单项选择题
All client computers on your company network run Windows 7. The Finance department staff run an application that collects data from 09.30 hours to 15.00 hours everyday. After data collection, the application generates reports that contain data aggregation for the day and the previous week. During report generation, the Finance department staff experience slow performance on their computers. You discover that the usage of the processor on these computers is between 90 and 100 percent. You need to reduce the impact of report generation on the Finance computers. What should you do?()
A.Set the priority of the application to Low.
B.Set the priority of the application to Real-time.
C.Configure the processor affinity mask to ensure that the application uses all the available processors.
D.Modify the memory settings of the computers to optimize the performance of the background applications.
相关考题
-
单项选择题
All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. AppLocker is configured to allow only approved applications to run. Employees with standard user account permissions are able to run applications that install into the user profile folder. You need to prevent standard users from running unauthorized applications. What should you do?()
A.Create Executable Rules by selecting the Create Default Rules option.
B.Create Windows Installer Rules by selecting the Create Default Rules option.
C.Create the following Windows Installer Rule.Deny C Everyone - %OSDRIVE%\Users\\Downloads\*
D.Create the following Executable Rule.Deny - Everyone - %OSDRIVE%\Users\\Documents\* -
单项选择题
Multiple users report that their Windows 7 computers take longer to start than when their computers were first installed. A help desk technician reports that the problem is related to installed applications. You need to recommend a solution that identifies the applications that run during the startup process. What should you recommend?()
A.Event Forwarding
B.MSConfig.exe
C.Problem Steps Recorder
D.Reliability Monitor -
单项选择题
Your network contains a wired network and a wireless network. Users report that they experience intermittent problems accessing network resources when they connect to the internal wireless network. You discover that an unsecured rogue wireless access point uses the same Service Set Identifier (SSID) as the internal wireless network. You need to ensure that the users only connect to the internal wireless network. What should you do?()
A.Configure a Windows Connect Now Group Policy.
B.Configure a Wireless Network (IEEE 802.11) Policy.
C.Delete the rogue network from the Network and Sharing Center on each computer.
D.Create a Connection Manager Administration Kit (CMAK) profile and deploy it to all users.
