A. From a command prompt, run ipconfig.exe /displaydns.
B. From a command prompt, run netsh.exe namespace show policy.
C. From Control Panel, run the network adapter troubleshooter.
D. From the Network Connection Status window, view the Network Connection Details.
您可能感兴趣的试卷
你可能感兴趣的试题
A.Configure all access points as RADIUS clients to the remediation servers.
B.Configure all access points as RADIUS clients to the network Policy Server (NPS).
C.Create a network policy that defines remote access server as a network connection method.
D.Create a network policy that specifies EAP-TLS as the only available authentication method.
A.From the services snap-in disable the IP helper.
B.From the services snp-in disable the net logon service.
C.From windows firewall. Enable the block all connections option on the public profile.
D.From the windows firewall, enable the block all connections option on the domain profile.
A. Application Servers
B. DirectAccess Server
C. Infrastructure Servers
D. Remote Clients
A.Add group1 to the RAS and IAS servers group.
B.Add group1 to the network configuration operators group..
C.Create a new network policy and define a group-based connection for group1. Set the access permission of the policy to access granted. Set the processing order of the policy to 1.
D.Create a new network policy and define a group-based condition for group1. Set the access permission of the policy to acces granted. Set the processing of the policy to 3.
A.Enable automatic updates on each client.
B.Enable the security center on each client.
C.Quarantine clients that do not have all available security updates installed.
D.Disconnect the remote connection until the required updates are installed.
A. On each client computer, add Group1 to the Distributed COM Users group.
B. On each client computer, add Group1 to the Network Configuration Operators group.
C. From Active Directory Users and Computers, add the users user accounts to Group1.
D. From Active Directory Users and Computers, add the users computer accounts to Group1.
A.Configure SSL encryption on the WSUS server website.
B.Run the netdom trust /SecurePasswordPrompt command on the WSUS server.
C.Configure the NTFS permissions on the content directory to deny Full control permission to the everyone group.
D.Configure the WSUS serve to require integrated windows authentication (WA) hen users connect to the WSUS serve.
A.Add the DHCP serve option 44.
B.Set the conflict detetion value to 0.
C.Set the conflict detection value to 2.
A. SHA not responding to NAP client
B. SHA unable to contact required services
C. SHV not responding
D. SHV unable to contact required services
A.Modify the quota template.
B.Delte and recreate the quota template.
C.Create a new quota template. Modify the quota for each folder.
D.Create a file screen template. Apply the file screen template to the root of the volume that contains the folders.
最新试题
Your company has a main office and one branch office. The main office has a print server named Printer1. The branch office has a print server named Printer2. Printer1 manages 15 pritners and Printer2 manages seven pritners. You add Printer2 the Print Management console on Printer1. you need to send automatic notification when a printer is not availible. What should you do()?
Your company has an Active Directory domain that has two domain controllers named DC1 and DC2.You prepare both servers to support event subscriptions. On DC1, you create a new default subscription for DC2. You need to review system events for DC2.Which event log should you select?()
Your companys corporate network uses Network Access Protection (NAP). Users are able to connect to the corporate network remotely. You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do()?
Your company has a server named Printer1 that runs Windows Server 2008 R2. Printer1 has the Print and Document Services server role installed.You need to reduce the number of events registered in the system log on Printer1. What should you do?()
You perform a security audit on a server named Server1. You install the Microsoft Network Monitor 3.0 application on Server1. You find that only some of the captured frames display host mnemonic names in the Source column and the Destination column. All other frames display IP addresses. You need to display mnemonic host names instead of IP addresses for all the frames.What should you do?()
Your company has a network that has an Active Directory domain. The domain has two servers named DC1 and DC2. You plan to collect events from DC2 and transfer them to DC1. You configure the required subscriptions by selecting the Normal option for the Event delivery optimization setting and by using the HTTP protocol.You discover that none of the subscriptions work.You need to ensure that the servers support the event collectors.Which three actions should you perform?()
Your company has a network that has 100 servers. A server named Server1 is configured as a file server. Server1 is connected to a SAN and has 15 logical drives. You want to automatically run a data archiving script if the free space on any of the logical drives is below 30 percent. You need to automate the script execution.You create a new Data Collector Set. What should you do next?()
Your company has users who connect remotely to the main office though a Windows Server 2008 VPN server. You need to ensure that users cannot access the VPN server remotely from 22:00 to 05:00. What should you do()?
You deploy Windows Server 2008 VPN server behind a firewall. Remote users connect to the VPN by using portable computers that run Windows Vista with the latest service pack. The firewall is configured to allow only secured web communications. You need to enable remote users to connect as securely as possible. you must achieve this goal without opening any additional ports on the firewall. What should you do ()?
You perform a security audit of a server named CRM1. You want to build a list of all DNS requests that are initiated by the server. You install the Microsoft Network Monitor 3.0 application on CRM1. You capture all local traffic on CRM1 for 24 hours. You save the capture file as data.cap. You find that the size of the file is more than 1 GB. You need to create a file named DNSdata.cap from the existing capture file that contains only DNS-related data.What should you do? ()