A.Configure NAT1 to forward port 389 to RDP1.
B.Configure NAT1 to forward port 1432 to RDP1.
C.Configure NAT1 to forward port 3339 to RDP1.
D.Configure NAT1 to forward port 3389 to RDP1.
您可能感兴趣的试卷
你可能感兴趣的试题
A.Install the routing and remote access role.
B.Run the netsh ras ip set access ALL command.
C.Run the netsh interface ipv4 enable command.
D.Enable the IPV4 router routing and remote access option.
A.Deactivate all LM and NTLM authentication methods on the FSS1 server.
B.Use IIS to publish the confidentials files. Activate SSL on the ISS server, and then open the files as a web folder.
C.Use IPSec encryption between the FSS 1 server and the computers of the users who need to access the confidential files.
D.Use the server messager block (SMB) signing between the FSS1 server and the computers of the users who want to access the confidential files.
E.Activate offline files for the confidential files that are stored on the FSS1 server. In the folder advanced properties dialog box, select the encrypt contents to secure data option.
A.Install the internet printing server role on SRV1.
B.Install the line printer daemon (LPD) services role service on SRV1.
C.Configure the printers on SRV1 to use line printer remote printing.
D.Install the file server role on SRV1 and activate the services for the NFS Role service option.
A. From the Local Security Policy console, configure the Security Options.
B. From the Local Security Policy console, configure the Application Control Policies.
C. From the Windows Firewall with Advanced Security console, create an inbound rule.
D. From the Windows Firewall with Advanced Security console, create a connection security rule.
A. At the Command Prompt, run netsh.exe firewall dump.
B. At the Command Prompt, run netsh.exe firewall show > firewall.txt.
C. From the Windows Firewall with Advanced Security console, click Export policy.
D. From the Windows Firewall with Advanced Security console, click the Connection Security Rules node, and then click Export List.
A. File and Printer Sharing (Echo Request ICMPv4-In)
B. File and Printer Sharing (SMB-In)
C. Remote Desktop (TCP-In)
D. Remote Service Management (RPC)
A.Disable the notify feature for the contoso.com zone.
B.Disable the allow-read permission for the everyone group on the contoso.com DNS domain.
C.Configure the all domain controllers in the domain zone replication option on ad.contoso.com.
D.Configure the allow zone transfers only to servers listed on the named servers option on contoso.com.
A.Create a new display filter and apply the filter to the capture.
B.Create a new capture filter and apply the filter to the capture.
C.Populate the aliases table and apply the aliases to the capture.
D.Configure the network monitor application to enable the enable converstations option, recapture the data to a new file.
A. Change the settings of the private firewall profile.
B. Change the settings of the domain firewall profile.
C. Modify the properties of the inbound firewall rules.
D. Modify the properties of the outbound firewall rules.
A.Create a new display filter and apply the filter to the capture.
B.Create a new capture filter and apply the filter to the capture.
C.Populate the aliases table and apply the aliases to the capture.
D.Configure the network monitor application to enable the enable converstations option, recapture the data to a new file.
最新试题
Your company has a main office and a branch office. The branch office has three servers that run a Server Core installation of Windows Server 2008 R2. The servers are named Server1, Server2, and Server3. You want to configure the Event Logs subscription on Server1 to collect events from Server2 and Server3. You discover that you cannot create a subscription on Server1 from another computer. You need to configure a subscription on Server1.Which two actions should you perform?()
Your company has a server named DC1 that runs Windows Server 2008 R2. Server1 has the DHCPServer server role installed.You find that a desktop computer named Computer1 is unable to obtain an IP configuration from the DHCP server.You install the Microsoft Network Monitor 3.0 application on Server1. You enable P-mode in the Network Monitor application configuration. You plan to capture only the DHCP server-related traffic between Server1 and Computer1.The network interface configuration for the two computers is shown in the following table.Server1 Computer1IP address 192.168.2.1 169.254.15.84MAC address 00-0A-5E-1C-7F-67 00-17-31-D5-5E-FFYou need to build a filter in the Network Monitor application to capture the DHCP traffic between Server1and Computer1.Which filter should you use?()
Your company has a network that has 100 servers. You install a new server that runs Windows Server 2008 R2. The server has the Web Server (IIS) server role installed. After a week, you discover that the Reliability Monitor has no data, and that the Systems Stability chart has never been updated.You need to configure the server to collect the Reliability Monitor data.What should you do?()
You perform a security audit of a server named CRM1. You want to build a list of all DNS requests that are initiated by the server. You install the Microsoft Network Monitor 3.0 application on CRM1. You capture all local traffic on CRM1 for 24 hours. You save the capture file as data.cap. You find that the size of the file is more than 1 GB. You need to create a file named DNSdata.cap from the existing capture file that contains only DNS-related data.What should you do? ()
Your company runs Windows Server Update Services (WSUS) on a server named Server1. Server1runs Windows Server 2008 R2. Server1 is located on the company intranet. You configure the WSUS Web site to use SSL.You need to configure a Group Policy object (GPO) to specify the intranet update locations.Which URLs should you use?()
Your companys corporate network uses Network Access Protection (NAP). Users are able to connect to the corporate network remotely. You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do()?
Your company has a network that has 100 servers. You install a new server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. You discover that the Reliability Monitor has no data, and that the system stablitiy chare has never been updated. You nede to configure the server to collect the reliability monitor data. What should you do()?
You deploy Windows Server 2008 VPN server behind a firewall. Remote users connect to the VPN by using portable computers that run Windows Vista with the latest service pack. The firewall is configured to allow only secured web communications. You need to enable remote users to connect as securely as possible. you must achieve this goal without opening any additional ports on the firewall. What should you do ()?
Your company has a network that has 100 servers. A server named Server1 is configured as a file server. Server1 is connected to a SAN and has 15 logical drives. You want to automatically run a data archiving script if the free space on any of the logical drives is below 30 percent. You need to automate the script execution.You create a new Data Collector Set. What should you do next?()
You install WSUS on a server that runs Windows Server 2008. You need to ensure that the traffic between the WSUS administrative web site and the server administrators computer is encrypted What should you do()?