单项选择题
A.Set the Disable Overlapped Recycling option to True.
B.Set the Shutdown Executable option to True.
C.Set the Disable Recycling for Configuration Changes option to True.
D.Set the Process Orphaning Enabled option to True.
单项选择题 You are an enterprise administrator for Cer-tech .com. The corporate network of the company consists of asingle Active Directory domain. All the servers on the network run Windows Server 2008 and all the clientcomputers run Windows XP Service Pack 2 (SP2). All computers are members of the domain. The networkruns a server named Server01 on which the Terminal Services role and the Terminal Services Web Accessrole are installed. The Network Level Authentication is enabled on the server. The Terminal Services WebAccess role uses Active Directory Domain Services (AD DS). You have been assigned the task to deployand publish an application called App1 on Server01. Which of the following options would you choose toensure that the users can launch App1 on Server01 from the Terminal Services Web Access Web page?()
单项选择题 You are an enterprise administrator for Cer-tech .com. The company runs Windows Server 2008 on all theservers on the network. Two servers on the network were configured as follows: Server01:Windows Media Services server role installed Server02:Windows Media Services server role installed and is also configured a License Clearing House.You published an audio file,which is licensed by Server02 on Server01. Which of the following optionswould you choose to ensure that users are allowed to use the audio file for only two days?()
多项选择题 You are an enterprise administrator for Cer-tech .com. The company runs Windows Server 2008 on all theservers on the network. The company has many remote users One of the servers on the network calledServer01 has the Terminal Services Gateway (TS Gateway) role installed on it. The remote users of thecompany need to connect remotely to desktop computers located in their offices through the gateway. Toensure secure connection to the gateway, you created a security group named RemoteUsersGrp1 for theremote users who need to connect to computers in their offices. Which of the following options would youchoose to enable the remote users to connect to the TS Gateway? ()