A. Disk Management
B. File Server Resource Manager
C. Share and Storage Management
D. Storage Explorer
您可能感兴趣的试卷
你可能感兴趣的试题
A. the Netsh tool
B. the Network Policy Server console
C. the Registry Editor
D. the Routing and Remote Access console
A. TCP ports 80, 443, 389 and 1645
B. TCP ports 88, 135, 139 and 1813
C. UDP ports 53, 67, 68 and 69
D. UDP ports 1812, 1813, 1645 and 1646
A.Use a static IPv4 address in the range used at the branch office.
B.Use a alternate configuration that contains a static IP address in the range used at the main office.
C.Use the address that was assigned by DHCP as a static IP address.
D.Use an altermate configuration that contains a static IP address in the range used at the branch office.
A.System log on DC1.
B.Application log on DC2.
C.Forwarded events log on DC1.
D.Forwarded events log on DC2.
A.Run the dnscmd.exe \\FS1\dfs /restore command on FS1.
B.Configure the NTFS permissions for the C:\DFSroots\dfs folder on FS1. Set the create folders/append data special permission to deny for the authentjicated users group. Set the full control permission to allow for the administrators group.
C.Start the delegate management permissions wizard for the dfs namespace named \\contoso.com\dfs remove all groups that have permission type explicit except the administrators group.
D.Configure the \\fs1\dfs shared folder permissions. set the permissions for the authenticated users group to reader. Set the permissions for the administrations group to co-ower.
A. On NPS1, configure remediation server groups.
B. On NPS1, configure connection request policies.
C. On VPN1, modify the DNS suffix search order.
D. On VPN1, modify the IKEv2 Client connection controls.
A. ¡¤Logi-LAT-Service ˆLogin-LAT-Node ˆLogin-LAT-Group ˆNAS-Identifier
B. ¡¤Tunne-Assignment-ID ˆTunnel-Preference ˆTunnel-Client-Auth-ID ˆNAS-Port-Id
C. ¡¤Tunne-Client-Endpt ˆTunnel-Server-Endpt ˆNAS-Port-Type ˆTunnel-Password
D. ¡¤Tunne-Medium-Type ˆTunnel-Pvt-Group-ID ˆTunnel-Type ˆTunnel-Tag
A.Configure a static IP address.
B.Configure the default gateway.
C.Configure the DNS server address.
D.Add the domain to the DNS suffix on the network interface.
A.Create a group policy object (GPO) that enabled security center and link the policy to the domain.
B.Create a group policy object (GPO) that enabled security center and link the policy to the domain controllers organizational unit (OU).
C.Create a group policy object (GPO) and set the require trusted path for credential entry option to enabled. Link the policy to the domain.
D.Create a group policy object (GPO) and set the require trusted path for credential entry option to Enabled. Link the policy to the domain controllers organizational unit (OU).
A.Create a stub zone for partner.com on each DNS server in contoso.com.
B.Configure the zone replication scope for partner.com to replicate to all DNS servers In the forest.
C.Configure an application directory partition in the contoso.com forest. Enlist all DNS servers in the contoso.com forest in the partition.
D.Configure an application directory partition in the partner forest. Enlist all DNS servers in the partner forest in the partition.
最新试题
Your company has a server named SRV1 that runs Windows Server 2008 R2. The default Print Services server role is installed on SRV1. The company wants to centralize printing on SRV1 for both UNIX and Windows users. You need to provide support to the UNIX users who print on SRV1.What are two possible ways to achieve this goal? ()
Your company has a server named DC1 that runs Windows Server 2008. DC1 has the DHCP server role installed. You find taht a desktop computer named SALES4 is unable to obtain an IP configuration from the DHCP server. You install the Microsoft Network Monitor 3.0 application on DC1. You enable P-mode in the Network Monitor application configuration. You plan to capture only the DHCP server-related traffic between DC1 and SALES4 The network interface configuration for the two computers is shown in the following table. (missing again wow). You need to build a filter int he Network Monitor application to capture the DHCP traffic between DC1 and SALES4 Which filter should you use()?
You have a server that runs Windows Server 2008. you create a new quota template. you apply quotas to 100 folders by using the quota template. you nede to modify the quota settings for al 100 folders. You must achive this goal by using the minimum amount of administrative effort. What should you do()?
Your company has a main office and a branch office. The branch office has three servers that run a Server Core installation of Windows Server 2008 R2. The servers are named Server1, Server2, and Server3. You want to configure the Event Logs subscription on Server1 to collect events from Server2 and Server3. You discover that you cannot create a subscription on Server1 from another computer. You need to configure a subscription on Server1.Which two actions should you perform?()
You have a server that runs Windows Server 2008. You need to configure the server as a VPN server. What should you installed on the server()?
You have 10 stand alone servers taht run Windows Server 2008. You install WSUS on a server named Server1. You need to configure all of the servers to receive updates from Server1 What should you do()?
Your company has a network that has 100 servers. You install a new server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. You discover that the Reliability Monitor has no data, and that the system stablitiy chare has never been updated. You nede to configure the server to collect the reliability monitor data. What should you do()?
Your company has a server named Printer1 that runs Windows Server 2008 R2. Printer1 has the Print and Document Services server role installed.You need to reduce the number of events registered in the system log on Printer1. What should you do?()
Your network consists of a single Active Directory domain. All servers run Windows Server 2008 R2.You have a server named Server1 that hosts shared documents. Users report extremely slow response times when they try to open the shared documents on Server1.You log on to Server1 and observe real-time data indicating that the processor is operating at 100 percent of capacity.You need to gather additional data to diagnose the cause of the problem.What should you do?()
Your company has users who connect remotely to the main office though a Windows Server 2008 VPN server. You need to ensure that users cannot access the VPN server remotely from 22:00 to 05:00. What should you do()?