A. Pointer (PTR)
B. Host Info (HINFO)
C. Service Location (SRV)
D. Canonical Name (CNAME)
您可能感兴趣的试卷
你可能感兴趣的试题
A.From the command prompt,run shadow.exe /v.
B.From the command prompt,run vssadmin.exe query reverts.
C.From Computer Management,click on the Shared Folders node and then click on Sessions.
D.From Computer Management,click on the Shared Folders node and then click on Open Files.
A.Enable the Optimize for scalability option.
B.Enable the Optimize for consistency option.
C.Set the Ordering method option to Lowest cost.
D.Set the Ordering method option to Random order.
A. Host Info (HINFO)
B. Service Location (SRV)
C. Canonical Name (CNAME)
D. Well-Known Service (WKS)
A.Run the dfscmd.exe \\FS1\dfs /restore command on FS1.
B.Configure the NTFS permissions for the C:\DFSroots\dfs folder on FS1. Set the Create folders/append data special permission to Deny for the Authenticated Users group. Set the Full Control permission to Allow for the Administrators group.
C.Start the Delegate Management Permissions Wizard for the DFS namespace named \\contoso.com\dfs. Remove all groups that have the permission type Explicit except the Administrators group.
D.Configure the \\FS1\dfs shared folder permissions. Set the permissions for the Authenticated Users group to Reader. Set the permissions for the Administrators group to Co-owner.
A.From Windows Firewall, add an exception.
B.From Windows Firewall, enable the Block all incoming connections option.
C.From the Windows Firewall with Advanced Security snap-in, create an inbound rule.
D.From the Windows Firewall with Advanced Security snap-in, create an outbound rule.
A. Create an IPsec Enforcement Network policy
B. Create an 802.1X enforcement network policy
C. Create a wired network (IEEE 802.3) Group Policy
D. Create an Extensible Authentication Portocol (EAP) Enforcement Network Policy
A.From the Services snap-in,disable the IP Helper.
B.From the Services snap-in,disable the Netlogon service.
C.From Windows Firewall,enable the Block all connections option on the Public Profile.
D.From Windows Firewall enable the Block all connections option on the Domain Profile.
A.Configure all access points to use 802.1X authentication.
B.Configure all portable computers to use MS-CHAP v2 authentication.
C.Use the Group Policy Management Console to access the wireless Group Policy settings, and enable the Prevent connections to ad-hoc networks option.
D.Use the Group Policy Management Console to access the wireless Group Policy settings, and disable the Prevent connections to infrastructure networks option.
A. Install the Network Policy Server (NPS) on the RAS1 server
B. Create a remote access policy that requires users to authenticate by using SPAP
C. Create a remote access policy that requires users to authenticate by using EAP-TLS
D. Create a remote access policy that requires users to authenticate by using MS-CHAP v2
A. Set the priority value of the Server2 Mail Exchanger (MX) record to 20. Create a new Mail Exchanger(MX) record for Server3. Set the priority value to 5.
B. Set the priority value of the Server2 Mail Exchanger (MX) record to 5. Create a new Mail Exchanger(MX) record for Server3. Set the priority value to 20.
C. Create a new Service Location (SRV) record in the domain for Server3. Set the port number value to 25. Configure the priority setting to 20.
D. Create a new Service Location (SRV) record in the domain for Server3. Set the port number value to 110. Configure the priority setting to 5.
最新试题
You deploy Windows Server 2008 VPN server behind a firewall. Remote users connect to the VPN by using portable computers that run Windows Vista with the latest service pack. The firewall is configured to allow only secured web communications. You need to enable remote users to connect as securely as possible. you must achieve this goal without opening any additional ports on the firewall. What should you do ()?
Your company has a main office and a branch office. The branch office has three servers that run a Server Core installation of Windows Server 2008 R2. The servers are named Server1, Server2, and Server3. You want to configure the Event Logs subscription on Server1 to collect events from Server2 and Server3. You discover that you cannot create a subscription on Server1 from another computer. You need to configure a subscription on Server1.Which two actions should you perform?()
Your network consists of a single Active Directory domain. All servers run Windows Server 2008 R2.You have a server named Server1 that hosts shared documents. Users report extremely slow response times when they try to open the shared documents on Server1.You log on to Server1 and observe real-time data indicating that the processor is operating at 100 percent of capacity.You need to gather additional data to diagnose the cause of the problem.What should you do?()
Your company has a network that has 100 servers. You install a new server that runs Windows Server 2008 R2. The server has the Web Server (IIS) server role installed. After a week, you discover that the Reliability Monitor has no data, and that the Systems Stability chart has never been updated.You need to configure the server to collect the Reliability Monitor data.What should you do?()
Your company has a network that has 100 servers. You install a new server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. You discover that the Reliability Monitor has no data, and that the system stablitiy chare has never been updated. You nede to configure the server to collect the reliability monitor data. What should you do()?
You have a file server that runs Windows Server 2008. The server has a shared folder. You need to receive a notifcation when a user stores more than 500MB of data int he shared folder. You must allow users to store more than 500MB of data in the shared folder. What should you do()?
You have 10 standalone servers that run Windows Server 2008 R2.You install the Windows Server Update Services (WSUS) server role on a server named Server1.You need to configure all of the servers to receive updates from Server1.What should you do?()
You perform a security audit of a server named CRM1. You want to build a list of all DNS requests that are initiated by the server. You install the Microsoft Network Monitor 3.0 application on CRM1. You capture all local traffic on CRM1 for 24 hours. You save the capture file as data.cap. You find that the size of the file is more than 1 GB. You need to create a file named DNSdata.cap from the existing capture file that contains only DNS-related data.What should you do? ()
Your company runs Windows Server Update Services (WSUS) on a server named Server1. Server1runs Windows Server 2008 R2. Server1 is located on the company intranet. You configure the WSUS Web site to use SSL.You need to configure a Group Policy object (GPO) to specify the intranet update locations.Which URLs should you use?()
Your company has an Active Directory domain that has two domain controllers named DC1 and DC2.You prepare both servers to support event subscriptions. On DC1, you create a new default subscription for DC2. You need to review system events for DC2.Which event log should you select?()