网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
The corporate network of Certkiller consists of a Windows Server 2008 single Active Directory domain. The domain has two servers named Certkiller 1 and Certkiller 2.  To ensure central monitoring of events you decided to collect all the events on one server, Certkiller 1. To collect events from Certkiller  2. and transfer them to Certkiller 1, you configured the required event subscriptions.  You selected the Normal option for the Event delivery optimization setting by using the HTTP protocol. However, you discovered that none of the subscriptions work.  Which of the following actions would you perform to configure the event collection and event forwarding on the two servers()
A

Through Run window execute the winrm quickconfig command on Certkiller 2.

B

Through Run window execute the wecutil qc command on Certkiller 2.

C

Add the Certkiller 1 account to the Administrators group on Certkiller 2.

D

Through Run window execute the winrm quickconfig command on Certkiller 1.

E

Add the Certkiller 2 account to the Administrators group on Certkiller 1.

F

Through Run window execute the wecutil qc command on Certkiller 1.


参考答案

参考解析
解析: 暂无解析
更多 “多选题The corporate network of Certkiller consists of a Windows Server 2008 single Active Directory domain. The domain has two servers named Certkiller 1 and Certkiller 2.  To ensure central monitoring of events you decided to collect all the events on one server, Certkiller 1. To collect events from Certkiller  2. and transfer them to Certkiller 1, you configured the required event subscriptions.  You selected the Normal option for the Event delivery optimization setting by using the HTTP protocol. However, you discovered that none of the subscriptions work.  Which of the following actions would you perform to configure the event collection and event forwarding on the two servers()AThrough Run window execute the winrm quickconfig command on Certkiller 2.BThrough Run window execute the wecutil qc command on Certkiller 2.CAdd the Certkiller 1 account to the Administrators group on Certkiller 2.DThrough Run window execute the winrm quickconfig command on Certkiller 1.EAdd the Certkiller 2 account to the Administrators group on Certkiller 1.FThrough Run window execute the wecutil qc command on Certkiller 1.” 相关考题
考题 Generally speaking, the U.S. economy consists of three sectors: the market sector, the corporate sector and the public sector.()

考题 You are the administrator of a Windows 2000 Active Directory network. The network consists of a single domain. The domain includes 20 Windows NT Workstation 4.0 client computers. All other client computers are Windows 2000 Professional computers.You create a Windows NT 4.0 default user policy on the Windows 2000 Server computer that is configured as the PDC emulator. This default user policy denies access to Network Neighborhood. You then install Terminal Services on one of the servers and Terminal Services Client on the 20 Windows NT Workstation client computers.You find that the users of the Terminal Server can still browse the network when they open My Network Places. You want to prevent all users from browsing the network.What should you do?A.Modify the Windows NT policy template file so that you can restrict access to both My Network Places and Network Neighborhood. Save the policy file on the Terminal Server.B.Copy the Windows NT policy file to the 20 Windows NT Workstation computers.C.Create a Windows 2000 Group Policy that denies user access to My Network Places.D.Edit the local registry on the Windows NT Workstation computers to deny access to Entire Network in Network Neighborhood.

考题 Certkiller .com has asked you to develop an application that displays the properties for all Certkiller.com‘s network drives.The information generated by this application will be utilized by Certkiller .com‘s network administrators to verify client setups.You need to ensure that these requirements are fully satisfied.What should you do?()A.B.C.D.

考题 Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2008 R2. All servers run Windows Server 2008 R2.   A corporate security policy requires complex passwords for user accounts that have administrator  privileges. You need to design a strategy that meets the following requirements: èEnsures that administrators use complex passwords   èMinimizes the number of servers required to support the solution What should you include in your design?()A、Implement Network Access Protection (NAP).B、Implement Active Directory Rights Management Services (AD RMS).C、Create a new Password Settings Object (PSO) for administrator accounts.D、Create a new child domain in the forest. Move all non-administrator accounts to the new domain.Configure a complex password policy in the root domain.

考题 You are an enterprise administrator for Cer-tech .com. The corporate network of the company consists of asingle Active Directory domain. All the servers on the network run Windows Server 2008. The network consists of a server called Server01 that has the Terminal Services role is installed on it. You have recentlydeployed a remote application called APP1 on the Terminal server. You need to ensure that the company’ssecurity policy that states that users should not be allowed to copy and paste information to a localcomputer during a Terminal Services session,requirements must be met while configuring Terminal Services. Which of the following options would you choose to accomplish this task?()A、In the RDP-Tcp Client setting properties for the server,disable the Drive option.B、In the RDP Settings for the published application,deselects the Clipboard option.C、Enable the Use temporary folders per session option.D、Change the Security Encryption Level to FIPS Compliant.

考题 Your network consists of an Active Directory domain and a DirectAccess infrastructure. You install Windows7 on a new portable computer and join the computer to the domain. You need to ensure that the computercan establish DirectAccess connections.  What should you do?()A、Install a computer certificate.B、Create a new network connection.C、Enable the Network Discovery firewall exception.D、Add the computer account to the Network Configuration Operators group.

考题 Certkiller .com has a main office and a branch office. Certkiller .com’s network consists of a single Active Directory forest. Some of the servers in the network run Windows Server 2008 and the rest run Windows server 2003.  You are the administrator at Certkiller .com. You have installed Active Directory Domain Services (AD DS) on a computer that runs Windows Server 2008. The branch office is located in a physically insecure place. It has not IT personnel onsite and there are no administrators over there. You need to setup a Read-Only Domain Controller (RODC) on the Server Core installation computer in the branch office. What should you do to setup RODC on the computer in branch office()A、Execute an attended installation of AD DSB、Execute an unattended installation of AD DSC、Execute RODC through AD DSD、Execute AD DS by using deploying the image of AD DSE、none of the above

考题 Your company's corporate network uses Network Access Protection (NAP).Users are able to connect to the corporate network remotely.You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do?()A、Apply an IPsec NAP policy.B、Configure a NAP policy for 802.1X wireless connections.C、Configure VPN connections to use MS-CHAP v2 authentication.D、Restrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP.

考题 You are the administrator of WXYZ.com Incorporation. Your company’s network consists of Windows 2000 Professional clients and Windows 2000 Servers. Users have started reporting that the network performance has degraded in recent times. Most of the Windows 2000 Professional clients on your network use the TCP/IP protocol to communicate with the Server. You want to increase network performance. Where do you change the binding order?()A、Windows 2000 Server  Network  Binding  Server  TCP/IP on the top.B、Windows 2000 Server  Network  Binding  Workstation  TCP/IP on the top.C、Windows 2000 Professional  Network  Binding  Server  TCP/IP on the top.D、Windows 2000 Professional  Network  Binding  Server  TCP/IP on the bottom.E、Windows 2000 Professional  Network  Binding  Workstation  TCP/IP on the top.F、Windows 2000 Professional  Network  Binding  Workstation  TCP/IP on thebottom.

考题 You are designing a strategy to ensure that DNS queries always take the most efficient route to get resolved.  Which action or actions should you perform?()A、 Configure conditional forwarding on the corporate DNS servers to point the development DNS servers.B、 Configure conditional forwarding on the development DNS servers to point the corporate DNS servers.C、 Configure conditional forwarding on the perimeter network DNS servers to point the corporate and development DNS servers.D、 Configure forwarding on the corporate and development DNS servers to point the perimeter network DNS servers.E、 Disable root hints on the perimeter network DNS Servers.

考题 The network at Company Ltd. consists of one Windows NT Server 4.0 domain and 35 Windows 2000Professional computers. The Company network consists of five interconnected TCP/IP subnets. All of thecomputers use TCP/IP as the only network protocol.You are adding 15 Windows 2000 Professional computers to the network. You want to enable theWindows 2000 Professional computers to resolve NetBIOS names to TCP/IP addresses.What should you do? ()A、Install a DHCP server. Configure each computer to use DHCP. B、Install a WINS server. Configure each computer to use WINS. C、Create a Lmhosts.sam file on each computer. Add an entry containing the TCP/IP address and  NetBIOS name for each computer on the network. D、Create a Hosts.sam file on each computer. Add an entry containing the TCP/IP address and NetBIOS name for each computer on the network. 

考题 The corporate network of Certkiller consists of a Windows Server 2008 single Active Directory domain. The domain has two servers named Certkiller 1 and Certkiller 2.  To ensure central monitoring of events you decided to collect all the events on one server, Certkiller 1. To collect events from Certkiller  2. and transfer them to Certkiller 1, you configured the required event subscriptions.  You selected the Normal option for the Event delivery optimization setting by using the HTTP protocol. However, you discovered that none of the subscriptions work.  Which of the following actions would you perform to configure the event collection and event forwarding on the two servers()A、Through Run window execute the winrm quickconfig command on Certkiller 2.B、Through Run window execute the wecutil qc command on Certkiller 2.C、Add the Certkiller 1 account to the Administrators group on Certkiller 2.D、Through Run window execute the winrm quickconfig command on Certkiller 1.E、Add the Certkiller 2 account to the Administrators group on Certkiller 1.F、Through Run window execute the wecutil qc command on Certkiller 1.

考题 You are an enterprise administrator for Cer-tech .com. The corporate network of the company consists ofan Active Directory domain. All the servers on the network run Windows Server 2008. The network runs aTerminal server named Server02 to enable remote users to run commonly required applications from theirterminal. Which of the following options would you choose to prevent new sessions on the Terminal Server without affecting current user sessions?()A、Run Tskill /server: Server02/A commandB、Run Taskkill /S Server02 /fi "MODULES eq TermServerv" commandC、Run Change user /execute disable commandD、Run Change logon /disable command

考题 Your network consists of a single Active Directory forest. You have 50 portable computers and 50 desktopcomputers. All computers have 32-bit hardware. You plan to deploy Windows 7 and 10 corporateapplications to the computers by using a custom image. You need to prepare for the deployment by usingthe minimum amount of administrative effort.  What should you do first?()A、On one computer, install Windows 7 and the corporate applications.B、On one portable computer and one desktop computer, install Windows 7 and the corporate applications.C、On a server, install and run the Microsoft Assessment and Planning (MAP) Toolkit.D、On a server, install the Windows Automated Installation Kit (AIK) and run Windows System ImageManager (Windows SIM).

考题 All servers on your companys network run Windows Server 2008 R2. All client computers run Windows 7,The company is planning to virtualize an application that runs only on Windows XP.  You need to recommend a virtualization solution that enables users to access the virtualized application while their computers are disconnected from the corporate network.  Which technology should you recommend?()A、Windows Virtual PCB、Remote Desktop Services (RDS)C、Microsoft Application Virtualization (App-V)D、Microsoft Virtual Desktop Infrastructure (VDI)

考题 Your network contains a Windows Server 2008 R2 server that functions as a file server. All users have laptop computers that run Windows 7.   The network is not connected to the Internet. Users save files to a shared folder on the server. You need to design a data provisioning solution that meets the following requirements:   èUsers who are not connected to the corporate network must be able to access the files and the folders in the corporate network.    èUnauthorized users must not have access to the cached files and folders. What should you do?()A、Implement a certification authority (CA). Configure IPsec domain isolation.B、Implement a certification authority (CA). Configure Encrypting File System (EFS) for the drive that hosts the files.C、Implement Microsoft SharePoint Foundation 2010. Enable Secure Socket Layer (SSL) encryption.D、Configure caching on the shared folder. Configure offline files to use encryption.

考题 Your network consists of a single Active Directory forest that contains a root domain and two child domains. All servers run Windows Server 2008 R2.  A corporate policy has the following requirements:   èAll local guest accounts must be renamed and disabled. èAll local administrator accounts must be renamed.   You need to recommend a solution that meets the requirements of the corporate policy. What should you recommend?()A、Implement a Group Policy object(GPO) for each domain.B、Implement a Group Policy object(GPO) for the root domain.C、Deploy Network Policy and Access Services(NPAS)on all domain controllers in each domain. D、Deploy Active Directory Rights Management Services(AD RMS)on the root domain controllers.

考题 Your companys corporate network uses Network Access Protection (NAP). Users are able to connect to the corporate network remotely. You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible.  What should you do()?  A、Apply an IPsec NAP policy.B、Configure a NAP Policy for 802.1x Wireless connectionsC、Configure VPN connections to use MS-CHAP v2 authenticationD、Restrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP

考题 You are an enterprise administrator for Cer-tech .com. The corporate network consists of a single ActiveDirectory domain. The company runs Windows Server 2008 on all the servers on the network. One of theservers, Server01 has the Windows SharePoint Services (WSS) server role installed on it. Which of thefollowing options would you choose to configure WSS server in such a way that it allow users to createdistribution lists from a SharePoint site?()A、Modify the outgoing mail character set.B、Configure the SharePoint site to accept messages from authenticated users only.C、Enable the SharePoint Directory Management Service on Server0 1.D、Use the default Rights Management server in Active Directory Domain Services to configure the SharePoint site.

考题 You are an administrator for a corporate network. At a branch office,you want to deploy Windows Vista to21 client computers and Windows Server 2008 to four servers. For which operating systems is the branchoffice eligible for KMS licensing?()A、Windows VistaB、Windows Server 2008C、Both Windows Vista and Windows Server 2008D、Neither Windows Vista nor Windows Server 2008

考题 单选题Certkiller .com has a domain controller that runs Windows Server 2008. The Certkiller .com network boosts 40 Windows Vista client machines. As an administrator at Certkiller .com, you want to deploy Active Directory Certificate service (AD CS) to authorize the network users by issuing digital certificates.  What should you do to manage certificate settings on all machines in a domain from one main location()A Configure Enterprise CA certificate settingsB Configure Enterprise trust certificate settingsC Configure Advance CA certificate settingsD Configure Group Policy certificate settingsE All of the above

考题 单选题You are an administrator for a corporate network. At a branch office,you want to deploy Windows Vista to21 client computers and Windows Server 2008 to four servers. For which operating systems is the branchoffice eligible for KMS licensing?()A Windows VistaB Windows Server 2008C Both Windows Vista and Windows Server 2008D Neither Windows Vista nor Windows Server 2008

考题 单选题All servers on your companys network run Windows Server 2008 R2. All client computers run Windows 7,The company is planning to virtualize an application that runs only on Windows XP.  You need to recommend a virtualization solution that enables users to access the virtualized application while their computers are disconnected from the corporate network.  Which technology should you recommend?()A Windows Virtual PCB Remote Desktop Services (RDS)C Microsoft Application Virtualization (App-V)D Microsoft Virtual Desktop Infrastructure (VDI)

考题 单选题You are the network administrator for ExamSheet. Your network consists of one Windows NT Server 4.0 domain and 35 Windows 2000 Professional computers. The network consists of five interconnected TCP/IP subnets. All of the computers use TCP/IP as the only network protocol. You are adding 15 Windows 2000 Professional computers to the network. You configure each of the new computers to use DHCP. The computers can communicate with each other but are unable to communicate outside their own subnet. You run the ipconfig command to examine the IP address on one of the new computers. The IP address is 169.254.101.72 You want to enable the Windows 2000 Professional computers to communicate outside their own subnet. What should you do?()A Install a DHCP server.B Install a WINS server. Configure each computer to use WINS.C Create an Lmhost file on each computer.D Create a Hosts file on each computer.

考题 多选题You must configure access to the corporate network for employees using a client access method. Users require IPsec tunneling to protected resources and an 802.1X supplicant. Users will access the network using Windows platforms.Which two client access methods would support these requirements?()AJunos PulseBJava AgentCOdyssey Access ClientDNative 802.1X supplicant

考题 单选题Certkiller .com has a network that consists of a single Active Directory domain.Windows Server 2008 is installed on all domain controllers in the network.  You are instructed to capture all replication errors from all domain controllers to a central location. What should you do to achieve this task()A Initiate the Active Directory Diagnostics data collector setB Set event log subscriptions and configure itC Initiate the System Performance data collector setD Create a new capture in the Network Monitor