You need to deploy Active Directory Rights Management System (AD RMS) to secure all documents,
spreadsheets and to provide user authentication.
What do you need to configure, in order to complete the deployment of AD RMS()
A.Upgrade all client computers to Windows Vista. Install AD RMS on domain controller Certkiller _DC1
B.Ensure that all Windows XP computers have the latest service pack and install the RMS client on all systems. Install AD RMS on domain controller Certkiller _DC1
C.Upgrade all client computers to Windows Vista. Install AD RMS on Certkiller _SRV5
D.Ensure that all Windows XP computers have the latest service pack and install the RMS client on all systems. Install AD RMS on domain controller Certkiller _SRV5
E.None of the above
您可能感兴趣的试卷
你可能感兴趣的试题
Certkiller .com has a network that consists of a single Active Directory domain.Windows Server 2008 is installed on all domain controllers in the network.
You are instructed to capture all replication errors from all domain controllers to a central location. What should you do to achieve this task()
A.Initiate the Active Directory Diagnostics data collector set
B.Set event log subscriptions and configure it
C.Initiate the System Performance data collector set
D.Create a new capture in the Network Monitor
A.Critical volume backup
B.Backup of all the volumes
C.Backup of the volume that hosts Operating system
D.Backup of AD DS folders
E.all of the above
A.Link the GPO to the domain and enable System Events option
B.Link the GPO to the domain and enable Audit Object Access option
C.Link the GPO to the Domain Controllers and enable Audit Object Access option
D.Link the GPO to the Domain Controllers and enable Audit Process tracking option
E.Perform all of the above actions
Certkiller .com has a software evaluation lab. There is a server in the evaluation lab named as CKT. CKT runs Windows Server 2008 and Microsoft Virtual Server 2005 R2. CKT has 200 virtual servers running on an isolated virtual segment to evaluate software. To connect to the internet, it uses physical network interface card.
Certkiller .com requires every server in the company to access Internet.
Certkiller .com security policy dictates that the IP address space used by software evaluation lab must not be used by other networks. Similarly, it states the IP address space used by other networks should not be used by the evaluation lab network. As an administrator you find you that the applications tested in the software evaluation lab need to access normal network to connect to the vendors update servers on the internet. You need to configure all virtual servers on the CKT server to access the internet. You also need to comply with company’s security policy.
Which two actions should you perform to achieve this task()
A.Trigger the Virtual DHCP server for the external virtual network and run ipconfig/renew command on each virtual server
B.On CKT’s physical network interface, activate the Internet Connection Sharing (ICS)
C.Use Certkiller .com intranet IP addresses on all virtual servers on CKT.
D.Add and install a Microsoft Loopback Adapter network interface on CKT. Use a new network interface and create a new virtual network.
E.None of the above
A.Execute Dsmod.exe
B.Use Active Directory Users and Computers
C.Use Active Directory Sites and Computers
D.Execute Ntdstuil.exe with -ato parameter
The corporate network of Certkiller consists of a Windows Server 2008 single Active Directory domain. The domain has two servers named Certkiller 1 and Certkiller 2.
To ensure central monitoring of events you decided to collect all the events on one server, Certkiller 1. To collect events from Certkiller
2. and transfer them to Certkiller 1, you configured the required event subscriptions.
You selected the Normal option for the Event delivery optimization setting by using the HTTP protocol. However, you discovered that none of the subscriptions work.
Which of the following actions would you perform to configure the event collection and event forwarding on the two servers()
A.Through Run window execute the winrm quickconfig command on Certkiller 2.
B.Through Run window execute the wecutil qc command on Certkiller 2.
C.Add the Certkiller 1 account to the Administrators group on Certkiller 2.
D.Through Run window execute the winrm quickconfig command on Certkiller 1.
E.Add the Certkiller 2 account to the Administrators group on Certkiller 1.
F.Through Run window execute the wecutil qc command on Certkiller 1.
Certkiller .com boosts a main office and 20 branch offices. Configured as a separate site, each branch office has a Read-Only Domain Controller (RODC) server installed.
Users in remote offices complain that they are unable to log on to their accounts.
What should you do to make sure that the cached credentials for user accounts are only stored in their local branch office RODC server()
A.Open the RODC computer account security tab and set Allow on the Receive as permission only for the users that are unable to log on to their accounts
B.Add a password replication policy to the main Domain RODC and add user accounts in the security group
C.Configure a unique security group for each branch office and add user accounts to the respective security group. Add the security groups to the password replication allowed group on the main RODC server
D.Configure and add a separate password replication policy on each RODC computer account
Certkiller .com has a network that is comprise of a single Active Directory Domain.
As an administrator at Certkiller .com, you install Active Directory Lightweight Directory Services (AD LDS) on a server that runs Windows Server 2008. To enable Secure Sockets Layer (SSL) based connections to the AD LDS server, you install certificates from a trusted Certification Authority (CA) on the AD LDS server and client computers.
Which tool should you use to test the certificate with AD LDS()
A.Ldp.exe
B.Active Directory Domain services
C.ntdsutil.exe
D.Lds.exe
E.wsamain.exe
F.None of the above
A.Delete all administrative accounts from the RODC’s group
B.Configure the permission to Deny on Receive for administrative accounts on the security tab for Group Policy Object (GPO)
C.Configure the administrative accounts to be added in the Domain RODC Password Replication Denied group
D.Add a new GPO and enable Account Lockout settings. Link it to the remote RODC server and on the security tab on GPO, check the Read Allow and the Apply group policy permissions for the administrators.
E.None of the above
A.Start the Audit Object Access option
B.Start the Audit System Events option
C.Start the Audit Logon Events option
D.Start the Audit process tracking option
E.All of the above
最新试题
Your network contains an Active Directory domain. A user named User1 takes a leave of absence for one year. You need to restrict access to the User1 user account while User1 is away. What should you do()
Your network contain 10 domain controller that run Windows Server R2. The network contain a member server that is configured to collect all of events that occur on the domain controllers. Your need to ensure that administrators are notified when a specific event occurs on any of the domain controllers. You want to achive the goal by using the minimum amount effort. What should you do()
Your network contains a single Active Directory domain named contoso.com. An administrator accidentally deletes the _msdsc.contoso.com zone. You recreate the _msdsc.contoso.com zone. You need to ensure that the _msdsc.contoso.com zone contains all of the required DNS records. What should you do on each domain controller()
Your network contains two Active Directory forests named contoso.com and nwtraders.com. A two-way forest trust exists between contoso.com and nwtraders.com. The forest trust is configured to use selective authentication. Contoso.com contains a server named Server1. Server1 contains a shared folder named Marketing. Nwtraders.com contains a global group named G_Marketing. The Change share permission and the Modify NTFS permissions for the Marketing folder are assignes to the G_Marketing group. Members of G_Marketing report that they cannot accesss the Marketing folder. You need to ensure that the G_Marketing members can accesss the folder from the network. What should you do()
You create a new Active Directory domain. The functional level of the domain is Windows Server 2003. The domain contains five domain controllers that run Windows Server 2008 R2. You need to monitor the replication of the group policy template files. Which tool should you use()
Your network contains an Active Directory domain named contoso.com. The domain contains five domain controllers.You add a logoff script to an existing Group Policy object (GPO). You need to verify that each domain controller successfully replicates the updated group policy. Which two objects should you verify on each domain controller()
You need to compact an Active Directory database on a domain controller that runs windows Server 2008 R2. What should you do()
You need to receive an e-mail message whenever a domain user account is locked out. Which tool should you use()
Your network contains an Active Directory domain that contains five domain controllers. You have a management computer that runs Windows 7. From the Windows 7 computer, you need to view all account logon failures that occur in the domain. The information must be consolidated on one list. Which command should you run on each domain controller()
Your company has four offices. The network contains a single Active Directory domain. Each office has domain controller. Each office has an organitational unit (OU) that contains the user accounts for the users in that office. In each office, support technicians perform basic troubleshooting for the users in their respective office. You need to ensure that the support technicians can reset the password for the user accounts in their respective office only. The solution must prevent the thechnicians from creating user accounts. What shoul you do()