A.Deactivate all LM and NTLM authentication methods on FSS1 server
B.Use IIS to publish the confidential files, activate SSL on the IIS server, and then open the files as a web folder
C.Use IPsec encryption between the FSS1 server and the computers of the users who need to access the confidential files.
D.Use the Server Message Block (SMB) signing between the FSS1 server and the computers of the users who want to access the confidential files.
E.Activate offline files for the confidential files that are stored on the FSS1 server. In the Folder avanced Properties box, select the Encrypt contents to secure data optiion
您可能感兴趣的试卷
你可能感兴趣的试题
A. Configure an e-mail notification for the Printers With Jobs printer filter.
B. Configure an e-mail notification for the Printers Not Ready printer filter.
C. Enable the Show informational notifications for local printers option on both print servers.
D. Enable the Show informational notifications for network printers option on both print servers.
A. Install the Internet Printing role service on SRV1.
B. Install the Line Printer Daemon (LPD) Services role service on SRV1.
C. Configure the printers on SRV1 to use Line Printer Remote printing.
D. Install the File Services server role on SRV1 and activate the Services for Network File System role service.
A.Install Serivce Pack 4 on all Windows 2000 Professional computers
B.Upgrade the Windows 2000 professional computers to Windows XP SP2
C.Run the IPv6.exe tool on the Windows 200 Professional and Windows XP computers
D.Install Active Directory Client extention (DSClient.exe) on the Windows 2000 Professional and Windows XP computers.
A. From File Server Resource Manager, create a File Screen.
B. From File Server Resource Manager, create a Storage Management report.
C. From the command prompt, run dirquota.exe quota list.
D. From the properties of each volume, review the Quota Entries list.
A.Configure dynamic NAT on the firewall
B.Configure the firewall to allow the use of Teredo
C.Configure a link local IPv6 address for the internal interface of the firewall
D.Configure a global IPv6 address for the external interface of the firewall
A. Modify the quota template.
B. Delete and recreate the quota template.
C. Create a new quota template. Modify the quota for each folder.
D. Create a file screen template. Apply the file screen template to the root of the volume that contains the folders.
A.Restart the IPsec Policy Agent service on Server1
B.Assign the Client (Respond Only) IPsec policy to Server1
C.Assign the Server (Request Security) IPsec policy to Server1
D.Assign the Client (Respond Only) IPsec policy to all client computers.
A. Use Wbadmin to restore the system state from backup.
B. Run Wbadmin with the Get Versions option. Install WSS.
C. Run Wbadmin with the Start Recovery option. Install WSS.
D. Use Wbadmin to restore the application and the sites from backup.
A. Run the Recover d:\payroll command.
B. Run the Wbadmin restore catalog -backuptarget:D: -version:10/29/2007-09:00 quiet command.
C. Run the Wbadmin start recovery -backuptarget:D: -version:10/29/2007-09:00 overwrite quiet command.
D. Run the Wbadmin start recovery -version:10/29/2007-09:00 -itemType:File -items:d:\Payroll -overwrite -recursive quiet command.
A.Create a signature (SIG) record for the domain controller
B.Modify the Name Server (NS) record for the domain controller
C.Modify the Service Locator (SRV) record for the domain controller
D.Modify the Start of Authority (SOA) record ont he domain controller
最新试题
You have a file server that runs Windows Server 2008. The server has a shared folder. You need to receive a notifcation when a user stores more than 500MB of data int he shared folder. You must allow users to store more than 500MB of data in the shared folder. What should you do()?
Your company has a server named Printer1 that runs Windows Server 2008 R2. Printer1 has the Print and Document Services server role installed.You need to reduce the number of events registered in the system log on Printer1. What should you do?()
Your company ahs an active direcotyr domain. The company also has a server named Server1 that runs Windows Server 2008. You install the file server role on Server1. you create a shared folder named AcctgShare on Server1 The permissions for the shared folder are configured as shown in the following table. ( missing again!) You need to ensure members of the Managers group can only view and open files in the shared folder. What should you do()?
Your company has a network that has 100 servers. You install a new server that runs Windows Server 2008 R2. The server has the Web Server (IIS) server role installed. After a week, you discover that the Reliability Monitor has no data, and that the Systems Stability chart has never been updated.You need to configure the server to collect the Reliability Monitor data.What should you do?()
Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP. what should you do()?
You install WSUS on a server that runs Windows Server 2008. You need to ensure that the traffic between the WSUS administrative web site and the server administrators computer is encrypted What should you do()?
Your company has a network that has 100 servers. You install a new server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. You discover that the Reliability Monitor has no data, and that the system stablitiy chare has never been updated. You nede to configure the server to collect the reliability monitor data. What should you do()?
You perform a security audit of a server named CRM1. You want to build a list of all DNS requests that are initiated by the server. You install the Microsoft Network Monitor 3.0 application on CRM1. You capture all local traffic on CRM1 for 24hours. You save the capture file as data.cap. you find that the size of this file is more tahn 1GB. you need to create a file named DNSdata.cap from the existing capture file taht contains only dNS -related data What should you do()?
Your company has an active directory domain that has two domain controllers named DC1 and DC2. You prepare both servers to support event subscriptions. On DC1, you create a new default subscription for DC2. You need to review system events for DC2. Which event log should you select()?
Your company has users who connect remotely to the main office though a Windows Server 2008 VPN server. You need to ensure that users cannot access the VPN server remotely from 22:00 to 05:00. What should you do()?