Your network has client computers that run Windows 7. A custom Web-based application requires specific security settings. You need to prevent users from permanently modifying their Internet Explorer browser’s security settings. What should you do?()
Your Hyper-V servers run Windows Server 2008 R2 Standard. You manage the virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to ensure that you can migrate child partitions between host servers. What are two possible methods that will allow you to achieve this goal?()
Your organization has 20 servers that run Windows Server 2003 Service Pack 2 (SP2). You need to monitor all 20 servers for a period of 24 hours by using the same performance counters. You must achieve this goal by using the least amount of administrative effort. What should you do first? ()
You deploy mobile devices that run Microsoft Windows Mobile 5.0 with Microsoft Messaging and Security Feature Pack. A server that runs Microsoft Exchange Server 2003 Service Pack 2 is configured by using the default installation settings. Company security policy requires a complex password for unlocking the Windows Mobilebased devices. You need to ensure that the Windows Mobilebased devices that perform Microsoft ActiveSync synchronization meet the company security policy. Which two actions should you perform?()
All client computers in your network run Windows 7 with default firewall settings. You have a server-based application that requires an agent to be installed on all client computers. You need to use Group Policy to allow the application to initiate installation of the agent on all client computers. What should you do?()
You are creating a Web application that will run on an intranet. The Web application reads comma-delimited text files. The text files reside in a subdirectory below the Web application's root directory. Users must not be able to navigate directly to these files in a Web browser unless they are members of the Accounting role. You need to write an ASP.NET HTTP handler that will use the FileAuthorizationModule class. Which form of authentication should you use?()
When will the primary processor core dump run in case of a switchover?()
You are the network administrator for All client computers run Windows 2000 Profession al. You recently deployed 10 new servers that run Windows Server 2003. You placed the servers in an new OU named W2K3Servers. Tess is another network administraror. You need to configure the appropriate permissions to allow Tess to manage the new servers by using Terminal Services from her client compueter. You need to assign Tess only the permissions she needs to perform her job. What should you do?()
You have a computer that runs Windows 7. You run Runas and specify the /savecred parameter to start anapplication. You need to delete the stored password. What should you do?()
Which ones of the following client PCs are eligible to install and run the Administrative tool for Exchange Server 2010?()