找考题网-背景图
单项选择题

You are the network administrator for The network consists of a single IP subnet. All servers are Windows Server 2003. All client computers run Windows XP Professional.
The corporate firewall blocks all requests from the local client computers to port 80 in the Internet. Requests sent over port 443 are allowed through the firewall. Server computers can communicate by using port 80 are 443 to the Internet.
You need to install Software Update Services (SUS) on a computer named Testking5. Testking5 has limited hard drive space and stores a minimal amount of information daily. Client computers must install Microsoft critical updates.
You need to ensure that Testking5 does not run out of hard drive space after the installation of SUS.
What should you do?()

A. On Testking5, clear the selection of all locales not used on your network.
B. On Testking5, select the option to maintain the updates on a Windows Update server.
C. Modify the default home page for all client computers to https://windowsupdate.microsoft.com.
D. Modify the proxy server setting for all client computers to http://testking5.

热门试题

单项选择题You are the network administrator for the Berlin office of The company network consists of a single Active Directory domain named The Berlin office contains 15 file servers that contain confidential files. All the file servers run either Windows Server 2003 or Windows 2000 Server. All the file servers are in the BerlinFilePrint organizational unit (OU). TestKings security department sets a rule that specifies the size and retention settings for the Security event log of all file servers. The rule also specified that local administrators on servers cannot override the changes you make to the settings for the Security event log. You need to define a method to modify the Security event log settings on each file server in the Berlin office in order to meet the states requirements. What should you do?()

A. Modify the local security policy on each file server.Define the size and retention settings for the Security event log.
B. Create a security template on one of the file servers by using the Security Configuration and Analysis tool. Define the size and retention settings for the Security event log in the template. Import the security template into the local security policy of the other 14 file servers.
C. Use Event Viewer to modify the event log properties on each file server. Define the size and retention settings for the Security event log.
D. Create a new Group Policy object (GPO) and link it to the BerlinFilePrint OU. In the GPO, define the size and retention settings for the Security event log.