Certkiller .com has a domain controller that runs Windows Server 2008. The Certkiller .com network boosts 40 Windows Vista client machines. As an administrator at Certkiller .com, you want to deploy Active Directory Certificate service (AD CS) to authorize the network users by issuing digital certificates.
What should you do to manage certificate settings on all machines in a domain from one main location()
A.Configure Enterprise CA certificate settings
B.Configure Enterprise trust certificate settings
C.Configure Advance CA certificate settings
D.Configure Group Policy certificate settings
E.All of the above
您可能感兴趣的试卷
你可能感兴趣的试题
A.Move the RID master role in the child domain to a domain controller that holds the Global Catalog.
B.Modify the schema to enable replication of the friendlynames attribute to the Global Catalog.
C.Move the RID master role in the child domain to a domain controller that does not hold the Global Catalog.
D.Move the infrastructure master role in the child domain to a domain controller that does not hold the Global Catalog.
A.Use the Active Directory Sites and Services console to configure a new site link bridge object.
B.Use the Active Directory Sites and Services console to decrease the site link cost between Site1 and Site2.
C.Use the Active Directory Sites and Services console to assign a new IP subnet to Site2. Move the new domain controller object to Site2.
D.Use the Active Directory Sites and Services console to configure the new domain controller as a preferred bridgehead server for Site1.
A.Register the Schmmgmt.dll. Start the Active Directory Schema snap-in.
B.Configure DC2 as a bridgehead server
C.On DC2, seize the Schema Master role
D.Log off and log on again to Active Directory by using an account that is a member of the Schema Administrators group. Start the Actrve Directory Schema snap-in.
A.Use Dsmod.exe to configure all domain controllers as global catalog servers.
B.Use Repadmin.exe to force replication between the site connection objects
C.From the Active Directory Sites and Services console, select the existing connection objects and force replication.
D.From the Actrve Directory Sites and Services console, configure all domain controllers as global catalog servers.
A.Add your user account to the local Backup Operators group
B.Install the Windows Server backup feature using the Server Manager feature.
C.Install the Removable Storage Manager feature using the Server Manager feature
D.Deactivating the backup job that is configured to backup Windows 2008 server domain controller on the Windows 2003 server.
E.None of the above
ertkiller .com has purchased laptop computers that will be used to connect to a wireless network. You create a laptop organizational unit and create a Group Policy Object (GPO) and configure user profiles by utilizing the names of approved wireless networks. You link the GPO to the laptop organizational unit. The new laptop users complain to you that they cannot connect to a wireless network.
What should you do to enforce the group policy wireless settings to the laptop computers()
A.Execute gpupdate/target:computer command at the command prompt on laptop computers
B.Execute Add a network command and leave the SSID (service set identifier) blank
C.Execute gpupdate/boot command at the command prompt on laptops computers
D.Connect each laptop computer to a wired network and log off the laptop computer and then login again.
E.None of the above
A.Go to Services tab, and check if Active Directory Federation Services is running
B.In the event viewer, Applications, Event ID column look for event ID 674.
C.Open a browser window, and then type the Federation Service URL for the new federation server.
D.None of the above
Certkiller .com has a main office and a branch office. Certkiller .com’s network consists of a single Active Directory forest. Some of the servers in the network run Windows Server 2008 and the rest run Windows server 2003.
You are the administrator at Certkiller .com. You have installed Active Directory Domain Services (AD DS) on a computer that runs Windows Server 2008. The branch office is located in a physically insecure place. It has not IT personnel onsite and there are no administrators over there. You need to setup a Read-Only Domain Controller (RODC) on the Server Core installation computer in the branch office. What should you do to setup RODC on the computer in branch office()
A.Execute an attended installation of AD DS
B.Execute an unattended installation of AD DS
C.Execute RODC through AD DS
D.Execute AD DS by using deploying the image of AD DS
E.none of the above
Certkiller .com boosts a two-node Network Load Balancing cluster which is called web. CK1 .com. The purpose of this cluster is to provide load balancing and high availability of the intranet website only. With monitoring the cluster, you discover that the users can view the Network Load Balancing cluster in their Network Neighborhood and they can use it to connect to various services by using the name web. CK1 .com.
You also discover that there is only one port rule configured for Network Load Balancing cluster.
You have to configure web. CK1 .com NLB cluster to accept HTTP traffic only. Which two actions should you perform to achieve this objective()
A.Create a new rule for TCP port 80 by using the Network Load Balancing Cluster console
B.Run the wlbs disable command on the cluster nodes
C.Assign a unique port rule for NLB cluster by using the NLB Cluster console
D.Delete the default port rules through Network Load Balancing Cluster console
As the Certkiller administrator you had installed a read-only domain controller (RODC) server at remote location.
The remote location doesn’t provide enough physical security for the server.
What should you do to allow administrative accounts to replicate authentication information to Read-Only Domain Controllers()
A.Remove any administrative accounts from RODC’s group
B.Add administrative accounts to the domain Allowed RODC Password Replication group
C.Set the Deny on Receive as permission for administrative accounts on the RODC computer account security tab for the Group Policy Object (GPO)
D.Configure a new Group Policy Object (GPO) with the Account Lockout settings enabled. Link the GPO to the remote location. Activate the Read Allow and the Apply group policy Allow permissions for the administrators on the Security tab for the GPO.
E.None of the above
最新试题
Your network contains an Active Directory forest. The forest contains two domains. You have a standalone root certification authority (CA). On a server in the child domain, you run the Add Roles Wizard and discover that the option to select an enterprise CA is disabled. You need to install an enterprise subordinate CA on the server. What should you use to log on to the new server()
You need to compact an Active Directory database on a domain controller that runs windows Server 2008 R2. What should you do()
Your network contains an Active Directory domain named contoso.com. The domain contains five domain controllers.You add a logoff script to an existing Group Policy object (GPO). You need to verify that each domain controller successfully replicates the updated group policy. Which two objects should you verify on each domain controller()
Your network contains two Active Directory forests named contoso.com and nwtraders.com. A two-way forest trust exists between contoso.com and nwtraders.com. The forest trust is configured to use selective authentication. Contoso.com contains a server named Server1. Server1 contains a shared folder named Marketing. Nwtraders.com contains a global group named G_Marketing. The Change share permission and the Modify NTFS permissions for the Marketing folder are assignes to the G_Marketing group. Members of G_Marketing report that they cannot accesss the Marketing folder. You need to ensure that the G_Marketing members can accesss the folder from the network. What should you do()
Your network contains three Active Directory forest named Forest1, Forest2, and Forest3. Each forest contains three domains. A two-way forest trust exists between Forest1 and Forest2. A two-way forest trust exists between Forest2 and Forest3. You need to configure the forest to meet the following requirements Users in Forest3 must be able to access resources in Forest1. Users in Forest1 must be able to access resources in Forest3. The number of trusts must be minimized. What should you do()
Your network contains an Active Directory domain that contains five domain controllers. You have a management computer that runs Windows 7. From the Windows 7 computer, you need to view all account logon failures that occur in the domain. The information must be consolidated on one list. Which command should you run on each domain controller()
You have a domain controller named Server1 that runs Windows Server 2008 R2. You need to determine the size of the Active Directory database on Server1. What should you do()
Your network contains an Active Directory domain. The domain contains 1000 user accounts. You have a list that contains the mobile phone number of each user You need to add the mobile number of each user to Active Directory. What should you do()
Your company has four offices. The network contains a single Active Directory domain. Each office has domain controller. Each office has an organitational unit (OU) that contains the user accounts for the users in that office. In each office, support technicians perform basic troubleshooting for the users in their respective office. You need to ensure that the support technicians can reset the password for the user accounts in their respective office only. The solution must prevent the thechnicians from creating user accounts. What shoul you do()
Your network contain 10 domain controller that run Windows Server R2. The network contain a member server that is configured to collect all of events that occur on the domain controllers. Your need to ensure that administrators are notified when a specific event occurs on any of the domain controllers. You want to achive the goal by using the minimum amount effort. What should you do()