A.Configure dynamic NAT on the firewall
B.Configure the firewall to allow the use of Teredo
C.Configure a link local IPv6 address for the internal interface of the firewall
D.Configure a global IPv6 address for the external interface of the firewall
您可能感兴趣的试卷
你可能感兴趣的试题
A. Modify the quota template.
B. Delete and recreate the quota template.
C. Create a new quota template. Modify the quota for each folder.
D. Create a file screen template. Apply the file screen template to the root of the volume that contains the folders.
A.Restart the IPsec Policy Agent service on Server1
B.Assign the Client (Respond Only) IPsec policy to Server1
C.Assign the Server (Request Security) IPsec policy to Server1
D.Assign the Client (Respond Only) IPsec policy to all client computers.
A. Use Wbadmin to restore the system state from backup.
B. Run Wbadmin with the Get Versions option. Install WSS.
C. Run Wbadmin with the Start Recovery option. Install WSS.
D. Use Wbadmin to restore the application and the sites from backup.
A. Run the Recover d:\payroll command.
B. Run the Wbadmin restore catalog -backuptarget:D: -version:10/29/2007-09:00 quiet command.
C. Run the Wbadmin start recovery -backuptarget:D: -version:10/29/2007-09:00 overwrite quiet command.
D. Run the Wbadmin start recovery -version:10/29/2007-09:00 -itemType:File -items:d:\Payroll -overwrite -recursive quiet command.
A.Create a signature (SIG) record for the domain controller
B.Modify the Name Server (NS) record for the domain controller
C.Modify the Service Locator (SRV) record for the domain controller
D.Modify the Start of Authority (SOA) record ont he domain controller
A. Enable the Optimize for scalability option.
B. Enable the Optimize for consistency option.
C. Set the Ordering method option to Lowest cost.
D. Set the Ordering method option to Random order.
A.Enable forwarding to your ISPs DNS servers.
B.Disable the root hints on the DNS server
C.Disable the netmask ordering option on the DNS server
D.Configure Reverse Lookup zones for the IP subnets on the network
A. Run the dfscmd.exe \\FS1\dfs /restore command on FS1.
B. Configure the NTFS permissions for the C:\DFSroots\dfs folder on FS1. Set the Create folders/append data special permission to Deny for the Authenticated Users group. Set the Full Control permission to Allow for the Administrators group.
C. Start the Delegate Management Permissions Wizard for the DFS namespace named \\contoso.com\dfs. Remove all groups that have the permission type Explicit except the Administrators group.
D. Configure the \\FS1\dfs shared folder permissions. Set the permissions for the Authenticated Users group to Reader. Set the permissions for the Administrators group to Co-owner.
A.ipconfig /registerdns:local.contoso.com
B.dnscmd Server1 /ZoneAdd local.contoso.com /DSPrimary
C.dnscmd Server1 /ZoneAdd local.contoso.com /Primary /file local.contoso.com.dns
D.netsh interface ipv4 set dnsserver name=local.contoso.com static 10.0.0.1 primary
A.Disable the root hints
B.Enable BIND secondaries
C.Configure a forwarder to the caching DNS server
D.Configure a GlobalNames host (A) record for the hostname of the caching DNS server
最新试题
Your company runs Windows Server Update Services (WSUS) on a server named Server1. Server1runs Windows Server 2008 R2. Server1 is located on the company intranet. You configure the WSUS Web site to use SSL.You need to configure a Group Policy object (GPO) to specify the intranet update locations.Which URLs should you use?()
Your company has a main office and one branch office. The main office has a print server named Printer1. The branch office has a print server named Printer2. Printer1 manages 15 printers and Printer2 manages seven printers. You add Printer2 to the Print Management console on Printer1. You need to send an automatic notification when a printer is not available. What should you do?()
Your companys corporate network uses Network Access Protection (NAP). Users are able to connect to the corporate network remotely. You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do()?
Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP. what should you do()?
You have 10 standalone servers that run Windows Server 2008 R2.You install the Windows Server Update Services (WSUS) server role on a server named Server1.You need to configure all of the servers to receive updates from Server1.What should you do?()
Your company has a network that has 100 servers. A server named Server1 is configured as a file server. Server1 is connected to a SAN and has 15 logical drives. You want to automatically run a data archiving script if the free space on any of the logical drives is below 30 percent. You need to automate the script execution.You create a new Data Collector Set. What should you do next?()
Your company has an active directory domain that has two domain controllers named DC1 and DC2. You prepare both servers to support event subscriptions. On DC1, you create a new default subscription for DC2. You need to review system events for DC2. Which event log should you select()?
You perform a security audit of a server named CRM1. You want to build a list of all DNS requests that are initiated by the server. You install the Microsoft Network Monitor 3.0 application on CRM1. You capture all local traffic on CRM1 for 24 hours. You save the capture file as data.cap. You find that the size of the file is more than 1 GB. You need to create a file named DNSdata.cap from the existing capture file that contains only DNS-related data.What should you do? ()
Your company has a network that has 100 servers. You install a new server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. You discover that the Reliability Monitor has no data, and that the system stablitiy chare has never been updated. You nede to configure the server to collect the reliability monitor data. What should you do()?
Your company has a server named FS1. FS1 hosts the domain-based DFS namespace named \\contoso. com\dfs all domain users store their data in subfolders within the DFS namespace. You need to prevent all users except administrators, from creating new folders or new files at the root of the \\contoso.com\dfs share. What should you do()?