单选题Cer-tech .com has an Active Directory domain. It has Terminal services installed on the Windows Server2008 computers in the domain. All client machines have Windows Vista as their operating system. Due to anature of work, users are required to view some training videos on Windows Media Player 11 duringTerminal Services session. What should you do to ensure that the users could run Windows Media Player11 during the Terminal services session?()AOn the terminal server, install the Quality Audio Video feature.BOpen the Terminal server settings and enable the ’allow desktop applications to run on session’. Disablethe default settingsCInstall and configure the Desktop Experience feature on the terminal serverDCreate a group policy object that allows Windows Media Player 11 to set the differential services codepoint value to 10 and apply the policy to the client machines that want to use Windows Media Player 11
单选题
Cer-tech .com has an Active Directory domain. It has Terminal services installed on the Windows Server2008 computers in the domain. All client machines have Windows Vista as their operating system. Due to anature of work, users are required to view some training videos on Windows Media Player 11 duringTerminal Services session. What should you do to ensure that the users could run Windows Media Player11 during the Terminal services session?()
A
On the terminal server, install the Quality Audio Video feature.
B
Open the Terminal server settings and enable the ’allow desktop applications to run on session’. Disablethe default settings
C
Install and configure the Desktop Experience feature on the terminal server
D
Create a group policy object that allows Windows Media Player 11 to set the differential services codepoint value to 10 and apply the policy to the client machines that want to use Windows Media Player 11
参考解析
解析:
暂无解析
相关考题:
Cer-tech .com has a single Active Directory domain called cer-tech.com. All servers in the domain runWindows Server 2008. There are two domain controllers in the network: ED1 and ED2 and the DNS service is installed on the domain controllers. Both DNS servers host Active Directory integrated zones thatare configured to allow the most secured updates. ED1 has a Key Management Services (KMS) installedand activated. During maintenance, you find that the service locater records from the cer-tech.com zonehosted on Server02 and Server02 are missing. You have to force registration of the KMS service locatorrecords in the Cer-tech .com zone. What should you do to correct this problem?()A、Execute slmgr.vbs script on ED1 at the command promptB、Configure non-secure updates on cer-tech.comC、Execute the net stop netlogon command on ED2 and run net start logon commandD、At the command prompt on ED1, run net stop sppsvc command and after that execute the net start sppsvc command
You are designing the DNS topology to meet the business and technical requirements. Which DNS structure should you use?()A、 one primary zoneB、 two primary zonesC、 one Active Directory-integrated zone that has the replication scope set to all DNS servers in the forest.D、 two Active Directory-integrated zones that have the replication scopes set to all DNS servers in the forest.E、 one Active Directory-integrated zone that has the replication scope set to all domain controllers in the domain.F、 two Active Directory-integrated zones that have the replication scopes set to all domain controllers in the domain.
Certkiller.com has an active directory forest on a single domain. Certkiller needs a distributed application that employs a custom application. The application is directory partition software named PARDAT. You need to implement this application for data replication. Which two tools should you use to achieve this task()A、Dnscmd.B、Ntdsutil.C、IpconfigD、DnsutilE、All of the above
Certkiller .com has a main office and 30 branch offices. To manage the network, each branch office has a separate active directory site that has a dedicated read-only domain controller (RODC). A branch office located in a far off location reports a robbery. The robbers have stolen the RODC server. Which utility should you do to recover the user accounts that were cached on the stolen RODC server()A、Execute Dsmod.exeB、Use Active Directory Users and ComputersC、Use Active Directory Sites and ComputersD、Execute Ntdstuil.exe with -ato parameter
Cer-tech .com has a server that hosts an Active Directory domain. A server at Cer-tech .com named Server02 has Terminal services role and Terminal Services web access role installed. It also has a servercalled Server0SA that runs ISA Server 2006. You are assigned the task to deploy Terminal ServicesGateway (TS Gateway) role on a new server called Server04 . Cer-tech .com. Cer-tech .com wants toemploy ISA as the SSL endpoint for Terminal Server connections. After doing the necessary configurations, you succeed in deploying TS Gateway role on Server04 . Cer-tech .com. Now you have toconfigure the ISA for TS connections. To do this you need to configure the TS gateway on Server04 to useISA 2006 on Server02 . What should you do to achieve this objective?()A、On Server04 , configure the Terminal Services Connection Authorization Policy store to use Server02 ass the Central network policy serverB、Design an SSL certificate from Server04 and export it to install the SSL certificate on Server02 . Set the ISA service on Server02 to use SSL certificate on Server04C、Set the TS gateway to use SSL HTTPS-HTTP bridgingD、Export an SSL certificate on Server04 and install it on Server02 . Set the TS gateway to accept SSL certificate from Server02
Certkiller .com has a network that consists of a single Active Directory domain. A technician has accidently deleted an Organizational unit (OU) on the domain controller. As an administrator of Certkiller .com, you are in process of restoring the OU. You need to execute a non-authoritative restore before an authoritative restore of the OU. Which backup should you use to perform non-authoritative restore of Active Directory Domain Services (AD DS) without disturbing other data stored on domain controller()A、Critical volume backupB、Backup of all the volumesC、Backup of the volume that hosts Operating systemD、Backup of AD DS foldersE、all of the above
Your company has a main office and three branch offices. The company has an Active Directory forest that has a single domain. Each office has one domain controller. Each office is configured as an Active Directory site. All sites are connected with the DEFAULTIPSITELINK object. You need to decrease the replication latency between the domain controllers. What should you do()A、Decrease the cost between the connection objects.B、Decrease the replication interval for all connection objects.C、Decrease the replication interval for the DEFAUL TIPSITELINK object.D、Decrease the replication schedule for the DEFAUL TIPSITELINK object.
As an administrator at Certkiller.com, you have installed an Active Directory forest that has a single domain. You have installed an Active Directory Federation services (AD FS) on the domain member server. What should you do to configure AD FS to make sure that AD FS token contains information from the active directory domain()A、Add a new account store and configure it.B、Add a new resource partner and configure itC、Add a new resource store and configure itD、Add a new administrator account on AD FS and configure itE、None of the above
Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2008 and are configured as DNS servers. A domain controller named DC1 has a standard primary zone for contoso,com. A domain controller named DC2 has a standard secondary zone for contoso,com. You need to ensure that the replication of the contoso,com zone is encrypted. You must not lose any zone data. What should you do()A、On both servers, modify the interface that the DNS server listens on.B、Convert the primary zone into an Active Directory-integrated zone. Delete the secondary zone.C、Convert the primary zone into an Active Directory-integrated stub zone. Delete the secondary zone.D、Configure the zone transfer settings of the standard primary zone. Modify the Master Servers lists on the secondary zone.
You have an Active Directory directory service forest with a forest root domain. The root domain has two child domains named na.corp.contoso.com and asia.prod.contoso.com. You have an Active Directory site for each domain. All sites are connected through the DEFAULTIPSITELINK site link. You need to minimize the time that is required to authenticate users when they access resources in the other domain. What should you do?()A、 Create a shortcut trust between the child domains.B、 Create a shortcut trust from the forest root domain to each of the child domains.C、 Decrease the replication interval for the DEFAULTIPSITELINK site link.D、 Create a batch script to replicate changes between the sites. Schedule the script to run on a regular basis.
单选题Contoso, Ltd. has an Active Directory domain named ad.contoso.com. Fabrikam, Inc. has an Active Directory domain named intranet.fabrikam.com. Fabrikam’s security policy prohibits the transfer of internal DNS zone data outside the Fabrikam network. You need to ensure that the Contoso users are able to resolve names from the intranet.fabrikam.com domain. What should you do()ACreate a new stub zone for the intranet.fabrikam.com domain.BConfigure conditional forwarding for the intranet.fabrikam.com domain.CCreate a standard secondary zone for the intranet.fabrikam.com domain.DCreate an Active Directory-integrated zone for the intranet.fabrikam.com domain.
单选题Your company has an Active Directory domain. A user attempts to log on to a computer that was turned off for twelve weeks. The administrator receives an error message that authentication has failed. You need to ensure that the user is able to log on to the computer. What should you do()ARun the netdom TRUST /reset command.BRun the netsh command with the set and machine options.CRun the Active Directory Users and Computers console to disable, and then enable the computer account.DReset the computer account. Disjoin the computer from the domain, and then rejoin the computer to the domain.
单选题You are designing the DNS topology to meet the business and technical requirements. Which DNS structure should you use?()Aone primary zoneBtwo primary zones Cone Active Directory-integrated zone that has the replication scope set to all DNS servers in the forest.Dtwo Active Directory-integrated zones that have the replication scopes set to all DNS servers in the forest.Eone Active Directory-integrated zone that has the replication scope set to all domain controllers in the domain.Ftwo Active Directory-integrated zones that have the replication scopes set to all domain controllers in the domain.
单选题Your company has an Active Directory domain named ad.contoso.com. All client computers run Windows Vista. The company has recently acquired a company that has an Active Directory domain named ad.fabrikam.com. A two-way forest trust is established between the ad.fabrikam.comdomain and the ad.contoso.com domain. You need to edit the ad.contoso.com domain Group Policy object (GPO) to enable users in the ad.contoso.com domain to access resources in thead.fabrikam.com domain. What should you do?()AConfigure the DNS Suffix Search List option to ad.contoso.com, ad.fabrikam.com.BConfigure the Allow DNS Suffix Appending to Unqualified Multi-Label Name Queries option to True.CConfigure the Primary DNS Suffix option to ad.contoso.com, ad.fabrikam.com. Configure the Primary DNS Suffix Devolution option to True.DConfigure the Primary DNS Suffix option to ad.contoso.com, ad.fabrikam.com. Configure the Primary DNS Suffix Devolution option to False.
多选题Certkiller.com has an active directory forest on a single domain. Certkiller needs a distributed application that employs a custom application. The application is directory partition software named PARDAT. You need to implement this application for data replication. Which two tools should you use to achieve this task()ADnscmd.BNtdsutil.CIpconfigDDnsutilEAll of the above
多选题Your company network has an Active Directory forest that has one parent domain and one child domain. The child domain has two domain controllers that run Windows Server 2008. All user accounts from the child domain are migrated to the parent domain. The child domain is scheduled to be decommissioned. You need to remove the child domain from the Active Directory forest. What are two possible ways to achieve this goal()ADelete the computer accounts for each domain controller in the child domain. Remove the trust relationship between the parent domain and the child domain.BRun the Dcpromo tool that has individual answer files on each domain controller in the child domain.CRun the Computer Management console to stop the Domain Controller service on both domain controllers in the child domain.DUse Server Manager on both domain controllers in the child domain to uninstall the Active Directory domain services role.
单选题Your company has an Active Directory domain named ad.contoso.com All client computers run Windows Vista. The company has recently acquired a company that has an Active Directory domain named ad. fabrikam.com. A two-way forest trust is established between the ad.fabrikam.com domain and the ad. contoso.com domain. You need to edit the ad.contoso.com domain Group Policy Object (GPO) to enable users in ad.contoso.com domain to access resources in the ad.frabrikam.com domain. What should you do?()AConfigure the DNS suffix Search List option to ad.contoso.com, ad.fabrikam.comBConfigure the Allow DNS Suffix appending to Unqualified Multi-Label Name Queries option to TrueCConfigure the Primary DNS Suffix to ad.contoso.com, ad.fabrikam.com. configure the Primary DNS suffix Devolution option to TrueDConfigure the Primary DNS Suffix to ad.contoso.com, ad.fabrikam.com. configure the Primary DNS suffix Devolution option to False
单选题Your company has an active directory domain named ad.contoso.com all client computers run windows vista. The company has recently acquired a company that has an active directory domain named ad.fabrikam.com. a two-way forest trust is established between the ad.fabrikam.com domain and the ad.contoso.com domain. You need to edit the ad.contoso.com domain group policy object (GPO) to enable users in ad.contoso.com domain to access resources in the ad.frabrikam.com domain.What should you do?()AConfigure the DNS suffix searc List option to ad.contoso.com, ad.fabrikam.com .BConfigure the allow DNS suffix appending to unqualified milti-label name queries option to true.CConfigure the primary DNS suffix to ad.contoso.com, ad.fabrikam.com. configure the primary DNS suffix devolution option to true.DConfigure the primary DNS Suffix to ad.contoso.com, ad.fabrikam.com. configure the primary DNS suffix devolution option to false.
单选题Your company has an Active Directory forest that contains a single domain. The domain member server has an Active Directory Federation Services (AD FS) server role installed. You need to configure AD FS to ensure that AD FS tokens contain information from the Active Directory domain. What should you do()AAdd and configure a new account store.BAdd and configure a new account partner.CAdd and configure a new resource partner.DAdd and configure a Claims-aware application.
单选题Certkiller .com has a network that consists of a single Active Directory domain. A technician has accidently deleted an Organizational unit (OU) on the domain controller. As an administrator of Certkiller .com, you are in process of restoring the OU. You need to execute a non-authoritative restore before an authoritative restore of the OU. Which backup should you use to perform non-authoritative restore of Active Directory Domain Services (AD DS) without disturbing other data stored on domain controller()ACritical volume backupBBackup of all the volumesCBackup of the volume that hosts Operating systemDBackup of AD DS foldersEall of the above
单选题Contoso, Ltd has an Active Directory domain named ad.contoso.com Fabrikam, Inc. has an Active Directory domain named intranet.fabrikam.com. Fabrikams security policy prohibits the transfer of internal DNS zone data outside the Fabrikam network. You need to ensure that the Contoso users are able to resolve names from the intranet.fabrikam.com domain. What should you do()ACreate a new stub zone for the intranet.fabrikam,com domain.BConfigure conditional forwarding for the intranet.fabrikam.com domain.CCreate a standard secondary zone for the intranet.fabrikam.com domain.DCreate an Active DirectoryCintegrated zone for the intranet.fabrikam.com domain.
单选题Certkiller .com has a network that is comprise of a single Active Directory Domain. As an administrator at Certkiller .com, you install Active Directory Lightweight Directory Services (AD LDS) on a server that runs Windows Server 2008. To enable Secure Sockets Layer (SSL) based connections to the AD LDS server, you install certificates from a trusted Certification Authority (CA) on the AD LDS server and client computers. Which tool should you use to test the certificate with AD LDS()ALdp.exeBActive Directory Domain servicesCntdsutil.exeDLds.exeEwsamain.exeFNone of the above
单选题Your company has a single domain named contoso.com. The contoso.com DNS zone is Active Directory-integrated. Your partner company has a single domain named partner.com. The partner.com DNS zone is Active Directory-integrated. The IP addresses of the DNS servers in the partner domain will change. You need to ensure name resolution for users in contoso.com to resources in partner.com. What should you do?()ACreate a stub zone for partner.com on each DNS server in contoso.com.BConfigure the Zone Replication Scope for partner.com to replicate to all DNS servers in the forest.CConfigure an application directory partition in the contoso.com forest. Enlist all DNS servers in the contoso.com forest in the partition.DConfigure an application directory partition in the partner forest. Enlist all DNS servers in the partner forest in the partition.
单选题You have an Active Directory directory service forest with a forest root domain. The root domain has two child domains named na.corp.contoso.com and asia.prod.contoso.com. You have an Active Directory site for each domain. All sites are connected through the DEFAULTIPSITELINK site link. You need to minimize the time that is required to authenticate users when they access resources in the other domain. What should you do?()A Create a shortcut trust between the child domains.B Create a shortcut trust from the forest root domain to each of the child domains.C Decrease the replication interval for the DEFAULTIPSITELINK site link.D Create a batch script to replicate changes between the sites. Schedule the script to run on a regular basis.
单选题Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2008 R2 and are configured as DNS servers. A domain controller named DC1 has a standard primary Zone for contoso.com. A domain controller named DC2 has a standard secondary zone for contoso.com. You need to ensure that the replication of the contoso.com zone is encrypted. You must not lose any zone data. What should you do()AOn both servers, modify the interface that the DNS server listens on.BConvert the primary zone into an Active Directory-integrated zone. Delete the secondary zone. CConvert the primary zone into an Active Directory-integrated stub zone. Delete the secondary zone.DConfigure the zone transfer settings of the standard primary zone. Modify the Master Servers lists on the secondary zone.
单选题Your company, Contoso, Ltd , has offices in North America and Europe. Contoso has an Active Directory forest that has three domains. You need to reduce the time required to authenticate users from the labs.eu. contoso.com domain when they access resources in the eng.na.contoso.com domain. What should you do()ADecrease the replication interval for all Connection objects.BDecrease the replication interval for the DEFAULTIPSITELINK site link.CSet up a one-way shortcut trust from eng.na.contoso.com to labs.eu.contoso.com.DSet up a one-way shortcut trust from labs.eu.contoso.com to eng.na.contoso.com.