A. Enable BIND secondaries.
B. Delete the (root) zone.
C. Create a GlobalNames zone.
D. Delete all conditional forwarders.
您可能感兴趣的试卷
你可能感兴趣的试题
A. On Server2, create a new event subscription.
B. On Server2, modify the outbound firewall rules.
C. On Server1, modify the inbound firewall rules.
D. On Server1, modify the settings on the Application log.
A. From the Windows Firewall with Advanced Security console, create an inbound rule on Server1.
B. From the Windows Firewall with Advanced Security console, create an outbound rule on Server1.
C. From a Group Policy object (GPO), enable the Client (Respond Only) IPSec policy on all client computers.
D. From a Group Policy object (GPO), configure the Network Security: LDAP client signing requirements policy setting for all client computers.
A.Run the ipconfig /renew command on WKS1.
B.Run the netsh add helper command on WKS1.
C.Add the DHCP reservation for WKS1 to the second DHCP server.
D.Add the DHCP servers to the RAS and IAS servers group in the active directory domain.
A.Set the security layer for each server to the RDP security layer.
B.Configure the firewall on each server to block port 3389.
C.Acquire user certificates from the internal certificate authority.
D.Configure each server to allow connections only to remote desktop client computers that use network level authentication.
A.Configure NAT1 to forward port 389 to RDP1.
B.Configure NAT1 to forward port 1432 to RDP1.
C.Configure NAT1 to forward port 3339 to RDP1.
D.Configure NAT1 to forward port 3389 to RDP1.
A.Install the routing and remote access role.
B.Run the netsh ras ip set access ALL command.
C.Run the netsh interface ipv4 enable command.
D.Enable the IPV4 router routing and remote access option.
A.Deactivate all LM and NTLM authentication methods on the FSS1 server.
B.Use IIS to publish the confidentials files. Activate SSL on the ISS server, and then open the files as a web folder.
C.Use IPSec encryption between the FSS 1 server and the computers of the users who need to access the confidential files.
D.Use the server messager block (SMB) signing between the FSS1 server and the computers of the users who want to access the confidential files.
E.Activate offline files for the confidential files that are stored on the FSS1 server. In the folder advanced properties dialog box, select the encrypt contents to secure data option.
A.Install the internet printing server role on SRV1.
B.Install the line printer daemon (LPD) services role service on SRV1.
C.Configure the printers on SRV1 to use line printer remote printing.
D.Install the file server role on SRV1 and activate the services for the NFS Role service option.
A. From the Local Security Policy console, configure the Security Options.
B. From the Local Security Policy console, configure the Application Control Policies.
C. From the Windows Firewall with Advanced Security console, create an inbound rule.
D. From the Windows Firewall with Advanced Security console, create a connection security rule.
A. At the Command Prompt, run netsh.exe firewall dump.
B. At the Command Prompt, run netsh.exe firewall show > firewall.txt.
C. From the Windows Firewall with Advanced Security console, click Export policy.
D. From the Windows Firewall with Advanced Security console, click the Connection Security Rules node, and then click Export List.
最新试题
Your company has a main office and one branch office. The main office has a print server named Printer1. The branch office has a print server named Printer2. Printer1 manages 15 pritners and Printer2 manages seven pritners. You add Printer2 the Print Management console on Printer1. you need to send automatic notification when a printer is not availible. What should you do()?
You perform a security audit on a server named Server1. You install the Microsoft Network Monitor 3.0 application on Server1. You find that only some of the captured frames display host mnemonic names in the Source column and the Destination column. All other frames display IP addresses. You need to display mnemonic host names instead of IP addresses for all the frames.What should you do?()
You have a server that runs Windows Server 2008. You need to configure the server as a VPN server. What should you installed on the server()?
You have a file server that runs Windows Server 2008 R2.You configure quotas on the server.You need to view each user¯s quota usage on a per folder basisWhat should you do?()
Your company has a network that has an active directory domain. The domain has two servers named DC1 and DC2. You plan to collect events from DC2 and transfer them to DC1. You configure the required subscriptions by selecting the normal option for the event delivery optimiation setting and using the HTTP protocol. you discovere that none of the subscritpions work. You need to ensure that the servers support event collectiors. which three actions should you perform()?
Your company has a server named FS1. FS1 hosts the domain-based DFS namespace named \\contoso. com\dfs all domain users store their data in subfolders within the DFS namespace. You need to prevent all users except administrators, from creating new folders or new files at the root of the \\contoso.com\dfs share. What should you do()?
Your company runs Windows Server Update Services (WSUS) on a server named Server1. Server1runs Windows Server 2008 R2. Server1 is located on the company intranet. You configure the WSUS Web site to use SSL.You need to configure a Group Policy object (GPO) to specify the intranet update locations.Which URLs should you use?()
You have a file server that runs Windows Server 2008. A user restores a large file by using the Previous Versions tab. You need to view the progress of the file restoration what should you do()?
Your company has a main office and one branch office. The main office has a print server named Printer1. The branch office has a print server named Printer2. Printer1 manages 15 printers and Printer2 manages seven printers. You add Printer2 to the Print Management console on Printer1. You need to send an automatic notification when a printer is not available. What should you do?()
Your network consists of a single Active Directory domain. All servers run Windows Server 2008 R2.You have a server named Server1 that hosts shared documents. Users report extremely slow response times when they try to open the shared documents on Server1.You log on to Server1 and observe real-time data indicating that the processor is operating at 100 percent of capacity.You need to gather additional data to diagnose the cause of the problem.What should you do?()