You are the administrator of two Microsoft Windows 2000 computers. One computer is running Internet Information Services (IIS), and the other is running SQL Server 2000. Company partners need to connect by means of the Internet and query data stored on the SQL Server computer. Some of these partners have computers that do not use Microsoft operating systems or Web browsers.You need to configure the IIS and SQL Server 2000 computers to allow access to data by means of the IIS virtual directory. IIS uses Basic Authentication to allow access to the virtual directory.Only company partners should have access to the SQL Server computer by means of the Internet. The partners should not be allowed to make ad hoc queries. You want to be able to audit successful and failed logins to the SQL Server computer.You want to allow the partners access to the SQL Server computer while keeping your security scheme as simple as possible. Which two actions should you take? (Each correct answer represents part of the solution. Choose two.)A.Configure the IIS virtual directory to allow URL queries.B.Configure the IIS virtual directory to allow template queries.C.Create a new Windows user account. Create a corresponding Windows Authenticated login on the SQL Server computer. Configure the IIS virtual directory to always use this login when connecting to the SQL Server computer.D.Create a Windows Authenticated login on the SQL Server computer for the IIS Internet Guest Account. Configure the IIS virtual directory to always use the Internet Guest Account when connecting to the SQL Server computer.E.Create a Windows Authenticated login for each company partner on the SQL Server computer. Configure the IIS virtual directory to use Windows Integrated Authentication when connecting to the SQL Server computer.

You are the administrator of two Microsoft Windows 2000 computers. One computer is running Internet Information Services (IIS), and the other is running SQL Server 2000. Company partners need to connect by means of the Internet and query data stored on the SQL Server computer. Some of these partners have computers that do not use Microsoft operating systems or Web browsers.

You need to configure the IIS and SQL Server 2000 computers to allow access to data by means of the IIS virtual directory. IIS uses Basic Authentication to allow access to the virtual directory.

Only company partners should have access to the SQL Server computer by means of the Internet. The partners should not be allowed to make ad hoc queries. You want to be able to audit successful and failed logins to the SQL Server computer.

You want to allow the partners access to the SQL Server computer while keeping your security scheme as simple as possible. Which two actions should you take? (Each correct answer represents part of the solution. Choose two.)

A.Configure the IIS virtual directory to allow URL queries.

B.Configure the IIS virtual directory to allow template queries.

C.Create a new Windows user account. Create a corresponding Windows Authenticated login on the SQL Server computer. Configure the IIS virtual directory to always use this login when connecting to the SQL Server computer.

D.Create a Windows Authenticated login on the SQL Server computer for the IIS Internet Guest Account. Configure the IIS virtual directory to always use the Internet Guest Account when connecting to the SQL Server computer.

E.Create a Windows Authenticated login for each company partner on the SQL Server computer. Configure the IIS virtual directory to use Windows Integrated Authentication when connecting to the SQL Server computer.


相关考题:

You are the administrator of SQL Server computers. One server is named SQL7, and other is named SQL2000. SQL7 is running SQL Server 7.O and SQL2000 is running SQL Server 2000.The net-libraries on SQL2000 are configured as shown in the exhibit.SQL7 is configured so that it has the named pipes, TCP/IP, NWlink, IPX/SPX and multiprotocol Net Libraries.SQL2000 and SQL7 exchange confidential company information. You need to ensure that unauthorized users cannot access this information.Which two actions should you take? (Each correct answer presents part of the solution. Choose two)A.On SQL2000, enable the multiprotocol net library.B.On SQL2000, select the force protocol encryption check box.C.On SQL7, select the force protocol encryption check box.D.On SQL2000, install a secure sockets layer (SSL) encryption certificate.E.On SQL2000 and SQL7, enable multiprotocol encryption.

You are a network administrator for your company. You manage a computer named Server6 that runs Windows Server 2003 with the default settings.You install Terminal Services on Server6. You attempt to connect to Server6 by using the URLhttp://Server6/Tsweb. You cannot connect to Server6. You need to be able to access Terminal Services on Server6 by using Internet Explorer 6.0.Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two.)A. Create a new Web site named Tsweb.B. Create a new virtual directory named Tsweb.C. Install IIS.D. Install the Remote Administration IIS subcomponent.E. Install the Remote Desktop Web Connection IIS subcomponent.

You create a Windows Communication Foundation (WCF) service. It is deployed on Microsoft Internet Information Services (IIS) with an application pool running as Network Service. You enable WMI tracing before launching the service. Your IT support staff adds WMI data collection through ASP.NET WMI tracing.You need to restrict the collection of WMI data to a privileged account.What should you do in WMI Control in the Computer Management console?()A.B.C.D.

You are the administrator of your company's network. The network is configured as shown in the exhibit.You want to install Windows 2000 Professional on 10 non-PXE-compliant computers that are on the marketing segment of your network. You start one of the computers by using a RIS boot disk. However, you cannot connect to the RIS server.You verify that the existing client computers on the network can connect to network servers, including the RIS server. The network router does not support BOOTP, so existing client computers use manually configured TCP/IP addresses. You want to enable the computers to connect to the RIS server.What should you do?A.Add a computer running DHCP Relay Agent to the marketing segment.B.Add a computer running the network monitor driver to the marketing segment.C.Move the Windows 2000 Server computer running WINS to the marketing segment.D.Move the Windows 2000 Server computer running Active Directory to the marketing segment.

You are the administrator of a SQL Server 2000 computer. The server contains confidential information about contracts on which your company has placed bids.Company policy requires that bid information be removed permanently from the database one year after the bid closes. You need to comply with this policy and minimize server overhead.What should you do?A.Create a Data Transformation Services (DTS) package to remove bids that have a closing data older than one year.B.Create a trigger to delete any bids that have a closing data older than one year. Bind the trigger to the bids table for all INSERT, UPDATE, and DELETE events.C.Create a stored procedure to delete any bids that have a closing data order than one year. Use SQL server agent to schedule the stored procedure to run every night.D.Create a view that contains a WHERE clause to exclude bids that have a closing date older than one year.

You are the administrator of a SQL server computer. The server is running SQL Server 6.5 and SQL Server 7.0.You install a named instance of SQL Server 2000, and then run the SQL server upgrade wizard. On the database selection screen, some of the SQL Server 6.5 databases are not listed.You cancel the SQL Server upgrade wizard.You need to ensure that the SQL Server 6.5 databases are listed in the wizard. What should you do?A.Uninstall SQL Server 7.0, and then rerun the SQL Server upgrade wizard.B.Run the Microsoft SQL Server-switch application, and then rerun the SQL Server upgrade wizard.C.Create a data transformation services package that imports the databases from SQL Server 6.5 to SQL Server 2000, and then execute the package.D.Uninstall SQL Server 2000, and then reinstall SQL Server 2000 as the default instance.

You are the administrator of two Microsoft Windows 2000 advanced server computers. On these servers, you are configuring a database that will store accounting information for your company.The data must be available at all times. Interruptions in data connectivity should not last longer than five minutes. Any changes to the database should not require you to reconfigure the client computers.How should you configure the database?A.Configure the database on the two servers as a SQL Server 2000 cluster.B.Configure the database on one server, and then configure a standby database on the second server.C.Configure the database on each server. Use Microsoft Distributed Transaction Coordinator to keep the two servers perfectly synchronized.D.Configure the database as a federated database, and then partition half the data on each server.

You are the administrator of a SQL Server 2000 computer. Your company uses the server to store service contract information for its customers.You are also the administrator of Oracle relational database management system (RDBMS) server.This server is used to store your company’s financial information. The financial information is updated frequently throughout the day.You need to create a series of reports that combine the service contract information and the financial information. These reports will be updated several times a day.You want to create reports on the SQL Server computer by using the minimum amount of disk space.What should you do?A.Set up SQL server replication to replicate the data from the oracle server to the SQL server computer.B.Set up the oracle server as a linked server. Create a view that joins the service contract information and the financial information.C.Set up data transformation services (DTS) package that imports and transforms the database from the oracle server to the SQL server computer. Use SQL server agent to execute the DTS package throughout the day as needed.D.Set up Microsoft ActiveX script. that connects to the oracle server and imports the financial information into SQL server temporary table. Create a view that joins the service contract information and the temporary table.

You are the administrator of the Coho Vineyard network. The network consists of 10 Windows 2000 Advanced Server computers and 250 Windows 2000 Professional computers.Your company has two domains cohovineyard.com and westcoastsales.com.The company's intranet site is on a Windows 2000 Advanced Server computer named ServerA. ServerA is in the cohovineyard.com domain and is running Internet Information Services (IIS) and Microsoft Proxy Server 2.0You want to configure the Windows 2000 Professional computers in the westcoastsales.com domain to access the intranet site. You want users to be able to connect to the intranet site by using the URL http://serverA rather than its fully qualified domain name.What should you do?A.Add cohovineyard.com to the Domain Suffix Search Order on the computers.B.Add westcoastsales.com to the Domain Suffix Search Order on the computers.C.Add westcoastsales.com to the exceptions list in the proxy server settings on the computers.D.Configure the proxy server settings on the computers to bypass the proxy server for intranet addresses.

You are the administrator of Microsoft Windows 2000 computer. You are preparing to install SQL Server 2000 on the computer.Your company contains a variety of client computers that will connect to the SQL server 2000 computer by using a specific Net-Library, as shown in the following table.You need to allow the client computers to connect to the SQL Server 2000 computer. You also want to minimize the number of configuration changes required on the client computers.Which three actions should you take? (Each correct answer presents part of the solution. Choose three)A. Install SQL Server 2000 as a named instance.B. Install SQL Server 2000 as the default instance.C. Configure the new instance for Mixed Mode Authentication.D. Configure the new instance for Windows Authentication.E. Configure the server to use the Named Pipes, IPX/SPX, and TCP/IP Net-Libraries.F. Configure the server to use the Multiprotocol Net-Library.

You are the network administrator for Company. Company’s network consists of 200 Windows 2000 Professional computers. CompanyW1 is a Windows 2000 Server computer that hosts Company’s intranet site. CompanyP1 is a computer running Microsoft Proxy Server that is used by all computers on the network to access the Internet. You discover that CompanyP1 is experiencing performance degradation due to large number of requests to authenticate with the proxy server. You want to minimize the number of authentication requests to the proxy server. What should you do on each computer?()A、Configure the proxy server settings to have a Secure proxy address of CompanyP1.B、Configure the proxy server settings to bypass the proxy server for local addresses.C、Add CompanyW1 to the Local intranet zone.D、Add the CompanyW1 to the list of trusted sites.

Your application must access data that is located on two SQL Server 2005 computers. One of these servers is named SQL1 and the other is SQL2. You have permissions to create a stored procedure on SQL1 to support your application. However,on SQL2 you only have permissions to select data. You write the stored procedure on SQL1. The stored procedure accesses SQL2 by using the OPENQUERY Transact-SQL statement. However,the query fails when executed.You need to troubleshoot the cause of the error. What should you do?()A、Join the two servers by using the four-part syntax of server.database.schema.table.B、Reference SQL2 by using an alias.C、Add SQL2 as a remote server to SQL1.D、Add SQL2 as a linked server to SQL1.

You are the administrator of a SQL Server 2005 computer named SQL1. All servers run Microsoft Windows Server 2003 and belong to a Microsoft Active Directory domain. The companys written security policy mandates strong passwords for all domain, local, and application accounts. The appropriate domain password policy has been deployed through the use of a Group Policy object (GPO). Many of the company’s computers run MS-DOS-based or UNIX-based operating systems. These computers require varying levels of access to a database named Services on SQL1. You need to ensure that these computers can access the Services database without violating the company’s written security policy.  What should you do?()A、Create a domain account for each of the company’s users. Provide each domain account with access to SQL1 and the Services database.B、Create a local logon account on SQL1 for each of the company’s users. Provide each logon account with access to SQL1 and the Services database.C、Create a SQL Server logon account for each of the company’s users. Enable the Enforce password policy option for each logon account. Provide each logon account with access to the Services database.D、Configure a virtual directory through Internet Information Services (IIS) for access to SQL1. Direct users to the virtual directory for data access.E、Create one SQL Server logon account for all of the company’s computers running MS-DOS or UNIX-based operating systems. Enable the Enforce password policy option for users’ accounts. Provide the logon accounts with access to the Services database.

You are the administrator of the Coho Vineyard network. The network consists of 10 Windows 2000Advanced Server computers and 250 Windows 2000 Professional computers.Your company has two domains cohovineyard.com and westcoastsales.com.The company’s intranet site is on a Windows 2000 Advanced Server computer named Server A. ServerA is in the cohovineyard.com domain and is running Internet Information Services and Microsoft Proxy Server2.0 You want to configure the Windows 2000 Professional computers in the westcoastsales.com domain to ccess the intranet site. You want users to be able to connect to the intranet site by using the URL  http://serverA rather than its fully qualified domain name. What should you do?()A、Add cohovineyard.com to the domain suffix search order on the computers.B、Add westcoassales.com to the domain suffix search orders on the computers.C、Add westcoassales.com to the exceptions list in the Proxy server settings on the computers. D、Configure the Proxy server settings on the computers to bypass the proxy server for intranet addresses.

You need to design the consolidation plan for SQL1, SQL2, and SQL3. You need to identify the appropriate combination of SQL Server instances and SQL Server 2005 computers that are needed to fulfill the company’s consolidation plans and security requirements.Which combination should you use?()A、one SQL Server 2005 computer with one instanceB、two SQL Server 2005 computers, each with two instancesC、two SQL Server computers, one with one instance and one with three instancesD、one SQL Server 2005 computer with two instances

You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run either Windows XP Professional or Windows 2000 Professional. All client computer accounts are located in an organizational unit (OU) named Workstation. A written company policy states that the Windows 2000 Professional computers must not use offline folders. You create a Group Policy object (GPO) to enforce this requirement. The settings in the GPO exist for both Windows 2000 Professional computers and Windows XP Professional computers. You need to configure the GPO to apply only to Windows 2000 Professional computers.  What are two possible ways to achieve this goal?()A、 Create a WMI filter that will apply the GPO to computers that are running Windows 2000 Professional. B、 Create a WMI filter that will apply the GPO to computers that are not running Windows XP Professional.C、 Create two OUs under the Workstation OU. Place the computer accounts for the Windows XP Professional computers in one OU, and place the computer accounts for the Windows 2000 Professional computers in the other OU. Link the GPO to the Workstation OU.D、 Create a group that includes the Windows XP Professional computers. Assign the group the Deny - Generate Resultant Set of Policy(Logging) permission.E、 Create a group that includes the Windows 2000 Professional computers. Assign the group the Deny - Apply Group Policy permission.

You are a network administrator for your company. You manage a computer named Server6 that runs Windows Server 2003 with the default settings.You install Terminal Services on Server6. You attempt to connect to Server6 by using the URLhttp://Server6/Tsweb. You cannot connect to Server6. You need to be able to access Terminal Services on Server6 by using Internet Explorer 6.0.Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two.)A、Create a new Web site named Tsweb.B、Create a new virtual directory named Tsweb.C、Install IIS.D、Install the Remote Administration IIS subcomponent.E、Install the Remote Desktop Web Connection IIS subcomponent.

You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work a database administrator for your company. There is a Data Transformation Services (DTS) package, and the DTS package is stored in SQL Server 2000. And you plans to have the SQL Server 2000 migrated into SQL Server 2005. The DTS package dynamically configures precedence constraints by utilizing complex Microsoft Visual Basic Scripting Edition (VBScript). The SQL Server 2005 Package Migration Wizard is run by you, but the wizard cannot convert the package from SQL Server 2000 to SQL Server 2005. You are required to make sure that the DTS package runs in SQL Server 2005. And the package should be run in the shortest time.  Which action should be utilized?()A、The SQL Server 2000 Data Transformation Services (DTS) package should be wrapped in an Execute DTS 2000 Package task.B、The SQL Server 2000 Data Transformation Services (DTS) package should be manually recreated as a SQL Server Integration Services (SSIS) package.C、The SQL Server 2000 Data Transformation Services (DTS) task should be configured to not utilize precedence constraints. Then, the SQL Server 2005 Package Migration Wizard should be run again.D、The SQL Server 2005 Package Migration Wizard should be run. And when the upgrade fails, a Transfer SQL Server Objects task should be run.

You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server as their messaging solution.During the course of the business week you receive instruction from Company.com to install the Microsoft Exchange Server 2010 management tools on a computer running Microsoft Windows 7. What should you do?()A、You should consider having the Net.TCP Port Sharing service set to Automatic.B、You should consider having Microsoft .NET Framework 3.5.1 and the Internet Information Services (IIS) 6.0 Management console installed first.C、You should consider having the Telnet Client installed first.D、You should consider having the Exchange Best Practices Analyzer run first.

You are the network administrator for. The network consists of a single Active Directory forest that contains two domains. You have not modified the default Active Directory site configurations. The functional level of both domains is Windows 2000 native. Servers run either Windows Server 2003 or Windows 2000 Server. TestKing's internal domain is named testking.local. Testking's external domain is named . The external domain is accessed only by TestKing's business partners. You install a Windows Server 2003 computer named Testking7 in the domain. You install and configure Terminal Services on Testking7. Testking7 is configured as a member server in the domain. You install a secure database application on Testking7 that will be accessed by TestKing's business partnersA few months later, users report that they can no longer establish Terminal Services session to Testking7. You verify that only the default ports for HTTP, HTTPS, and Terminal Services on your firewall are open to the Internet. You need to ensure that TestKing's business partners can establish Terminal Services sessions to Testking7. What are two possible ways to achieve this goal?() (Each correct answer presents a complete solution. Choose two)A、Install Terminal Services Licensing on a Windows 2000 Server computer in testking.local. Configure the computer as an Enterprise License Server.B、Install Terminal Services Licensing on a Windows 2000 Server computer in extranet.testking.com. Configure the computer as an Enterprise License ServerC、Install Terminal Services Licensing on a Windows Server 2003 computer in extranet.testking.com. Configure the computer as an Enterprise License Server.D、Install Terminal Services Licensing on a Windows Server 2003 computer in testking.local. Configure the computer as an Enterprise License Server.E、Instruct TestKing's business partners to connect by using the Terminal Services Advanced Client (TSAC) over HTTPS.

Certkiller .com has a software evaluation lab. There is a server in the evaluation lab named as CKT. CKT runs Windows Server 2008 and Microsoft Virtual Server 2005 R2. CKT has 200 virtual servers running on an isolated virtual segment to evaluate software. To connect to the internet, it uses physical network interface card.  Certkiller .com requires every server in the company to access Internet.  Certkiller .com security policy dictates that the IP address space used by software evaluation lab must not be used by other networks. Similarly, it states the IP address space used by other networks should not be used by the evaluation lab network. As an administrator you find you that the applications tested in the software evaluation lab need to access normal network to connect to the vendors update servers on the internet. You need to configure all virtual servers on the CKT server to access the internet. You also need to comply with company’s security policy.  Which two actions should you perform to achieve this task()A、Trigger the Virtual DHCP server for the external virtual network and run  ipconfig/renew command on each virtual serverB、On CKT’s physical network interface, activate the Internet Connection Sharing (ICS)C、Use Certkiller .com intranet IP addresses on all virtual servers on CKT.D、Add and install a Microsoft Loopback Adapter network interface on CKT. Use a new network interface and create a new virtual network.E、None of the above

You want to connect to your branch office printer through the browser. Your Windows 2000 Professional computer is running Peer Web Server. You were told the share name of the printer is HPColorL. You are unable to see it when you type its URL. What do you need to do to connect to this printer? ()A、Double-click the connect hotspot in the left pane of the printer's dialog box to view the printer. B、Ask the branch office administrator to reinstall the printer by using its URL as the port. C、Install Internet Explorer 3.0 or higher on your Windows 2000 Professional.D、Ask the administrator at the branch office to install IIS on the branch server.

You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as the administrator of a SQL Server 2005 computer, and the computer is named SQL1. Microsoft Windows Server 2003 is run by all servers. All the servers belong to a Microsoft Active Directory domain. According to the company written security policy, strong passwords are mandated for all domain, local, and application accounts. The company utilizes a Group Policy object (GPO) to deploy the proper domain password policy. MS-DOS-based or UNIX-based operating systems are run by many of the company’s computers. Varying levels of access to a database named Services on SQL1 is requested by the computers. Since you are the database administrator, you are required to confirm that the Services database can be accessed by these computers. And the company’s written security policy should not be violated.  Which action should be performed by you?()A、A domain account should be created for each of the company’s users. And then, each domain account should be offered with access to SQL1 and the Services database.B、A local logon account should be created on SQL1 for each of the company’s users. And then, each logon account should be offered with access to SQL1 and the Services database.C、One SQL Server logon account should be created for all of the company’s computers running MS-DOS or UNIX-based operating systems. And then, the Enforce password policy option should be enabled for users’ accounts. At last, the logon accounts should be provided with access to the Services database.D、A SQL Server logon account should be created for each of the company’s users. And then, the Enforce password policy option should be enabled for each logon account. At last, each logon account should be offered with access to the Services database.E、A virtual directory should be configured through Internet Information Services (IIS) for access to SQL1. And then, users should be directed to the virtual directory for data access.

You are a database administrator for your company. You are configuring a new SQL Server 2005 computer named SQL1. SQL1 will run Reporting Services. It will also be configured to automatically perform database backups and other maintenance tasks. There are no other SQL Server computers in the network environment. All access to SQL1 will be made by using SQL1s DNS name. You need to disable any unnecessary services on SQL1. Which service or services should you disable?()A、Internet Information ServicesB、SQL Server BrowserC、SQL Server AgentD、Microsoft Distributed Transaction Coordinator

单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server as their messaging solution.During the course of the business week you receive instruction from Company.com to install the Microsoft Exchange Server 2010 management tools on a computer running Microsoft Windows 7. What should you do?()AYou should consider having the Net.TCP Port Sharing service set to Automatic.BYou should consider having Microsoft .NET Framework 3.5.1 and the Internet Information Services (IIS) 6.0 Management console installed first.CYou should consider having the Telnet Client installed first.DYou should consider having the Exchange Best Practices Analyzer run first.

单选题You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as the administrator of a SQL Server 2005 computer, and the computer is named SQL1. Microsoft Windows Server 2003 is run by all servers. All the servers belong to a Microsoft Active Directory domain. According to the company written security policy, strong passwords are mandated for all domain, local, and application accounts. The company utilizes a Group Policy object (GPO) to deploy the proper domain password policy. MS-DOS-based or UNIX-based operating systems are run by many of the company’s computers. Varying levels of access to a database named Services on SQL1 is requested by the computers. Since you are the database administrator, you are required to confirm that the Services database can be accessed by these computers. And the company’s written security policy should not be violated.  Which action should be performed by you?()AA domain account should be created for each of the company’s users. And then, each domain account should be offered with access to SQL1 and the Services database.BA local logon account should be created on SQL1 for each of the company’s users. And then, each logon account should be offered with access to SQL1 and the Services database.COne SQL Server logon account should be created for all of the company’s computers running MS-DOS or UNIX-based operating systems. And then, the Enforce password policy option should be enabled for users’ accounts. At last, the logon accounts should be provided with access to the Services database.DA SQL Server logon account should be created for each of the company’s users. And then, the Enforce password policy option should be enabled for each logon account. At last, each logon account should be offered with access to the Services database.EA virtual directory should be configured through Internet Information Services (IIS) for access to SQL1. And then, users should be directed to the virtual directory for data access.

多选题You are a database administrator for your company. You are configuring a new SQL Server 2005 computer named SQL1. SQL1 will run Reporting Services. It will also be configured to automatically perform database backups and other maintenance tasks. There are no other SQL Server computers in the network environment. All access to SQL1 will be made by using SQL1s DNS name. You need to disable any unnecessary services on SQL1. Which service or services should you disable?()AInternet Information ServicesBSQL Server BrowserCSQL Server AgentDMicrosoft Distributed Transaction Coordinator