A. ipconfig /registerdns:local.contoso.com
B. dnscmd Server1 /ZoneAdd local.contoso.com /DSPrimary
C. dnscmd Server1 /ZoneAdd local.contoso.com /Primary /file local.contoso.com.dns
D. netsh interface ipv4 set dnsserver name=local.contoso.com
您可能感兴趣的试卷
你可能感兴趣的试题
A. From the DHCP snap-in, modify the bindings to associate only LAN1 with the DHCP service
B. From the DHCP snap-in, create a new multicast scope
C. From the properties of the LAN1 network connection, set the metric value to 1
D. From the properties of the LAN2 network connection, set the metric value to 1
A.Set the security layer for each server to the RDP Security Layer.
B.Configure the firewall on each server to block port 3389.
C.Acquire user certificates from the internal certification authority.
D.Configure each server to allow connections only to Remote Desktop client computers that use Network Level Authentication.
A. Restart the IPsec Policy Agent service on Server1
B. Assign the Client (Respond Only) IPsec policy to Server1
C. Assign the Server (Request Security) IPsec Policy to Server1
D. Assign the Client (Respond Only) IPsec policy to all client computers
A. Configure the burst handling option on DC2.
B. Configure DC1 and DC2 as WINS push/pull replication partners.
C. In the WINS server properties on DC1, increase the Renew interval setting to 1 day.
D. In the WINS server properties on DC2, increase the Renew interval setting to 1 day.
A.Install the Network Policy Server (NPS) on the RAS1 server.
B.Create a remote access policy that requires users to authenticate by using SPAP.
C.Create a remote access policy that requires users to authenticate by using EAP-TLS.
D.Create a remote access policy that requires users to authenticate by using MS-CHAP v2.
A. Run the ipconfig /renew command on WKS1
B. Run the netsh add helper command on WKS1
C. Add the DHCP reservation for WKS1 to the second DHCP server
D. Add both DHCP servers to the RAS and IAS Servers group in the Active Directory domain
A. Deactivate all LM and NTLM authentication methods on the FSS1 server
B. Use IIS to publish the confidentials files. activate SSL on the ISS server, and then open the files as a web folder.
C. Use IPSec encryption between the FSS1 server and the computers of the users who need to access the confidential files
D. Use the Server Message Block (SMB) signing between the FSS1 server and the computers of the users who want to access the confidential files.
E. Activate offline files for the confidential files that are stored on the FSS1 server. In the Folder Advanced.Properties dialog box, select the Encrypt contents to secure data option.
A. Run the dnscmd . /clearcache command on Server3.
B. Run the ipconfig /flushdns command on Server3.
C. Decrease the Time-to-Live (TTL) on the Start of Authority (SOA) record of na.contoso.com to 15 minutes.
D. Increase the Retry Interval value on the Start of Authority (SOA) record of na.contoso.com to 15 minutes.
A. Run the netsh ras ipv6 set command
B. Run the netsh interface ipv6 delete command
C. Run ipv6.exe and remove the IPv6 protocol
D. From the Local Area connection Properties, uncheck Internet Protocol Versions 6 (TCP/IPv6)
A. Stop and restart the DNS Server service on Server1.
B. Enable DNS scavenging on the na.contoso.com zone.
C. Run the dnscmd Server1 /AgeAllRecords command on Server1.
D. Run the dnscmd Server1 /StartScavenging command on Server1.
最新试题
Your company has a server named Printer1 that runs Windows Server 2008 R2. Printer1 has the Print and Document Services server role installed.You need to reduce the number of events registered in the system log on Printer1. What should you do?()
You deploy Windows Server 2008 VPN server behind a firewall. Remote users connect to the VPN by using portable computers that run Windows Vista with the latest service pack. The firewall is configured to allow only secured web communications. You need to enable remote users to connect as securely as possible. you must achieve this goal without opening any additional ports on the firewall. What should you do ()?
You have a file server that runs Windows Server 2008 R2.You configure quotas on the server.You need to view each user¯s quota usage on a per folder basisWhat should you do?()
Your company has a network that has an Active Directory domain. The domain has two servers named DC1 and DC2. You plan to collect events from DC2 and transfer them to DC1. You configure the required subscriptions by selecting the Normal option for the Event delivery optimization setting and by using the HTTP protocol.You discover that none of the subscriptions work.You need to ensure that the servers support the event collectors.Which three actions should you perform?()
You perform a security audit on a server named Server1. You install the Microsoft Network Monitor 3.0 application on Server1. You find that only some of the captured frames display host mnemonic names in the Source column and the Destination column. All other frames display IP addresses. You need to display mnemonic host names instead of IP addresses for all the frames.What should you do?()
Your companys corporate network uses Network Access Protection (NAP). Users are able to connect to the corporate network remotely. You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do()?
You have a server that runs Windows Server 2008 R2.You create a new quota template. You apply quotas to 100 folders by using the quota template.You need to modify the quota settings for all 100 folders. You must achieve this goal by using the minimum amount of administrative effort.What should you do?()
Your company has users who connect remotely to the main office though a Windows Server 2008 VPN server. You need to ensure that users cannot access the VPN server remotely from 22:00 to 05:00. What should you do()?
Your company has a server named DC1 that runs Windows Server 2008 R2. Server1 has the DHCPServer server role installed.You find that a desktop computer named Computer1 is unable to obtain an IP configuration from the DHCP server.You install the Microsoft Network Monitor 3.0 application on Server1. You enable P-mode in the Network Monitor application configuration. You plan to capture only the DHCP server-related traffic between Server1 and Computer1.The network interface configuration for the two computers is shown in the following table.Server1 Computer1IP address 192.168.2.1 169.254.15.84MAC address 00-0A-5E-1C-7F-67 00-17-31-D5-5E-FFYou need to build a filter in the Network Monitor application to capture the DHCP traffic between Server1and Computer1.Which filter should you use?()
Your company has a network that has 100 servers. A server named Server1 is configured as a file server. Server1 is connected to a SAN and has 15 logical drives. You want to automatically run a data archiving script if the free space on any of the logical drives is below 30 percent. You need to automate the script execution.You create a new Data Collector Set. What should you do next?()