You have two computers named Computer1 and Computer2. The computers run Windows XP Professional and are joined to an Active Directory domain. Computer1 contains the recovery agent certificate for the domain. A domain user named User1 encrypts files on Computer2 in a folder named C:/User1.  The user leaves the company and the administrator deletes User1’s account. You need to decrypt the files encrypted by User1. What should you do?() A、Log on to Computer2 by using the domain administrator account. At the command prompt, run cipher.exe /u c:/user1/*.*. B、Create a new domain user account named User1. Log on to Computer2 as User1. Modify the properties of the encrypted files. C、Remove Computer2 from the domain. Log on to Computer2 by using the local administrator account. Modify the properties of the encrypted files. D、Back up the encrypted files on Computer2. Restore the files on Computer1. Log on to Computer1 by using the recovery agent account and modify the properties of the encrypted files.

You have two computers named Computer1 and Computer2. The computers run Windows XP Professional and are joined to an Active Directory domain. Computer1 contains the recovery agent certificate for the domain. A domain user named User1 encrypts files on Computer2 in a folder named C:/User1.  The user leaves the company and the administrator deletes User1’s account. You need to decrypt the files encrypted by User1. What should you do?() 

  • A、Log on to Computer2 by using the domain administrator account. At the command prompt, run cipher.exe /u c:/user1/*.*. 
  • B、Create a new domain user account named User1. Log on to Computer2 as User1. Modify the properties of the encrypted files. 
  • C、Remove Computer2 from the domain. Log on to Computer2 by using the local administrator account. Modify the properties of the encrypted files. 
  • D、Back up the encrypted files on Computer2. Restore the files on Computer1. Log on to Computer1 by using the recovery agent account and modify the properties of the encrypted files. 

相关考题:

Your network contains a domain-based Distributed File System (DFS) namespace named \\contoso.com\DFS1. You have two servers named Server1 and Server2 that are configured as namespace servers for \\contoso.com\DFS1. You need to verify that the DFS namespace replicates successfully between Server1 and Server2.Which tool should you use?()A. DfscmdB. DfsdiagC. DfsrdiagD. Dfsutil

You are the network consultant from passguide.com. You have been asked for which two features of optical networks allow data to be transmitted over extremely long distances? ()A、EncryptionB、Bandwidth limitsC、Minimal signal lossD、No EMI

You work as an administrator at ABC.com.The ABC.com network consists of a single domain named ABC.com.All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2 installed.The ABC.com network has a server named ABC_SR09 that hosts two virtual machines.How would you enable Network Load Balancing (NLB) on the virtual machines?()A、You should configure Router Guard on the two virtual machines.B、You should configure Port Mirroring on the two virtual machines.C、You should add the Network Load Balancing feature on the two virtual machines.D、You should configure Integration Services on ABC_SR09.E、You should configure NIC Teaming on the two virtual machines.F、You should enable spoofing of MAC Address on the two virtual machines.

You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows  Server 2012 R2 installed.ABC.com has a server, named ABC-SR07, which has four network adapters. ABC.com has two local area networks (LANs). Two of ABC-SR07’s network adapters are connected to the one LAN,while the other two are connected to the other LAN.You are required to configure one of the network adapter pairs into a network adapter team. Which of the following actions should you take?()A、You should consider accessing the Group Policy Management Console (GPMC) on ABC-SR07.B、You should consider accessing the TS Manager console on ABC-SR07.C、You should consider accessing the Server Manager console on ABC-SR07.D、You should consider accessing the Remote Desktop Gateway Manager console on ABC-SR07.

You have an Active Directory forest that contains one domain named contoso.com. The functional level of both the forest and the domain is Windows Server 2003. You have an Exchange Server 2003 organization. All servers have Exchange Server 2003 Service Pack 2 (SP2) installed. You plan to transition to Exchange Server 2010. You need to prepare the Active Directory environment for the deployment of the first Exchange Server 2010 server.  What should you run()?  A、Setup.com /PrepareADB、Setup.com /PrepareDomainC、Setup.com /PrepareLegacyExchangePermissionsD、Setup.com /PrepareSchema

You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of two offices that areconfigured as an Active Directory site named Site A and Site B. You are planning to configure an Exchange Server 2010 environment in both sites. A direct Internet connections resides from both sites with a direct link. The connection between these two sites is via a highspeed WAN link. You have received instructions from the CIO to install Exchange Server 2010 Mailboxserves in both sites. You thus need to ensure that the Hub Transport server is automatically load balancedat every site as well as ensuring that outbound e-mail messages is delivered in the event of a singleserver failure. You should also ensure that the least amound of servers is deployed. What should you do?()A、The best option is to install two Hub Transport servers and create and configure one Send connector.B、The best option is to install one Edge Transport server and create two Send connectors.C、The best option is to install two Edge Transport servers and create two Send connectors.D、The best option is to install one Hub Transport server and create and configure one Send connector.

Your network contains two Active Directory forests. One forest contains two domains named  contoso.com and na.contoso.com. The other forest contains a domain named nwtraders.com. A forest  trust is configured between the two forests.  You have a user named User1 in the na.contoso.com domain.  User1 reports that he fails to log on to a computer in the nwtraders.com domain by using the user name  NA/User1.  Other users from na.contoso.com report that they can log on to the computers in the nwtraders.com  domain.  You need to ensure that User1 can log on to the computer in the nwtraders.com domain.  What should you do()A、Enable selective authentication over the forest trust.B、Create an external one-way trust from na.contoso.com to nwtraders.com.C、Instruct User1 to log on to the computer by using his user principal name (UPN).D、Instruct User1 to log on to the computer by using the user name nwtraders/User1.

You work as a network Exchange administrator at Company.com.The Company.com network  currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.The Company.com network users have been configured by Company.com to have the @Company.com email address suffix.During the course of the business week you receive instruction from Company.com to configure a public folder named KingPublic for the Internet users to post content by sending e-mail to KingPublic@Company.com.  What should you do?()A、You should consider having a new mail contact created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.B、You should consider having a new mailbox created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.C、You should consider having mail enabled for KingPublic.D、You should consider having the author role assigned to Anonymous.

You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2 installed.The ABC.com network has a server named ABC_SR07 that hosts two virtual machines. You use Windows Server Backup to configure scheduled backups of ABC_SR07.  How would you ensure that all virtual machines will be saved before the backups begin?()A、You should configure the Router Guard settings.B、You should configure the Port Mirroring settings.C、You should configure the Integration Services settings.D、You should configure a system sate backup.E、You should configure the NIC Teaming settings.

You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com.All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2 installed.You have created and linked a new Group Policy object (GPO) to an organizational unit (OU), named ABCServ, which host the computer accounts for servers in the ABC.com domain.You have been tasked with adding a group to a local group on all servers in the ABC.com domain.This group should not, however, be removed from the local group.  Which of the following actions should you take?()A、You should consider adding a restricted group.B、You should consider adding a global group.C、You should consider adding a user group.D、You should consider adding a server group.

You work as an administrator at ENSUREPASS.com. The ENSUREPASS.com network consists of  a single domain named ENSUREPASS.com. All servers on the ENSUREPASS.com network have  Windows Server 2012 R2 installed.ENSUREPASS.com has a server, named ENSUREPASS-SR07, which has two physical disks installed. The C:// drive hosts the boot partition, while the D:// drive is not being used. Both disks are online. You have received instructions to create a virtual machine on ENSUREPASS-SR07. Subsequentto creating the virtual machine, you have to connect the D:// drive to the virtual machine.  Which of the following is TRUE with regards to connecting a physical disk to a virtual machine?()A、The physical disk should not be onlineB、The physical disk should be uninstalled and re-installedC、The physical disk should be configured as a striped diskD、The physical disk should be configured as a mirrored disk

Your network contains an Active Directory forest. The forest contains two domains named contoso.com and nwtraders.com.You have a DNS server named DNS1. DNS1 hosts Active Directory-integrated zones for contoso.com and nwtraders.com.You discover that client computers in contoso.com cannot use single-label names to access servers in nwtraders.com.You need to ensure that contoso.com computers can access nwtraders.com servers by using single-label names.What should you modify?()A、the DNS suffix search order on DNS1B、the DNS suffix search order on the client computersC、the root hints servers on DNS1D、the security settings of the nwtraders.com zone

Your network contains a domain-based Distributed File System (DFS) namespace named //contoso.com/DFS1. You have two servers named Server1 and Server2 that are configured as namespace servers for //contoso.com/DFS1. You need to verify that the DFS namespace replicates successfully between Server1 and Server2. Which tool should you use?()A、DfscmdB、DfsdiagC、DfsrdiagD、Dfsutil

You have an Exchange organization named nwtraders.com.All servers in the organization have Exchange Server 2010 Service Pack 1 (SPl) installed.Your company acquires another company named Contoso, Ltd. You plan to create new mailboxes for each user from Contoso. You need to ensure that each new mailbox can receive e-mail messages sent to contoso.com.Which two objects should you create?()A、a Receive connectorB、a Remote domainC、an organizational relationshipD、an accepted domainE、an e-mail address policy

You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. You have received instructions from the CIO to install Exchange Server 2010 that has the followingservers: * Two Edge Transport servers named TESTKING-SR24 and TESTKING-SR25 * Two Hub Transport servers namend TESTKING-SR26 and TESTKING-SR27 However, e-mail massages from the Internet should be delivered to internal recipients, in the case of a single Edge Transport failure. What should you do?()A、The best option is to set up two SRV resource records.B、The best option is to set up two mail exchange (MX) records.C、The best option is to set up two Remote Domains.D、The best option is to set up two EdgeSync Subscriptions.

You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. TestKing.com is configured to run an exchange 2010 environment.Due to company growth, TestKing.com has bought two other comapnies named Courseware Publishersand Stanford Finance. Youz have received instructions from the CIO to make sure that the users fromboth of these companies have their own respective e-mail address that correspond to their company. What should you do?()A、The best option is to create and configure two Receive connectors and two address lists.B、The best option is to create and configure two transport rules and two address remote entries.C、The best option is to create and configure two accepted domains and two e-mail address policies.D、The best option is to create and configure two remote domains and two accepted domains.

多选题You work as a database administrator for Certkiller .com. You want to administer your database servers,which are running on different host machines,using the Web-enabled grid control interface. You have configured the agent on the host machines. You have started the Oracle Database 10g Grid Control utility on your machine. Which two additional components would you configure to achieve this objective?()AApplication Server ControlBOracle Management ServiceCOracle Enterprise Manager RepositoryDOracle Enterprise Manager Database Control

多选题You work as an administrator at ABC.com.The ABC.com network consists of a single domain named ABC.com.All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2 installed.The ABC.com network has a server named ABC_SR09 that hosts two virtual machines.How would you enable Network Load Balancing (NLB) on the virtual machines?()AYou should configure Router Guard on the two virtual machines.BYou should configure Port Mirroring on the two virtual machines.CYou should add the Network Load Balancing feature on the two virtual machines.DYou should configure Integration Services on ABC_SR09.EYou should configure NIC Teaming on the two virtual machines.FYou should enable spoofing of MAC Address on the two virtual machines.

单选题Your network contains an Active Directory forest. The forest contains two domains named contoso.com and nwtraders.com.You have a DNS server named DNS1. DNS1 hosts Active Directory-integrated zones for contoso.com and nwtraders.com.You discover that client computers in contoso.com cannot use single-label names to access servers in nwtraders.com.You need to ensure that contoso.com computers can access nwtraders.com servers by using single-label names.What should you modify?()Athe DNS suffix search order on DNS1Bthe DNS suffix search order on the client computersCthe root hints servers on DNS1Dthe security settings of the nwtraders.com zone

多选题You have a server that runs Windows Server 2003 Service Pack 2 (SP2). You install the Windows Support Tools on the server.You need to list all of the name servers in a DNS zone named contoso.com. Which two possible commands should you run?()ADnslint /d contoso.comBNetdiag /d:Contoso.com /test:DNSCNet view /domain:contoso.comDNslookup –querytype=ns contoso.com

多选题You have a single Active Directory directory service forest named contoso.com. You create baseline  security settings for a group of computers, and you store the settings in a database. You deploy thebaseline security settings. You need to confirm that the security settings on one of the computers are  applied correctly.  What are two possible commands that you can run to achieve this goal?()AseceditBgpupdateCnetdomDscwcmd

单选题You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. TestKing.com is configured to run an exchange 2010 environment.Due to company growth, TestKing.com has bought two other comapnies named Courseware Publishersand Stanford Finance. Youz have received instructions from the CIO to make sure that the users fromboth of these companies have their own respective e-mail address that correspond to their company. What should you do?()AThe best option is to create and configure two Receive connectors and two address lists.BThe best option is to create and configure two transport rules and two address remote entries.CThe best option is to create and configure two accepted domains and two e-mail address policies.DThe best option is to create and configure two remote domains and two accepted domains.

单选题Your network contains two Active Directory forests named contoso.com and adatum.com. Active  Directory Rights Management Services (AD RMS) is deployed in contoso.com. An AD RMS  trusted user domain (TUD) exists between contoso.com and adatum.com.     From the AD RMS logs, you discover that some clients that have IP addresses in the  adatum.com forest are authenticating as users from contoso.com.     You need to prevent users from impersonating contoso.com users.     What should you do()AConfigure trusted e-mail domains.BEnable lockbox exclusion in AD RMS.CCreate a forest trust between adatum.com and contoso.com.DAdd a certificate from a third-party trusted certification authority (CA).

多选题You have two Active Directory directory service forests named contoso.com and fabrikam.com. All users log on to the contoso.com domain. All servers run Windows Server 2003 and are members of the fabrikam.com domain. You create a one-way forest trust in which fabrikam.com is trusting contoso.com. Forest-wide authentication is enabled. You need to provide only selected users with access to a server in the fabrikam.com domain. Which two actions should you perform?()AGrant the users the Allowed to Authenticate permission on the computer object representing the server.BGrant the users the Modify permission on the computer object representing the server.CChange the one-way forest trust to a two-way forest trust.DChange the properties of the forest trust from Forest-wide authentication to Selective authentication.

单选题You network contains two domains named contoso.com and nwtraders.com. A single DNS server hosts both DNS zones. The DNS server has an IP address of 10. 10. 0. 10.  You have 100 computers that run Windows XP Professional. The computers are members of the contoso.com domain. All computers have static IP addresses. The network does not contain a WINS server. You need to ensure that users can access servers in both domains by using single-label host names. What should you do on the client computers?()AAdd nwtraders.com to the DNS suffix list.BAdd nwtraders.com to the LMHOSTS file.CChange the WINS server address to 10. 10. 0. 10.  DRun ipconfig /setclassid local area connection nwtraders.com.

多选题You are the network consultant from passguide.com. You have been asked for which two features of optical networks allow data to be transmitted over extremely long distances? ()AEncryptionBBandwidth limitsCMinimal signal lossDNo EMI

单选题You have a DNS server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You have two Web servers named Server2 and Server3.  The Web servers host an internal Web site that will be accessed by the URL http://www.contoso.com. You need to ensure that requests for www.contoso.com are distributed between Server2 and Server3.  What should you do?()AOn each Web server, configure a host header value of www.contoso.com.BOn each Web server, configure a custom HTTP header value of www.contoso.com.COn Server1, create two host (A) records for www.contoso.com.DOn Server1, create a _roundrobin._tcp.contoso.com service locator (SRV) record for each server that has a port value of 80.

多选题You have an Exchange organization named nwtraders.com.All servers in the organization have Exchange Server 2010 Service Pack 1 (SPl) installed.Your company acquires another company named Contoso, Ltd. You plan to create new mailboxes for each user from Contoso. You need to ensure that each new mailbox can receive e-mail messages sent to contoso.com.Which two objects should you create?()Aa Receive connectorBa Remote domainCan organizational relationshipDan accepted domainEan e-mail address policy