A. Run the netsh ras ipv6 set command
B. Run the netsh interface ipv6 delete command
C. Run ipv6.exe and remove the IPv6 protocol
D. From the Local Area connection Properties, uncheck Internet Protocol Versions 6 (TCP/IPv6)
您可能感兴趣的试卷
你可能感兴趣的试题
A. Stop and restart the DNS Server service on Server1.
B. Enable DNS scavenging on the na.contoso.com zone.
C. Run the dnscmd Server1 /AgeAllRecords command on Server1.
D. Run the dnscmd Server1 /StartScavenging command on Server1.
A. Configure client computers in the Contoso forest to use the Tailspin Toys DNS server as the alternate DNS server.
B. Create a new conditional forwarder and store it in Active Directory. Replicate the new conditional forwarder to all DNS servers in the Contoso forest.
C. Create a new application directory partition in the Contoso forest. Enlist the directory partition for all DNS servers.
D. Create a new host (A) record in the GlobalNames folder on one of the DNS servers in the Contoso forest. Configure the host (A) record by using the Tailspin Toys domain name and the IP address of the DNS server in the Tailspin Toys forest.
A.Configure all access points as RADIUS clients to the Remediation Servers.
B.Configure all access points as RADIUS clients to the Network Policy Server (NPS).
C.Create a Network Policy that defines Remote Access Server as a network connection method.
D.Create a Network Policy that specifies EAP-TLS as the only available authentication method.
A.Create a Group Policy object (GPO) that enables Security Center and link the policy to the domain.
B.Create a Group Policy object (GPO) that enables Security Center and link the policy to the Domain Controllers organizational unit (OU).
C.Create a Group Policy object (GPO) and set the Require trusted path for credential entry option to Enabled. Link the policy to the domain.
D.Create a Group Policy object (GPO) and set the Require trusted path for credential entry option to Enabled. Link the policy to the Domain Controllers organizational unit (OU).
A. Disable the root hints.
B. Enable BIND secondaries.
C. Configure a forwarder to the caching DNS server.
D. Configure a GlobalNames host (A) record for the hostname of the caching DNS server.
A.Enable automatic updates on each client.
B.Enable the Security Center on each client.
C.Quarantine clients that do not have all available security updates installed.
D.Disconnect the connection until the required updates are installed.
A. Enable forwarding to your ISPs DNS servers.
B. Disable the root hints on the DNS server.
C. Disable the netmask ordering option on the DNS server.
D. Configure Reverse Lookup Zones for the IP subnets on the network.
A.Apply an IPsec NAP policy.
B.Configure a NAP policy for 802.1X wireless connections.
C.Configure VPN connections to use MS-CHAP v2 authentication.
D.Restrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP
A.Windows Deployment Services server role and Deployment Server role service.
B.Windows Deployment Services server role and Transport role Service.
C.Network Policy and Access Services server role and Routing and Remote Access Services role service.
D.Network Policy and Access Services server role and Host Credential Authorization Protocol role.
A. Restart the IPsec Policy Agent service on Server1.
B. Assign the Client (Respond Only) IPsec policy to Server1.
C. Assign the Server (Request Security) IPsec policy to Server1.
D. Assign the Client (Respond Only) IPsec policy to all client computers.
最新试题
Your company has a server named DC1 that runs Windows Server 2008. DC1 has the DHCP server role installed. You find taht a desktop computer named SALES4 is unable to obtain an IP configuration from the DHCP server. You install the Microsoft Network Monitor 3.0 application on DC1. You enable P-mode in the Network Monitor application configuration. You plan to capture only the DHCP server-related traffic between DC1 and SALES4 The network interface configuration for the two computers is shown in the following table. (missing again wow). You need to build a filter int he Network Monitor application to capture the DHCP traffic between DC1 and SALES4 Which filter should you use()?
You perform a security audit on a server named Server1. You install the Microsoft Network Monitor 3.0 application on Server1. You find that only some of the captured frames display host mnemonic names in the Source column and the Destination column. All other frames display IP addresses. You need to display mnemonic host names instead of IP addresses for all the frames.What should you do?()
Your company has a server named SRV1 that runs Windows Server 2008 R2. The default Print Services server role is installed on SRV1. The company wants to centralize printing on SRV1 for both UNIX and Windows users. You need to provide support to the UNIX users who print on SRV1.What are two possible ways to achieve this goal? ()
Your company runs Windows Server Update Services (WSUS) on a server named Server1. Server1runs Windows Server 2008 R2. Server1 is located on the company intranet. You configure the WSUS Web site to use SSL.You need to configure a Group Policy object (GPO) to specify the intranet update locations.Which URLs should you use?()
You install WSUS on a server that runs Windows Server 2008. You need to ensure that the traffic between the WSUS administrative web site and the server administrators computer is encrypted What should you do()?
Your companys corporate network uses Network Access Protection (NAP). Users are able to connect to the corporate network remotely. You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do()?
You have a file server that runs Windows Server 2008 R2.You configure quotas on the server.You need to view each user¯s quota usage on a per folder basisWhat should you do?()
Your company has an active directory domain that has two domain controllers named DC1 and DC2. You prepare both servers to support event subscriptions. On DC1, you create a new default subscription for DC2. You need to review system events for DC2. Which event log should you select()?
Your company has users who connect remotely to the main office though a Windows Server 2008 VPN server. You need to ensure that users cannot access the VPN server remotely from 22:00 to 05:00. What should you do()?
You perform a security audit of a server named CRM1. You want to build a list of all DNS requests that are initiated by the server. You install the Microsoft Network Monitor 3.0 application on CRM1. You capture all local traffic on CRM1 for 24 hours. You save the capture file as data.cap. You find that the size of the file is more than 1 GB. You need to create a file named DNSdata.cap from the existing capture file that contains only DNS-related data.What should you do? ()