Your network contains two Active Directory sites named Site1 and Site2. Site1 contains a server named Server1. Server1 runs a custom application named App1.Users in Site2 report that they cannot access App1 on Server1. Users in Site1 can access App1.Server1 has a Windows Firewall with Advanced Security rule named Rule1.You discover that Rule1 blocks the connection to App1.You verify that Server1 has no connection security rules.You need to ensure that the Site2 users can connect to Server1.What should you modify in Rule1?()A、the authorized computers listB、the authorized users listC、the edge traversal settingsD、the scope
Your network contains two Active Directory sites named Site1 and Site2. Site1 contains a server named Server1. Server1 runs a custom application named App1.Users in Site2 report that they cannot access App1 on Server1. Users in Site1 can access App1.Server1 has a Windows Firewall with Advanced Security rule named Rule1.You discover that Rule1 blocks the connection to App1.You verify that Server1 has no connection security rules.You need to ensure that the Site2 users can connect to Server1.What should you modify in Rule1?()
- A、the authorized computers list
- B、the authorized users list
- C、the edge traversal settings
- D、the scope
相关考题:
Your network consists of a single Active Directory domain that has three Active Directory sites. Each site contains two Active Directory domain controllers. All domain controllers run Windows Server 2003 Service Pack 2 (SP2). All domain controllers have Windows Support Tools installed. You need to verify the replication status of Active Directory. Which tool should you use?()A、Active Directory Sites and ServicesB、Nltest.exeC、Network MonitorD、Replmon.exe
Your network consists of a single Active Directory domain that has three Active Directory sites. Each site contains two Active Directory domain controllers. All domain controllers run Windows Server 2003 Service Pack 2 (SP2). All domain controllers have Windows Support Tools installed. You need to verify the replication status of Active Directory. Which tool should you use?()A、Active Directory Sites and Services B、Nltest.exe C、Network Monitor D、Replmon.exe
Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system .Which two of these are characteristics of an IDS sensor?()A、 has a permissive interface that is used to monitor networksB、 is an active device in the traffic pathC、 passively listens to network trafficD、 has a promiscuous interface that is used to monitor the network
Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest. The forest contains a single domain. You plan to deploy 10 Edge Transport servers on the perimeter network. You need to recommend a solution for the Edge Transport server deployment. The solution must meet the following requirements: .Allow administrators to apply a single security policy to all Edge Transport servers .Reduce the administrative overhead that is required to manage servers .Minimize the attack surface of the internal network What should you recommend?()A、Implement Network Policy and Access Services (NPAS).B、Implement Active Directory Federation Services (AD FS).C、Create a new Active Directory domain in the internal forest, and then join all Edge Transport servers to the new domain.D、Create an Active Directory forest in the perimeter network, and then join all Edge Transport servers to the new domain.
Your network contains a single Active Directory domain. A domain controller named DC2 fails. You need to remove DC2 from Active Directory. Which two actions should you perform()A、At the command prompt, run dcdiag.exe /fix.B、At the command prompt, run netdom.exe remove dc2.C、From Active Directory Sites and Services, delete DC2.D、From Active Directory Users and Computers, delete DC2.
Your network contains an Active Directory domain. The domain contains two Active Directory sites named Site1 and Site2. Site1 contains two domain controllers named DC1 and DC2. Site2 contains two domain controller named DC3 and DC4. The functional level of the domain is Windows Server 2008 R2. The functional level of the forest is Windows Server 2003. Active Directory replication between Site1 and Site2 occurs from 20:00 to 01:00 every day. At 07:00, an administrator deletes a user account while he is logged on to DC1. You need to restore the deleted user account. You want to achieve this goal by using the minimum amount of administrative effort. What should you do()A、On DC1, run the Restore-ADObject cmdlet.B、On DC3, run the Restore-ADObject cmdlet.C、On DC1, stop Active Directory Domain Services, restore the System State, and then start Active Directory DomainD、On DC3, stop Active Directory Domain Services, perform an authoritative restore, and then start Active Directory Do
Your network contains an Active Directory domain that has two sites. You need to identify whether logon scripts are replicated to all domain controllers. Which folder should you verify()A、GroupPolicyB、NTDSC、SoftwareDistributionD、SYSVOL
Your network contains an Active Directory forest. The forest contains one domain and three sites. Each site contains two domain controllers. All domain controllers are DNS servers. You create a new Active Directory-integrated zone. You need to ensure that the new zone is replicated to the domain controllers in only one of the sites. What should you do first()A、Modify the NTDS Site Settings object for the site.B、Modify the replication settings of the default site link.C、Create an Active Directory connection object.D、Create an Active Directory application directory partition.
Your network contains an Active Directory forest. The forest schema contains a custom attribute for user objects. You need to modify the custom attribute value of 500 user accounts. Which tool should you use()A、CsvdeB、DsmodC、DsrmD、Ldifde
Your network contains an internal network and a perimeter network. The internal network contains a single Active Directory site. The perimeter network contains two Exchange Server 2010 Edge Transport servers. You plan to deploy an Exchange Server 2010 organization on the internal network. You need to plan the deployment of Hub Transport server roles to meet the following requirements:.If a single Hub Transport server fails, e-mail messages from the Internet must be delivered to the Mailboxservers. .If a single Hub Transport server fails, users must be able to send e-mail messages to other users thathave mailboxes on the same Mailbox server. What should you include in the plan?()A、Deploy one Edge Transport server on the internal network, and then configure EdgeSync synchronization.B、Deploy one Hub Transport server on the internal network, and then configure EdgeSync synchronization.C、Deploy one Hub Transport server on the internal network and one Hub Transport server on the perimeter network.D、Deploy two Hub Transport servers on the internal network.
Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest. The forest contains a single domain. You plan to deploy 10 Edge Transport servers on the perimeter network. You need to recommend a solution for the Edge Transport server deployment. The solution must meet the following requirements: .Allow administrators to apply a single security policy to all Edge Transport servers .Reduce the administrative overhead that is required to manage servers .Minimize the attack surface of the internal network What should you recommend?()A、Implement Network Policy and Access Services (NPAS).B、Implement Active Directory Federation Services (AD FS).C、Create a new Active Directory domain in the internal forest, and then join all EdgeTransport servers to the new domain.D、Create an Active Directory forest in the perimeter network, and then join all Edge Transport servers to the new domain.
多选题Your network contains an Active Directory domain. The network has DirectAccess deployed.You deploy the DirectAccess Connectivity Assistant (DCA) to all client computers.You need to ensure that users can view their DirectAccess status by using the DCA.Which two group policy settings should you configure?()ADynamic Tunnel Endpoints (DTEs)BCorporate Portal SiteCCorporate ResourcesDPortalName
单选题Your company has a main office and a branch office. The offices connect by using WAN links. The network consists of a single Active Directory domain. An Active Directory site exists for each office. Servers in both offices run Windows Server 2008 R2 Enterprise. You plan to deploy a failover cluster solution to service users in both offices. You need to plan a failover cluster to meet the following requirements: èMaintain the availability of services if a single server fails èMinimize the number of servers required What should you include in your plan?()ADeploy a failover cluster that contains one node in each office.BDeploy a failover cluster that contains two nodes in each office.CIn the main office, deploy a failover cluster that contains one node. In the branch office, deploy a failover cluster that contains one node.DIn the main office, deploy a failover cluster that contains two nodes. In the branch office, deploy a failover cluster that contains two nodes.
单选题Your network consists of a single Active Directory domain. The network contains 20 file servers that run Windows Server 2008 R2. Each file server contains two volumes. One volume contains the operating system. The other volume contains all data files. You need to plan a recovery strategy that meets the following requirements: èAllows the operating system to be restored èAllows the data files to be restored èEnsures business continuity èMinimizes the amount of time to restore the server What should you include in your plan?()AWindows Deployment Services (WDS)BWindows Automated Installation Kit (Windows AIK) and folder redirectionCthe Multipath I/O feature and Volume Shadow CopiesDthe Windows Server Backup feature and System Image Recovery
单选题Your network contains two Exchange Server 2010 Mailbox servers.You create a database availability group (DAG).You need to ensure that the Exchange servers can replicate mailbox databases.What should you do?()AModify the membership list of the DAGBAdd the Network Load Balancing feature on both serversCAdd Active Directory Federation Services (AD FS) on both serversDEnable Datacenter Activation Coordination (DAC) mode for the DAG
单选题Your network contains two Exchange Server 2010 Edge Transport servers. The network also contains five Hub Transport servers in two Active Directory sites. All e-mail sent to the network is received by the Edge Transport servers. You plan to configure anti-spam filtering. You need to ensure that the anti-spam filtering configurations are applied to both Edge Transport servers. The solution must use a minimum amount of administrative effort. What should you do?()AConfigure EdgeSync synchronization.BImplement Active Directory Federation Services (AD FS).CJoin both Edge Transport servers to an Active Directory domain and then create a forest trust from the internal forest.DManually configure settings on one Edge Transport server and then export the settings to the othe rEdge Transport server.