A. On Server2, create a new event subscription.
B. On Server2, modify the outbound firewall rules.
C. On Server1, modify the inbound firewall rules.
D. On Server1, modify the settings on the Application log.
您可能感兴趣的试卷
你可能感兴趣的试题
A. From the Windows Firewall with Advanced Security console, create an inbound rule on Server1.
B. From the Windows Firewall with Advanced Security console, create an outbound rule on Server1.
C. From a Group Policy object (GPO), enable the Client (Respond Only) IPSec policy on all client computers.
D. From a Group Policy object (GPO), configure the Network Security: LDAP client signing requirements policy setting for all client computers.
A.Run the ipconfig /renew command on WKS1.
B.Run the netsh add helper command on WKS1.
C.Add the DHCP reservation for WKS1 to the second DHCP server.
D.Add the DHCP servers to the RAS and IAS servers group in the active directory domain.
A.Set the security layer for each server to the RDP security layer.
B.Configure the firewall on each server to block port 3389.
C.Acquire user certificates from the internal certificate authority.
D.Configure each server to allow connections only to remote desktop client computers that use network level authentication.
A.Configure NAT1 to forward port 389 to RDP1.
B.Configure NAT1 to forward port 1432 to RDP1.
C.Configure NAT1 to forward port 3339 to RDP1.
D.Configure NAT1 to forward port 3389 to RDP1.
A.Install the routing and remote access role.
B.Run the netsh ras ip set access ALL command.
C.Run the netsh interface ipv4 enable command.
D.Enable the IPV4 router routing and remote access option.
A.Deactivate all LM and NTLM authentication methods on the FSS1 server.
B.Use IIS to publish the confidentials files. Activate SSL on the ISS server, and then open the files as a web folder.
C.Use IPSec encryption between the FSS 1 server and the computers of the users who need to access the confidential files.
D.Use the server messager block (SMB) signing between the FSS1 server and the computers of the users who want to access the confidential files.
E.Activate offline files for the confidential files that are stored on the FSS1 server. In the folder advanced properties dialog box, select the encrypt contents to secure data option.
A.Install the internet printing server role on SRV1.
B.Install the line printer daemon (LPD) services role service on SRV1.
C.Configure the printers on SRV1 to use line printer remote printing.
D.Install the file server role on SRV1 and activate the services for the NFS Role service option.
A. From the Local Security Policy console, configure the Security Options.
B. From the Local Security Policy console, configure the Application Control Policies.
C. From the Windows Firewall with Advanced Security console, create an inbound rule.
D. From the Windows Firewall with Advanced Security console, create a connection security rule.
A. At the Command Prompt, run netsh.exe firewall dump.
B. At the Command Prompt, run netsh.exe firewall show > firewall.txt.
C. From the Windows Firewall with Advanced Security console, click Export policy.
D. From the Windows Firewall with Advanced Security console, click the Connection Security Rules node, and then click Export List.
A. File and Printer Sharing (Echo Request ICMPv4-In)
B. File and Printer Sharing (SMB-In)
C. Remote Desktop (TCP-In)
D. Remote Service Management (RPC)
最新试题
Your company has a main office and a branch office. The branch office has three servers that run a Server Core installation of Windows Server 2008 R2. The servers are named Server1, Server2, and Server3. You want to configure the Event Logs subscription on Server1 to collect events from Server2 and Server3. You discover that you cannot create a subscription on Server1 from another computer. You need to configure a subscription on Server1.Which two actions should you perform?()
You perform a security audit of a server named CRM1. You want to build a list of all DNS requests that are initiated by the server. You install the Microsoft Network Monitor 3.0 application on CRM1. You capture all local traffic on CRM1 for 24 hours. You save the capture file as data.cap. You find that the size of the file is more than 1 GB. You need to create a file named DNSdata.cap from the existing capture file that contains only DNS-related data.What should you do? ()
Your company has an Active Directory domain that has two domain controllers named DC1 and DC2.You prepare both servers to support event subscriptions. On DC1, you create a new default subscription for DC2. You need to review system events for DC2.Which event log should you select?()
You perform a security audit of a server named DC1. You install the Microsoft Network Monitor 3.0 application on DC1.You plan to capture all the LDAP traffic that comes to and goes from the server between 20:00 and 07:00 the next day and save it to the E:\data.cap file. You create a scheduled task. You add a new Start a program action to the task.You need to add the application name and the application arguments to the new action.What should you do?()
Your company has a network that has 100 servers. You install a new server that runs Windows Server 2008 R2. The server has the Web Server (IIS) server role installed. After a week, you discover that the Reliability Monitor has no data, and that the Systems Stability chart has never been updated.You need to configure the server to collect the Reliability Monitor data.What should you do?()
Your company has a network that has 100 servers. A server named Server1 is configured as a file server. Server1 is connected to a SAN and has 15 logical drives. You want to automatically run a data archiving script if the free space on any of the logical drives is below 30 percent. You need to automate the script execution.You create a new Data Collector Set. What should you do next?()
Your company has a network that has an active directory domain. The domain has two servers named DC1 and DC2. You plan to collect events from DC2 and transfer them to DC1. You configure the required subscriptions by selecting the normal option for the event delivery optimiation setting and using the HTTP protocol. you discovere that none of the subscritpions work. You need to ensure that the servers support event collectiors. which three actions should you perform()?
Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP. what should you do()?
You perform a security audit on a server named Server1. You install the Microsoft Network Monitor 3.0 application on Server1. You find that only some of the captured frames display host mnemonic names in the Source column and the Destination column. All other frames display IP addresses. You need to display mnemonic host names instead of IP addresses for all the frames.What should you do?()
You have a file server that runs Windows Server 2008. A user restores a large file by using the Previous Versions tab. You need to view the progress of the file restoration what should you do()?