A. From Network Connections, right-click the active network connection, and then click Status.
B. From Network Connections, select the active network connection, and then click Diagnose this connection.
C. From Windows Firewall with Advanced Security, click Monitoring, and then click Connection Security Rules.
D. From Windows Firewall with Advanced Security, click Monitoring, click Security Associations, and then click Main Mode.
您可能感兴趣的试卷
你可能感兴趣的试题
A.Configure client computers in the contoso forest to use the tailspin toys DNS server as the alternate DNS server.
B.Create a new conditional forwader and store it in active directory. Replicate the new conditional forwarded to all DNS server in the contoso forest.
C.Create a new application directory partition in the contoso forest. Enlist the directory partition for all DNS servers.
D.Create a new host (A) record in the globalnames folder on one of the DNS servers in the contoso forest. Configure the host (A) record by using by using the tailspin toys domain name and the ip address of the DNS server in the tailspin toys forest.
A. ICMPv6 Echo Requests
B. ICMPv6 Redirect
C. IGMP
D. IPv6-Route
A.Configure a new GPO that disables the Local-Link multicast name resolution feature. Apply the policy to all the client computes in the north America office.
B.Configure a new GPO that enables the local-Link Multicast name resolution feature. Apply the policy to all the client computers in the north America office.
C.Configure a new GPO that configures the DNS suffix search list option to sa. Contoso.com, na.contoso.com apply the policy to all the client computers in the north America office.
D.Configure the priority value for the SRV records on each of the north America domain controllers to 5.
A. nbtstat.exe a server1.contoso.com
B. netsh.exe dnsclient show state
C. nslookup.exe server1.contoso.com
D. ping.exe server1.contoso.com
A.configure dynamic NAT on the firewall.
B.configure the firewall to allow the use of teredo.
C.Configure a link local IPv6 address for the internal interface of the firewall.
D.Configure a global IPv6 address for the external interface of the firewall.
A.Add a mail exchange (MX) record for server2.
B.Add a mailbox (MB) record for server2. Set the mailbox host setting to server2.
C.Add a canonical (CNAME) record that maps server2 to contoso.com.
D.Add a server locator (SRV) record for server2. Set the service field to _smtp. Set the protocol field to _tcp. Set the port number to 25.
A. Modify the GlobalQueryBlockList registry key and restart the DNS Server service.
B. Modify the EnableGlobalNamesSupport registry key and restart the DNS Server service.
C. Create a trust anchor that uses a certificate issued by an internal certification authority (CA).
D. Create a trust anchor that uses a certificate issued by a publicly trusted certification authority (CA).
A.Run the wecutil qc command on DC1.
B.Run the wecutil qc command on DC2.
C.Run the winrm quickconfig command on DC1.
D.Run the winrm ruickconfig command on DC2.
E.Add the DC2 account to the administrators group on DC1.
F.Add the DC1 account to the administrators group on DC2.
A.Disable the root hints.
B.Enable BIND secondaries.
C.Configure a forwarder to the caching DNS server.
D.Configure a GlobalNames host (A) record for the hostname of the caching DNS server.
A.Apply an IPsec NAP policy.
B.Configure a NAP Policy for 802.1x Wireless connections.
C.Configure VPN connections to use MS-CHAP v2 authentication.
D.Restrict dynamic host configuration protocol (DHCP) clients by using NAP.
最新试题
Your company runs Windows Server Update Services (WSUS) on a server named Server1. Server1runs Windows Server 2008 R2. Server1 is located on the company intranet. You configure the WSUS Web site to use SSL.You need to configure a Group Policy object (GPO) to specify the intranet update locations.Which URLs should you use?()
You have a file server that runs Windows Server 2008 R2.You configure quotas on the server.You need to view each user¯s quota usage on a per folder basisWhat should you do?()
Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP. what should you do()?
Your company has users who connect remotely to the main office though a Windows Server 2008 VPN server. You need to ensure that users cannot access the VPN server remotely from 22:00 to 05:00. What should you do()?
You manage a server that runs Windows Server 2008. The windows backup and restore utility is installed ont he server. You nede to create a full backup of all system state data to the DVD drive (R: drive) on the server. Which command should you run on the server()?
You have a server that runs Windows Server 2008. You need to configure the server as a VPN server. What should you installed on the server()?
Your company has a network that has 100 servers. A server named Server1 is configured as a file server. Server1 is connected to a SAN and has 15 logical drives. You want to automatically run a data archiving script if the free space on any of the logical drives is below 30 percent. You need to automate the script execution.You create a new Data Collector Set. What should you do next?()
You have a file server that runs Windows Server 2008. The server has a shared folder. You need to receive a notifcation when a user stores more than 500MB of data int he shared folder. You must allow users to store more than 500MB of data in the shared folder. What should you do()?
Your companys corporate network uses Network Access Protection (NAP). Users are able to connect to the corporate network remotely. You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do()?
Your network consists of a single Active Directory domain. All servers run Windows Server 2008 R2.You have a server named Server1 that hosts shared documents. Users report extremely slow response times when they try to open the shared documents on Server1.You log on to Server1 and observe real-time data indicating that the processor is operating at 100 percent of capacity.You need to gather additional data to diagnose the cause of the problem.What should you do?()