Your company uses Active Directory-integrated DNS. Users require access to the Internet. You run a network capture. You notice the DNS server is sending DNS name resolution queries to a server named f.root-servers.net. You need to prevent the DNS server from sending queries to f.root-servers.net. The server must be able to resolve names for Internet hosts. Which two actions should you perform?()A、Enable forwarding to your ISP¯s DNS serversB、Disable the root hints on the DNS server.C、Disable the netmask ordering option on the DNS server.D、Configure Reverse Lookup Zones for the IP subnets on the network.

Your company uses Active Directory-integrated DNS. Users require access to the Internet. You run a network capture. You notice the DNS server is sending DNS name resolution queries to a server named f.root-servers.net. You need to prevent the DNS server from sending queries to f.root-servers.net. The server must be able to resolve names for Internet hosts. Which two actions should you perform?()

  • A、Enable forwarding to your ISP¯s DNS servers
  • B、Disable the root hints on the DNS server.
  • C、Disable the netmask ordering option on the DNS server.
  • D、Configure Reverse Lookup Zones for the IP subnets on the network.

相关考题:

Our company promises to provide good ________ .A.techniques and equipmentB.chances to develop your skillsC.post-sale servicesD.full and direct consultation

Since RAM is only active when the computer is on, your computer uses disk to store information even when the computer is off. Which of the following is true?(74).A.When your computer is on, only RAM is used to store information.B.When your computer is on, only disk drives are used to store information.C.When your computer is off, only RAM is used to store information.D.When your computer is off, only disk drives are used to store information.

Your Web site uses custom Themes. Your Web site must support additional Themes based on the user‘s company name. The company name is set when a user logs on to the Web site. The company‘s Theme name is stored in a variable named ThemeName. You need to use this variable to dynamically set the Web site‘s Theme.What should you do?()A.B.C.D.

● Since RAM is only active when the computer is on, your computer uses disto store information even when the computer is off. Which of the following itrue? (74)(74)A.When your computer is on, only RAM is used to store informationB.When your computer is on, only disk drives are used to storinformation.C.When your computer is off, only RAM is used to store informationD.When your computer is off, only disk drives are used to storinformation.

Your company has an Active Directory domain. All computers are members of the domain. Your networkcontains an internal Web site that uses Integrated Windows Authentication. From a computer that runs Windows 7, you attempt to connect to the Web site and are prompted for authentication. You verify that youruser account has permission to access the Web site. You need to ensure that you are automaticallyauthenticated when you connect to the Web site.  What should you do?()A、Create a complex password for your user account.B、Open Credential Manager and modify your credentials.C、Add the URL of the Web site to the Trusted sites zone.D、Add the URL of the Web site to the Local intranet zone.

Your company has a branch office that is configured as a separate Active Directory site and has  an Active Directory domain controller.     The Active Directory site requires a local Global Catalog server to support a new application.     You need to configure the domain controller as a Global Catalog server.     Which tool should you use()A、The Dcpromo.exe utilityB、The Server Manager consoleC、The Computer Management consoleD、The Active Directory Sites and Services consoleE、The Active Directory Domains and Trusts console

Your network consists of a single Active Directory domain. All domain controllers run Windows Server2008 R2. Your company and an external partner plan to collaborate on a project. The external partner has an Active Directory domain that contains Windows Server 2008 R2 domain controllers. You need to design a collaboration solution that meets the following requirements:   èAllows users to prevent sensitive documents from being forwarded to untrusted recipients or from being  printed.   èAllows users in the external partner organization to access the protected content to which they have been granted rights.   èSends all inter-organizational traffic over port 443.   èMinimizes the administrative effort required to manage the external users. What should you include in your design?()A、Establish a federated trust between your company and the external partner. Deploy a Windows Server 2008 R2 server that has Microsoft SharePoint Foundation 2010 installed.B、Establish a federated trust between your company and the external partner. Deploy a Windows Server 2008 R2 server that runs Microsoft SharePoint 2010 and that has the Active Directory Rights  Management Services (AD?RMS) role installed.C、Establish an external forest trust between your company and the external partner. Deploy a Windows Server 2008 R2 server that has the Active Directory Certificate Services server role installed. Implement Encrypting File System (EFS).D、Establish an external forest trust between your company and the external partner. Deploy a Windows Server 2008 R2 server that has the Active Directory Rights Management Service (AD?RMS)role installed  and Microsoft SharePoint Foundation 2010 installed.

As an experienced technician, you are responsible for Technical Support in your company. One of the trainees is asking you how to create separate networks on one Storage Area Network so as to provide enhanced availability, security, etc. Which of the following solution will enable that?()A、Cisco Direct Attached StorageB、Cisco Virtual Attached Storage NetworkC、Cisco Virtual Storage Area NetworkD、Cisco Direct Storage Area Network

You are a database administrator for your company. The company uses a vendor company’s application that is based on a proprietary database. You query data from the application database and import the data into a SQL Server 2005 database. The application vendor provides you with a new OLE DB driver to be used when querying the application database. Company policy prohibits connections between the SQL Server database and the application database, except when querying this data. You need to provide a way to query data from the application database. What should you?()A、Configure a Linked Server connection to the application database.B、Write a query that uses an OPENDATASOURCE command.C、Write a query that uses an OPENQUERY command.D、Configure a Remote Server connection to the application database.

Your company has an Active Directory domain. AlI servers run Windows Server 2008. Your company uses an Enterprise Root certificate authority (CA). You need to ensure that revoked certificate information is highly available. What should you do()A、Implement an Online Certificate Status Protocol (OCSP) responder by using Network Load Balancing.B、Implement an Online Certificate Status Protocol (OCSP) responder by using an Internet Security and Acceleration Server array.C、Publish the trusted certificate authorities list to the domain by using a Group Policy Object (GPO).D、Create a new Group Policy Object (GPO) that allows users to trust peer certificates. Link the GPO to the domain.

Your company has an Active Directory domain. All servers run Windows Server 2008 R2.  Your  company uses an Enterprise Root certification authority (CA) and an Enterprise Intermediate CA.  The Enterprise Intermediate CA certificate expires.    You need to deploy a new Enterprise Intermediate CA certificate to all computers in the domain. What should you do()A、Import the new certificate into the Intermediate Certification Store on the Enterprise Root CA server.B、Import the new certificate into the Intermediate Certification Store on the Enterprise Intermediate CA  server.C、Import the new certificate into the Intermediate Certification Store in the Default Domain Controllers  group policy object.D、Import the new certificate into the Intermediate Certification Store in the Default Domain group policy  object.

Your company has an Active Directory forest. The company has servers that run Windows Server   2008 R2 and client computers that run Windows 7. The domain uses a set of GPO administrative  templates that have been approved to support regulatory compliance requirements.   Your partner company has an Active Directory forest that contains a single domain. The company has  servers that run Windows Server 2008 R2 and client computers that run Windows 7.   You need to configure your partner companys domain to use the approved set of administrative  templates.   What should you do()A、Use the Group Policy Management Console (GPMC) utility to back up the GPO to a file. In each site,  import the GPO to the default domain policy.B、Copy the ADMX files from your companys PDC emulator to the PolicyDefinitions folder on the partner  companys PDC emulator.C、Copy the ADML files from your companys PDC emulator to the PolicyDefinitions folder on thepartner  companys PDC emulator.D、Download the conf.adm, system.adm, wuau.adm, and inetres.adm files from the Microsoft Updates  Web site. Copy the ADM files to the PolicyDefinitions folder on the partner companys PDC emulator.

You have an Exchange Server 2010 organization.  Your company has a relationship with another company.  The partner company has an Exchange Server 2010 organization.  You need to recommend a security solution to meet the following requirements:  .Ensure that all e-mail delivery between your servers and the partner companys servers is encrypted .Ensure that all communication between your servers and the partner companys servers is authenticated What should you include in the solution?()A、Active Directory Rights Management Services (AD RMS)B、Domain SecurityC、Forms-based AuthenticationD、Secure/Multipurpose Internet Mail Extensions (S/MIME)

You are a security administrator for your company. The network consists of three Active Directory domains. All Active Directory domains are running at a Windows Server 2003 mode functionality level.    Employees in the editorial department of your company need access to resources on file servers that are in each of the Active Directory domains. Each Active Directory domain in the company contains at least one editorial department employee user account.    You need to create a single group named Company Editors that contains all editorial department employee user accounts and that has access to the resources on file server computers.  What should you do?()A、 Create a global distribution group in the forest root domain and name it Company Editors.B、 Create a global security group in the forest root domain and name it Company Editors.C、 Create a universal distribution group in the forest root domain and name it Company Editors. D、 Create a universal security group in the forest root domain and name it Company Editors.

Your network contains an Active Directory domain named contoso.com. The domain contains a   server named Server1. The Active Directory Federation Services (AD FS) role is installed on Server1. Contoso.com is defined as an account store.   A partner company has a Web-based application that uses AD FS authentication. The partner company  plans to provide users from contoso.com access to the Web application.   You need to configure AD FS on contoso.com to allow contoso.com users to be authenticated by the   partner company.   What should you create on Server1()A、a new applicationB、a resource partnerC、an account partnerD、an organization claim

You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com users make use of Microsoft Office Outlook 2007 to access their mailboxes.A new Company.com directive states that all received e-mail messages located in the entire mailbox be archived after one year.It is important that e-mail messages of the finance department be kept for three years. What should you do?()A、Your best option would be to create a message classification.B、Your best option would be to create a linked mailbox.C、Your best option would be to create an Outlook Protection Rule.D、Your best option would be to create a managed custom folder.

You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.you are responsible for managing an exchange server 2010 edge transport server named -ex10.during the course of the week you receive an instruction from the cio to install a new edge transport server named -ex20 into the organization.You thus decide to copy the configuration s from -ex10 to -ex20.What should you do?()A、Your best option would be to back up the Active Directory Lightweight Directory Services (AD LDS) database.B、Your best option would be to back up the system state.C、Your best option would be to run the ExportEdgeConfig.PS1 script.D、Your best option would be to run the New-EdgeSyncServiceConfig cmdlet.

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 cluster. According to the company requirement, the failover response of the cluster has to be tested. The company assigns this task to you. On the cluster, you have to implement a manual failover.  What should you do? () A、The contents of a shared folder on the active node should be encrypted by using Encrypting File System (EFS) B、You should restore a backup to the active node C、You should get rid of the shared array from the active node D、From the active node, you have to uplug the network cable(s)

单选题Your company has an Active Directory forest. The company has servers that run Windows Server 2008 amd client computers that run Windows Vista. The domain uses a set of GPO administrative templates that have been approved to support regulatory compliance requirements. Your partner company has an Active Directory forest that contains a single domain, The company has servers that run Windows Server 2008 and client computers that run Windows Vista. You need to configure your partner company’s domain to use the approved set of administrative templates. What should you do()AUse the Group Policy Management Console (GPMC) utility to back up the GPO to a file. In each site, import the GPO to the default domain policy.BCopy the ADMX files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PDC emulatorCCopy the ADML files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PDC emulatorDDownload the conf.adm, system.adm, wuau.adm, and inetres.adm files from the Microsoft Updates Web site. Copy the ADM files to the PolicyDefinitions folder on thr partner company’s emulator.

单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.the Company.com contains an exchange server 2010 client access server named -ex12.Company.com has an employee named andy booth.he uses exchange activesync to down load attachment.You have received instructions from the cio to limit andy booth’s attachments size;however your action should not in any way affect the other employees at Company.com.What should you do?()AThe best option is to set up a new managed content setting.BThe best option is to change Andy Booth’s message size restrictions.CThe best option is to set up a new Exchange ActiveSync mailbox policy.DThe best option is to change the default Exchange ActiveSync mailbox policy.

单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server as their messaging solution.During the course of the business week you receive instruction from Company.com to perform an automated installation of Microsoft Exchange Server 2010.What should you do?()AYou should consider having the msiexec.eex command included in your script.BYou should consider having the Ipsetupui.exe command included in your script.CYou should consider having the setup.exe command included in your script.DYou should consider having the setup.com command included in your script.

单选题You are a security administrator for your company. The network consists of three Active Directory domains. All Active Directory domains are running at a Windows Server 2003 mode functionality level.    Employees in the editorial department of your company need access to resources on file servers that are in each of the Active Directory domains. Each Active Directory domain in the company contains at least one editorial department employee user account.    You need to create a single group named Company Editors that contains all editorial department employee user accounts and that has access to the resources on file server computers.  What should you do?()A Create a global distribution group in the forest root domain and name it Company Editors.B Create a global security group in the forest root domain and name it Company Editors.C Create a universal distribution group in the forest root domain and name it Company Editors. D Create a universal security group in the forest root domain and name it Company Editors.

单选题Your company has an Active Directory forest. The company has servers that run Windows Server  2008 R2 and client computers that run Windows 7. The domain uses a set of GPO administrative  templates that have been approved to support regulatory compliance requirements.     Your partner company has an Active Directory forest that contains a single domain. The company  has servers that run Windows Server 2008 R2 and client computers that run Windows 7.     You need to configure your partner company’s domain to use the approved set of administrative  templates.   What should you do()AUse the Group Policy Management Console (GPMC) utility to back up the GPO to a file. In each site, import the GPBCopy the ADMX files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PDCCCopy the ADML files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PDC DDownload the conf.adm, system.adm, wuau.adm, and inetres.adm files from the Microsoft Updates Web site.

单选题Your company has a branch office that is configured as a separate Active Directory site and has an  Active Directory domain controller.   The Active Directory site requires a local Global Catalog server to support a new application.  You need to configure the domain controller as a Global Catalog server.  Which tool should you use()AThe Dcpromo.exe utilityBThe Server Manager consoleCThe Computer Management consoleDThe Active Directory Sites and Services consoleEThe Active Directory Domains and Trusts console

问答题Practice 4  ● Mr. White is going to order a large amount of commercial computers from your company. He also shows an interest in your company’s electrostatic copier, which is in the charge of Mr. Blair, your colleague. Mr. White would like to bring 8 samples and some specifications back home to make a trial sale.  ● Write a note to Mr. Blair, one of your colleagues.  ● Telling him the fact that Mr. White is interested in electrostatic copier.  ● Mentioning the number he wants to have.  ● Suggesting their direct contact.  ● Write 30-40 words on your answer sheet.

单选题Your company has a single Active Directory directory service forest with multiple domains. The  company has a main office with 1,000 users and a single branch office with 500 users. Each office is aseparate Active Directory site. The main office Active Directory site has two domain controllers with Global  Catalog services. Company employees must be able to work in both offices. You need to plan the  placement and configuration of domain controllers.  What should you do?()A Deploy two additional domain controllers in the main office Active Directory site.B Deploy global catalog servers in the branch office Active Directory site.C Enable change notification on the site link between the main office Active Directory site and the branch office Active Directory site.D Disable change notification on the site link between the main office Active Directory site and the branch office Active Directory site.

单选题Your network contains an Active Directory domain named contoso.com. The domain contains a  server named Server1. The Active Directory Federation Services (AD FS) role is installed on  Server1.     Contoso.com is defined as an account store.  A partner company has a Web-based application that uses AD FS authentication. The partner  company plans to provide users from contoso.com access to the Web application. You need to  configure AD FS on contoso.com to allow contoso.com users to be authenticated by the partner  company.     What should you create on Server1()Aa new applicationBa resource partnerCan account partnerDan organization claim

问答题Practice 9  ● You are the Purchasing Manager for a large company. Last month you decided to look for a new supplier for the stationery and office equipment that your company uses. You have found a new supplier, Compass Office Goods Ltd.  ● Write a memo to your company’s department heads:  ● explaining why you looked for a new supplier.  ● saying who the new supplier is.  ● asking for feedback about the goods that they supply.  ● Write 40—50 words.