单选题Certkiller .com has a network that is comprise of a single Active Directory Domain.  As an administrator at Certkiller .com, you install Active Directory Lightweight Directory Services (AD LDS) on a server that runs Windows Server 2008. To enable Secure Sockets Layer (SSL) based connections to the AD LDS server, you install certificates from a trusted Certification Authority (CA) on the AD LDS server and client computers.  Which tool should you use to test the certificate with AD LDS()ALdp.exeBActive Directory Domain servicesCntdsutil.exeDLds.exeEwsamain.exeFNone of the above

单选题
Certkiller .com has a network that is comprise of a single Active Directory Domain.  As an administrator at Certkiller .com, you install Active Directory Lightweight Directory Services (AD LDS) on a server that runs Windows Server 2008. To enable Secure Sockets Layer (SSL) based connections to the AD LDS server, you install certificates from a trusted Certification Authority (CA) on the AD LDS server and client computers.  Which tool should you use to test the certificate with AD LDS()
A

Ldp.exe

B

Active Directory Domain services

C

ntdsutil.exe

D

Lds.exe

E

wsamain.exe

F

None of the above


参考解析

解析: 暂无解析

相关考题:

Certkiller .com has a remote data center with servers connected to a local datacenter through a high-speed network. Which of the following methods is the most convenient to use to install and upgrade the servers in the remote center using locally managed install images?()A.NIMB.HAGEO/HACMPC.NFSD.ftp, rsh and rexec

Certkiller .com has a file server named Certkiller -SR07 that stores old inventory files. Certkiller .com has given you the task of creating an application to archive these old inventory files.The inventory files have to be compressed prior to being uploaded to Certkiller .com‘s Web server.You are currently writing a method that will receive a byte array and compress it into a new file.You need to ensure that a data corruption check takes place during the decompression process.What should you do?()A.B.C.D.

Certkiller .com has asked you to create a file management application to monitor the hosts file.Certkiller .com has instructed you to change the hosts file if it has been changed.You, therefore, need to display the size and whether the hosts file is set to read-only.What should you do?()A.B.C.D.

Certkiller .com has asked you to develop an application that displays the properties for all Certkiller.com‘s network drives.The information generated by this application will be utilized by Certkiller .com‘s network administrators to verify client setups.You need to ensure that these requirements are fully satisfied.What should you do?()A.B.C.D.

Certkiller .com has a server named Certkiller -SR05 that has numerous processors installed.You have been given the task of developing an application that displays certain clock speed statisticson all processors installed on Certkiller -SR05.You need to ensure that this requirement is fully satisfied.What should you do?()A.B.C.D.

You work as an application developer at Certkiller .com. Certkiller .com has asked you to develop an application that monitors and controls the activities of a Windows service.You need to use the appropriate class to meet Certkiller .com’s requirements. What should you do?()A、 Use the ServiceBase class.B、 Use the ServiceInstaller class.C、 Use the ServiceManager class.D、 Use the ServiceController class.

Company.com has I/O slot constraints on two nodes that are going to be configured in an  HACMP cluster. There is room for only one Network Interface Card in each node,in addition to the built-in Ethernet port on the system planer.  The best HACMP configuration for these servers is to implement:()  A、 A single adapter network using the Network Interface Card in each nodeB、 A single adapter network using persistent addresses on the Network Interface Card in each nodeC、 A dual adapter network using the internal Ethernet adapters as an non-service interface with IPAT via IP Replacement.D、 EtherChannel high availability for the network connections with HACMP cascading resource groups for data and application fallover

Certkiller .com has a main office and a branch office. Certkiller .com’s network consists of a single Active Directory forest. Some of the servers in the network run Windows Server 2008 and the rest run Windows server 2003.  You are the administrator at Certkiller .com. You have installed Active Directory Domain Services (AD DS) on a computer that runs Windows Server 2008. The branch office is located in a physically insecure place. It has not IT personnel onsite and there are no administrators over there. You need to setup a Read-Only Domain Controller (RODC) on the Server Core installation computer in the branch office. What should you do to setup RODC on the computer in branch office()A、Execute an attended installation of AD DSB、Execute an unattended installation of AD DSC、Execute RODC through AD DSD、Execute AD DS by using deploying the image of AD DSE、none of the above

You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed. ABC.com has a server, named ABC-SR13. ABC-SR13 hosts a shared folder, named ABCShare, which has been shared as ABCShare$. Which of the following is TRUE with regards to sharing the folder in this manner?()A、It allows all users to view ABCShare when browsing the network.B、It prevents users from viewing ABCShare when browsing the network.C、It only allows ABC-SR13’s users to view ABCShare.D、It removes the permissions configured for ABCShare.

Certkiller.com runs Window Server 2008 on all of its servers. It has a single Active Directory domain and it uses Enterprise Certificate Authority. The security policy at Certkiller .com makes it necessary to examine revoked certificate information.  You need to make sure that the revoked certificate information is available at all times. What should you do to achieve that()A、Add and configure a new GPO (Group Policy Object) that enables users to accept peer certificates and link the GPO to the domain.B、Configure and use a GPO to publish a list of trusted certificate authorities to the domainC、Configure and publish an OCSP (Online certificate status protocol) responder through ISAS (Internet Security and Acceleration Server) array.D、Use network load balancing and publish an OCSP responder.E、None of the above

Certkiller .com has organizational units in the Active Directory domain. There are 10 servers in the organizational unit called Security. As an administrator at Certkiller .com, you generate a Group Policy Object (GPO) and link it to the Security organizational unit. What should you do to monitor the network connections to the servers in Security organizational unit()A、Start the Audit Object Access optionB、Start the Audit System Events optionC、Start the Audit Logon Events optionD、Start the Audit process tracking optionE、All of the above

Certkiller.com has an active directory forest on a single domain.  Certkiller needs a distributed application that employs a custom application. The application is directory partition software named PARDAT. You need to implement this application for data replication.  Which two tools should you use to achieve this task()A、Dnscmd.B、Ntdsutil.C、IpconfigD、DnsutilE、All of the above

Certkiller .com has a network that consists of a single Active Directory domain. A technician has accidently deleted an Organizational unit (OU) on the domain controller. As an administrator of Certkiller .com, you are in process of restoring the OU. You need to execute a non-authoritative restore before an authoritative restore of the OU. Which backup should you use to perform non-authoritative restore of Active Directory Domain Services (AD DS) without disturbing other data stored on domain controller()A、Critical volume backupB、Backup of all the volumesC、Backup of the volume that hosts Operating systemD、Backup of AD DS foldersE、all of the above

You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently created a distribution group for the network users.During the course of the business week you receive instruction from Company.com to ensure that the newly added users are able to add their mailboxes to the distribution group.What should you do?()A、You should consider having the security settings of the distribution group modified.B、You should consider having the authentication settings of the ECP virtual directory modified.C、You should consider having the group scope of the distribution group modified.D、You should consider having the approval mode of the distribution group modified.

单选题You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain have Windows Server 2012 R2 installed. The ABC.com network uses the network ID 192.168.1.0/26 and has a single DNS server named ABC_SR07. ABC_SR07 has a Standard Primary DNS zone.Which of the following options is the correct reverse lookup zone for the ABC.com network?()A192.168.1-0.in-addr.arpaB192.168.1.26.in-addr.arpaC26.1.168.192.in-addr.arpaD1.168.192-26.in-addr.arpaE0.1.168.192.in-addr.arpa

单选题You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed. ABC.com has a server, named ABC-SR13. ABC-SR13 hosts a shared folder, named ABCShare, which has been shared as ABCShare$. Which of the following is TRUE with regards to sharing the folder in this manner?()AIt allows all users to view ABCShare when browsing the network.BIt prevents users from viewing ABCShare when browsing the network.CIt only allows ABC-SR13’s users to view ABCShare.DIt removes the permissions configured for ABCShare.

单选题Certkiller .com has a domain controller that runs Windows Server 2008. The Certkiller .com network boosts 40 Windows Vista client machines. As an administrator at Certkiller .com, you want to deploy Active Directory Certificate service (AD CS) to authorize the network users by issuing digital certificates.  What should you do to manage certificate settings on all machines in a domain from one main location()AConfigure Enterprise CA certificate settingsBConfigure Enterprise trust certificate settingsCConfigure Advance CA certificate settingsDConfigure Group Policy certificate settingsEAll of the above

单选题You work as a network administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.The network as a server named ABC_SR05 that provides DHCP services.You need to create the DHCP scopes to support a subnet that has 800 hosts.You want to minimize the number of unused IP addresses on each subnet. How would you configure DHCP to support these subnets?()AYou should assign the network 172.16.0.0/16.BYou should assign the network 172.16.0.0/17.CYou should assign the network 172.16.0.0/18.DYou should assign the network 172.16.0.0/19.EYou should assign the network 172.16.0.0/20.FYou should assign the network 172.16.0.0/22.

单选题You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows  Server 2012 R2 installed.ABC.com has a server, named ABC-SR07, which has four network adapters. ABC.com has two local area networks (LANs). Two of ABC-SR07’s network adapters are connected to the one LAN,while the other two are connected to the other LAN.You are required to configure one of the network adapter pairs into a network adapter team. Which of the following actions should you take?()AYou should consider accessing the Group Policy Management Console (GPMC) on ABC-SR07.BYou should consider accessing the TS Manager console on ABC-SR07.CYou should consider accessing the Server Manager console on ABC-SR07.DYou should consider accessing the Remote Desktop Gateway Manager console on ABC-SR07.

单选题Certkiller .com has a remote data center with servers connected to a local datacenter through a high-speed network. Which of the following methods is the most convenient to use to install and upgrade the servers in the remote center using locally managed install images?()ANIMBHAGEO/HACMPCNFSDftp, rsh and rexec

多选题Certkiller .com has a software evaluation lab. There is a server in the evaluation lab named as CKT. CKT runs Windows Server 2008 and Microsoft Virtual Server 2005 R2. CKT has 200 virtual servers running on an isolated virtual segment to evaluate software. To connect to the internet, it uses physical network interface card.  Certkiller .com requires every server in the company to access Internet.  Certkiller .com security policy dictates that the IP address space used by software evaluation lab must not be used by other networks. Similarly, it states the IP address space used by other networks should not be used by the evaluation lab network. As an administrator you find you that the applications tested in the software evaluation lab need to access normal network to connect to the vendors update servers on the internet. You need to configure all virtual servers on the CKT server to access the internet. You also need to comply with company’s security policy.  Which two actions should you perform to achieve this task()ATrigger the Virtual DHCP server for the external virtual network and run  ipconfig/renew command on each virtual serverBOn CKT’s physical network interface, activate the Internet Connection Sharing (ICS)CUse Certkiller .com intranet IP addresses on all virtual servers on CKT.DAdd and install a Microsoft Loopback Adapter network interface on CKT. Use a new network interface and create a new virtual network.ENone of the above

多选题Certkiller.com has an active directory forest on a single domain.  Certkiller needs a distributed application that employs a custom application. The application is directory partition software named PARDAT. You need to implement this application for data replication.  Which two tools should you use to achieve this task()ADnscmd.BNtdsutil.CIpconfigDDnsutilEAll of the above

多选题You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2 installed.ABC.com has a Hyper-V server, named ABC-SR13, which hosts multiple virtual machines. You have enabled the use of Single-root I/O virtualization.Which of the following is TRUE with regards to using Single-root I/O virtualization?()AIt maximizes network throughput, while minimizing network latency.BIt maximizes network throughput, as well as network latency.CIt avoids the virtual switch stack and allows the virtual machine direct access to the actual network switch.DIt prevents the virtual machine from accessing the network switch directly.

单选题You work as an application developer at Certkiller .com. Certkiller .com has asked you to develop an application that monitors and controls the activities of a Windows service.You need to use the appropriate class to meet Certkiller .com’s requirements. What should you do?()A Use the ServiceBase class.B Use the ServiceInstaller class.C Use the ServiceManager class.D Use the ServiceController class.

单选题Certkiller .com has a network that consists of a single Active Directory domain. A technician has accidently deleted an Organizational unit (OU) on the domain controller. As an administrator of Certkiller .com, you are in process of restoring the OU. You need to execute a non-authoritative restore before an authoritative restore of the OU. Which backup should you use to perform non-authoritative restore of Active Directory Domain Services (AD DS) without disturbing other data stored on domain controller()ACritical volume backupBBackup of all the volumesCBackup of the volume that hosts Operating systemDBackup of AD DS foldersEall of the above

单选题You work as a network Exchange administrator at Company.com.The Company.com network  currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.The Company.com network users have been configured by Company.com to have the @Company.com email address suffix.During the course of the business week you receive instruction from Company.com to configure a public folder named KingPublic for the Internet users to post content by sending e-mail to KingPublic@Company.com.  What should you do?()AYou should consider having a new mail contact created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.BYou should consider having a new mailbox created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.CYou should consider having mail enabled for KingPublic.DYou should consider having the author role assigned to Anonymous.

单选题Certkiller .com has a network that is comprise of a single Active Directory Domain.  As an administrator at Certkiller .com, you install Active Directory Lightweight Directory Services (AD LDS) on a server that runs Windows Server 2008. To enable Secure Sockets Layer (SSL) based connections to the AD LDS server, you install certificates from a trusted Certification Authority (CA) on the AD LDS server and client computers.  Which tool should you use to test the certificate with AD LDS()ALdp.exeBActive Directory Domain servicesCntdsutil.exeDLds.exeEwsamain.exeFNone of the above

单选题Certkiller .com has a network that consists of a single Active Directory domain.Windows Server 2008 is installed on all domain controllers in the network.  You are instructed to capture all replication errors from all domain controllers to a central location. What should you do to achieve this task()AInitiate the Active Directory Diagnostics data collector setBSet event log subscriptions and configure itCInitiate the System Performance data collector setDCreate a new capture in the Network Monitor