Your company hires 10 new employees. You want the new employees to connect to the main office through a VPN connection. You create new user accounts and grant the new employees the Allow Read and Allow Execute permissions to shared resources in the main office. The new employees are unable to access shared resources in the main office. You need to ensure that users are able to establish a VPN connection to the main office. What should you do()A、Grant the new employees the Allow Full control permission.B、Grant the new employees the Allow Access Dial-in permission.C、Add the new employees to the Remote Desktop Users security group.D、Add the new employees to the Windows Authorization Access security group.
Your company hires 10 new employees. You want the new employees to connect to the main office through a VPN connection. You create new user accounts and grant the new employees the Allow Read and Allow Execute permissions to shared resources in the main office. The new employees are unable to access shared resources in the main office. You need to ensure that users are able to establish a VPN connection to the main office. What should you do()
- A、Grant the new employees the Allow Full control permission.
- B、Grant the new employees the Allow Access Dial-in permission.
- C、Add the new employees to the Remote Desktop Users security group.
- D、Add the new employees to the Windows Authorization Access security group.
相关考题:
You are the administrator of Company.com's Windows 2000 Network. The routed TCP/IP network that you administer consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. All computers are members of a single Windows 2000 domain named Company.com. TCP/IP is the only network protocol used at Company's office. You have recently installed 10 new Windows 2000 Professional computers and you want to enable the new computers to use host names to connect to shared resources on the network. You configure a TCP/IP address and a gateway address on each new computer. You want to complete the configuration to allow the computers to communicate on the network. What should you do?()A、Configure a DNS suffix.B、Configure a subnet mask.C、Configure an LMHOSTS file.D、Configure an Interface metric.E、Configure at least one DNS address.
Your company has a server that runs Windows Server 2008 R2.You have a new application that locates remote resources by name. The new application requires IPv6.You need to ensure that the application can locate remote resources by using IPv6.What should you do?()A、Create a new Pointer (PTR) DNS record.B、Create a new Quad-A (AAAA) DNS record.C、Create a new Signature (SIG) DNS record.D、Create a new Route Through (RT) DNS record.
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Due to company growth Company.com, has acquired an accepted domain named courseware.com.The employees of both domains are configured with internal and external Out Of Office messages.You have received instructions to make sure that the internal Out Of Office messages are sent to senders from the courseware.com. What should you do?()A、You should create and configure a new accepted domain.B、You should create and configure a new remote domain.C、You should create and configure a new Receive connector.D、You should create and configure a new Send connector.
You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All company data is stored in shared folders on network file servers. The data for each department is stored in a departmental shared folder. Users in each department are members of the departmental global group. Each departmental global group is assigned the Allow - Full Control permission for the corresponding departmental shared folder. Company requirements state that all access to shared folders must be configured by using global groups. A user named Richard works in the sales department. Richard needs to be able to modify files in the Marketing shared folder. You need to ensure that Richard has the minimum permissions for the Marketing shared folder that he needs to do his job. You need to achieve this goal while meeting company requirements and without granting unnecessary permissions. What should you do? ()A、Add Richard's user account to the Marketing global group.B、Assign the Sales global group the Allow - Change permission for the Marketing shared folder.C、Create a new global group. Add Richard's user account to the group. Assign the new global group the Allow - Change permission for the Marketing shared folder.D、Assign Richard's user account the Allow - Change permission for the Marketing shared folder.
You are a Windows Server 2008 systems administrator responsible for configuring the Streaming MediaServices server role. Your organization would like to make numerous human resources training videosavailable for access by its employees. Employees should be able to pause and fast-forward content asneeded. You also want to ensure that users can access the content only while they are connected to your company's LAN. Which actions should you take?()A、Create a new broadcast publishing point.B、Create a new on-demand publishing point.C、Enable WMS IP Address Authorization for the publishing point.D、Enable WMS Negotiate Authentication for the publishing point.
Your network contains an Active Directory forest. You set the Windows PowerShell execution policy to allow unsigned scripts on a domain controller in the network. You create a Windows PowerShell script named new-users.ps1 that contains the following lines: new-aduser user1 new-aduser user2 new-aduser user3 new-aduser user4 new-aduser user5 On the domain controller, you double-click the script and the script runs. You discover that the script fails to create the user accounts. You need to ensure that the script creates the user accounts. Which cmdlet should you add to the script()A、Import-ModuleB、Register-ObjectEventC、Set-ADDomainD、Set-ADUser
Your network consists of a single Active Directory domain. The network is located on the 172.16.0.0/23 subnet. The company hires temporary employees. You provide user accounts and computers to the temporaryem ployees. The temporary employees receive computers that are outside the Active Directory domain. The temporary employees use their computers to connect to the network by using wired connections andwireless connections. The company’s security policy specifies that the computers connected to the network must have the latest updates for the operating system. You need to plan the network’s security so that it complies with the company 's security policy. What should you include in your plan?()A、Implement a Network Access Protection (NAP) strategy for the 172.16.0.0/23 subnet.B、Create an extranet domain within the same forest. Migrate the temporary employees user accounts to the extranet domain. Install the necessary domain resources on the 172.16.0.0/23 subnet.C、Move the temporary employees user accounts to a new organizational unit (OU). Create a new Group Policy object (GPO) that uses an intranet Microsoft Update server. Link the new GPO tothe new OU.D、Create a new subnet in a perimeter network. Relocate the wireless access point to the perimeter network. Require authentication through a VPN server before allowing access to the internal resources.
You are the network administrator for Testking.com. The network consists of a single Active Directory domain named testking.com. The sales department is hiring employees. An OU named TestKingSales is created to hold objects for the new sales department users. Each sales department user has a portable computer. Each portable computer runs Windows XP Professional. The sales department users are responsible for joining their portable computers to the domain. You need to ensure that the computer accounts for the Sales department user's portable computers are created in the TestKingSales OU. You need to achieve this goal without granting any unnecessary permissions. What should you do?()A、Assign the sales department users the Allow - Read permissions for the Computer container.B、Configure the sales department users' user accounts to be trusted for delegationC、Prestage the computer accounts in the TestKingSales OU for the sales department users' portable computers.D、Assign the sales depertment users the Allow - Create all Child Objects permission for the TestKingSales OU.
You are the network administrator for your company. Your network consists of a single Active Directory domain. Three security groups named Accountants, Processors, and Management are located in an organizational unit (OU) named Accounting. All of the user accounts that belong to these three groups are also in the Accounting OU. You create a Group Policy object (GPO) and link it to the Accounting OU. You configure the GPO to disable the display options under the User Configuration section of the GPO. You need to achieve the following goals: You need to ensure that the GPO applies to all user accounts that are members of the Processors group. You need to prevent the GPO fromapplying to any user account that is a member of the Accountants group. You need to prevent the GPO from applying to any user account that is a member of the Management group, unless the user account is also a member of the Processors group. What should you do?()A、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants and Management security groups the Deny - Read and the Deny - Apply Group Policy permissions. Modify the DACL of the GPO to assign the users who are in both the Accountants and Management security groups the Allow - Read and the Allow - Apply Group Policy permissions.B、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants and Management security groups the Deny - Read and the Deny - Apply Group Policy permissions. Create a new security group named Mixed that contains all the user accounts from the Processors group and the specific user accounts from the Management group to which you want the GPO to apply. Modify the DACL of the GPO to assign the Mixed security group the Allow - Read and the Allow - Apply Group Policy permissions.C、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants security group the Deny - Read and the Deny - Apply Group Policy permissions. Modify the DACL settings of the GPO to remove the Authenticated Users special group. Modify the DACL settings of the GPO to add the Processors group and assign the Allow - Read and the Allow - Apply Group Policy permissions.D、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants security group the Deny - Read and the Allow - Apply Group Policy permissions. Modify the DACL settings of the GPO to assign the Management security group the Deny - Read and the Deny - Apply Group Policy permissions.
Your company has a main office and 50 branch offices. Each office contains multiple subnets. You need to automate the creation of Active Directory subnet objects. What should you use()A、the Dsadd toolB、the Netsh toolC、the New-ADObject cmdletD、the New-Object cmdlet
You are the administrator of Company.com’s Windows 2000 Network. Your routed TCP/IP network consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. All computers are in the Company.com domain. Your network uses TCP/IP as the only network protocol. You are installing 10 new Windows 2000 Professional computers. You want to enable the new computers to use host names to connect to shared resources on the network. You configure a TCP/IP address, a gateway address and a subnet mask on each new computer. You want to complete the configuration to allow the computers to communicate on the network. What should you do?()A、Configure a HOSTS file.B、Configure a LMHOSTS file.C、Configure a WINS server database.D、Configure a DHCP server address.E、Configure at least one DNS address.
You are designing a migration strategy to create user IDs for all company users in the new environment. What should you do?()A、Create a script that uses Active Directory Services Interfaces (ADSI) to import all user account into the new environment.B、Create new accounts for all users. Create a trust relationship between the existing environment and the new environment to enable access to resources in the existing environment.C、Import all user accounts into the new environment by using the Active Directory Migration Tool (ADMT).D、Import all user accounts into the new environment. Instruct users to no change their passwords during the migration phase so that they can access resources in the existing environment.
You have stored confidential financial data in a shared folder named AccSecured on your Windows 2000 Prfessional computer. Your company hires an intern named Richard. You create a subfolder named intern, which Richard needs to access. You want to allow Richard access to the intern subfolder only. You create a user account named intern. You want to allow the intern user account the ability to update, create, and delete files within the intern folder. You need to prevent Richard from accessing any other files or folders within the AccSecured folder. What should you do?()A、Map a network drive to the AccSecured/intern folder from Richard’s computer.B、Map a network drive to the AccSecured shared folder from Richard’s computer.C、Allow the intern user account modify permissions on the intern subfolder.D、Allow the intern user account traverse folder/execute file permission on the AccSecured folder.E、Allow the intern user account list folder content permission on the AccSecured folder. Removeread extended attributes and read permissions.
Your company has a main office and a branch office.The branch office administrators are the only members of a custom management role group.The role group is configured to allow members to manage recipients. You notice that the branch office administrators can manage recipients in both offices.You need to ensure that the branch office administrators can manage recipients in the branch office only. What should you do?()A、Create and associate a management scope to the role group.B、Create and associate a management role assignment policy to the role group.C、Create a new linked role group, and then add the branch office administrators to the role group.D、Create a new role, and then add management role entries to the role.
The human resources department has informed you that two new temporary part-time employees will join your company next week. You are required to set up a workstation that will be used bythese employees. They do not need access to the network but they will need to access an HP LaserJet printer attached to the local computer. You install Windows 2000 Professional and format the hard disk using NTFS. What type of user account should you create for them?()A、No account. They can use the built-in guest account.B、No Account. They can use the built-in Administrator account.C、Local user accountD、Domain user account
Your company has a main office and a branch office. You plan to deploy a Read-only Domain Controller (RODC) in the branch office. You need to plan a strategy to manage the RODC. Your plan must meet the following requirements: èAllow branch office support technicians to maintain drivers and disks on the RODC èPrevent branch office support technicians from managing domain user accounts What should you include in your plan?()A、Configure the RODC for Administrator Role Separation.B、Configure the RODC to replicate the password for the branch office support technicians.C、Set NTFS permissions on the Active Directory database to Read Execute for the branch officesupport technicians.D、Set NTFS permissions on the Active Directory database to Deny Full Control for the branch office support technicians.
Your network contains an Active Directory domain named contoso.com. Your company hires 500 temporary employees for the summer. The human resources department gives you a Microsoft Excel document that contains a list of the temporary employees. You need to automate the creation of user accounts for the 500 temporary employees. Which tool should you use?()A、The Add-Member cmdletB、ADSI EditC、The csvde.exe commandD、Active Directory Users and Computers
You and Stephen are the desktop administrators for your company. You install a printer on your Windows XP Professional computer. You share this printer on the company network. You want to ensure that only members of the DTAdmins local group can use this printer, and that only you and Stephen can manage the printer and all print jobs. You also want to ensure that members of the DTAdmins local group can manage only their own print jobs. How should you configure security on this printer?() A、Grant Allow - Print permission to the DTAdmins group. Grant Allow - Manage Documents permission to your user account and to Stephen’s user account. B、Grant Allow - Print permission to the DTAdmins group. Grant Allow - Manage Documents and Allow - Manage Printers permissions to your user account and to Stephen’s user account. C、Grant Allow - Manage Documents permission to the DTAdmins group. Grant Allow - Manage Printers permission to your user account and to Stephen’s user account. D、Grant Allow - Print permission to the DTAdmins group. Remove Allow - Manage Documents permission from the Creator Owner group. Grant Allow - Manage Printers permission to your user account and to Stephen’s user account.
You install Windows 2000 Professional on your portable computer. You create a new dial up connection to connect to your company’s remote access server. You connect to the remote access server by using the dial up connection. You can connect to the servers on the same segment as the remote access server. You cannot access the shared resources that are on the remote segments from the remote access server. What should you do? ()A、Configure the company remote access server to accept multilink connections.B、Configure the TCP/IP program for the dial up connection to disable IP header compression.C、Configure the TCP/IP properties for the dial up connection to use the default gateway on theremote network.D、Grant your user account dial in permission on the company remote access server.
You have stored confidential financial data in a shared folder named AccSecured on your Windows 2000 Professional computer. Your company hires an intern named Richard. You create a subfolder named intern, which Richard needs to access. You want to allow Richard access to the intern subfolder only. You create a user account named intern. You want to allow the intern user account the ability to update, create, and delete files within the intern folder. You need to prevent Richard from accessing any other files or folders within the AccSecured folder. What should you do?()A、 Map a network drive to the AccSecuredintern folder from Richard’s computer. B、 Map a network drive to the AccSecured shared folder from Richard’s computer. C、 Allow the intern user account modify permissions on the intern subfolder. D、 Allow the intern user account traverse folder/execute file permission on the AccSecured folder. E、 Allow the intern user account list folder content permission on the AccSecured folder. Remove read extended attributes and read permissions.
单选题Your company hires 10 new employees. You want the new employees to connect to the main office through a VPN connection. You create new user accounts and grant the new employees the Allow Read and Allow Execute permissions to shared resources in the main office. The new employees are unable to access shared resources in the main office. You need to ensure that users are able to establish a VPN connection to the main office. What should you do()AGrant the new employees the Allow Full control permission.BGrant the new employees the Allow Access Dial-in permission.CAdd the new employees to the Remote Desktop Users security group.DAdd the new employees to the Windows Authorization Access security group.
单选题An employee named Drew is leaving your company. A new employee named Adam will replace him. Drew has a local user account on a Windows 2000 Professional computer, with rights and permissions to multiple files and folders on the computer. You want Adam to have the same rights and permissions. How will you achieve this with the least administrative efforts? ()ARename Drew’s user account to Adam, and change the account password.BCreate a new account and link it to the previous users account.CDelete the account and create a new one.DAdd a new user account to all the groups that the previous employee was added.
多选题You have stored confidential financial data in a shared folder named AccSecured on your Windows 2000 Professional computer. Your company hires an intern named Richard. You create a subfolder named intern, which Richard needs to access. You want to allow Richard access to the intern subfolder only. You create a user account named intern. You want to allow the intern user account the ability to update, create, and delete files within the intern folder. You need to prevent Richard from accessing any other files or folders within the AccSecured folder. What should you do?()AMap a network drive to the AccSecuredintern folder from Richard’s computer.BMap a network drive to the AccSecured shared folder from Richard’s computer.CAllow the intern user account modify permissions on the intern subfolder.DAllow the intern user account traverse folder/execute file permission on the AccSecured folder.EAllow the intern user account list folder content permission on the AccSecured folder. Remove read extended attributes and read permissions.
多选题You have stored confidential financial data in a shared folder named AccSecured on your Windows 2000 Prfessional computer. Your company hires an intern named Richard. You create a subfolder named intern, which Richard needs to access. You want to allow Richard access to the intern subfolder only. You create a user account named intern. You want to allow the intern user account the ability to update, create, and delete files within the intern folder. You need to prevent Richard from accessing any other files or folders within the AccSecured folder. What should you do?()AMap a network drive to the AccSecured/intern folder from Richard’s computer.BMap a network drive to the AccSecured shared folder from Richard’s computer.CAllow the intern user account modify permissions on the intern subfolder.DAllow the intern user account traverse folder/execute file permission on the AccSecured folder.EAllow the intern user account list folder content permission on the AccSecured folder. Removeread extended attributes and read permissions.
单选题You are designing a migration strategy to create user IDs for all company users in the new environment. What should you do?()ACreate a script that uses Active Directory Services Interfaces (ADSI) to import all user account into the new environment.BCreate new accounts for all users. Create a trust relationship between the existing environment and the new environment to enable access to resources in the existing environment.CImport all user accounts into the new environment by using the Active Directory Migration Tool (ADMT).DImport all user accounts into the new environment. Instruct users to no change their passwords during the migration phase so that they can access resources in the existing environment.
单选题Your network contains one Active Directory domain. All domain controllers run Windows Server 2003 Service Pack 2 (SP2). You have a comma delimited file that contains information for 2,000 new employees. You need to create 2,000 new user accounts by using the information in the file. You must achieve this goal by using the minimum amount of administrative effort. Which tool should you use? ()ACsvde.exeBDsmod.exeCldifde.exeDNtdsutil.exe
单选题Your network consists of a single Active Directory domain. The network is located on the 172.16.0.0/23 subnet. The company hires temporary employees. You provide user accounts and computers to the temporaryem ployees. The temporary employees receive computers that are outside the Active Directory domain. The temporary employees use their computers to connect to the network by using wired connections andwireless connections. The company’s security policy specifies that the computers connected to the network must have the latest updates for the operating system. You need to plan the network’s security so that it complies with the company 's security policy. What should you include in your plan?()AImplement a Network Access Protection (NAP) strategy for the 172.16.0.0/23 subnet.BCreate an extranet domain within the same forest. Migrate the temporary employees user accounts to the extranet domain. Install the necessary domain resources on the 172.16.0.0/23 subnet.CMove the temporary employees user accounts to a new organizational unit (OU). Create a new Group Policy object (GPO) that uses an intranet Microsoft Update server. Link the new GPO tothe new OU.DCreate a new subnet in a perimeter network. Relocate the wireless access point to the perimeter network. Require authentication through a VPN server before allowing access to the internal resources.