our network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1 that runs Windows Server 2012 R2. Server1 contains a shared folder named Share1. Share1 contains the home folder of each user. All users have the necessary permissions to access only their home folder. The users report that when they access Share1, they can see the home folders of all the users. You need to ensure that the users see only their home folder when they access Share1. What should you do from Server1?()A、From Windows Explorer,modify the properties of the volume that contains Share1.B、From Server Manager,modify the properties of the volume that contains Share1.C、From Server Manager,modify the properties of Share1.D、From Windows Explorer,modify the properties of Share1.

our network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1 that runs Windows Server 2012 R2. Server1 contains a shared folder named Share1. Share1 contains the home folder of each user. All users have the necessary permissions to access only their home folder. The users report that when they access Share1, they can see the home folders of all the users. You need to ensure that the users see only their home folder when they access Share1. What should you do from Server1?()

  • A、From Windows Explorer,modify the properties of the volume that contains Share1.
  • B、From Server Manager,modify the properties of the volume that contains Share1.
  • C、From Server Manager,modify the properties of Share1.
  • D、From Windows Explorer,modify the properties of Share1.

相关考题:

In most WANs, the network contains numerous cables or telephone lines, each one connecting a pair ofA.hostsB.routersC.serversD.networks

The back garden of our house contains a lawn, ______ very pleasant to sit on in summer.A.which isB.which it isC.it isD.where it is

For more information, visit our()at www.cambridge.org.A、netB、websiteC、internetD、network

Your network contains an internal network and a perimeter network that are separated by a firewall. The perimeter network contains an Exchange Server 2010 Edge Transport server.  You plan to deploy an internal Exchange Server 2010 organization that meets the following requirements:.Support EdgeSync synchronization .Support encrypted delivery of outbound e-mail messages to the Edge Transport server .Minimize the attack surface of the internal network  Which TCP ports should you allow from the internal network to the perimeter network?()A、3389 and 25B、3389 and 636C、50636 and 25D、50636 and 135

Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest. The forest contains a single domain.  You plan to deploy 10 Edge Transport servers on the perimeter network.  You need to recommend a solution for the Edge Transport server deployment. The solution must meet the following requirements: .Allow administrators to apply a single security policy to all Edge Transport servers .Reduce the administrative overhead that is required to manage servers .Minimize the attack surface of the internal network What should you recommend?()A、Implement Network Policy and Access Services (NPAS).B、Implement Active Directory Federation Services (AD FS).C、Create a new Active Directory domain in the internal forest, and then join all Edge Transport servers to the new domain.D、Create an Active Directory forest in the perimeter network, and then join all Edge Transport servers to the new domain.

Your network contains a single Active Directory domain named contoso.com.The domain contains a DNS server named Server1 that hosts the contoso.com zone.The network is connected to the network of a partner company. The partner companys network contains a DNS server that hosts a zone named nwtraders.com.You need to ensure that computers in contoso.com can resolve the names of computers in nwtraders.com.The solution must not require any changes to the zone configuration of nwtraders.com.What should you configure on Server1?()A、a conditional forwarderB、a GlobalNames zoneC、a secondary zoneD、a zone delegation

our network contains a Network Policy Server (NPS) named Server1.You need to configure a network policy for a VLAN.Which RADIUS attributes should you add?()A、¡¤Logi-LAT-ServiceˆLogin-LAT-Node ˆLogin-LAT-Group ˆNAS-IdentifierB、¡¤Tunne-Assignment-ID ˆTunnel-Preference ˆTunnel-Client-Auth-ID ˆNAS-Port-IdC、¡¤Tunne-Client-Endpt ˆTunnel-Server-Endpt ˆNAS-Port-Type ˆTunnel-PasswordD、¡¤Tunne-Medium-Type ˆTunnel-Pvt-Group-ID ˆTunnel-Type ˆTunnel-Tag

Your network contains an Active Directory forest. The forest schema contains a custom attribute for  user objects.   You need to modify the custom attribute value of 500 user accounts.   Which tool should you use()A、CsvdeB、DsmodC、DsrmD、Ldifde

Your network contains an internal network and a perimeter network. The internal network contains a single Active Directory site.  The perimeter network contains two Exchange Server 2010 Edge Transport servers. You plan to deploy an Exchange Server 2010 organization on the internal network.  You need to plan the deployment of Hub Transport server roles to meet the following requirements:.If a single Hub Transport server fails, e-mail messages from the Internet must be delivered to the Mailboxservers. .If a single Hub Transport server fails, users must be able to send e-mail messages to other users thathave mailboxes on the same Mailbox server.  What should you include in the plan?()A、Deploy one Edge Transport server on the internal network, and then configure EdgeSync synchronization.B、Deploy one Hub Transport server on the internal network, and then configure EdgeSync synchronization.C、Deploy one Hub Transport server on the internal network and one Hub Transport server on the perimeter network.D、Deploy two Hub Transport servers on the internal network.

our network contains a Network Policy Server (NPS) named NPS1 and a network access server named NAS1. NAS1 is configured to use NPS1 for authentication and accounting. A firewall separates NPS1 and NAS1.You need to ensure that NAS1 can successfully send authentication and accounting messages to NPS1.Which ports should you allow through the firewall?()A、TCP ports 80, 443, 389 and 1645B、TCP ports 88, 135, 139 and 1813C、UDP ports 53, 67, 68 and 69D、UDP ports 1812, 1813, 1645 and 1646

our network consists of a single Active Directory domain. All network servers run Windows Server 2003 Service Pack 2 (SP2). The network contains a single subnet. The network connects to the Internet by using a network address translation (NAT) device. You deploy a new DHCP server named Server1. You create a scope as shown in the exhibit. (Click the Exhibit button.) You need to ensure that client computers can connect to the Internet.  What should you do?()A、Add a Router scope option. B、Enable conflict detection on the DHCP server. C、Remove the WINS/NBT Node Type scope option. D、Configure the scope to respond to a BOOTP request only.

our network contains a server that runs window server 2008. The serve has the network policy server(NPS) service role installed. You need to allow only members of a global group named group1 VPN access to the network. What should you do?()A、Add group1 to the RAS and IAS servers group.B、Add group1 to the network configuration operators group..C、Create a new network policy and define a group-based connection for group1. Set the access permission of the policy to access granted. Set the processing order of the policy to 1.D、Create a new network policy and define a group-based condition for group1. Set the access permission of the policy to acces granted. Set the processing of the policy to 3.

Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest. The forest contains a single domain.  You plan to deploy 10 Edge Transport servers on the perimeter network.  You need to recommend a solution for the Edge Transport server deployment. The solution must meet the following requirements: .Allow administrators to apply a single security policy to all Edge Transport servers .Reduce the administrative overhead that is required to manage servers .Minimize the attack surface of the internal network  What should you recommend?()A、Implement Network Policy and Access Services (NPAS).B、Implement Active Directory Federation Services (AD FS).C、Create a new Active Directory domain in the internal forest, and then join all EdgeTransport servers to the new domain.D、Create an Active Directory forest in the perimeter network, and then join all Edge Transport servers to the new domain.

our network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). The network contains two servers named Server1 and Server2.  Server1 is configured as a DHCP server and has a scope that contains addresses 192.168.2.51 to 192.168.2.125.You have a reservation for a print device named Printer1. The reservation assigns the IP address of 192.168.2.100.You install DHCP on Server2 and create a scope that contains addresses 192.168.2.126 to 192.168.2.200.You need to ensure that Printer1’s IP address always remains the same. What should you create on Server2?()A、an exclusion range B、a reservation C、a superscope D、a user class

Your network contains two Hyper-V hosts that run Windows Server 2012 R2. The Hyper-V hosts contains several virtual machines that run Windows Server 2012 R2. You install the Network Load Balancing feature on the virtual machines. You need to configure the virtual machines to support Network Load Balancing (NLB). Which virtual machine settings should you configure?()A、Port mirroringB、DHCP guardC、Router guardD、MAC address

单选题Which OSI layer header contains the address of a destination host that is another network?()AapplicationBpresentationCsessionDtransportEnetworkFdata linkGphysical

单选题Your network contains an internal network and a perimeter network that are separated by a firewall. The perimeter network contains an Exchange Server 2010 Edge Transport server.  You plan to deploy an internal Exchange Server 2010 organization that meets the following requirements:.Support EdgeSync synchronization .Support encrypted delivery of outbound e-mail messages to the Edge Transport server .Minimize the attack surface of the internal network  Which TCP ports should you allow from the internal network to the perimeter network?()A3389 and 25B3389 and 636C50636 and 25D50636 and 135

单选题You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()AUse Windows Explorer to receive the offline filesBUsing the Windows Explorer, disable the cache for the reports on the network shareCUse the Windows NT explorer to grant the special access for the reports on the network  shareDUse the synchronization manager to configure synchronization not to occur when users are  connected to the LAN connection.

单选题Your network contains a single Active Directory domain named contoso.com.The domain contains a DNS server named Server1 that hosts the contoso.com zone.The network is connected to the network of a partner company. The partner companys network contains a DNS server that hosts a zone named nwtraders.com.You need to ensure that computers in contoso.com can resolve the names of computers in nwtraders.com.The solution must not require any changes to the zone configuration of nwtraders.com.What should you configure on Server1?()Aa conditional forwarderBa GlobalNames zoneCa secondary zoneDa zone delegation

单选题Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. You create a new inbound rule by using Windows Firewall with Advanced Security. You need to configure the rule to allow Server1 to accept unsolicited inbound packets that are received through a network address translation (NAT) device on the network. Which setting in the rule should you configure?()AEdge traversalBAuthorized computersCInterface typesDRemote IP address

单选题our network contains multiple servers that run Windows Server 2008 R2. The servers have the Routing and Remote Access Services (RRAS) role service installed. The servers are configured to support Routing Information Protocol (RIP).You need to prevent the server from receiving routes for the 10.0.0.0 network.What should you do from the Routing and Remote Access console?()AFrom the RIP properties page, modify the General settings.BFrom the RIP properties page, modify the Security settings.CFrom the RIP interface properties page, modify the Security settings.DFrom the RIP interface properties page, modify the Neighbors settings.

单选题our network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). The network contains two servers named Server1 and Server2.  Server1 is configured as a DHCP server and has a scope that contains addresses 192.168.2.51 to 192.168.2.125.You have a reservation for a print device named Printer1. The reservation assigns the IP address of 192.168.2.100.You install DHCP on Server2 and create a scope that contains addresses 192.168.2.126 to 192.168.2.200.You need to ensure that Printer1’s IP address always remains the same. What should you create on Server2?()Aan exclusion range Ba reservation Ca superscope Da user class