The corporate network of Certkiller consists of a Windows Server 2008 single Active Directory domain. The domain has two servers named Certkiller 1 and Certkiller 2.  To ensure central monitoring of events you decided to collect all the events on one server, Certkiller 1. To collect events from Certkiller  2. and transfer them to Certkiller 1, you configured the required event subscriptions.  You selected the Normal option for the Event delivery optimization setting by using the HTTP protocol. However, you discovered that none of the subscriptions work.  Which of the following actions would you perform to configure the event collection and event forwarding on the two servers()A、Through Run window execute the winrm quickconfig command on Certkiller 2.B、Through Run window execute the wecutil qc command on Certkiller 2.C、Add the Certkiller 1 account to the Administrators group on Certkiller 2.D、Through Run window execute the winrm quickconfig command on Certkiller 1.E、Add the Certkiller 2 account to the Administrators group on Certkiller 1.F、Through Run window execute the wecutil qc command on Certkiller 1.

The corporate network of Certkiller consists of a Windows Server 2008 single Active Directory domain. The domain has two servers named Certkiller 1 and Certkiller 2.  To ensure central monitoring of events you decided to collect all the events on one server, Certkiller 1. To collect events from Certkiller  2. and transfer them to Certkiller 1, you configured the required event subscriptions.  You selected the Normal option for the Event delivery optimization setting by using the HTTP protocol. However, you discovered that none of the subscriptions work.  Which of the following actions would you perform to configure the event collection and event forwarding on the two servers()

  • A、Through Run window execute the winrm quickconfig command on Certkiller 2.
  • B、Through Run window execute the wecutil qc command on Certkiller 2.
  • C、Add the Certkiller 1 account to the Administrators group on Certkiller 2.
  • D、Through Run window execute the winrm quickconfig command on Certkiller 1.
  • E、Add the Certkiller 2 account to the Administrators group on Certkiller 1.
  • F、Through Run window execute the wecutil qc command on Certkiller 1.

相关考题:

As they access the corporate network, mobile and remote users inadvertently can infect the network with(72) and worms acquired from unprotected public networks.A.virusesB.diseaseC.germsD.sickness

Your network contains an Active Directory domain. The network has DirectAccess deployed.You deploy the DirectAccess Connectivity Assistant (DCA) to all client computers.You need to ensure that users can view their DirectAccess status by using the DCA.Which two group policy settings should you configure?()A. Dynamic Tunnel Endpoints (DTEs)B. Corporate Portal SiteC. Corporate ResourcesD. PortalName

Which of the following provides the MOST redundancy for a corporate server network?() A. Server-to-server replicationB. Server clusteringC. Hot siteD. Disk-to-disk replication

You have just configured a static default route on router TK1. What is the purpose of a default route?() A. It is a route to be used when the routing protocol fails.B. It is a route configured by an ISP that sends traffic into a corporate network.C. It is a route used when a packet is destined for a remote network that is not listed in the routing table.D. It is a route manually configured for a specific remote network for which a routing protocol is not configured.E. It is used to send traffic to a stub network.

The LAN needs are expanding at the Testking corporate office, which is quickly growing. You are instructed to enlarge the area covered by a single LAN segment on the TestKing network.Which of the following are layer 1 devices that you can use?()A. A switch.B. A router.C. A network adapter card.D. A hub.E. A repeater.

For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists()。 A.IPB.ICMPC.TCPD.UDP

As they access the corporate network, mobile and remote users inadvertently can infect the network with ( )and worms acquired from unprotected public networks.A. sicknessB. diseaseC. GermsD. Viruses

A virtual (71) network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely (72). It prevents (73) people fromeavesdropping on the traffic and allows the user to conduct work remotely. Traffic on the virtual network is sent securely by establishing an encrypted connection across the Internet known as a (74).A remote access VPN securely connects a device outside the corporate office. A site-to-site VPN connects the corporate office to branch offices over the Internet. Site-to-site VPNs are used when distance makes it impractical to have direct network connections between these offices. Think of site-to-site access as (75) to network. A.encodedB.encryptedC.storedD.transmitted

The LAN needs are expanding at the Testking corporate office, which is quickly growing. You are instructed to enlarge the area covered by a single LAN segment on the TestKing network.Which of the following are layer 1 devices that you can use?()A、A switch.B、A router.C、A network adapter card.D、A hub.E、A repeater.

In which situation would the use of a static route be appropriate?()A、To configure a route to the first Layer 3 device on the network segment.B、To configure a route from an ISP router into a corporate network.C、To configure a route when the administrative distance of the current routing protocolis too low.D、To reach a network is more than 15 hops away.E、To provide access to the Internet for enterprise hosts.

Your network contains an Active Directory domain. The network has DirectAccess deployed.You deploy the DirectAccess Connectivity Assistant (DCA) to all client computers.You need to ensure that users can view their DirectAccess status by using the DCA.Which two group policy settings should you configure?()A、Dynamic Tunnel Endpoints (DTEs)B、Corporate Portal SiteC、Corporate ResourcesD、PortalName

You are planning to connect your three branch offices to the corporate site via Frame Relay. The first branch office has been assigned the network 10.1.0.0/16, the second 10.2.0.0/16, the third 10.3.0.0/16, and the corporate headquarters uses 10.0.0.0/16. You would like to summarize all branch and corporate networks into a single route at the corporate site. Which network address and subnet mask should you choose?()  A、 10.0.0.0/24B、 10.0.0.0/16C、 10.0.0.0/14D、 10.0.0.0/15

Which of the following would be considered reasonable network maintenance tasks?(Choose allthat apply.)()A、Ensuring compliance with legal regulations and corporate policiesB、Troubleshooting problem reportsC、Planning for network expansionD、Providing support to sales and marketingE、Giving presentations to managementF、Monitoring and tuning network performance

Which of the following provides the MOST redundancy for a corporate server network?()A、Server-to-server replicationB、Server clusteringC、Hot siteD、Disk-to-disk replication

Your company's corporate network uses Network Access Protection (NAP).Users are able to connect to the corporate network remotely.You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do?()A、Apply an IPsec NAP policy.B、Configure a NAP policy for 802.1X wireless connections.C、Configure VPN connections to use MS-CHAP v2 authentication.D、Restrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP.

Network Access Protection (NAP) is configured for the corporate network.Users connect to the corporate network by using portable computers.The company policy requires confidentiality of data when the data is in transit between the portable computers and the servers.You need to ensure that users can access network resources only from computers that comply with the company policy.What should you do?()A、Create an IPsec Enforcement Network policy.B、Create an 802.1X Enforcement Network policy.C、Create a Wired Network (IEEE 802.3) Group policy.D、Create an Extensible Authentication Protocol (EAP) Enforcement Network policy.

You are designing a strategy to ensure that DNS queries always take the most efficient route to get resolved.  Which action or actions should you perform?()A、 Configure conditional forwarding on the corporate DNS servers to point the development DNS servers.B、 Configure conditional forwarding on the development DNS servers to point the corporate DNS servers.C、 Configure conditional forwarding on the perimeter network DNS servers to point the corporate and development DNS servers.D、 Configure forwarding on the corporate and development DNS servers to point the perimeter network DNS servers.E、 Disable root hints on the perimeter network DNS Servers.

Your companys corporate network uses Network Access Protection (NAP). Users are able to connect to the corporate network remotely. You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible.  What should you do()?  A、Apply an IPsec NAP policy.B、Configure a NAP Policy for 802.1x Wireless connectionsC、Configure VPN connections to use MS-CHAP v2 authenticationD、Restrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP

单选题Which of the following provides the MOST redundancy for a corporate server network?()A Server-to-server replicationB Server clusteringC Hot siteD Disk-to-disk replication

单选题You have just configured a static default route on router TK1. What is the purpose of a default route?()AIt is a route to be used when the routing protocol fails.BIt is a route configured by an ISP that sends traffic into a corporate network.CIt is a route used when a packet is destined for a remote network that is not listed in the routing table.DIt is a route manually configured for a specific remote network for which a routing protocol is not configured.EIt is used to send traffic to a stub network.

多选题The LAN needs are expanding at the Testking corporate office, which is quickly growing. You are instructed to enlarge the area covered by a single LAN segment on the TestKing network.Which of the following are layer 1 devices that you can use?()AA switch.BA router.CA network adapter card.DA hub.EA repeater.

多选题Which of the following would be considered reasonable network maintenance tasks?(Choose allthat apply.)()AEnsuring compliance with legal regulations and corporate policiesBTroubleshooting problem reportsCPlanning for network expansionDProviding support to sales and marketingEGiving presentations to managementFMonitoring and tuning network performance

单选题TestKing.com has a large corporate network that uses multiple routing protocols.Hosts in a portion of the network that uses EIGRP have become unreachable.Which router command will allow you, the network technician, to view the status of these routes?()ATestKing# show eigrp entriesBTestKing# show protocolsCTestKing# debug eigrp routesDTestKing# show ip route eigrpETestKing# show route eigrp

单选题Network access protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The command policy required confidentiality of data when is in transmit between the portable computers and the servers. You need to ensure that users can access network resources only from computers that comply with the company policy. What should you do?()ACreate an Ipsec enforcement network policy.BCreate an 802.1xenforcemen tnetwork policy.CCreatea wired network(IEEE802.3)Group policy.DCreate an extensible authentication protocol(EAP)enforcement network policy.

单选题For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists?()AIPBICMPCTCPDUDP

单选题In which situation would the use of a static route be appropriate?()ATo configure a route to the first Layer 3 device on the network segment.BTo configure a route from an ISP router into a corporate network.CTo configure a route when the administrative distance of the current routing protocolis too low.DTo reach a network is more than 15 hops away.ETo provide access to the Internet for enterprise hosts.

单选题Network Access Protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The company policy required confidentiality of data when the data is in transmit between the portable computers and the servers. You need to ensure taht users can access network resources only from computers that comply with the company policy. What should you do? ()A Create an IPsec Enforcement Network policyB Create an 802.1X enforcement network policyC Create a wired network (IEEE 802.3) Group PolicyD Create an Extensible Authentication Portocol (EAP) Enforcement Network Policy

单选题You are planning to connect your three branch offices to the corporate site via Frame Relay. The first branch office has been assigned the network 10.1.0.0/16, the second 10.2.0.0/16, the third 10.3.0.0/16, and the corporate headquarters uses 10.0.0.0/16. You would like to summarize all branch and corporate networks into a single route at the corporate site. Which network address and subnet mask should you choose?()A 10.0.0.0/24B 10.0.0.0/16C 10.0.0.0/14D 10.0.0.0/15