A. Run the dnscmd . /clearcache command on Server3.
B. Run the ipconfig /flushdns command on Server3.
C. Decrease the Time-to-Live (TTL) on the Start of Authority (SOA) record of na.contoso.com to 15 minutes.
D. Increase the Retry Interval value on the Start of Authority (SOA) record of na.contoso.com to 15 minutes.
您可能感兴趣的试卷
你可能感兴趣的试题
A. Run the netsh ras ipv6 set command
B. Run the netsh interface ipv6 delete command
C. Run ipv6.exe and remove the IPv6 protocol
D. From the Local Area connection Properties, uncheck Internet Protocol Versions 6 (TCP/IPv6)
A. Stop and restart the DNS Server service on Server1.
B. Enable DNS scavenging on the na.contoso.com zone.
C. Run the dnscmd Server1 /AgeAllRecords command on Server1.
D. Run the dnscmd Server1 /StartScavenging command on Server1.
A. Configure client computers in the Contoso forest to use the Tailspin Toys DNS server as the alternate DNS server.
B. Create a new conditional forwarder and store it in Active Directory. Replicate the new conditional forwarder to all DNS servers in the Contoso forest.
C. Create a new application directory partition in the Contoso forest. Enlist the directory partition for all DNS servers.
D. Create a new host (A) record in the GlobalNames folder on one of the DNS servers in the Contoso forest. Configure the host (A) record by using the Tailspin Toys domain name and the IP address of the DNS server in the Tailspin Toys forest.
A.Configure all access points as RADIUS clients to the Remediation Servers.
B.Configure all access points as RADIUS clients to the Network Policy Server (NPS).
C.Create a Network Policy that defines Remote Access Server as a network connection method.
D.Create a Network Policy that specifies EAP-TLS as the only available authentication method.
A.Create a Group Policy object (GPO) that enables Security Center and link the policy to the domain.
B.Create a Group Policy object (GPO) that enables Security Center and link the policy to the Domain Controllers organizational unit (OU).
C.Create a Group Policy object (GPO) and set the Require trusted path for credential entry option to Enabled. Link the policy to the domain.
D.Create a Group Policy object (GPO) and set the Require trusted path for credential entry option to Enabled. Link the policy to the Domain Controllers organizational unit (OU).
A. Disable the root hints.
B. Enable BIND secondaries.
C. Configure a forwarder to the caching DNS server.
D. Configure a GlobalNames host (A) record for the hostname of the caching DNS server.
A.Enable automatic updates on each client.
B.Enable the Security Center on each client.
C.Quarantine clients that do not have all available security updates installed.
D.Disconnect the connection until the required updates are installed.
A. Enable forwarding to your ISPs DNS servers.
B. Disable the root hints on the DNS server.
C. Disable the netmask ordering option on the DNS server.
D. Configure Reverse Lookup Zones for the IP subnets on the network.
A.Apply an IPsec NAP policy.
B.Configure a NAP policy for 802.1X wireless connections.
C.Configure VPN connections to use MS-CHAP v2 authentication.
D.Restrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP
A.Windows Deployment Services server role and Deployment Server role service.
B.Windows Deployment Services server role and Transport role Service.
C.Network Policy and Access Services server role and Routing and Remote Access Services role service.
D.Network Policy and Access Services server role and Host Credential Authorization Protocol role.
最新试题
You deploy Windows Server 2008 VPN server behind a firewall. Remote users connect to the VPN by using portable computers that run Windows Vista with the latest service pack. The firewall is configured to allow only secured web communications. You need to enable remote users to connect as securely as possible. you must achieve this goal without opening any additional ports on the firewall. What should you do ()?
Your company has a network that has 100 servers. You install a new server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. You discover that the Reliability Monitor has no data, and that the system stablitiy chare has never been updated. You nede to configure the server to collect the reliability monitor data. What should you do()?
Your company runs Windows Server Update Services (WSUS) on a server named Server1. Server1runs Windows Server 2008 R2. Server1 is located on the company intranet. You configure the WSUS Web site to use SSL.You need to configure a Group Policy object (GPO) to specify the intranet update locations.Which URLs should you use?()
You perform a security audit of a server named CRM1. You want to build a list of all DNS requests that are initiated by the server. You install the Microsoft Network Monitor 3.0 application on CRM1. You capture all local traffic on CRM1 for 24 hours. You save the capture file as data.cap. You find that the size of the file is more than 1 GB. You need to create a file named DNSdata.cap from the existing capture file that contains only DNS-related data.What should you do? ()
Your company has a server named Printer1 that runs Windows Server 2008 R2. Printer1 has the Print and Document Services server role installed.You need to reduce the number of events registered in the system log on Printer1. What should you do?()
You have a server that runs Windows Server 2008 R2.You create a new quota template. You apply quotas to 100 folders by using the quota template.You need to modify the quota settings for all 100 folders. You must achieve this goal by using the minimum amount of administrative effort.What should you do?()
You have a server that runs Windows Server 2008. You need to configure the server as a VPN server. What should you installed on the server()?
Your companys corporate network uses Network Access Protection (NAP). Users are able to connect to the corporate network remotely. You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do()?
You perform a security audit on a server named Server1. You install the Microsoft Network Monitor 3.0 application on Server1. You find that only some of the captured frames display host mnemonic names in the Source column and the Destination column. All other frames display IP addresses. You need to display mnemonic host names instead of IP addresses for all the frames.What should you do?()
You perform a security audit of a server named CRM1. You want to build a list of all DNS requests that are initiated by the server. You install the Microsoft Network Monitor 3.0 application on CRM1. You capture all local traffic on CRM1 for 24hours. You save the capture file as data.cap. you find that the size of this file is more tahn 1GB. you need to create a file named DNSdata.cap from the existing capture file taht contains only dNS -related data What should you do()?