单项选择题You are an administrator at Certkiller .com. Certkiller has a RODC (read-only domain controller) server at a remote location. The remote location doesn’t have proper physical security. You need to activate non- administrative accounts passwords on that RODC server. Which of the following action should be considered to populate the RODC server with non-administrative accounts passwords()

A.Delete all administrative accounts from the RODC’s group
B.Configure the permission to Deny on Receive for administrative accounts on the security tab for Group Policy Object (GPO)
C.Configure the administrative accounts to be added in the Domain RODC Password Replication Denied group
D.Add a new GPO and enable Account Lockout settings. Link it to the remote RODC server and on the security tab on GPO, check the Read Allow and the Apply group policy permissions for the administrators.
E.None of the above


您可能感兴趣的试卷

你可能感兴趣的试题

2.单项选择题

Certkiller is having an Active Directory Rights Management Service (AD RMS) server. 
Users machines are running Windows Vista and an Active Directory domain is configured at Microsoft Windows Server 2003 functional level.  Users are complaining that they cannot protect their documents. You need to configure AD RMS so that users are able to protect their documents.
What should you do()

A.Use a group policy to install the AD RMS client computers
B.Add the ADRMSADMIN account to the local administrators group on the computers
C.Add the ADRMSSRVC account to the local administrators on the AD RMS server
D.Establish an e-mail account in Active Directory Domain Services (AD DS) for each user
E.Upgrade the active directory domain to the functional level of Windows 2008 server

3.单项选择题Your company has two Active Directory forests named Forest1 and Forest2. The forest functional level and the domain functional level of Forest1 are set to Windows Server 2008. The forest functional levle of Forest2 is set to WIndows 2000, and the domain functional levels in Forest2 are set to Windows Server 2003. You need to set up a transitive forest trust between Frorest1 and Forest2. What should you do first()

A.Raise the forest functional level of Forest2 to Windows Server 2003 Interim mode.
B.Raise the forest functional level of Forest2 to Windows Server 2003.
C.Upgrade the domain controllers in Forest2 to Windows Server 2008.
D.Upgrade the domain controllers in Forest2 to Windows Server 2003.

5.单项选择题You need to validate whether Active Directory successfully replicated between two domain controllers. What should you do()

A.Run the DSget command.
B.Run the Dsquery command.
C.Run the RepAdmin command.
D.Run the Windows System Resource Manager.

6.单项选择题

Certkiller .com has a server that runs on Windows Server 2008. The server also has an instance of Active Directory Lightweight Directory Services (AD LDS) running. 
In order to test AD LDS, you need to replicate the AD LDS instance on a test computer located on the network. 
What should you do to achieve this objective()

A.Execute AD LDS Setup wizard on the test computer to create and install a replica of AD LDS.
B.Execute repadmin/bs  command on the test computer
C.Install and configure a new AD LDS instance on the test computer by copy and pasting the entire partition on the test computer
D.Execute the Dsmgmt command on the test computer and create a naming context

7.单项选择题

Certkiller .com has a main office and branch office in another city. You are assigned to deploy and implement a Read-only Domain Controller (RODC) at the branch office. You deploy a RODC that runs Windows Server 2008. 
What should you do to ensure that the users at the branch office can log on to the domain using RODC()

A.Use Password Replication Policy on the RODC
B.Add RODC to the main office
C.Deploy and configure a new bridgehead server in the branch office
D.Deploy and configure a Password Replication Policy on the RODC in the main office

8.单项选择题

Critical services are running on CKD20, a domain controller. You have completed restructuring the organizational unit hierarchy for the domain and deleted the needless objects. 
What would you do to perform an offline defragmentation of the Active Directory database on CKD20 while ensuring that the critical services remain online()

A.Open the Microsoft Management Console (MMC) and stop the Domain Controller service. After that, run the defrag tool
B.Start the domain controller in the Directory Service restore mode and run the Ntdsutil tool
C.Start the domain controller and then use the Defrag tool to start defragmentation
D.Open the MMC and stop the Domain Controller service. After that, run the Ntdsutil tool. 
E.All of the above

10.单项选择题Your company has an Active Directory forest. Not all domain controllers in the forest are configured as Global Catalog Servers. Your domain structure contains one root domain and one child domain. You modify the folder permissions on a file server taht is in th child domain. You discover that some Access Control entries start with S-1-5-21 and that no account name is listed. You need to list the account names. What should you do()

A.Move the RID master role in the child domain to a domain controller that holds the Global Catalog.
B.Modify the schema to enable replication of the friendlynames attribute to the Global Catalog.
C.Move the RID master role in the child domain to a domain controller that does not hold the Global Catalog.
D.Move the infrastructure master role in the child domain to a domain controller that does not hold the Global Catalog.

最新试题

Your network contains an Active Directory domain. All domain controller run Windows Server  2003.    You replace all domain controllers with domain controllers that run Windows Server 2008 R2.    You raise the functional level of the domain to Windows Server 2008 R2.    You need to minimize the amount of SYSVOL replication traffic on the network.    What should you do()

题型:单项选择题

You have an enterprise subordinate certification authority (CA). The CA is configured to use a  hardware security module.  You need to back up Active Directory Certificate Services on the CA.    Which command should you run()

题型:单项选择题

You create a new Active Directory domain. The functional level of the domain is Windows Server  2003.    The domain contains five domain controllers that run Windows Server 2008 R2.    You need to monitor the replication of the group policy template files.    Which tool should you use()

题型:单项选择题

Your network contains an Active Directory domain named contoso.com. Contoso.com contains a  member server that runs Windows Serever 2008 Standart.  You need to install an enterprise subordinate certification authority (CA) that support private key  archival. You must achieve this goal by using the minimum amount of administrative effort.What do you do first()

题型:单项选择题

Your company has four offices.  The network contains a single Active Directory domain.  Each office has domain controller. Each office has an organitational unit (OU) that contains the  user accounts for the users in that office.  In each office, support technicians perform basic troubleshooting for the users in their respective  office.  You need to ensure that the support technicians can reset the password for the user accounts in  their respective office only. The solution must prevent the thechnicians from creating user  accounts.  What shoul you do()

题型:单项选择题

Your network contains an Active Directory domain named contoso.com. The domain contains five  domain controllers.You add a logoff script to an existing Group Policy object (GPO). You need to verify that each  domain controller successfully replicates the updated group policy.    Which two objects should you verify on each domain controller()

题型:多项选择题

Your network contains an Active Directory domain. The domain contains 1000 user accounts.  You have a list that contains the mobile phone number of each user  You need to add the mobile number of each user to Active Directory.    What should you do()

题型:单项选择题

Your network contains two Active Directory forests named contoso.com and    nwtraders.com. A  two-way forest trust exists between contoso.com and nwtraders.com. The forest trust is  configured to use selective authentication.  Contoso.com contains a server named Server1. Server1 contains a shared folder named  Marketing. Nwtraders.com contains a global group named G_Marketing. The Change share  permission and the Modify NTFS permissions for the Marketing folder are assignes to the  G_Marketing group.  Members of G_Marketing report that they cannot accesss the Marketing folder.  You need to ensure that the G_Marketing members can accesss the folder from the network.    What should you do()

题型:单项选择题

Your network contain 10 domain controller that run Windows Server    R2.  The network contain a member server that is configured to collect all of events that occur on the  domain controllers.  Your need to ensure that administrators are notified when a specific event occurs on any of the  domain controllers. You want to achive the goal by using the minimum amount effort.  What should you do()

题型:单项选择题

Active Directory Rights Management Services (AD RMS) is deployed on your network.    You need to configure AD RMS to use Kerberos authentication.  Which two actions should you perform()

题型:多项选择题