A.Install the routing and remote access role.
B.Run the netsh ras ip set access ALL command.
C.Run the netsh interface ipv4 enable command.
D.Enable the IPV4 router routing and remote access option.
您可能感兴趣的试卷
你可能感兴趣的试题
A.Deactivate all LM and NTLM authentication methods on the FSS1 server.
B.Use IIS to publish the confidentials files. Activate SSL on the ISS server, and then open the files as a web folder.
C.Use IPSec encryption between the FSS 1 server and the computers of the users who need to access the confidential files.
D.Use the server messager block (SMB) signing between the FSS1 server and the computers of the users who want to access the confidential files.
E.Activate offline files for the confidential files that are stored on the FSS1 server. In the folder advanced properties dialog box, select the encrypt contents to secure data option.
A.Install the internet printing server role on SRV1.
B.Install the line printer daemon (LPD) services role service on SRV1.
C.Configure the printers on SRV1 to use line printer remote printing.
D.Install the file server role on SRV1 and activate the services for the NFS Role service option.
A. From the Local Security Policy console, configure the Security Options.
B. From the Local Security Policy console, configure the Application Control Policies.
C. From the Windows Firewall with Advanced Security console, create an inbound rule.
D. From the Windows Firewall with Advanced Security console, create a connection security rule.
A. At the Command Prompt, run netsh.exe firewall dump.
B. At the Command Prompt, run netsh.exe firewall show > firewall.txt.
C. From the Windows Firewall with Advanced Security console, click Export policy.
D. From the Windows Firewall with Advanced Security console, click the Connection Security Rules node, and then click Export List.
A. File and Printer Sharing (Echo Request ICMPv4-In)
B. File and Printer Sharing (SMB-In)
C. Remote Desktop (TCP-In)
D. Remote Service Management (RPC)
A.Disable the notify feature for the contoso.com zone.
B.Disable the allow-read permission for the everyone group on the contoso.com DNS domain.
C.Configure the all domain controllers in the domain zone replication option on ad.contoso.com.
D.Configure the allow zone transfers only to servers listed on the named servers option on contoso.com.
A.Create a new display filter and apply the filter to the capture.
B.Create a new capture filter and apply the filter to the capture.
C.Populate the aliases table and apply the aliases to the capture.
D.Configure the network monitor application to enable the enable converstations option, recapture the data to a new file.
A. Change the settings of the private firewall profile.
B. Change the settings of the domain firewall profile.
C. Modify the properties of the inbound firewall rules.
D. Modify the properties of the outbound firewall rules.
A.Create a new display filter and apply the filter to the capture.
B.Create a new capture filter and apply the filter to the capture.
C.Populate the aliases table and apply the aliases to the capture.
D.Configure the network monitor application to enable the enable converstations option, recapture the data to a new file.
A. the authorized computers list
B. the authorized users list
C. the edge traversal settings
D. the scope
最新试题
You deploy Windows Server 2008 VPN server behind a firewall. Remote users connect to the VPN by using portable computers that run Windows Vista with the latest service pack. The firewall is configured to allow only secured web communications. You need to enable remote users to connect as securely as possible. you must achieve this goal without opening any additional ports on the firewall. What should you do ()?
Your company has a server named DC1 that runs Windows Server 2008 R2. Server1 has the DHCPServer server role installed.You find that a desktop computer named Computer1 is unable to obtain an IP configuration from the DHCP server.You install the Microsoft Network Monitor 3.0 application on Server1. You enable P-mode in the Network Monitor application configuration. You plan to capture only the DHCP server-related traffic between Server1 and Computer1.The network interface configuration for the two computers is shown in the following table.Server1 Computer1IP address 192.168.2.1 169.254.15.84MAC address 00-0A-5E-1C-7F-67 00-17-31-D5-5E-FFYou need to build a filter in the Network Monitor application to capture the DHCP traffic between Server1and Computer1.Which filter should you use?()
You have a server that runs Windows Server 2008. you create a new quota template. you apply quotas to 100 folders by using the quota template. you nede to modify the quota settings for al 100 folders. You must achive this goal by using the minimum amount of administrative effort. What should you do()?
Your company has a server named SRV1 that runs Windows Server 2008 R2. The default Print Services server role is installed on SRV1. The company wants to centralize printing on SRV1 for both UNIX and Windows users. You need to provide support to the UNIX users who print on SRV1.What are two possible ways to achieve this goal? ()
Your company ahs an active direcotyr domain. The company also has a server named Server1 that runs Windows Server 2008. You install the file server role on Server1. you create a shared folder named AcctgShare on Server1 The permissions for the shared folder are configured as shown in the following table. ( missing again!) You need to ensure members of the Managers group can only view and open files in the shared folder. What should you do()?
Your company has an active directory domain that has two domain controllers named DC1 and DC2. You prepare both servers to support event subscriptions. On DC1, you create a new default subscription for DC2. You need to review system events for DC2. Which event log should you select()?
Your company has an Active Directory domain that has two domain controllers named DC1 and DC2.You prepare both servers to support event subscriptions. On DC1, you create a new default subscription for DC2. You need to review system events for DC2.Which event log should you select?()
Your company has a network that has an Active Directory domain. The domain has two servers named DC1 and DC2. You plan to collect events from DC2 and transfer them to DC1. You configure the required subscriptions by selecting the Normal option for the Event delivery optimization setting and by using the HTTP protocol.You discover that none of the subscriptions work.You need to ensure that the servers support the event collectors.Which three actions should you perform?()
You have 10 stand alone servers taht run Windows Server 2008. You install WSUS on a server named Server1. You need to configure all of the servers to receive updates from Server1 What should you do()?
Your company has a server named Printer1 that runs Windows Server 2008 R2. Printer1 has the Print and Document Services server role installed.You need to reduce the number of events registered in the system log on Printer1. What should you do?()