多项选择题
You are a systems administrator in charge of adding the Windows SharePoint Services (WSS) server roleon a computer running Windows Server 2008. You have completed the initial installation process for theserver but have not yet added any roles or features to the installation. Based on your technical requirements, you have decided to install WSS in a server farm configuration.
Which of the following is nota dependency of the WSS server role?()
A.Windows Internal Database role service
B.Windows Process Activation role service
C.Microsoft .NET Framework 3.0
D.Web Server (IIS) role
E.File Server role
相关考题
-
单项选择题
Your company network consists of a single Active Directory domain named Contoso.com. In the companynetwork,you have deployed Terminal Services on a computer named TS1 that is running Windows Server2008. Some users who connect to TS1 through RDP complain that they cannot print successfully to theirlocal printers. You want to ensure that TS1 uses a generic PostScript printer driver whenever TerminalServices can not find an adequate driver for Terminal Services client printers. What should you do?()
A.On the Client Session tab of RDP-Tcp properties on TS1, select the Windows Printer option.
B.On the Client Session tab of RDP-Tcp properties on TS1, select the Default To Main Client Printeroption.
C.In a Group Policy object (GPO), configure the User Terminal Services Easy Printer Driver First policysetting, and then apply the GPO so that TS1 falls within the scope of the policy.
D.In a Group Policy object (GPO), configure the Specify Terminal Server Fallback Printer Driver policysetting with the PS option, and then apply the GPO so that TS1 falls within the scope of the policy. -
多项选择题
You are a systems administrator responsible for configuring a Windows Server 2008 SMTP server. Yourorganization is currently using the default SMTP virtual server for sending order notifications from a single Web application called ContosoOrderManagement. Recently, you have noticed that a largenumber of messages have been sent to the SMTP virtual server from other computers and users. Which two methods can you use to prevent unauthorized access to the SMTP server?()
A.Enable Basic Authentication.
B.Configure a smart host for use by the SMTP virtual server.
C.Add Connection Control entries to limit which IP addresses can use the SMTP server.
D.Modify settings on the Security tab of the properties of the SMTP virtual server. -
多项选择题
You are a systems administrator responsible for managing a Windows Server 2008 Web Server Currently,there are no Web sites configured on the server. You need to configure the server to host two Web applications: Engineering App and Sales App. Both Web applications must be accessible by using HTTPport 80 without the use of host headers. Also, you must protect against problems in one Web applicationaffecting the performance or reliability of the other Web application. Which two steps should you take tomeet these requirements?()
A.Create a single Web site that contains both Web applications.
B.Create two Web sites, one for each Web application.
C.Assign both Web applications to the same application pool.
D.Assign each Web application to its own application pool.
