A.Add the DHCP server option 15
B.Add the DHCP server option 44
C.Set the Conflict Detection value to 0
D.Set the Conflict Detection value to 2
您可能感兴趣的试卷
你可能感兴趣的试题
A. Open the Event Viewer console. Create a custom view for the system log. Exclude the events that are notified by Event ID 10 from the filter.
B. Open the Print Management console. Open the properties of Printer1 and clear the Log spooler information events option.
C. Open the Print Management console. Open the properties of Printer1 and clear the Show informational notifications for network printers option.
D. Open the Print Management console. Open the properties of each individual printer on Printer1 and clear the Enable advanced printing features option.
A.Deactivate all LM and NTLM authentication methods on FSS1 server
B.Use IIS to publish the confidential files, activate SSL on the IIS server, and then open the files as a web folder
C.Use IPsec encryption between the FSS1 server and the computers of the users who need to access the confidential files.
D.Use the Server Message Block (SMB) signing between the FSS1 server and the computers of the users who want to access the confidential files.
E.Activate offline files for the confidential files that are stored on the FSS1 server. In the Folder avanced Properties box, select the Encrypt contents to secure data optiion
A. Configure an e-mail notification for the Printers With Jobs printer filter.
B. Configure an e-mail notification for the Printers Not Ready printer filter.
C. Enable the Show informational notifications for local printers option on both print servers.
D. Enable the Show informational notifications for network printers option on both print servers.
A. Install the Internet Printing role service on SRV1.
B. Install the Line Printer Daemon (LPD) Services role service on SRV1.
C. Configure the printers on SRV1 to use Line Printer Remote printing.
D. Install the File Services server role on SRV1 and activate the Services for Network File System role service.
A.Install Serivce Pack 4 on all Windows 2000 Professional computers
B.Upgrade the Windows 2000 professional computers to Windows XP SP2
C.Run the IPv6.exe tool on the Windows 200 Professional and Windows XP computers
D.Install Active Directory Client extention (DSClient.exe) on the Windows 2000 Professional and Windows XP computers.
A. From File Server Resource Manager, create a File Screen.
B. From File Server Resource Manager, create a Storage Management report.
C. From the command prompt, run dirquota.exe quota list.
D. From the properties of each volume, review the Quota Entries list.
A.Configure dynamic NAT on the firewall
B.Configure the firewall to allow the use of Teredo
C.Configure a link local IPv6 address for the internal interface of the firewall
D.Configure a global IPv6 address for the external interface of the firewall
A. Modify the quota template.
B. Delete and recreate the quota template.
C. Create a new quota template. Modify the quota for each folder.
D. Create a file screen template. Apply the file screen template to the root of the volume that contains the folders.
A.Restart the IPsec Policy Agent service on Server1
B.Assign the Client (Respond Only) IPsec policy to Server1
C.Assign the Server (Request Security) IPsec policy to Server1
D.Assign the Client (Respond Only) IPsec policy to all client computers.
A. Use Wbadmin to restore the system state from backup.
B. Run Wbadmin with the Get Versions option. Install WSS.
C. Run Wbadmin with the Start Recovery option. Install WSS.
D. Use Wbadmin to restore the application and the sites from backup.
最新试题
Your company has a main office and one branch office. The main office has a print server named Printer1. The branch office has a print server named Printer2. Printer1 manages 15 printers and Printer2 manages seven printers. You add Printer2 to the Print Management console on Printer1. You need to send an automatic notification when a printer is not available. What should you do?()
You have a file server that runs Windows Server 2008. A user restores a large file by using the Previous Versions tab. You need to view the progress of the file restoration what should you do()?
You perform a security audit on a server named Server1. You install the Microsoft Network Monitor 3.0 application on Server1. You find that only some of the captured frames display host mnemonic names in the Source column and the Destination column. All other frames display IP addresses. You need to display mnemonic host names instead of IP addresses for all the frames.What should you do?()
You have a server that runs Windows Server 2008. You need to configure the server as a VPN server. What should you installed on the server()?
You manage a server that runs Windows Server 2008. The windows backup and restore utility is installed ont he server. You nede to create a full backup of all system state data to the DVD drive (R: drive) on the server. Which command should you run on the server()?
Your company has a main office and a branch office. The branch office has three servers that run a Server Core installation of Windows Server 2008 R2. The servers are named Server1, Server2, and Server3. You want to configure the Event Logs subscription on Server1 to collect events from Server2 and Server3. You discover that you cannot create a subscription on Server1 from another computer. You need to configure a subscription on Server1.Which two actions should you perform?()
Your company has a network that has an Active Directory domain. The domain has two servers named DC1 and DC2. You plan to collect events from DC2 and transfer them to DC1. You configure the required subscriptions by selecting the Normal option for the Event delivery optimization setting and by using the HTTP protocol.You discover that none of the subscriptions work.You need to ensure that the servers support the event collectors.Which three actions should you perform?()
Your company has an Active Directory domain that has two domain controllers named DC1 and DC2.You prepare both servers to support event subscriptions. On DC1, you create a new default subscription for DC2. You need to review system events for DC2.Which event log should you select?()
You perform a security audit of a server named CRM1. You want to build a list of all DNS requests that are initiated by the server. You install the Microsoft Network Monitor 3.0 application on CRM1. You capture all local traffic on CRM1 for 24hours. You save the capture file as data.cap. you find that the size of this file is more tahn 1GB. you need to create a file named DNSdata.cap from the existing capture file taht contains only dNS -related data What should you do()?
Your network consists of a single Active Directory domain. All servers run Windows Server 2008 R2.You have a server named Server1 that hosts shared documents. Users report extremely slow response times when they try to open the shared documents on Server1.You log on to Server1 and observe real-time data indicating that the processor is operating at 100 percent of capacity.You need to gather additional data to diagnose the cause of the problem.What should you do?()