A. Configure SSL encryption on the WSUS server website.
B. Run the netdom trust /SecurePasswordPrompt command on the WSUS server
C. Configure the NTFS permissions on the content directory to Deny Full Controll permission to the Everyone group
D. Configure the WSUS server to require Integrated Windows Authentication (IWA) when users connect to the WSUS server.
您可能感兴趣的试卷
你可能感兴趣的试题
A. Create a new Quad-A (AAAA) DNS record.
B. Create a new Signature (SIG) DNS record.
C. Create a new Public key (KEY) DNS record.
D. Create a new Well-known service (WKS) DNS record.
A. Add the Event trace data collector
B. Add the Performance counter alert
C. Add the Performance counter data collector
D. Add the System configuration data collector
A. Configure a proxy server
B. Configure a upstream server
C. Create a new replica group
D. Create a new computer group
A. Create a new Pointer (PTR) DNS record.
B. Create a new Quad-A (AAAA) DNS record.
C. Create a new Signature (SIG) DNS record.
D. Create a new Route Through (RT) DNS record.
A. Use DNS manager to delete the 127.in-addr.arpa zone.
B. Run the dnscmd /RecordDelete 10.3.2.127 command at the command prompt.
C. Run the dnscmd /ZoneDelete 127.in-addr.arpa command at the command prompt.
D. Run the dnscmd /RecordDelete 10.in-addr.arpa. 127.2.3 PTR command at the command prompt.
A. Increase the Expires After setting to 4 days on the Start of Authority (SOA) record for the zone.
B. Increase the Refresh Interval setting to 4 days on the Start of Authority (SOA) record for the zone.
C. Configure the Zone Aging / Scavenging Properties dialog box to enable Scavenge stale resource records, and set the Refresh setting to 4 days.
D. Configure the Zone Aging / Scavenging Properties dialog box to enable Scavenge stale resource records, and set the No-refresh interval setting to 4 days.
A. Run the wecutil cs subscription.xml command on Server1
B. Run the wevutil im subscription.xml command on Server1
C. Create an event collector subscription configuration file. name the file subscription.xml
D. Create a custom view on Server1 by using Event View. Export the custom view to a file named subscription.xml
A. In the Performance console, create a counter log to track processor usage.
B. In Event View, open and review the application log for Performance events.
C. In Windows Reliability and Performance Monitor, use the Resource View to see the percentage of processor capacity used by each application.
D. In Windows Reliability and Performance Monitor, create an alert that will be triggered when processor usage exceeds 80 percent for more than five minutes on Server1.
A. From File Server Resource Manager, create a File Screen
B. From File Server Resource Manager, create a Storage Management report.
C. From the command prompt, run dirquota.exe quota list.
D. From the properties of each volume, review the Quota Entries list.
A. Decrease the Retry Interval setting in the Start of Authority (SOA) record for the zone.
B. Decrease the Refresh Interval setting in the Start of Authority (SOA) record for the zone.
C. Increase the Refresh Interval setting in the Start of Authority (SOA) record for the zone.
D. Disable the netmask ordering option in the properties of the DNS Master server for the zone.
最新试题
You install WSUS on a server that runs Windows Server 2008. You need to ensure that the traffic between the WSUS administrative web site and the server administrators computer is encrypted What should you do()?
You perform a security audit on a server named Server1. You install the Microsoft Network Monitor 3.0 application on Server1. You find that only some of the captured frames display host mnemonic names in the Source column and the Destination column. All other frames display IP addresses. You need to display mnemonic host names instead of IP addresses for all the frames.What should you do?()
Your company has a network that has an active directory domain. The domain has two servers named DC1 and DC2. You plan to collect events from DC2 and transfer them to DC1. You configure the required subscriptions by selecting the normal option for the event delivery optimiation setting and using the HTTP protocol. you discovere that none of the subscritpions work. You need to ensure that the servers support event collectiors. which three actions should you perform()?
You have a file server that runs Windows Server 2008 R2.You configure quotas on the server.You need to view each user¯s quota usage on a per folder basisWhat should you do?()
You manage a server that runs Windows Server 2008. The windows backup and restore utility is installed ont he server. You nede to create a full backup of all system state data to the DVD drive (R: drive) on the server. Which command should you run on the server()?
Your network consists of a single Active Directory domain. All servers run Windows Server 2008 R2.You have a server named Server1 that hosts shared documents. Users report extremely slow response times when they try to open the shared documents on Server1.You log on to Server1 and observe real-time data indicating that the processor is operating at 100 percent of capacity.You need to gather additional data to diagnose the cause of the problem.What should you do?()
Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP. what should you do()?
You perform a security audit of a server named CRM1. You want to build a list of all DNS requests that are initiated by the server. You install the Microsoft Network Monitor 3.0 application on CRM1. You capture all local traffic on CRM1 for 24 hours. You save the capture file as data.cap. You find that the size of the file is more than 1 GB. You need to create a file named DNSdata.cap from the existing capture file that contains only DNS-related data.What should you do? ()
Your company has a server named DC1 that runs Windows Server 2008. DC1 has the DHCP server role installed. You find taht a desktop computer named SALES4 is unable to obtain an IP configuration from the DHCP server. You install the Microsoft Network Monitor 3.0 application on DC1. You enable P-mode in the Network Monitor application configuration. You plan to capture only the DHCP server-related traffic between DC1 and SALES4 The network interface configuration for the two computers is shown in the following table. (missing again wow). You need to build a filter int he Network Monitor application to capture the DHCP traffic between DC1 and SALES4 Which filter should you use()?
Your companys corporate network uses Network Access Protection (NAP). Users are able to connect to the corporate network remotely. You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do()?