windows Components/Windows Installer
User Configuration/Administrative Templates/Windows Components/Windows Installer
Computer Configuration/Administrative Templates/Windows Components/Windows Update
User Configuration/Administrative Templates/Windows Components/Windows Update
第22题:
got
will get
have got
are getting
第23题:
Install the antivirus software on each mailbox storage server
Install the antivirus software on each Outlook Web Access server
Install the antivirus software on one Outlook Web Access server at each office
Install the antivirus software on a back-end server that contains no mailboxes
第24题:
On each server in your office, use Performance Logs and Alers to create a baseline log. Configure the log to collect data every five minutes for one day. Use the same counters for each server to create a log file. Schedule the log to run weekly.
From a monitoring computer, use Performance Logs and Alerts to create a baseline log for each server in your office. Configure the log to collect data every five minutes for one day. Use the same counters for each server to create a log file. Schedule the log to run weekly.
On each server in your office, use Performance Logs and Alerts to create threshold-based alerts. Configure the alerts to send a message to your monitoring computer when they are triggered. Set each alert to start a new scan when the alert finishes.
From a monitoring computer use Performance Logs and Alerts to create a new counter set in System Monitor. Configure the counters to run continuously.