单项选择题You install WSUS on a server that runs Windows Server 2008. You need to ensure taht the traffic between the WSUS administrative website and the server administrators computer is encrypted. What should you do? ()

A. Configure SSL encryption on the WSUS server website.
B. Run the netdom trust /SecurePasswordPrompt command on the WSUS server
C. Configure the NTFS permissions on the content directory to Deny Full Controll permission to the Everyone group
D. Configure the WSUS server to require Integrated Windows Authentication (IWA) when users connect to the WSUS server.


您可能感兴趣的试卷

你可能感兴趣的试题

4.单项选择题Your company has a server that runs Windows Server 2008 R2.You have a new application that locates remote resources by name. The new application requires IPv6.You need to ensure that the application can locate remote resources by using IPv6.What should you do?()

A. Create a new Pointer (PTR) DNS record.
B. Create a new Quad-A (AAAA) DNS record.
C. Create a new Signature (SIG) DNS record.
D. Create a new Route Through (RT) DNS record.

5.单项选择题Your company has a single Active Directory domain. All servers run Windows Server 2008 R2.You install an additional DNS server that runs Windows Server 2008 R2.You need to delete the pointer record for the IP address 10.3.2.127.What should you do?()

A. Use DNS manager to delete the 127.in-addr.arpa zone.
B. Run the dnscmd /RecordDelete 10.3.2.127 command at the command prompt.
C. Run the dnscmd /ZoneDelete 127.in-addr.arpa command at the command prompt.
D. Run the dnscmd /RecordDelete 10.in-addr.arpa. 127.2.3 PTR command at the command prompt.

6.单项选择题Your company has a main office and two branch offices. Domain controllers in the main office host an Active Directory-integrated zone. The DNS servers in the branch offices host a secondary zone for the domain and use the main office DNS servers as the DNS Master servers for the zone.Each branch office has an application server. Users access the application server by using its fully qualified domain name.You need to ensure that users in the branch offices can access their local application server even if the WAN links are down for three days.What should you do?()

A. Increase the Expires After setting to 4 days on the Start of Authority (SOA) record for the zone.
B. Increase the Refresh Interval setting to 4 days on the Start of Authority (SOA) record for the zone.
C. Configure the Zone Aging / Scavenging Properties dialog box to enable Scavenge stale resource records, and set the Refresh setting to 4 days.
D. Configure the Zone Aging / Scavenging Properties dialog box to enable Scavenge stale resource records, and set the No-refresh interval setting to 4 days.

7.多项选择题Your company has a main office and a branch office. The branch office has three servers that run a Server Core installation of Windows Server 2008. The servers are named Server1, Server2, Server3. You want to configure the Event Logs subscription on Server1 to collect events from Server2 and Server3. You discover that you cannot create a subscription on Server1 from another computer. You need to configure a subscription on Server1. which two actions should you perform? ()

A. Run the wecutil cs subscription.xml command on Server1
B. Run the wevutil im subscription.xml command on Server1
C. Create an event collector subscription configuration file. name the file subscription.xml
D. Create a custom view on Server1 by using Event View. Export the custom view to a file named subscription.xml

8.单项选择题Your network consists of a single Active Directory domain. All servers run Windows Server 2008. You have a server named Server1 that hosts shared documents. Users report extremely slow response times when they try to open the shared documents on Server1. You log on to Server1 and observe real-time data indicating that the processor is operating at 100 percent of capacity. You need to gather additional data to diagnose the cause of the problem. What should you do?()

A. In the Performance console, create a counter log to track processor usage.
B. In Event View, open and review the application log for Performance events.
C. In Windows Reliability and Performance Monitor, use the Resource View to see the percentage of processor capacity used by each application.
D. In Windows Reliability and Performance Monitor, create an alert that will be triggered when processor usage exceeds 80 percent for more than five minutes on Server1.

9.单项选择题You have a file server that runs Windows Server 2008. You configure quotas on the server. You need to view each users quota usage on a per folder basis. What should you do?()

A. From File Server Resource Manager, create a File Screen
B. From File Server Resource Manager, create a Storage Management report.
C. From the command prompt, run dirquota.exe quota list.
D. From the properties of each volume, review the Quota Entries list.

10.单项选择题Your company has a main office and two branch offices that are connected by WAN links. The main office runs the DNS Server service on three domain controllers.The zone for your domain is configured as an Active Directory-integrated zone.Each branch office has a single member server that hosts a secondary zone for the domain.The DNS servers in the branch offices use the main office DNS server as the DNS Master server for the zone.You need to minimize DNS zone transfer traffic over the WAN links.What should you do?()

A. Decrease the Retry Interval setting in the Start of Authority (SOA) record for the zone.
B. Decrease the Refresh Interval setting in the Start of Authority (SOA) record for the zone.
C. Increase the Refresh Interval setting in the Start of Authority (SOA) record for the zone.
D. Disable the netmask ordering option in the properties of the DNS Master server for the zone.

最新试题

You install WSUS on a server that runs Windows Server 2008. You need to ensure that the traffic between the WSUS administrative web site and the server administrators computer is encrypted What should you do()?  

题型:单项选择题

You perform a security audit on a server named Server1. You install the Microsoft Network Monitor 3.0 application on Server1.  You find that only some of the captured frames display host mnemonic names in the Source column and the Destination column. All other frames display IP addresses. You need to display mnemonic host names instead of IP addresses for all the frames.What should you do?()

题型:单项选择题

Your company has a network that has an active directory domain. The domain has two servers named DC1 and DC2. You plan to collect events from DC2 and transfer them to DC1. You configure the required subscriptions by selecting the normal option for the event delivery optimiation setting and using the HTTP protocol. you discovere that none of the subscritpions work. You need to ensure that the servers support event collectiors. which three actions should you perform()?  

题型:多项选择题

You have a file server that runs Windows Server 2008 R2.You configure quotas on the server.You need to view each user¯s quota usage on a per folder basisWhat should you do?()

题型:单项选择题

You manage a server that runs Windows Server 2008. The windows backup and restore utility is installed ont he server. You nede to create a full backup of all system state data to the DVD drive (R: drive) on the server. Which command should you run on the server()?  

题型:单项选择题

Your network consists of a single Active Directory domain. All servers run Windows Server 2008 R2.You have a server named Server1 that hosts shared documents. Users report extremely slow response times when they try to open the shared documents on Server1.You log on to Server1 and observe real-time data indicating that the processor is operating at 100 percent of capacity.You need to gather additional data to diagnose the cause of the problem.What should you do?()

题型:单项选择题

Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP. what should you do()? 

题型:单项选择题

You perform a security audit of a server named CRM1. You want to build a list of all DNS requests that are initiated by the server. You install the Microsoft Network Monitor 3.0 application on CRM1. You capture all local traffic on CRM1 for 24 hours. You save the capture file as data.cap. You find that the size of the file is more than 1 GB. You need to create a file named DNSdata.cap from the existing capture file that contains only DNS-related data.What should you do? ()

题型:单项选择题

Your company has a server named DC1 that runs Windows Server 2008. DC1 has the DHCP server role installed. You find taht a desktop computer named SALES4 is unable to obtain an IP configuration from the DHCP server. You install the Microsoft Network Monitor 3.0 application on DC1. You enable P-mode in the Network Monitor application configuration. You plan to capture only the DHCP server-related traffic between DC1 and SALES4 The network interface configuration for the two computers is shown in the following table. (missing again wow). You need to build a filter int he Network Monitor application to capture the DHCP traffic between DC1 and SALES4 Which filter should you use()?  

题型:单项选择题

Your companys corporate network uses Network Access Protection (NAP). Users are able to connect to the corporate network remotely. You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do()?  

题型:单项选择题