A.Open port 1423 on the firewall
B.Open port 1723 on the firewall
C.Open port 3389 on the firewall
D.Open port 6000 on the firewall
您可能感兴趣的试卷
你可能感兴趣的试题
A.Install the Internet Printing role service on SRV1.
B.Install the Line Printer Daemon (LPD) Services role service on SRV1.
C.Configure the printers on SRV1 to use Line Printer Remote printing.
D.Install the File Services server role on SRV1 and activate the Services for Network File System role service.
A.Create a soft quota.
B.Create a hard quota.
C.Create an Active Screening File Screen.
D.Create a Passive Screening File Screen.
A.From File Server Resource Manager, create a File Screen.
B.From File Server Resource Manager, create a Storage Management report.
C.From the command prompt, run dirquota.exe quota list.
D.From the properties of each volume, review the Quota Entries list.
A.Modify the quota template.
B.Delete and recreate the quota template.
C.Create a new quota template. Modify the quota for each folder.
D.Create a file screen template. Apply the file screen template to the root of the volume that contains the folders.
A.Wbadmin enable backup -addtarget:R: /quiet
B.Wbadmin enable backup addtarget:C: /quiet
C.Wbadmin start backup allCritical backuptarget:C:/quiet
D.Wbadmin start backup allCritical backuptarget:R:/quiet
A. Configure NAT1 to forward port 389 to RDP1
B. Configure NAT1 to forward port 1432 to RDP1
C. Configure NAT1 to forward port 3339 to RDP1
D. Configure NAT1 to forward port 3389 to RDP1
A.Use Wbadmin to restore the system state from backup.
B.Run Wbadmin with the Get Versions option. Install WSS.
C.Run Wbadmin with the Start Recovery option. Install WSS.
D.Use Wbadmin to restore the application and the sites from backup.
deployed on the network. You need to ensure that NAP policies are enforced on portable computers taht
use a wireless connection to access the network. What should you do?()
A. Configure all access points to use 802.1X authentication
B. Configure all protable computers to use MS-CHAP v2 authentication
C. Use the Group Policy Management Console to access the wireless group policy settings, and enable the Prevent connections to ad-hoc networks option.
D. Use the Group Policy Management Console to access the wireless group policy settings, and disable the Prevent connections to infrastructure networks option.
A. Run dnscmd by using the ZoneResetMasters option.
B. Run dnscmd by using the ZoneResetSecondaries option.
C. Add the new DNS server to the Zone Transfers tab on one of the DNS servers in the main office.
D. Add the new DNS server to the DNSUpdateProxy Global security group in Active Directory Users and Computers.
You need to ensure that the system health policy is applied to all client computers that attempt VPN connections.What should you do?()
A. Reconfigure NPS1 as a radius client
B. Reconfigure VPN1 as a radius client
C. Add the NAP role to a domain controller
D. Add the NAP role to an Enterrpise Certificate server.
最新试题
You perform a security audit of a server named CRM1. You want to build a list of all DNS requests that are initiated by the server. You install the Microsoft Network Monitor 3.0 application on CRM1. You capture all local traffic on CRM1 for 24 hours. You save the capture file as data.cap. You find that the size of the file is more than 1 GB. You need to create a file named DNSdata.cap from the existing capture file that contains only DNS-related data.What should you do? ()
Your company has a server named FS1. FS1 hosts the domain-based DFS namespace named \\contoso. com\dfs all domain users store their data in subfolders within the DFS namespace. You need to prevent all users except administrators, from creating new folders or new files at the root of the \\contoso.com\dfs share. What should you do()?
You perform a security audit of a server named DC1. You install the Microsoft Network Monitor 3.0 application on DC1.You plan to capture all the LDAP traffic that comes to and goes from the server between 20:00 and 07:00 the next day and save it to the E:\data.cap file. You create a scheduled task. You add a new Start a program action to the task.You need to add the application name and the application arguments to the new action.What should you do?()
You install WSUS on a server that runs Windows Server 2008. You need to ensure that the traffic between the WSUS administrative web site and the server administrators computer is encrypted What should you do()?
Your company runs Windows Server Update Services (WSUS) on a server named Server1. Server1runs Windows Server 2008 R2. Server1 is located on the company intranet. You configure the WSUS Web site to use SSL.You need to configure a Group Policy object (GPO) to specify the intranet update locations.Which URLs should you use?()
Your company has a network that has 100 servers. A server named Server1 is configured as a file server. Server1 is connected to a SAN and has 15 logical drives. You want to automatically run a data archiving script if the free space on any of the logical drives is below 30 percent. You need to automate the script execution.You create a new Data Collector Set. What should you do next?()
Your company has a server named DC1 that runs Windows Server 2008. DC1 has the DHCP server role installed. You find taht a desktop computer named SALES4 is unable to obtain an IP configuration from the DHCP server. You install the Microsoft Network Monitor 3.0 application on DC1. You enable P-mode in the Network Monitor application configuration. You plan to capture only the DHCP server-related traffic between DC1 and SALES4 The network interface configuration for the two computers is shown in the following table. (missing again wow). You need to build a filter int he Network Monitor application to capture the DHCP traffic between DC1 and SALES4 Which filter should you use()?
Your company has a network that has an Active Directory domain. The domain has two servers named DC1 and DC2. You plan to collect events from DC2 and transfer them to DC1. You configure the required subscriptions by selecting the Normal option for the Event delivery optimization setting and by using the HTTP protocol.You discover that none of the subscriptions work.You need to ensure that the servers support the event collectors.Which three actions should you perform?()
Your company has an Active Directory domain that has two domain controllers named DC1 and DC2.You prepare both servers to support event subscriptions. On DC1, you create a new default subscription for DC2. You need to review system events for DC2.Which event log should you select?()
You perform a security audit of a server named CRM1. You want to build a list of all DNS requests that are initiated by the server. You install the Microsoft Network Monitor 3.0 application on CRM1. You capture all local traffic on CRM1 for 24hours. You save the capture file as data.cap. you find that the size of this file is more tahn 1GB. you need to create a file named DNSdata.cap from the existing capture file taht contains only dNS -related data What should you do()?