网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Your network contains two servers named Server1 and Server2. Server1 and Server2 run the Server Core installation of Windows Server 2008 R2.You need to duplicate the Windows Firewall configurations from Server1 to Server2.What should you use?()

  • A、the Get-Item and the Set-Item cmdlets
  • B、the Get-Service and the Set-Service cmdlets
  • C、the Netsh tool
  • D、the Sconfig tool

参考答案

更多 “Your network contains two servers named Server1 and Server2. Server1 and Server2 run the Server Core installation of Windows Server 2008 R2.You need to duplicate the Windows Firewall configurations from Server1 to Server2.What should you use?()A、the Get-Item and the Set-Item cmdletsB、the Get-Service and the Set-Service cmdletsC、the Netsh toolD、the Sconfig tool” 相关考题
考题 Your network contains a server that runs Windows Server 2008 R2. You need to schedule backups of the server. The solution must ensure that multiple versions of the backup are available.Which two possible backup locations should you use?()A. external hard diskB. internal hard diskC. optical mediaD. remote shared folder

考题 Your network contains two servers named Server1 and Server2. Server1 runs Windows Server 2008 R2. Server2 runs Windows Server 2008. You need to ensure that you can initiate a full server backup of Server2 from Server1.What should you do?()A. Install Windows Server Backup on Server2.B. Upgrade Server2 to Windows Server 2008 R2.C. Add an exception to Windows Firewall on Server2.D. Add your user account to the Backup Operators group on Server2.

考题 You are the network administrator for Your network contains a single Active Directory domain named All network servers run Windows Server 2003.One of your application servers runs proprietary software. This server stops responding. After help desk technicians restart the server, it appears to run normally.Two weeks later, the same server stops responding again. You need to gather and store data to diagnose the problem.What should you do?()A. Open Event Viewer and review the security logs on the server.B. Create a System Monitor log that uses memory counters and gather data over time.C. Open Task Manager and gather memory usage statistics.D. Modify Boot.ini to use /maxmem:1536.

考题 Your company has two data centers.  Each data center contains a perimeter network.  Your network contains an Exchange Server 2010 organization.  You plan to deploy Exchange Server 2010 Edge Transport servers in the perimeter networks.  You need to recommend a solution for the Edge Transport servers that meets the following requirements:.Distribute inbound e-mail messages across all Edge Transport servers  .Ensure that users receive inbound e-mail messages if an Edge Transport server fails  .Ensure that users receive inbound e-mail messages if a single data center network becomes unavailable .Minimize costs  What should you recommend?()A、In each perimeter network, deploy one Edge Transport server. Implement failover clustering.B、In each perimeter network, deploy two Edge Transport servers. Implement failover clustering.C、In each perimeter network, deploy one Edge Transport server. Configure a mail exchange (MX) record for each server.D、In each perimeter network, deploy two Edge Transport servers. Configure a mail exchange (MX) record for each server.

考题 Your network contains an internal network and a perimeter network that are separated by a firewall. The perimeter network contains an Exchange Server 2010 Edge Transport server.  You plan to deploy an internal Exchange Server 2010 organization that meets the following requirements:.Support EdgeSync synchronization .Support encrypted delivery of outbound e-mail messages to the Edge Transport server .Minimize the attack surface of the internal network  Which TCP ports should you allow from the internal network to the perimeter network?()A、3389 and 25B、3389 and 636C、50636 and 25D、50636 and 135

考题 Your network contains a single Active Directory domain named contoso.com.The domain contains a DNS server named Server1 that hosts the contoso.com zone.The network is connected to the network of a partner company. The partner companys network contains a DNS server that hosts a zone named nwtraders.com.You need to ensure that computers in contoso.com can resolve the names of computers in nwtraders.com.The solution must not require any changes to the zone configuration of nwtraders.com.What should you configure on Server1?()A、a conditional forwarderB、a GlobalNames zoneC、a secondary zoneD、a zone delegation

考题 Your network contains an internal network and a perimeter network. The internal network contains a single Active Directory site.  The perimeter network contains two Exchange Server 2010 Edge Transport servers. You plan to deploy an Exchange Server 2010 organization on the internal network.  You need to plan the deployment of Hub Transport server roles to meet the following requirements:.If a single Hub Transport server fails, e-mail messages from the Internet must be delivered to the Mailboxservers. .If a single Hub Transport server fails, users must be able to send e-mail messages to other users thathave mailboxes on the same Mailbox server.  What should you include in the plan?()A、Deploy one Edge Transport server on the internal network, and then configure EdgeSync synchronization.B、Deploy one Hub Transport server on the internal network, and then configure EdgeSync synchronization.C、Deploy one Hub Transport server on the internal network and one Hub Transport server on the perimeter network.D、Deploy two Hub Transport servers on the internal network.

考题 Your network contains a domain-based Distributed File System (DFS) namespace named //contoso.com/DFS1. You have two servers named Server1 and Server2 that are configured as namespace servers for //contoso.com/DFS1. You need to verify that the DFS namespace replicates successfully between Server1 and Server2. Which tool should you use?()A、DfscmdB、DfsdiagC、DfsrdiagD、Dfsutil

考题 Your network contains two Hyper-V hosts that run Windows Server 2012 R2. The Hyper-V hosts contains several virtual machines that run Windows Server 2012 R2. You install the Network Load Balancing feature on the virtual machines. You need to configure the virtual machines to support Network Load Balancing (NLB). Which virtual machine settings should you configure?()A、Port mirroringB、DHCP guardC、Router guardD、MAC address

考题 单选题Your company has a main office and a branch office. The offices connect by using WAN links. The network consists of a single Active Directory domain. An Active Directory site exists for each office.   Servers in both offices run Windows Server 2008 R2 Enterprise.   You plan to deploy a failover cluster solution to service users in both offices.  You need to plan a failover cluster to meet the following requirements: èMaintain the availability of services if a single server fails èMinimize the number of servers required What should you include in your plan?()A Deploy a failover cluster that contains one node in each office.B Deploy a failover cluster that contains two nodes in each office.C In the main office, deploy a failover cluster that contains one node. In the branch office, deploy a  failover cluster that contains one node.D In the main office, deploy a failover cluster that contains two nodes. In the branch office, deploy a  failover cluster that contains two nodes.

考题 单选题Your network consists of a single Active Directory domain. The network contains 20 file servers that run Windows Server 2008 R2. Each file server contains two volumes. One volume contains the operating system. The other volume contains all data files.    You need to plan a recovery strategy that meets the following requirements: èAllows the operating system to be restored èAllows the data files to be restored èEnsures business continuity   èMinimizes the amount of time to restore the server What should you include in your plan?()A Windows Deployment Services (WDS)B Windows Automated Installation Kit (Windows AIK) and folder redirectionC the Multipath I/O feature and Volume Shadow CopiesD the Windows Server Backup feature and System Image Recovery

考题 单选题Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). The network contains two servers named Server1 and Server2. Server1 is configured as a DHCP server and has a scope that contains addresses 192.168.2.51 to 192.168.2.125.You have a reservation for a print device named Printer1. The reservation assigns the IP address of 192.168.2.100.You install DHCP on Server2 and create a scope that contains addresses 192.168.2.126 to 192.168.2.200.You need to ensure that Printer1’s IP address always remains the same.  What should you create on Server2?()A an exclusion range B a reservation C a superscope D a user class

考题 单选题Your network contains an internal network and a perimeter network that are separated by a firewall. The perimeter network contains an Exchange Server 2010 Edge Transport server.  You plan to deploy an internal Exchange Server 2010 organization that meets the following requirements:.Support EdgeSync synchronization .Support encrypted delivery of outbound e-mail messages to the Edge Transport server .Minimize the attack surface of the internal network  Which TCP ports should you allow from the internal network to the perimeter network?()A 3389 and 25B 3389 and 636C 50636 and 25D 50636 and 135

考题 单选题Your network has Network Access Protection (NAP) deployed. The network contains two servers named Server1 and Server2. Server1 is a Network Policy Server (NPS). Server2 has a third-party antivirus solution installed.Server1 is configured to use a custom system health validator provided by the antivirus vendor. The system health validator uses Server2 to identify the version of the current antivirus definition.You need to ensure that NAP clients are considered noncompliant if Server1 cannot connect to Server2.Which error code resolution setting should you configure?()A SHA not responding to NAP clientB SHA unable to contact required servicesC SHV not respondingD SHV unable to contact required services

考题 单选题Your network contains two Windows Server Update Services (WSUS) servers named Server1 and Server2. Server1 is a member of a domain named contoso.com. Server2 is a standalone server. Server2 is configured as an autonomous downstream server.You need to ensure that all updates approved on Server1 are automatically approved on Server2. Which options should you modify?()A Automatic ApprovalsB Products and ClassificationsC Synchronization ScheduleD Update Source and Proxy Server

考题 单选题Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). The network contains two servers named Server1 and Server2. Server1 is configured as a DHCP server and has a scope that contains addresses 192.168.2.51 to 192.168.2.125. You have a reservation for a print device named Printer1. The reservation assigns the IP address of 192.168.2.100. You install DHCP on Server2 and create a scope that contains addresses 192.168.2.126 to 192.168.2.200. You need to ensure that Printer1s IP address always remains the same. What should you create on Server2?()A an exclusion rangeB a reservationC a superscopeD a user class

考题 单选题Your company has two data centers.  Each data center contains a perimeter network.  Your network contains an Exchange Server 2010 organization.  You plan to deploy Exchange Server 2010 Edge Transport servers in the perimeter networks.  You need to recommend a solution for the Edge Transport servers that meets the following requirements:.Distribute inbound e-mail messages across all Edge Transport servers  .Ensure that users receive inbound e-mail messages if an Edge Transport server fails  .Ensure that users receive inbound e-mail messages if a single data center network becomes unavailable.Minimize costs  What should you recommend?()A In each perimeter network, deploy one Edge Transport server. Implement failover clustering.B In each perimeter network, deploy two Edge Transport servers. Implement failover clustering.C In each perimeter network, deploy one Edge Transport server. Configure a mail exchange (MX) record for each server.D In each perimeter network, deploy two Edge Transport servers. Configure a mail exchange (MX) record for each server.

考题 单选题Your network contains two servers named Server1 and Server2. Server1 runs Windows Server 2008 R2. Server2 runs Windows Server 2008. You need to ensure that you can initiate a full server backup of Server2 from Server1. What should you do?()A Install Windows Server Backup on Server2.B Upgrade Server2 to Windows Server 2008 R2.C Add an exception to Windows Firewall on Server2.D Add your user account to the Backup Operators group on Server2.

考题 单选题You need to design a configuration for the mailbox servers. What should you do?()A Create two Exchange Server 2003 computers. Place the mailboxes for main office users on one server, and place the mailboxes for remote users on the other serverB Create a Network Load Balancing cluster that contains two Exchange Server 2003 computers. Place half of the user mailboxes on one server, and place half of the user mailboxes on the other serverC Create a Microsoft Cluster Server cluster that contains two Exchange Server 2003 computers. Place all of the user mailboxes on one server and configure the other server as a failover nodeD Create a Microsoft Cluster Server cluster that contains two Exchange Server 2003 computers. Place half of the user mailboxes on one server, and place half of the user mailboxes on the other server

考题 单选题Your network contains a single Active Directory domain named contoso.com.The domain contains a DNS server named Server1 that hosts the contoso.com zone.The network is connected to the network of a partner company. The partner companys network contains a DNS server that hosts a zone named nwtraders.com.You need to ensure that computers in contoso.com can resolve the names of computers in nwtraders.com.The solution must not require any changes to the zone configuration of nwtraders.com.What should you configure on Server1?()A a conditional forwarderB a GlobalNames zoneC a secondary zoneD a zone delegation

考题 单选题Your network contains two servers named Server1 and Server2. Server1 and Server2 run the Server Core installation of Windows Server 2008 R2.You need to duplicate the Windows Firewall configurations from Server1 to Server2.What should you use?()A the Get-Item and the Set-Item cmdletsB the Get-Service and the Set-Service cmdletsC the Netsh toolD the Sconfig tool

考题 多选题Your network contains a server that runs Windows Server 2008 R2. You need to schedule backups of the server. The solution must ensure that multiple versions of the backup are available. Which two possible backup locations should you use?()Aexternal hard diskBinternal hard diskCoptical mediaDremote shared folder

考题 单选题Your network contains two Exchange Server 2010 Edge Transport servers.  The network also contains five Hub Transport servers in two Active Directory sites. All e-mail sent to the network is received by the Edge Transport servers. You plan to configure anti-spam filtering.  You need to ensure that the anti-spam filtering configurations are applied to both Edge Transport servers. The solution must use a minimum amount of administrative effort.  What should you do?()A Configure EdgeSync synchronization.B Implement Active Directory Federation Services (AD FS).C Join both Edge Transport servers to an Active Directory domain and then create a forest trust from the internal forest.D Manually configure settings on one Edge Transport server and then export the settings to the othe rEdge Transport server.