A. Host Info (HINFO)
B. Service Location (SRV)
C. Canonical Name (CNAME)
D. Well-Known Service (WKS)
您可能感兴趣的试卷
你可能感兴趣的试题
A.Run the dfscmd.exe \\FS1\dfs /restore command on FS1.
B.Configure the NTFS permissions for the C:\DFSroots\dfs folder on FS1. Set the Create folders/append data special permission to Deny for the Authenticated Users group. Set the Full Control permission to Allow for the Administrators group.
C.Start the Delegate Management Permissions Wizard for the DFS namespace named \\contoso.com\dfs. Remove all groups that have the permission type Explicit except the Administrators group.
D.Configure the \\FS1\dfs shared folder permissions. Set the permissions for the Authenticated Users group to Reader. Set the permissions for the Administrators group to Co-owner.
A.From Windows Firewall, add an exception.
B.From Windows Firewall, enable the Block all incoming connections option.
C.From the Windows Firewall with Advanced Security snap-in, create an inbound rule.
D.From the Windows Firewall with Advanced Security snap-in, create an outbound rule.
A. Create an IPsec Enforcement Network policy
B. Create an 802.1X enforcement network policy
C. Create a wired network (IEEE 802.3) Group Policy
D. Create an Extensible Authentication Portocol (EAP) Enforcement Network Policy
A.From the Services snap-in,disable the IP Helper.
B.From the Services snap-in,disable the Netlogon service.
C.From Windows Firewall,enable the Block all connections option on the Public Profile.
D.From Windows Firewall enable the Block all connections option on the Domain Profile.
A.Configure all access points to use 802.1X authentication.
B.Configure all portable computers to use MS-CHAP v2 authentication.
C.Use the Group Policy Management Console to access the wireless Group Policy settings, and enable the Prevent connections to ad-hoc networks option.
D.Use the Group Policy Management Console to access the wireless Group Policy settings, and disable the Prevent connections to infrastructure networks option.
A. Install the Network Policy Server (NPS) on the RAS1 server
B. Create a remote access policy that requires users to authenticate by using SPAP
C. Create a remote access policy that requires users to authenticate by using EAP-TLS
D. Create a remote access policy that requires users to authenticate by using MS-CHAP v2
A. Set the priority value of the Server2 Mail Exchanger (MX) record to 20. Create a new Mail Exchanger(MX) record for Server3. Set the priority value to 5.
B. Set the priority value of the Server2 Mail Exchanger (MX) record to 5. Create a new Mail Exchanger(MX) record for Server3. Set the priority value to 20.
C. Create a new Service Location (SRV) record in the domain for Server3. Set the port number value to 25. Configure the priority setting to 20.
D. Create a new Service Location (SRV) record in the domain for Server3. Set the port number value to 110. Configure the priority setting to 5.
A. Configure an IPsec connection to use tunnel mode and preshared key authentication.
B. Configure a PPTP connection to use version 2 of the MS-CHAP v2 authentication.
C. Configure a L2TP/IPsec connection to use the EAP-TLS authentication
D. Configure a L2TP/IPsec connection to use version 2 of the MS-CHAP v2 authentication.
A. Create a new display filter and apply the filter to the capture
B. Create a new capture filter and apply the filter to the capture
C. Populate the Aliases table and apply the aliases to the capture
D. Configure the Network Monitor Application to enable the Enable Converstations optionrecapture the data to a new file.
A. Create a Signature (SIG) record for the domain controller.
B. Modify the Name Server (NS) record for the domain controller.
C. Modify the Service Location (SRV) record for the domain controller.
D. Modify the Start of Authority (SOA) record on the domain controller.
最新试题
You have a server that runs Windows Server 2008. you create a new quota template. you apply quotas to 100 folders by using the quota template. you nede to modify the quota settings for al 100 folders. You must achive this goal by using the minimum amount of administrative effort. What should you do()?
Your company has a network that has 100 servers. You install a new server that runs Windows Server 2008 R2. The server has the Web Server (IIS) server role installed. After a week, you discover that the Reliability Monitor has no data, and that the Systems Stability chart has never been updated.You need to configure the server to collect the Reliability Monitor data.What should you do?()
You perform a security audit of a server named CRM1. You want to build a list of all DNS requests that are initiated by the server. You install the Microsoft Network Monitor 3.0 application on CRM1. You capture all local traffic on CRM1 for 24 hours. You save the capture file as data.cap. You find that the size of the file is more than 1 GB. You need to create a file named DNSdata.cap from the existing capture file that contains only DNS-related data.What should you do? ()
Your company has a main office and a branch office. The branch office has three servers that run a Server Core installation of Windows Server 2008 R2. The servers are named Server1, Server2, and Server3. You want to configure the Event Logs subscription on Server1 to collect events from Server2 and Server3. You discover that you cannot create a subscription on Server1 from another computer. You need to configure a subscription on Server1.Which two actions should you perform?()
Your company has an Active Directory domain that has two domain controllers named DC1 and DC2.You prepare both servers to support event subscriptions. On DC1, you create a new default subscription for DC2. You need to review system events for DC2.Which event log should you select?()
You have a server that runs Windows Server 2008. You need to configure the server as a VPN server. What should you installed on the server()?
Your company has a server named DC1 that runs Windows Server 2008. DC1 has the DHCP server role installed. You find taht a desktop computer named SALES4 is unable to obtain an IP configuration from the DHCP server. You install the Microsoft Network Monitor 3.0 application on DC1. You enable P-mode in the Network Monitor application configuration. You plan to capture only the DHCP server-related traffic between DC1 and SALES4 The network interface configuration for the two computers is shown in the following table. (missing again wow). You need to build a filter int he Network Monitor application to capture the DHCP traffic between DC1 and SALES4 Which filter should you use()?
Your company has a server named FS1. FS1 hosts the domain-based DFS namespace named \\contoso. com\dfs all domain users store their data in subfolders within the DFS namespace. You need to prevent all users except administrators, from creating new folders or new files at the root of the \\contoso.com\dfs share. What should you do()?
You have a file server that runs Windows Server 2008. A user restores a large file by using the Previous Versions tab. You need to view the progress of the file restoration what should you do()?
You manage a server that runs Windows Server 2008. The windows backup and restore utility is installed ont he server. You nede to create a full backup of all system state data to the DVD drive (R: drive) on the server. Which command should you run on the server()?