A.Configure a static IP address.
B.Configure the default gateway.
C.Configure the DNS server address.
D.Add the domain to the DNS suffix on the network interface.
您可能感兴趣的试卷
你可能感兴趣的试题
A.Create a group policy object (GPO) that enabled security center and link the policy to the domain.
B.Create a group policy object (GPO) that enabled security center and link the policy to the domain controllers organizational unit (OU).
C.Create a group policy object (GPO) and set the require trusted path for credential entry option to enabled. Link the policy to the domain.
D.Create a group policy object (GPO) and set the require trusted path for credential entry option to Enabled. Link the policy to the domain controllers organizational unit (OU).
A.Create a stub zone for partner.com on each DNS server in contoso.com.
B.Configure the zone replication scope for partner.com to replicate to all DNS servers In the forest.
C.Configure an application directory partition in the contoso.com forest. Enlist all DNS servers in the contoso.com forest in the partition.
D.Configure an application directory partition in the partner forest. Enlist all DNS servers in the partner forest in the partition.
A. In the contoso.com domain, add Server1 to the RAS and IAS Servers group.
B. In the contoso.com domain, add Server1 to the Windows Authorization Access group.
C. In the eu.contoso.com domain, add Server1 to the RAS and IAS Servers group.
D. In the eu.contoso.com domain, add Server1 to the Windows Authorization Access group.
A. Create a new ODBC data source.
B. Run netsh.exe nps reset config.
C. Manually configure the SQL logging settings.
D. Restart the Network Policy Server (NPS) role service.
A.Deactivate all LM and NTLM authentication methods on FSS1 server.
B.Use IIS to publish the confidential files, activate SSL on the IIS server, and then open the files as a web folder.
C.Use IPsec encryption between the FSS1 server and the computers of the users who need to access the confidential files.
D.Use the server message block (SMB) signing between the FSS1 serve and the computers of the users who want to access the confidential files.
E.Activate offline files for the confidential files that are stored on the FSS1 server. In the folder advanced properties box, select the encrypt contents to secure data option.
A. Acct-Session-Id
B. Acct-Status-Type
C. Class
D. NAS-Identifier
A.Install service pack 4 on all windows 2000 professional computers.
B.Upgrade the windows 2000 professional computers to windows XP SP2.
C.Run the IPv6.exe tool on the windows 2000 professional and windows XP computers.
D.Install active directory client extenticon. (DSClient.exe) on the windows 2000 professional and windows XP computers.
A.Configure the windows update settings on each server by using control panel.
B.Run the wuauclt.exe /detectnow command on each server.
C.Run the wuauclt.exe /reauthorization command on each server.
D.Configure the windows update settings on each server by using local group policy.
A. health policies
B. network policies
C. RADIUS clients
D. remote RADIUS server groups
A.Ipconfig /registerdns: local.contoso.com
B.dnscmd server1 /zoneadd local.cotoso.com /DSPrimary.
C.Dnscmd server1 /zoneadd local.contoso.com /primary /file local.contoso.com.dns.
D.Netsh interface ipv4 set dnsserver name=local.contoso.com static 10.0.0.1 primary.
最新试题
You perform a security audit on a server named Server1. You install the Microsoft Network Monitor 3.0 application on Server1. You find that only some of the captured frames display host mnemonic names in the Source column and the Destination column. All other frames display IP addresses. You need to display mnemonic host names instead of IP addresses for all the frames.What should you do?()
Your company ahs an active direcotyr domain. The company also has a server named Server1 that runs Windows Server 2008. You install the file server role on Server1. you create a shared folder named AcctgShare on Server1 The permissions for the shared folder are configured as shown in the following table. ( missing again!) You need to ensure members of the Managers group can only view and open files in the shared folder. What should you do()?
You deploy Windows Server 2008 VPN server behind a firewall. Remote users connect to the VPN by using portable computers that run Windows Vista with the latest service pack. The firewall is configured to allow only secured web communications. You need to enable remote users to connect as securely as possible. you must achieve this goal without opening any additional ports on the firewall. What should you do ()?
Your company has a server named Printer1 that runs Windows Server 2008 R2. Printer1 has the Print and Document Services server role installed.You need to reduce the number of events registered in the system log on Printer1. What should you do?()
Your company has a network that has 100 servers. You install a new server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. You discover that the Reliability Monitor has no data, and that the system stablitiy chare has never been updated. You nede to configure the server to collect the reliability monitor data. What should you do()?
You manage a server that runs Windows Server 2008. The windows backup and restore utility is installed ont he server. You nede to create a full backup of all system state data to the DVD drive (R: drive) on the server. Which command should you run on the server()?
Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP. what should you do()?
You have a server that runs Windows Server 2008 R2.You create a new quota template. You apply quotas to 100 folders by using the quota template.You need to modify the quota settings for all 100 folders. You must achieve this goal by using the minimum amount of administrative effort.What should you do?()
Your company has a server named DC1 that runs Windows Server 2008 R2. Server1 has the DHCPServer server role installed.You find that a desktop computer named Computer1 is unable to obtain an IP configuration from the DHCP server.You install the Microsoft Network Monitor 3.0 application on Server1. You enable P-mode in the Network Monitor application configuration. You plan to capture only the DHCP server-related traffic between Server1 and Computer1.The network interface configuration for the two computers is shown in the following table.Server1 Computer1IP address 192.168.2.1 169.254.15.84MAC address 00-0A-5E-1C-7F-67 00-17-31-D5-5E-FFYou need to build a filter in the Network Monitor application to capture the DHCP traffic between Server1and Computer1.Which filter should you use?()
You install WSUS on a server that runs Windows Server 2008. You need to ensure that the traffic between the WSUS administrative web site and the server administrators computer is encrypted What should you do()?