A.Diskpart.exe
B.Chkdsk.exe
C.Fsutil.exe
D.Fdisk.exe
E.None of the above
您可能感兴趣的试卷
你可能感兴趣的试题
You are formulating the backup strategy for Active Directory Lightweight Directory Services (AD LDS) to ensure that data and log files are backed up regularly. This will also ensure the continued availability of data to applications and users in the event of a system failure. Because you have limited media resources, you decided to backup only specific ADLDS instance instead of taking backup of the entire volume.
What should you do to accomplish this task()
A.Use Windows Server backup utility and enable checkbox to take only backup of database and log files of AD LDS
B.Use Dsdbutil.exe tool to create installation media that corresponds only to the ADLDS instance
C.Move AD LDS database and log files on a separate volume and use windows server backup utility
D.None of the above
You need to deploy Active Directory Rights Management System (AD RMS) to secure all documents,
spreadsheets and to provide user authentication.
What do you need to configure, in order to complete the deployment of AD RMS()
A.Upgrade all client computers to Windows Vista. Install AD RMS on domain controller Certkiller _DC1
B.Ensure that all Windows XP computers have the latest service pack and install the RMS client on all systems. Install AD RMS on domain controller Certkiller _DC1
C.Upgrade all client computers to Windows Vista. Install AD RMS on Certkiller _SRV5
D.Ensure that all Windows XP computers have the latest service pack and install the RMS client on all systems. Install AD RMS on domain controller Certkiller _SRV5
E.None of the above
Certkiller .com has a network that consists of a single Active Directory domain.Windows Server 2008 is installed on all domain controllers in the network.
You are instructed to capture all replication errors from all domain controllers to a central location. What should you do to achieve this task()
A.Initiate the Active Directory Diagnostics data collector set
B.Set event log subscriptions and configure it
C.Initiate the System Performance data collector set
D.Create a new capture in the Network Monitor
A.Critical volume backup
B.Backup of all the volumes
C.Backup of the volume that hosts Operating system
D.Backup of AD DS folders
E.all of the above
A.Link the GPO to the domain and enable System Events option
B.Link the GPO to the domain and enable Audit Object Access option
C.Link the GPO to the Domain Controllers and enable Audit Object Access option
D.Link the GPO to the Domain Controllers and enable Audit Process tracking option
E.Perform all of the above actions
Certkiller .com has a software evaluation lab. There is a server in the evaluation lab named as CKT. CKT runs Windows Server 2008 and Microsoft Virtual Server 2005 R2. CKT has 200 virtual servers running on an isolated virtual segment to evaluate software. To connect to the internet, it uses physical network interface card.
Certkiller .com requires every server in the company to access Internet.
Certkiller .com security policy dictates that the IP address space used by software evaluation lab must not be used by other networks. Similarly, it states the IP address space used by other networks should not be used by the evaluation lab network. As an administrator you find you that the applications tested in the software evaluation lab need to access normal network to connect to the vendors update servers on the internet. You need to configure all virtual servers on the CKT server to access the internet. You also need to comply with company’s security policy.
Which two actions should you perform to achieve this task()
A.Trigger the Virtual DHCP server for the external virtual network and run ipconfig/renew command on each virtual server
B.On CKT’s physical network interface, activate the Internet Connection Sharing (ICS)
C.Use Certkiller .com intranet IP addresses on all virtual servers on CKT.
D.Add and install a Microsoft Loopback Adapter network interface on CKT. Use a new network interface and create a new virtual network.
E.None of the above
A.Execute Dsmod.exe
B.Use Active Directory Users and Computers
C.Use Active Directory Sites and Computers
D.Execute Ntdstuil.exe with -ato parameter
The corporate network of Certkiller consists of a Windows Server 2008 single Active Directory domain. The domain has two servers named Certkiller 1 and Certkiller 2.
To ensure central monitoring of events you decided to collect all the events on one server, Certkiller 1. To collect events from Certkiller
2. and transfer them to Certkiller 1, you configured the required event subscriptions.
You selected the Normal option for the Event delivery optimization setting by using the HTTP protocol. However, you discovered that none of the subscriptions work.
Which of the following actions would you perform to configure the event collection and event forwarding on the two servers()
A.Through Run window execute the winrm quickconfig command on Certkiller 2.
B.Through Run window execute the wecutil qc command on Certkiller 2.
C.Add the Certkiller 1 account to the Administrators group on Certkiller 2.
D.Through Run window execute the winrm quickconfig command on Certkiller 1.
E.Add the Certkiller 2 account to the Administrators group on Certkiller 1.
F.Through Run window execute the wecutil qc command on Certkiller 1.
Certkiller .com boosts a main office and 20 branch offices. Configured as a separate site, each branch office has a Read-Only Domain Controller (RODC) server installed.
Users in remote offices complain that they are unable to log on to their accounts.
What should you do to make sure that the cached credentials for user accounts are only stored in their local branch office RODC server()
A.Open the RODC computer account security tab and set Allow on the Receive as permission only for the users that are unable to log on to their accounts
B.Add a password replication policy to the main Domain RODC and add user accounts in the security group
C.Configure a unique security group for each branch office and add user accounts to the respective security group. Add the security groups to the password replication allowed group on the main RODC server
D.Configure and add a separate password replication policy on each RODC computer account
Certkiller .com has a network that is comprise of a single Active Directory Domain.
As an administrator at Certkiller .com, you install Active Directory Lightweight Directory Services (AD LDS) on a server that runs Windows Server 2008. To enable Secure Sockets Layer (SSL) based connections to the AD LDS server, you install certificates from a trusted Certification Authority (CA) on the AD LDS server and client computers.
Which tool should you use to test the certificate with AD LDS()
A.Ldp.exe
B.Active Directory Domain services
C.ntdsutil.exe
D.Lds.exe
E.wsamain.exe
F.None of the above
最新试题
Your network contains an Active Directory domain. The domain contains a group named Group1. The minimum password lenght for the domain is set to six characters. you need to ensure that the passwords for all users in Group1 are at least 10 characters long. All other users must be able to use passwords that are six characters long. What should you do first()
Your network contains an Active Directory forest. The forest contains two domains. You have a standalone root certification authority (CA). On a server in the child domain, you run the Add Roles Wizard and discover that the option to select an enterprise CA is disabled. You need to install an enterprise subordinate CA on the server. What should you use to log on to the new server()
Your network contains an Active Directory domain named contoso.com. Contoso.com contains three servers.The servers are configure as shown in the following table. Server name Server roel Service Server1 Certification authority (CA) Server2 Certificate Enrollment Web Service Server3 Certificate Enrollment Policy Web Service You need to ensure that users can manually enroll and renew their certificates by using the Certificate Enrollment Web Service. Which two actions should you perform()
Your network contains an Active Directory domain named contoso.com. The domain contains five domain controllers.You add a logoff script to an existing Group Policy object (GPO). You need to verify that each domain controller successfully replicates the updated group policy. Which two objects should you verify on each domain controller()
You have an enterprise subordinate certification authority (CA). You have a group named Group1. You need to allow members of Group1 to publish new certificate revocation lists. Members of Group1 must not be allowed to revoke certificates. What should you do()
Your network contains an Active Directory domain. The domain contains 1000 user accounts. You have a list that contains the mobile phone number of each user You need to add the mobile number of each user to Active Directory. What should you do()
Your network contains two Active Directory forests named contoso.com and nwtraders.com. A two-way forest trust exists between contoso.com and nwtraders.com. The forest trust is configured to use selective authentication. Contoso.com contains a server named Server1. Server1 contains a shared folder named Marketing. Nwtraders.com contains a global group named G_Marketing. The Change share permission and the Modify NTFS permissions for the Marketing folder are assignes to the G_Marketing group. Members of G_Marketing report that they cannot accesss the Marketing folder. You need to ensure that the G_Marketing members can accesss the folder from the network. What should you do()
Your network contain 10 domain controller that run Windows Server R2. The network contain a member server that is configured to collect all of events that occur on the domain controllers. Your need to ensure that administrators are notified when a specific event occurs on any of the domain controllers. You want to achive the goal by using the minimum amount effort. What should you do()
You remotely monitor several domain controllers. You run winrm.exe quickconfig on each domain controller. You need to create a WMI script query to retrieve information from the bios of each domain controller. Which format should you use to write the query()
You need to compact an Active Directory database on a domain controller that runs windows Server 2008 R2. What should you do()