多项选择题

Your company has an organizational unit named Production. The Production organizational unit  has a child organizational unit named R&D. You create a GPO named Software Deployment and  link it to the Production organizational unit.    
You create a shadow group for the R&D organizational unit. You need to deploy an application to  users in the Production organizational unit. You also need to ensure that the application is not  deployed to users in the R&D organizational unit.    
What are two possible ways to achieve this goal()

A.Configure the Enforce setting on the software deployment GPO.
B.Configure the Block Inheritance setting on the R&D organizational unit.
C.Configure the Block Inheritance setting on the Production organizational unit.
D.Configure security filtering on the Software Deployment GPO to Deny Apply group policy for the R&D security group


您可能感兴趣的试卷

你可能感兴趣的试题

1.单项选择题

You are installing an application on a computer that runs Windows Server 2008 R2. During  installation, the application will need to add new attributes and classes to the Active Directory  database.    
You need to ensure that you can install the application.    
What should you do()

A.Change the functional level of the forest to Windows Server 2008 R2.
B.Log on by using an account that has Server Operator rights.
C.Log on by using an account that has Schema Administrator rights and the appropriate rights to install the applicatio
D.Log on by using an account that has the Enterprise Administrator rights and the appropriate rights to install the app

3.多项选择题

You need to relocate the existing user and computer objects in your company to different  organizational units.    
What are two possible ways to achieve this goal()

A.Run the Dsmod utility.
B.Run the Active Directory Migration Tool (ADMT).
C.Run the Active Directory Users and Computers utility.
D.Run the move-item command in the Microsoft Windows PowerShell utility.

5.单项选择题

Your company’s security policy requires complex passwords.
You have a comma delimited file named import.csv that contains user account information. You  need to create user accounts in the domain by using the import.csv file.  
You also need to ensure that the new user accounts are set to use default passwords and are  disabled.    
What should you do()

A.Modify the userAccountControl attribute to disabled. Run the csvde -i -k -f import.csv command. Run the DSMOD u
B.Modify the userAccountControl attribute to accounts disabled. Run the csvde -f import.csv command. Run the DSM
C.Modify the userAccountControl attribute to disabled. Run the wscript import.csv command. Run the DSADD utility to
D.Modify the userAccountControl attribute to disabled. Run the ldifde -i -f import.csv command. Run the DSADD utility

6.单项选择题

You have a Windows Server 2008 R2 that has the Active Directory Certificate Services server  role installed.  
You need to minimize the amount of time it takes for client computers to download a certificate  revocation list (CRL).    
What should you do()

A.Install and configure an Online Responder.
B.Install and configure an additional domain controller.
C.Import the Root CA certificate into the Trusted Root Certification Authorities store on all client workstations.
D.Import the Issuing CA certificate into the Trusted Root Certification Authorities store on all client workstations.

8.单项选择题

You have an Active Directory domain that runs Windows Server 2008 R2. You need to implement  a certification authority (CA) server that meets the following requirements:    
- Allows the certification authority to automatically issue certificates  - Integrates with Active Directory Domain Services    
What should you do()

A.Install and configure the Active Directory Certificate Services server role as a Standalone Root CA .
B.Install and configure the Active Directory Certificate Services server role as an Enterprise Root CA .
C.Purchase a certificate from a third-party certification authority. Install and configure the Active Directory Certificate S
D.Purchase a certificate from a third-party certification authority. Import the certificate into the computer store of the sc

9.单项选择题

Your network consists of a single Active Directory domain. All domain controllers run Windows  Server 2008 R2.    
You need to capture all replication errors from all domain controllers to a central location.    
What should you do()

A.Configure event log subscriptions.
B.Start the System Performance data collector set.
C.Start the Active Directory Diagnostics data collector set.
D.Install Network Monitor and create a new capture.

10.单项选择题

Your network consists of a single Active Directory domain.? All domain controllers run Windows  Server 2008 R2.    
You need to identify the Lightweight Directory Access Protocol (LDAP) clients that are using the  largest amount of available CPU resources on a domain controller.    
What should you do()

A.Review performance data in Resource Monitor.
B.Review the Hardware Events log in the Event Viewer.
C.Run the LAN Diagnostics Data Collector Set. Review the LAN Diagnostics report.
D.Run the Active Directory Diagnostics Data Collector Set. Review the Active Directory Diagnostics report.

最新试题

Your network contains an Active Directory domain. All domain controller run Windows Server  2003.    You replace all domain controllers with domain controllers that run Windows Server 2008 R2.    You raise the functional level of the domain to Windows Server 2008 R2.    You need to minimize the amount of SYSVOL replication traffic on the network.    What should you do()

题型:单项选择题

You have an enterprise subordinate certification authority (CA). You have a group named  Group1.    You need to allow members of Group1 to publish new certificate revocation lists. Members of  Group1 must not be allowed to revoke certificates.    What should you do()

题型:单项选择题

You create a new Active Directory domain. The functional level of the domain is Windows Server  2008 R2.  The domain contains five domain controllers. You need to monitor the replication of the group  policy template files. Which tool should you use()

题型:单项选择题

Your network contains an Active Directory domain named contoso.com. You have a management  computer named Computer1 that runs Windows 7.    You need to forward the logon events of all the domain controllers in contoso.com to Computer1.    All new domain controllers must be dynamically added to the subscription.  What should you do()

题型:单项选择题

Your network contains an Active Directory domain controller named DC1. DDC1 runs Windows  Server 2008 R2.  You need to defragment the Active Directory database on DC1. The solution must minimize  downtime on DC1.    What should you do first()

题型:单项选择题

You have an enterprise subordinate certification authority (CA). The CA is configured to use a  hardware security module.  You need to back up Active Directory Certificate Services on the CA.    Which command should you run()

题型:单项选择题

You remotely monitor several domain controllers.  You run winrm.exe quickconfig on each domain controller. You need to create a WMI script query  to retrieve information from the bios of each domain controller.    Which format should you use to write the query()

题型:单项选择题

You need to receive an e-mail message whenever a domain user account is locked out.    Which tool should you use()

题型:单项选择题

Your network contains an Active Directory forest. All domain controllers run Windows Server  2008 Standard. The functional level of the domain is Windows Server 2003. You have a  certification authority (CA).  The relevant servers in the domain are configured as shown in the following table:    Server name  Operating system  Server role  Server1  Windows Server 2003  Enterprise root CA  Server2  Windows Server 2008  Enterprise subordinate CA  Server3  Windows Server 2008 R2  Web Server  You need to ensure that you can install the Active Directory Certificate Services (AD CS)  Certificate Enrollment Web Service on the network.    What should you do()

题型:单项选择题

You have an enterprise subordinate certification authority (CA) configured for key archival. Three  key recovery agent certificates are issued.  The CA is configured to use two recovery agents.    You need to ensure that all of the recovery agent certificates can be used to recover all new  private keys.    What should you do()

题型:单项选择题