网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Ezonexam.com's network contains two domain controllers and approximately 500 client computers. The domain controllers run Windows 2000 Server. The client computers run Windows 2000 Professional. The majority of users have mobile computers. Users in Ezonexam often travel with their mobile computer for extended periods of time and do not have remote access to Ezonexam.com's network.

You want to configure the domain controllers so that DNS only contains entries for computers that are active on the network. You also want to ensure that when users return you do not have to manually create or delete DNS entries.

How should you configure the DNS servers?

A.Configure both domain controllers with Active Directory integrated primary zones for the domain and enable secure dynamic updates for the zone.

B.Configure both domain controllers with Active Directory integrated primary zones for the domain and the secure cache against pollution option for the zone.

C.Configure both domain controllers with Active Directory integrated primary zones for the domain and enable scavenging and dynamic updates for the zone.

D.Configure both domain controllers with standard primary zones for the domain and enable scavenging for the zone.

E.Configure one server with a standard primary zone for the domain, and configure at least one server with an Active Directory integrated primary zone.


参考答案

更多 “ Ezonexam.com's network contains two domain controllers and approximately 500 client computers. The domain controllers run Windows 2000 Server. The client computers run Windows 2000 Professional. The majority of users have mobile computers. Users in Ezonexam often travel with their mobile computer for extended periods of time and do not have remote access to Ezonexam.com's network.You want to configure the domain controllers so that DNS only contains entries for computers that are active on the network. You also want to ensure that when users return you do not have to manually create or delete DNS entries.How should you configure the DNS servers?A.Configure both domain controllers with Active Directory integrated primary zones for the domain and enable secure dynamic updates for the zone.B.Configure both domain controllers with Active Directory integrated primary zones for the domain and the secure cache against pollution option for the zone.C.Configure both domain controllers with Active Directory integrated primary zones for the domain and enable scavenging and dynamic updates for the zone.D.Configure both domain controllers with standard primary zones for the domain and enable scavenging for the zone.E.Configure one server with a standard primary zone for the domain, and configure at least one server with an Active Directory integrated primary zone. ” 相关考题
考题 The network consists of a single domain named Ezonexam.com that includes 20 Windows NT workstation 4.0 client computers. All other client computers are Windows 2000 Professional computers. You install Terminal Services on one of the Windows Server computers and Terminal Services Client on the 20 Windows NT Workstation 4.0 client computers. You create a system policy on the server that is configured as the terminal server. This system policy denies access to Network Neighborhood. You find that the users of the terminal server can still browse the network when they open My Network Places from Windows 2000 Professional computer or when they open Network Neighborhood from Windows NT Workstation 4.0 computers.You want to prevent all users from browsing the network.What should you do? (Each correct answer presents a complete solution. Choose two.)A.Create a Windows Group Policy that denies user access to My Network Places.B.Copy the Windows NT policy file to the 20 Windows NT Workstation 4.0 computers.C.Create a Windows NT 4.0 default user policy on the Windows 2000 Server computer that is configured as the PDC emulator.D.Modify the Windows NT policy template file so that you can restrict access to both My Network Places and Network Neighborhood. Save the policy file on the terminal server.E.Configure the terminal server to use Application server mode. Select the Permissions compatible with Terminal Server 4.0 Users option.

考题 Your company has an Active Directory forest that contains client computers that run Windows Vista and Microsoft Windows XP. You need to ensure that users are able to install approved application updates on their computers. Which two actions should you perform()A、Set up Automatic Updates through Control Panel on the client computersB、Create a GPO and link it to the Domain Controllers organizational unit. Configure the GPO to automatically search for updates on the Microsoft Update site.C、Create a GPO and link it to the domain. Configure the GPO to direct the client computers to the Microsoft WSUS server for approved updates.D、Install the Microsoft WSUS application on a server in the environment. Configure the server to search for new updates on the Internet. Approve all required updates.

考题 You have a single Active Directory directory service domain. All client computers run either Windows Vista or Windows XP. You create and configure a Group Policy object (GPO) named Secure Client  Computer. You need to ensure that the Secure Client Computer GPO is automatically applied to current  and future Windows XP client computers.  What should you do?()A、 Create a WMI filter that limits the scope of the Secure Client Computer GPO to the Windows XP operating system. Link the WMI filter to the GPO. Link the GPO to the domain.B、 Create a global security group that contains all of the Windows XP client computers. Edit the permissions of the Secure Client Computer GPO to allow the global security group the Read and Apply Group Policy permissions. Link the Secure Client Computer GPO to the domain.C、 Use the Delegation of Control Wizard at the domain level, and delegate the Generate Resultant Set of policy (Planning) right to the Windows XP client computers. Link the Secure Client Computer GPO to the domain.D、 Use the Delegation of Control Wizard at the domain level, and delegate the Generate Resultant Set of policy (Logging) right to the Windows XP client computers. Link the Secure Client Computer GPO to the domain.

考题 Your network contains an Active Directory domain. All domain controllers run Windows Server 2008  R2. Client computers run either Windows XP Service Pack 3 (SP3) or Windows Vista.  You need to ensure that all client computers can apply Group Policy preferences.   What should you do()A、Upgrade all Windows XP client computers to Windows 7.B、Create a central store that contains the Group Policy ADMX files.C、Install the Group Policy client-side extensions (CSEs) on all client computers.D、Upgrade all Windows Vista client computers to Windows Vista Service Pack 2 (SP2).

考题 You are a network administrator for your company. All domain controllers run Windows Server 2003. The network contains 50 Windows 98 client computers, 300 Windows 2000 Professional computers, and 150 Windows XP Professional computers.   According to the network design specification, the Kerberos version 5 authentication protocol must be used for all client computers on the internal network.   You need to ensure that Kerberos version 5 authentication is used for all client computers on the internal network.   What should you do?  ()A、 On each domain controller, disable Server Message Block (SMB) signing and encryption of the secure channel traffic.B、 Replace all Windows 98 computers with new Windows XP Professional computers.C、 Install the Active Directory Client Extensions software on the Windows 98 computers.D、 Upgrade all Windows 98 computers to Windows NT Workstation 4.0.

考题 Your network contains an Active Directory domain. All domain controllers run Windows Server 2008  R2. Client computers run either Windows 7 or Windows Vista Service Pack 2 (SP2).  You need to audit user access to the administrative shares on the client computers.   What should you do()A、Deploy a logon script that runs Icacls.exe.B、Deploy a logon script that runs Auditpol.exe.C、From the Default Domain Policy, modify the Advanced Audit Policy Configuration.D、From the Default Domain Controllers Policy, modify the Advanced Audit Policy Configuration.

考题 You are the desktop administrator for one of your company's branch offices. The network in the branch office consists of a single network segment, which contains a domain controller, a DHCP server, 10 Windows 2000 Server computers, and 50 Windows 2000 Professional computers. All servers and client computers are members of the company's Active Directory domain. You purchase 50 new client computers for the branch office. Each new client computer contains a built-in PXE-compliant network adapter. You install and configure RIS on one of the Windows 2000 Server computers that is on the network in the branch office. You create a Windows XP Professional RIS image on the Windows 2000 Server computer. You connect the new client computers to the network in the office, and you turn on each computer. Each computer displays a message stating that it cannot contact a PXE boot server. You verify that the RIS server is connected to the network. You need to ensure that the new client computers can connect to the RIS server and can begin installing Windows XP Professional. What should you do?()A、Ask a domain administrator to authorize the RIS server. B、Grant the Everyone group Allow - Read NTFS permission on the RIS image.C、Install RIS on the domain controller. Copy the RIS image to the domain controller.D、Add a reservation for the RIS server to the DHCP server. 

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run either Windows XP Professional or Windows 2000 Professional. All client computer accounts are located in an organizational unit (OU) named Workstation. A written company policy states that the Windows 2000 Professional computers must not use offline folders. You create a Group Policy object (GPO) to enforce this requirement. The settings in the GPO exist for both Windows 2000 Professional computers and Windows XP Professional computers. You need to configure the GPO to apply only to Windows 2000 Professional computers.  What are two possible ways to achieve this goal?()A、 Create a WMI filter that will apply the GPO to computers that are running Windows 2000 Professional. B、 Create a WMI filter that will apply the GPO to computers that are not running Windows XP Professional.C、 Create two OUs under the Workstation OU. Place the computer accounts for the Windows XP Professional computers in one OU, and place the computer accounts for the Windows 2000 Professional computers in the other OU. Link the GPO to the Workstation OU.D、 Create a group that includes the Windows XP Professional computers. Assign the group the Deny - Generate Resultant Set of Policy(Logging) permission.E、 Create a group that includes the Windows 2000 Professional computers. Assign the group the Deny - Apply Group Policy permission.

考题 You are the network administrator for your company. The network consists of a single Active Directorydomain. All domain controllers run Windows Server 2003. All client computers run Windows XP Professional with default settings. Some users have portable computers, and the rest have desktop computers.You need to ensure that all users are authenticated by a domain controller when they log on.How should you modify the local security policy? ()A、Require authentication by a domain controller to unlock the client computer.B、Cache zero interactive logons.C、Cache 50 interactive logons.D、Grant the Log on locally user right to the Users group.

考题 You are the network administrator for your company, which employs 1,500 users. The network consists of a single Active Directory domain. All network servers run Windows Server 2003. Most client computers run Windows XP Professional, and the rest run Windows NT 4.0 Workstation.Two terminal servers are available to network users. You install a new application on both terminal servers.Everyone who uses the new application to create data must save the data directly in a folder on the local hard disk.You need to ensure that client disk drives are always available when employees connect to the terminal servers.Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two.)A、Create a client connection object with default settings and deploy the object to each terminal server.B、Edit the RDP-Tcp properties by selecting the Connect client drives at logon option.C、Install NetMeeting on all client computers. Configure Remote Desktop Sharing.D、Install the default Windows 2000 Terminal Server Client software on the Windows NT 4.0 workstations.E、Install Remote Desktop Connection on the Windows NT 4.0 workstations.

考题 You are the administrator of Company’s network.You install 50 new Windows 2000 Professional computers in the marketing department. Two weeks later,users report that five of the computers have stopped responding. You troubleshoot the five computers.You find that some users have installed unsigned device drivers that are not supported by Windows 2000Professional.You want to determine which drivers were installed by users.What should you do?()A、Run the chkdsk /f command on all drives on the computers.B、Configure Windows 2000 Professional to enable driver signing verification.C、Run the File Signature Verification tool on the computers.D、Run the System File Checker utility on the computers.

考题 Your network contains an Active Directory domain named contoso.com. All domain controllers  and member servers run Windows Server 2008. All client computer run Windows 7.  From a client computer, you create an audit policy by using the Advanced Audit Policy  Configuration settings in the Default Domain Policy Group Policy object (GPO).   You discover that the audit policy is not applied to the member servers.    The audit policy is  applied to the client computers.   You need to ensure that the audit policy is applied to all member servers and all client computers.     What should you do()A、Add a WMI filter to the Default Domain Policy GPOB、Modify the security settings of the Default Domain Policy GPOC、Configure a startup script that runs auditpol.exe on the member servers.D、Configure a startup script that runs auditpol.exe on the domain controllers.

考题 Your company has an Active Directory forest that contains client computers that run Windows Vista  and Windows XP.   You need to ensure that users are able to install approved application updates on their computers.  Which two actions should you perform()A、Set up Automatic Updates through Control Panel on the client computers.B、Create a GPO and link it to the Domain Controllers organizational unit. Configure the GPO to  automatically search for updates on the Microsoft Update site.C、Create a GPO and link it to the domain. Configure the GPO to direct the client computers to the  Windows Server Update Services (WSUS) server for approved updates.D、Install the Windows Server Update Services (WSUS). Configure the server to search for new updates  on the Internet. Approve all required updates.

考题 Your company’s network has client computers that run Windows 7.    When a user attempts to log on to the domain from a computer named Client1,she receives the following message:   The system cannot log you on to this domain because the system’s computer account in its primary domain is missing or the password on that account is incorrect.  You need to ensure that the user can log on to the domain from Client1.   What should you do?()A、Disjoin and rejoin Client1 to the domain.B、Add the computer account for Client1 to the Domain Computers Active Directory group.C、Reset the account password for Client1 through Active Directory Users and Computers.D、Reset the account password for the user through Active Directory Users and Computers.

考题 Your network consists of an Active Directory domain. The domain controllers run Windows Server 2008 R2. Client computers run Windows 7.   You need to implement Encrypting File System (EFS) for all client computers. You want to achieve this goal while meeting the following requirements:   èYou must minimize the amount of data that is transferred across the network when a user logs on to or off from a client computer.   èUsers must be able to access their EFS certificates on any client computers. èIf a client computer s disk fails, EFS certificates must be accessible    What should you do?()A、Enable credential roaming.B、Enable roaming user profiles.C、Enable a Data Recovery Agent.D、Issue smart cards to all users.

考题 Your company has an Active Directory forest that contains client computers that run Windows  Vista and Windows XP.     You need to ensure that users are able to install approved application updates on their  computers.     Which two actions should you perform()A、Set up Automatic Updates through Control Panel on the client computers.B、Create a GPO and link it to the Domain Controllers organizational unit. Configure the GPO to automatically searchC、Create a GPO and link it to the domain. Configure the GPO to direct the client computers to the Windows Server UpD、Install the Windows Server Update Services (WSUS). Configure the server to search for new updates on the Intern

考题 Your network contains a single Active Directory domain. All domain controllers run Windows Server   2008 R2. There are 1,000 client computers that run Windows 7 and that are connected to managedswitches.   You need to recommend a strategy for network access that meets the following requirements:   èUsers are unable to bypass network access restrictions.   èOnly client computers that have up-to-date service packs installed can access the network.   èOnly client computers that have up-to-date anti-malware software installed can access the network.   What should you recommend?()A、Implement Network Access Protection (NAP) that uses DHCP enforcement.B、Implement Network Access Protection (NAP) that uses 802.1x enforcement.C、Implement a Network Policy Server (NPS), and enable IPsec on the domain controllers.D、Implement a Network Policy Server (NPS), and enable Remote Authentication Dial-In User Service  (RADIUS) authentication on the managed switches.

考题 Your network consists of a single Active Directory domain. Your network contains 10 servers and 500 client computers. All domain controllers run Windows Server 2008 R2. A Windows Server 2008 R2 server  has Remote Desktop Services installed. All client computers run Windows XP Service Pack 3.  Youplan to deploy a new line-of-business application. The application requires desktop themes to be  enabled.   You need to recommend a deployment strategy that meets the following requirements: èOnly authorized users must be allowed to access the application.   èAuthorized users must be able to access the application from any client computer. èYour strategy must minimize changes to the client computers.  èYour strategy must minimize software costs. What should you recommend?()A、Migrate all client computers to Windows 7. Deploy the application to all client computers by using a Group Policy object (GPO).B、Migrate all client computers to Windows 7. Deploy the application to the authorized users by using a Group Policy object (GPO).C、Deploy the Remote Desktop Connection (RDC) 7.0 software to the client computers. Install the  application on the Remote Desktop Services server. Implement Remote Desktop Connection Broker (RD Connection Broker).D、Deploy the Remote Desktop Connection (RDC) 7.0 software to the client computers. Enable the  Desktop Experience feature on the Remote Desktop Services server. Install the application on the  Remote Desktop Services server.

考题 You are the network administrator for The network consists of a sing Active Directory domain named All domain controllers run Windows Server 2003. All client computers run Windows XP Professional with default settings. Some users have portable computers, and the rest have desktop computers. You need to ensure that all users are authenticated by a domain controller whenthey log on. How should you modify the local security policy?()A、Require authentication by a domain controller to unlock the client computer.B、Cache zero interactive logons.C、Cache 50 interactive logons.D、Grant the Log on locally user right to the Users group.

考题 You are responsible for migrating client computers from Windows 98 and Windows NT Workstation 4.0 to Windows 2000 Professional. You have installed Windows 2000 Professional and reinstalled the necessary application on 10 computers. You have returned these computers to their users. The users of these computers report that their word processing application will not start. What should you do?()A、Set the permission on the application to Execute.B、Add the application to the Run key in the registry.C、Apply the Securews.inf security template on the users’ computers.D、Apply the compatws.inf security template on the users’ computers.

考题 You are the network administrator for . The network consists of a single Active Directory domain All network servers run Windows Server 2003, and all client computers run Windows 2000 Professional. You need to standardize the desktop environment for all client computers. Your solution must prevent domain users from permanently modifying their regional settings or the desktop background. Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two)A、Specify the profile's network path in the user properties in Active Directory Users and Computers.B、Specify the profile's local path in the user properties in Computer Management,C、Specify the profile's network path in the user properties in Computer Management.D、In the network share where profiles reside, rename Ntuser.dat to Ntuser.man.E、In the local profile directory, rename Ntuser.dat to Ntuser.man.F、In the network share where profiles reside, rename the Ntuser.ini to Ntuser.man.

考题 You are a network administrator for your company. All domain controllers run Windows Server 2003. The network contains 50 Windows 98 client computers, 300 Windows 2000 Professional computers, and 150 Windows XP Professional computers.   According to the network design specification, the Kerberos version 5 authentication protocol must be used for all client computers on the internal network.   You need to ensure that Kerberos version 5 authentication is used for all client computers on the internal network.  What should you do? ()A、 On each domain controller, disable Server Message Block (SMB) signing and encryption of the secure channel traffic.  B、 Replace all Windows 98 computers with new Windows XP Professional computers.  C、 Install the Active Directory Client Extensions software on the Windows 98 computers. D、 Upgrade all Windows 98 computers to Windows NT Workstation 4.0.

考题 单选题You are the network administrator for The network consists of a sing Active Directory domain named All domain controllers run Windows Server 2003. All client computers run Windows XP Professional with default settings. Some users have portable computers, and the rest have desktop computers. You need to ensure that all users are authenticated by a domain controller whenthey log on. How should you modify the local security policy?()A Require authentication by a domain controller to unlock the client computer.B Cache zero interactive logons.C Cache 50 interactive logons.D Grant the Log on locally user right to the Users group.