A. the authorized computers list
B. the authorized users list
C. the edge traversal settings
D. the scope
您可能感兴趣的试卷
你可能感兴趣的试题
A. the Get-Item and the Set-Item cmdlets
B. the Get-Service and the Set-Service cmdlets
C. the Netsh tool
D. the Sconfig tool
A. Enable IPv4 routing.
B. Enable IPv6 routing.
C. Add a new routing protocol.
D. Add the Routing role service.
A.Enable the optimize for scalibity option.
B.Enable the optimize for consistency option.
C.Set the ordering method option to lowest cost.
D.Set the ordering method option to random order.
A.From windows firewall, add an exception.
B.From windows firewall enable the block all incoming connections option.
C.From the windows firewall with advanced security snap-in, create an inbound rule.
D.From the windows firewall with advanced security snap-in, create an outbound rule.
A.Configure and enable DFS-R on the App1 Web Server.
B.Create a host (AAAA) record for the App1 Web server in the DNS zone for the forest root domain.
C.Create a zone named GlobalNames on a DNS server. Replicate the GloballNames zone to all domain controllers in the forest. Create a host (A) record for the App1 Web server in the zone.
D.Create a zone named LegacyWNS on a DNS server. Replicate the LegacyWNS zone to all domain controllers in the forest. Create a host (A) record for the App1 Web server in the zone.
A.From file server resource manage, create a file screen.
B.From file server resource manager, create a storage management report.
C.From the command prompt, run dirquota.exe quota list.
D.From the properties of each volume, review the quota entries list.
A.In the performance console, create a counter log to track processor usage.
B.In event view, open and review the application log for performance events.
C.In windows reliability and performance monitor, use the resource view to see the percentage of processor capacity used by each application.
D.In windows reliability and performance monitor, create an alert that will be triggered when processor usage exceeds 80 percent for more than five minutes on server1.
Your network contains a server named Server1 that runs Windows Server 2008 R2. The network contains multiple subnets.An administrator reports that Server1 fails to communicate with computers on remote subnets.You run route.exe print on Server1 as shown in the exhibit. (Click the Exhibit button.)You need to ensure that Server1 can communicate with all computers on the network.
What should you do?()
A. Disable IPv6.
B. Change the subnet mask.
C. Add a default gateway address.
D. Change the default metric to 100.
A. From the RIP properties page, modify the General settings.
B. From the RIP properties page, modify the Security settings.
C. From the RIP interface properties page, modify the Security settings.
D. From the RIP interface properties page, modify the Neighbors settings.
A.Configure a proxy server.
B.Configure a upstream server.
C.Create a new replica group.
D.Create a new computer group.
最新试题
Your company has a network that has 100 servers. A server named Server1 is configured as a file server. Server1 is connected to a SAN and has 15 logical drives. You want to automatically run a data archiving script if the free space on any of the logical drives is below 30 percent. You need to automate the script execution.You create a new Data Collector Set. What should you do next?()
You have 10 stand alone servers taht run Windows Server 2008. You install WSUS on a server named Server1. You need to configure all of the servers to receive updates from Server1 What should you do()?
You perform a security audit of a server named CRM1. You want to build a list of all DNS requests that are initiated by the server. You install the Microsoft Network Monitor 3.0 application on CRM1. You capture all local traffic on CRM1 for 24hours. You save the capture file as data.cap. you find that the size of this file is more tahn 1GB. you need to create a file named DNSdata.cap from the existing capture file taht contains only dNS -related data What should you do()?
You have a file server that runs Windows Server 2008. A user restores a large file by using the Previous Versions tab. You need to view the progress of the file restoration what should you do()?
Your company has a network that has an Active Directory domain. The domain has two servers named DC1 and DC2. You plan to collect events from DC2 and transfer them to DC1. You configure the required subscriptions by selecting the Normal option for the Event delivery optimization setting and by using the HTTP protocol.You discover that none of the subscriptions work.You need to ensure that the servers support the event collectors.Which three actions should you perform?()
Your company runs Windows Server Update Services (WSUS) on a server named Server1. Server1runs Windows Server 2008 R2. Server1 is located on the company intranet. You configure the WSUS Web site to use SSL.You need to configure a Group Policy object (GPO) to specify the intranet update locations.Which URLs should you use?()
Your company has an Active Directory domain that has two domain controllers named DC1 and DC2.You prepare both servers to support event subscriptions. On DC1, you create a new default subscription for DC2. You need to review system events for DC2.Which event log should you select?()
Your company has a main office and one branch office. The main office has a print server named Printer1. The branch office has a print server named Printer2. Printer1 manages 15 printers and Printer2 manages seven printers. You add Printer2 to the Print Management console on Printer1. You need to send an automatic notification when a printer is not available. What should you do?()
Your companys corporate network uses Network Access Protection (NAP). Users are able to connect to the corporate network remotely. You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do()?
You perform a security audit on a server named Server1. You install the Microsoft Network Monitor 3.0 application on Server1. You find that only some of the captured frames display host mnemonic names in the Source column and the Destination column. All other frames display IP addresses. You need to display mnemonic host names instead of IP addresses for all the frames.What should you do?()