Your network contains the servers shown in the following table.
Server name S
erver role Server location Server share
Server1 File server Office1 Data1
Server2 File server Office2 Data2
Office1 and Office2 connect to each other by using a WAN link. Users in Office2 frequently access the same set of files stored in Data1. You need to reduce the amount of file transfer traffic across the WAN link.
What should you add to Server1?()
A. the Background Intelligent Transfer Service (BITS) feature
B. the BranchCache feature
C. the BranchCache for network files role service
D. the Distributed File System (DFS) role service
您可能感兴趣的试卷
你可能感兴趣的试题
Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 is located in a branch office. You view the BranchCache configuration of Server1 as shown in the exhibit. (Click the Exhibit button.) You need to ensure that client computers in the branch office retrieve cached files from Server1 only.
What should you do on Server1?()
A.Install the BranchCache for Network Files role service
B.Install the Services for Network File System role service
C.Run netsh.exe branchcache set service mode=DISTRIBUTED
D.Run netsh.exe branchcache set service mode=HOSTEDSERVER
A.Run the dnscmd /zoneupdatefromDs command on the branch office server.
B.Run the dnscmd /zoneupdatefromDs command on a domain controller in the main office.
C.Change the domain controllers at the branch offices from RODCs to standard domain controllers.
D.Decrease the minimum (default) TTL option to 15 minutes on the start of authority (SOA) record for the zone.
A. hashgen.exe d d:\branchcache
B. net.exe stop PeerDistSvc & net.exe start PeerDistSvc
C. netsh.exe branchcache flush
D. rd.exe d:\branchcache /s /q
A. Set the Elliptic Curve Cryptography to Allow.
B. Set the Elliptic Curve Cryptography to Require.
C. Disable the Allow delegating saved credentials setting.
D. Disable the Create caching-capable user key from smart card option.
A. Enable access-based enumeration (ABE) on the share.
B. Assign the Read NTFS permission to the Domain Users group.
C. From the Network and Sharing Center, enable public folder sharing.
D. From the File Sharing Wizard, configure the Read permission level for the Domain Users group.
A. Add User1 to Group2.
B. Remove User1 from Group1.
C. Assign the Change share permission to Group1.
D. Assign the Change share permission to Group3.
A. Disk Management
B. File Server Resource Manager
C. Share and Storage Management
D. Storage Explorer
A. the Netsh tool
B. the Network Policy Server console
C. the Registry Editor
D. the Routing and Remote Access console
A. TCP ports 80, 443, 389 and 1645
B. TCP ports 88, 135, 139 and 1813
C. UDP ports 53, 67, 68 and 69
D. UDP ports 1812, 1813, 1645 and 1646
A.Use a static IPv4 address in the range used at the branch office.
B.Use a alternate configuration that contains a static IP address in the range used at the main office.
C.Use the address that was assigned by DHCP as a static IP address.
D.Use an altermate configuration that contains a static IP address in the range used at the branch office.
最新试题
You have 10 stand alone servers taht run Windows Server 2008. You install WSUS on a server named Server1. You need to configure all of the servers to receive updates from Server1 What should you do()?
Your company has a main office and one branch office. The main office has a print server named Printer1. The branch office has a print server named Printer2. Printer1 manages 15 pritners and Printer2 manages seven pritners. You add Printer2 the Print Management console on Printer1. you need to send automatic notification when a printer is not availible. What should you do()?
Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP. what should you do()?
Your company has a server named FS1. FS1 hosts the domain-based DFS namespace named \\contoso. com\dfs all domain users store their data in subfolders within the DFS namespace. You need to prevent all users except administrators, from creating new folders or new files at the root of the \\contoso.com\dfs share. What should you do()?
Your company runs Windows Server Update Services (WSUS) on a server named Server1. Server1runs Windows Server 2008 R2. Server1 is located on the company intranet. You configure the WSUS Web site to use SSL.You need to configure a Group Policy object (GPO) to specify the intranet update locations.Which URLs should you use?()
You manage a server that runs Windows Server 2008. The windows backup and restore utility is installed ont he server. You nede to create a full backup of all system state data to the DVD drive (R: drive) on the server. Which command should you run on the server()?
Your company has a server named DC1 that runs Windows Server 2008 R2. Server1 has the DHCPServer server role installed.You find that a desktop computer named Computer1 is unable to obtain an IP configuration from the DHCP server.You install the Microsoft Network Monitor 3.0 application on Server1. You enable P-mode in the Network Monitor application configuration. You plan to capture only the DHCP server-related traffic between Server1 and Computer1.The network interface configuration for the two computers is shown in the following table.Server1 Computer1IP address 192.168.2.1 169.254.15.84MAC address 00-0A-5E-1C-7F-67 00-17-31-D5-5E-FFYou need to build a filter in the Network Monitor application to capture the DHCP traffic between Server1and Computer1.Which filter should you use?()
Your company has a network that has 100 servers. A server named Server1 is configured as a file server. Server1 is connected to a SAN and has 15 logical drives. You want to automatically run a data archiving script if the free space on any of the logical drives is below 30 percent. You need to automate the script execution.You create a new Data Collector Set. What should you do next?()
You have a file server that runs Windows Server 2008 R2.You configure quotas on the server.You need to view each user¯s quota usage on a per folder basisWhat should you do?()
You perform a security audit of a server named CRM1. You want to build a list of all DNS requests that are initiated by the server. You install the Microsoft Network Monitor 3.0 application on CRM1. You capture all local traffic on CRM1 for 24 hours. You save the capture file as data.cap. You find that the size of the file is more than 1 GB. You need to create a file named DNSdata.cap from the existing capture file that contains only DNS-related data.What should you do? ()