A.Add your user account to the local Backup Operators group
B.Install the Windows Server backup feature using the Server Manager feature.
C.Install the Removable Storage Manager feature using the Server Manager feature
D.Deactivating the backup job that is configured to backup Windows 2008 server domain controller on the Windows 2003 server.
E.None of the above
您可能感兴趣的试卷
你可能感兴趣的试题
ertkiller .com has purchased laptop computers that will be used to connect to a wireless network. You create a laptop organizational unit and create a Group Policy Object (GPO) and configure user profiles by utilizing the names of approved wireless networks. You link the GPO to the laptop organizational unit. The new laptop users complain to you that they cannot connect to a wireless network.
What should you do to enforce the group policy wireless settings to the laptop computers()
A.Execute gpupdate/target:computer command at the command prompt on laptop computers
B.Execute Add a network command and leave the SSID (service set identifier) blank
C.Execute gpupdate/boot command at the command prompt on laptops computers
D.Connect each laptop computer to a wired network and log off the laptop computer and then login again.
E.None of the above
A.Go to Services tab, and check if Active Directory Federation Services is running
B.In the event viewer, Applications, Event ID column look for event ID 674.
C.Open a browser window, and then type the Federation Service URL for the new federation server.
D.None of the above
Certkiller .com has a main office and a branch office. Certkiller .com’s network consists of a single Active Directory forest. Some of the servers in the network run Windows Server 2008 and the rest run Windows server 2003.
You are the administrator at Certkiller .com. You have installed Active Directory Domain Services (AD DS) on a computer that runs Windows Server 2008. The branch office is located in a physically insecure place. It has not IT personnel onsite and there are no administrators over there. You need to setup a Read-Only Domain Controller (RODC) on the Server Core installation computer in the branch office. What should you do to setup RODC on the computer in branch office()
A.Execute an attended installation of AD DS
B.Execute an unattended installation of AD DS
C.Execute RODC through AD DS
D.Execute AD DS by using deploying the image of AD DS
E.none of the above
Certkiller .com boosts a two-node Network Load Balancing cluster which is called web. CK1 .com. The purpose of this cluster is to provide load balancing and high availability of the intranet website only. With monitoring the cluster, you discover that the users can view the Network Load Balancing cluster in their Network Neighborhood and they can use it to connect to various services by using the name web. CK1 .com.
You also discover that there is only one port rule configured for Network Load Balancing cluster.
You have to configure web. CK1 .com NLB cluster to accept HTTP traffic only. Which two actions should you perform to achieve this objective()
A.Create a new rule for TCP port 80 by using the Network Load Balancing Cluster console
B.Run the wlbs disable command on the cluster nodes
C.Assign a unique port rule for NLB cluster by using the NLB Cluster console
D.Delete the default port rules through Network Load Balancing Cluster console
As the Certkiller administrator you had installed a read-only domain controller (RODC) server at remote location.
The remote location doesn’t provide enough physical security for the server.
What should you do to allow administrative accounts to replicate authentication information to Read-Only Domain Controllers()
A.Remove any administrative accounts from RODC’s group
B.Add administrative accounts to the domain Allowed RODC Password Replication group
C.Set the Deny on Receive as permission for administrative accounts on the RODC computer account security tab for the Group Policy Object (GPO)
D.Configure a new Group Policy Object (GPO) with the Account Lockout settings enabled. Link the GPO to the remote location. Activate the Read Allow and the Apply group policy Allow permissions for the administrators on the Security tab for the GPO.
E.None of the above
A.Configure the GPO to assign the application to the computer account. Link the SalesAPP GPO to the domain.
B.Configure the GPO to assign the application to the user account. Link the SalesAPP GPO to the Sales organizational unit in each location.
C.Configure the GPO to publish the application to the user account. Link the SalesAPP GPO to the Sales organizational unit in each location.
D.Configure the GPO to assign the application to the computer account. Link the SalesAPP GPO to the Sales organizational unit in each location.
A.From the Schema snap-in, create multiple class schema objects.
B.From the ADSI Edit snap-in, create multiple Password Setting objects.
C.From the Security Configuration Wizard, create multiple security policies.
D.From the Group Policy Management snap-in, create multiple Group Policy objects.
A.Select the Startup repair option.
B.Select the System restore option.
C.Run the Rollback utility at the command prompt.
D.Run the Wbadmin utility at the command prompt.
A.Run Event Viewer.
B.View the Netlogon.log file.
C.Run the Security and Configuration Wizard.
D.View the Security tab on the domain controller computer object.
A.Perform an authoritative restore of the Sales OU.
B.Perform an authoritative restore of the Groups OU.
C.Perform a non-authoritative restore of the Groups OU.
D.Perform a non-authoritative restore of the Sales OU.
最新试题
Your company has four offices. The network contains a single Active Directory domain. Each office has domain controller. Each office has an organitational unit (OU) that contains the user accounts for the users in that office. In each office, support technicians perform basic troubleshooting for the users in their respective office. You need to ensure that the support technicians can reset the password for the user accounts in their respective office only. The solution must prevent the thechnicians from creating user accounts. What shoul you do()
You have an enterprise subordinate certification authority (CA). You have a custom certificate template that has a key length of 1,024 bits. The template is enabled for autoenrollment. You increase the template key length to 2,048 bits. You need to ensure that all current certificate holders automatically enroll for a certificate that uses the new template. Which console should you use()
Your network contains an Active Directory domain. The domain contains 1000 user accounts. You have a list that contains the mobile phone number of each user You need to add the mobile number of each user to Active Directory. What should you do()
Your network contains two Active Directory forests named contoso.com and nwtraders.com. A two-way forest trust exists between contoso.com and nwtraders.com. The forest trust is configured to use selective authentication. Contoso.com contains a server named Server1. Server1 contains a shared folder named Marketing. Nwtraders.com contains a global group named G_Marketing. The Change share permission and the Modify NTFS permissions for the Marketing folder are assignes to the G_Marketing group. Members of G_Marketing report that they cannot accesss the Marketing folder. You need to ensure that the G_Marketing members can accesss the folder from the network. What should you do()
Your network contain 10 domain controller that run Windows Server R2. The network contain a member server that is configured to collect all of events that occur on the domain controllers. Your need to ensure that administrators are notified when a specific event occurs on any of the domain controllers. You want to achive the goal by using the minimum amount effort. What should you do()
Your network contains an Active Directory domain named contoso.com. Contoso.com contains a member server that runs Windows Serever 2008 Standart. You need to install an enterprise subordinate certification authority (CA) that support private key archival. You must achieve this goal by using the minimum amount of administrative effort.What do you do first()
You have an enterprise subordinate certification authority (CA). The CA is configured to use a hardware security module. You need to back up Active Directory Certificate Services on the CA. Which command should you run()
You create a new Active Directory domain. The functional level of the domain is Windows Server 2008 R2. The domain contains five domain controllers. You need to monitor the replication of the group policy template files. Which tool should you use()
Your network contains an Active Directory forest. The forest contains two domains. You have a standalone root certification authority (CA). On a server in the child domain, you run the Add Roles Wizard and discover that the option to select an enterprise CA is disabled. You need to install an enterprise subordinate CA on the server. What should you use to log on to the new server()
You remotely monitor several domain controllers. You run winrm.exe quickconfig on each domain controller. You need to create a WMI script query to retrieve information from the bios of each domain controller. Which format should you use to write the query()