1. [单选题]You are the administrator responsible for security and user desktop settings on your network. You need to configure a custom registry entry for all users. You want to add the custom registry entry into a Group Policy object (GPO) with the least amount of administrative effort.What should you do?
A. Configure an ADM template and add the template to the GPO.
B. Configure an INF policy and add the policy to the GPO.
C. Configure a Microsoft Windows installer package and add the package to the GPO.
D. Configure RIS to include the registry entry.
2. [单选题]The company is buying 50 identical computers to run Windows 2000 Server in these offices. These servers must be installed to the company's standard configuration. You create a setup information file (SIF) that specifies the company's standard configuration.You want to automate the installation process as much as possible in the least possible amount of time.
A. What should you do?
B. Use Makebt32.exe to create four installation startup disks and add the SIF to the first disk. Instruct an employee at each office to start the installation by using these disks.
C. Create an MS-DOS boot disk that contains CD ROM drivers and the SIF and that runs the Winnt/S: D:\i386 command. Instruct an employee at each office to start the installation by using this disk.
D. Create a floppy disk that contains only the SIF. Instruct an employee at each office to start the installation by using the Windows 2000 Server CD-ROM, with the floppy disk inserted.
E. Create a Windows 2000 folder on a hard disk. Copy the Windows 2000 Server CD-ROM to the folder. Add the SIF to the folder. Copy the folder to a writable C Instruct an employee at each office to start the installation by using this C
3. [多选题]You are the administrator of a SQL Server 2000 computer. The server contains a Data Transformation Services (DTS) package that queries multiple databases and writes the results to a text file. You run this package by using a Microsoft Windows batch file. The batch file uses the dtsrun utility to execute the DTS package.You want to ensure that connection properties, such as login names and passwords, cannot be read or modified by users. Which two actions should you take? (Each correct answer represents part of the solution. Choose two.)
A. Save the DTS package so that it has an owner password.
B. Save the DTS package so that it has a user password.
C. Encrypt the DTS package details in the command line of the dtsrun utility.
D. Store the DTS package in the Meta. Data Services repository.
E. Store the DTS package as a Microsoft Visual Basic file.