Your company has a main office and a branch office that are configured as a single Active Directory forest.
The functional level of the Active Directory forest is Windows Server 2003. There are four Windows Server 2003 domain controllers in the main office. You need to ensure that you are able to deploy a read-only domain controller (RODC) at the branch office. Which two actions should you perform()
A.Run the adpreplrodcprep command.
B.Raise the functional level of the forest to Windows Server 2008.
C.Raise the functional level of the domain to Windows Server 2008.
D.Deploy a Windows Server 2008 domain controller at the main office.
您可能感兴趣的试卷
你可能感兴趣的试题
A.Diskpart.exe
B.Chkdsk.exe
C.Fsutil.exe
D.Fdisk.exe
E.None of the above
You are formulating the backup strategy for Active Directory Lightweight Directory Services (AD LDS) to ensure that data and log files are backed up regularly. This will also ensure the continued availability of data to applications and users in the event of a system failure. Because you have limited media resources, you decided to backup only specific ADLDS instance instead of taking backup of the entire volume.
What should you do to accomplish this task()
A.Use Windows Server backup utility and enable checkbox to take only backup of database and log files of AD LDS
B.Use Dsdbutil.exe tool to create installation media that corresponds only to the ADLDS instance
C.Move AD LDS database and log files on a separate volume and use windows server backup utility
D.None of the above
You need to deploy Active Directory Rights Management System (AD RMS) to secure all documents,
spreadsheets and to provide user authentication.
What do you need to configure, in order to complete the deployment of AD RMS()
A.Upgrade all client computers to Windows Vista. Install AD RMS on domain controller Certkiller _DC1
B.Ensure that all Windows XP computers have the latest service pack and install the RMS client on all systems. Install AD RMS on domain controller Certkiller _DC1
C.Upgrade all client computers to Windows Vista. Install AD RMS on Certkiller _SRV5
D.Ensure that all Windows XP computers have the latest service pack and install the RMS client on all systems. Install AD RMS on domain controller Certkiller _SRV5
E.None of the above
Certkiller .com has a network that consists of a single Active Directory domain.Windows Server 2008 is installed on all domain controllers in the network.
You are instructed to capture all replication errors from all domain controllers to a central location. What should you do to achieve this task()
A.Initiate the Active Directory Diagnostics data collector set
B.Set event log subscriptions and configure it
C.Initiate the System Performance data collector set
D.Create a new capture in the Network Monitor
A.Critical volume backup
B.Backup of all the volumes
C.Backup of the volume that hosts Operating system
D.Backup of AD DS folders
E.all of the above
A.Link the GPO to the domain and enable System Events option
B.Link the GPO to the domain and enable Audit Object Access option
C.Link the GPO to the Domain Controllers and enable Audit Object Access option
D.Link the GPO to the Domain Controllers and enable Audit Process tracking option
E.Perform all of the above actions
Certkiller .com has a software evaluation lab. There is a server in the evaluation lab named as CKT. CKT runs Windows Server 2008 and Microsoft Virtual Server 2005 R2. CKT has 200 virtual servers running on an isolated virtual segment to evaluate software. To connect to the internet, it uses physical network interface card.
Certkiller .com requires every server in the company to access Internet.
Certkiller .com security policy dictates that the IP address space used by software evaluation lab must not be used by other networks. Similarly, it states the IP address space used by other networks should not be used by the evaluation lab network. As an administrator you find you that the applications tested in the software evaluation lab need to access normal network to connect to the vendors update servers on the internet. You need to configure all virtual servers on the CKT server to access the internet. You also need to comply with company’s security policy.
Which two actions should you perform to achieve this task()
A.Trigger the Virtual DHCP server for the external virtual network and run ipconfig/renew command on each virtual server
B.On CKT’s physical network interface, activate the Internet Connection Sharing (ICS)
C.Use Certkiller .com intranet IP addresses on all virtual servers on CKT.
D.Add and install a Microsoft Loopback Adapter network interface on CKT. Use a new network interface and create a new virtual network.
E.None of the above
A.Execute Dsmod.exe
B.Use Active Directory Users and Computers
C.Use Active Directory Sites and Computers
D.Execute Ntdstuil.exe with -ato parameter
The corporate network of Certkiller consists of a Windows Server 2008 single Active Directory domain. The domain has two servers named Certkiller 1 and Certkiller 2.
To ensure central monitoring of events you decided to collect all the events on one server, Certkiller 1. To collect events from Certkiller
2. and transfer them to Certkiller 1, you configured the required event subscriptions.
You selected the Normal option for the Event delivery optimization setting by using the HTTP protocol. However, you discovered that none of the subscriptions work.
Which of the following actions would you perform to configure the event collection and event forwarding on the two servers()
A.Through Run window execute the winrm quickconfig command on Certkiller 2.
B.Through Run window execute the wecutil qc command on Certkiller 2.
C.Add the Certkiller 1 account to the Administrators group on Certkiller 2.
D.Through Run window execute the winrm quickconfig command on Certkiller 1.
E.Add the Certkiller 2 account to the Administrators group on Certkiller 1.
F.Through Run window execute the wecutil qc command on Certkiller 1.
Certkiller .com boosts a main office and 20 branch offices. Configured as a separate site, each branch office has a Read-Only Domain Controller (RODC) server installed.
Users in remote offices complain that they are unable to log on to their accounts.
What should you do to make sure that the cached credentials for user accounts are only stored in their local branch office RODC server()
A.Open the RODC computer account security tab and set Allow on the Receive as permission only for the users that are unable to log on to their accounts
B.Add a password replication policy to the main Domain RODC and add user accounts in the security group
C.Configure a unique security group for each branch office and add user accounts to the respective security group. Add the security groups to the password replication allowed group on the main RODC server
D.Configure and add a separate password replication policy on each RODC computer account
最新试题
Your network contains an Active Directory domain named contoso.com. Contoso.com contains a member server that runs Windows Serever 2008 Standart. You need to install an enterprise subordinate certification authority (CA) that support private key archival. You must achieve this goal by using the minimum amount of administrative effort.What do you do first()
Your network contains an Active Directory forest. The forest contains an Acitve Directory site for a remote office. The remote site contains a read-only domain controller (RODC). You need to configure the RODC to store only the password of users in the remote site. What should you do()
You need to receive an e-mail message whenever a domain user account is locked out. Which tool should you use()
You have an enterprise subordinate certification authority (CA). The CA is configured to use a hardware security module. You need to back up Active Directory Certificate Services on the CA. Which command should you run()
Your network contains an Active Directory domain controller named DC1. DDC1 runs Windows Server 2008 R2. You need to defragment the Active Directory database on DC1. The solution must minimize downtime on DC1. What should you do first()
Your network contains an Active Directory forest. The forest contains two domains. You have a standalone root certification authority (CA). On a server in the child domain, you run the Add Roles Wizard and discover that the option to select an enterprise CA is disabled. You need to install an enterprise subordinate CA on the server. What should you use to log on to the new server()
Active Directory Rights Management Services (AD RMS) is deployed on your network. You need to configure AD RMS to use Kerberos authentication. Which two actions should you perform()
Your network contain 10 domain controller that run Windows Server R2. The network contain a member server that is configured to collect all of events that occur on the domain controllers. Your need to ensure that administrators are notified when a specific event occurs on any of the domain controllers. You want to achive the goal by using the minimum amount effort. What should you do()
Your network contains an Active Directory domain. The domain contains 1000 user accounts. You have a list that contains the mobile phone number of each user You need to add the mobile number of each user to Active Directory. What should you do()
What should you do()