Your network contains two servers named Server1 and Server2 that run Windows Server 2008 R2.From Server1, you create a collector-initiated subscription that uses Server2 as a source computer.You verify the event subscription and discover the error message shown in the exhibit. (Click the Exhibit button.) You need to ensure that the subscription collection runs successfully. What should you do?() A、On Server1, run winrm quickconfig.B、On Server2, run winrm quickconfig.C、From the properties of the subscription, modify the User Account options.D、From the properties of the subscription, modify the Protocol and Port options.

Your network contains two servers named Server1 and Server2 that run Windows Server 2008 R2.From Server1, you create a collector-initiated subscription that uses Server2 as a source computer.You verify the event subscription and discover the error message shown in the exhibit. (Click the Exhibit button.) You need to ensure that the subscription collection runs successfully. What should you do?()

  • A、On Server1, run winrm quickconfig.
  • B、On Server2, run winrm quickconfig.
  • C、From the properties of the subscription, modify the User Account options.
  • D、From the properties of the subscription, modify the Protocol and Port options.

相关考题:

Your network contains a server that runs Windows Server 2008 R2. You need to schedule backups of the server. The solution must ensure that multiple versions of the backup are available.Which two possible backup locations should you use?()A. external hard diskB. internal hard diskC. optical mediaD. remote shared folder

Your wireless network is not listed in the Connect to a network window of your computer. You need to connect to your wireless network.Which two actions should you perform?() A.AB.BC.CD.DE.E

Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system.Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()A. core layerB. bridging two VLANs on one switchC. between two Layer 2 devices withtrunkingD. between two Layer 2 devices withouttrunking

Your company has two data centers.  Each data center contains a perimeter network.  Your network contains an Exchange Server 2010 organization.  You plan to deploy Exchange Server 2010 Edge Transport servers in the perimeter networks.  You need to recommend a solution for the Edge Transport servers that meets the following requirements:.Distribute inbound e-mail messages across all Edge Transport servers  .Ensure that users receive inbound e-mail messages if an Edge Transport server fails  .Ensure that users receive inbound e-mail messages if a single data center network becomes unavailable .Minimize costs  What should you recommend?()A、In each perimeter network, deploy one Edge Transport server. Implement failover clustering.B、In each perimeter network, deploy two Edge Transport servers. Implement failover clustering.C、In each perimeter network, deploy one Edge Transport server. Configure a mail exchange (MX) record for each server.D、In each perimeter network, deploy two Edge Transport servers. Configure a mail exchange (MX) record for each server.

Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system .Which two of these are characteristics of an IDS sensor?()A、 has a permissive interface that is used to monitor networksB、 is an active device in the traffic pathC、 passively listens to network trafficD、 has a promiscuous interface that is used to monitor the network

Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()A、 core layerB、 bridging two VLANs on one switchC、 between two Layer 2 devices with trunkingD、 between two Layer 2 devices without trunking

Your network contains an Active Directory domain that has two sites.    You need to identify whether logon scripts are replicated to all domain controllers.   Which folder should you verify()A、GroupPolicyB、NTDSC、SoftwareDistributionD、SYSVOL

Your network contains an internal network and a perimeter network. The internal network contains a single Active Directory site.  The perimeter network contains two Exchange Server 2010 Edge Transport servers. You plan to deploy an Exchange Server 2010 organization on the internal network.  You need to plan the deployment of Hub Transport server roles to meet the following requirements:.If a single Hub Transport server fails, e-mail messages from the Internet must be delivered to the Mailboxservers. .If a single Hub Transport server fails, users must be able to send e-mail messages to other users thathave mailboxes on the same Mailbox server.  What should you include in the plan?()A、Deploy one Edge Transport server on the internal network, and then configure EdgeSync synchronization.B、Deploy one Hub Transport server on the internal network, and then configure EdgeSync synchronization.C、Deploy one Hub Transport server on the internal network and one Hub Transport server on the perimeter network.D、Deploy two Hub Transport servers on the internal network.

Your network contains two servers that run the Server Core installation of Windows Server 2008 R2.  The two servers are part of a Network Load Balancing cluster. The cluster hosts a Web site.  Administrators use client computers that run Windows 7.   You need to recommend a strategy that allows the administrators to remotely manage the Network Load  Balancing cluster. Your strategy must support automation.  What should you recommend?()A、On the servers, enable Windows Remote Management (WinRM).B、On the servers, add the administrators to the Remote Desktop Users group.C、On the Windows 7 client computers,enable Windows Remote Management (WinRM).D、On the Windows 7 client computers,add the administrators to the Remote Desktop Users group.

Your network contains two Hyper-V hosts that run Windows Server 2012 R2. The Hyper-V hosts contains several virtual machines that run Windows Server 2012 R2. You install the Network Load Balancing feature on the virtual machines. You need to configure the virtual machines to support Network Load Balancing (NLB). Which virtual machine settings should you configure?()A、Port mirroringB、DHCP guardC、Router guardD、MAC address

多选题Your network contains an Active Directory domain. The network has DirectAccess deployed.You deploy the DirectAccess Connectivity Assistant (DCA) to all client computers.You need to ensure that users can view their DirectAccess status by using the DCA.Which two group policy settings should you configure?()ADynamic Tunnel Endpoints (DTEs)BCorporate Portal SiteCCorporate ResourcesDPortalName

单选题Your company has a main office and a branch office. The offices connect by using WAN links. The network consists of a single Active Directory domain. An Active Directory site exists for each office.   Servers in both offices run Windows Server 2008 R2 Enterprise.   You plan to deploy a failover cluster solution to service users in both offices.  You need to plan a failover cluster to meet the following requirements: èMaintain the availability of services if a single server fails èMinimize the number of servers required What should you include in your plan?()ADeploy a failover cluster that contains one node in each office.BDeploy a failover cluster that contains two nodes in each office.CIn the main office, deploy a failover cluster that contains one node. In the branch office, deploy a  failover cluster that contains one node.DIn the main office, deploy a failover cluster that contains two nodes. In the branch office, deploy a  failover cluster that contains two nodes.

单选题Your network consists of a single Active Directory domain. The network contains 20 file servers that run Windows Server 2008 R2. Each file server contains two volumes. One volume contains the operating system. The other volume contains all data files.    You need to plan a recovery strategy that meets the following requirements: èAllows the operating system to be restored èAllows the data files to be restored èEnsures business continuity   èMinimizes the amount of time to restore the server What should you include in your plan?()AWindows Deployment Services (WDS)BWindows Automated Installation Kit (Windows AIK) and folder redirectionCthe Multipath I/O feature and Volume Shadow CopiesDthe Windows Server Backup feature and System Image Recovery

单选题Your network consists of a single Active Directory domain. The network contains two Windows Server 2008 R2 computers named Server1 and Server2. The company has two identical print devices. You plan to deploy print services.  You need to plan a print services infrastructure to meet the following requirements: èManage the print queue from a central location.    èMake the print services available, even if one of the print devices fails. What should you include in your plan?()AInstall and share a printer on Server1. Enable printer pooling.BInstall the Remote Desktop Services server role on both servers.Configure Remote Desktop Connection broker(RD Connection Broker).CInstall and share a printer on Serve1. Install and share a printer on Server2. Use Print Management to install the printers on the client computers.D Add Server1 and Server2 to a Network Load Balancing cluster. Install a printer on each node of the  cluster.

单选题Your company has two data centers.  Each data center contains a perimeter network.  Your network contains an Exchange Server 2010 organization.  You plan to deploy Exchange Server 2010 Edge Transport servers in the perimeter networks.  You need to recommend a solution for the Edge Transport servers that meets the following requirements:.Distribute inbound e-mail messages across all Edge Transport servers  .Ensure that users receive inbound e-mail messages if an Edge Transport server fails  .Ensure that users receive inbound e-mail messages if a single data center network becomes unavailable.Minimize costs  What should you recommend?()AIn each perimeter network, deploy one Edge Transport server. Implement failover clustering.BIn each perimeter network, deploy two Edge Transport servers. Implement failover clustering.CIn each perimeter network, deploy one Edge Transport server. Configure a mail exchange (MX) record for each server.DIn each perimeter network, deploy two Edge Transport servers. Configure a mail exchange (MX) record for each server.

单选题You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()AUse Windows Explorer to receive the offline filesBUsing the Windows Explorer, disable the cache for the reports on the network shareCUse the Windows NT explorer to grant the special access for the reports on the network  shareDUse the synchronization manager to configure synchronization not to occur when users are  connected to the LAN connection.

单选题You are a network administrator and you need to implement a routing protocol on your network that provides: * Scalability * VLSM support * Minimal overhead * Support for connecting networks using routers of multiple vendors Which of the following routing protocol would best serve your needs?()AVTPBRIP version 1CEIGRPDOSPFEIGRPFCDP

单选题Your network contains two Exchange Server 2010 Mailbox servers.You create a database availability group (DAG).You need to ensure that the Exchange servers can replicate mailbox databases.What should you do?()AModify the membership list of the DAGBAdd the Network Load Balancing feature on both serversCAdd Active Directory Federation Services (AD FS) on both serversDEnable Datacenter Activation Coordination (DAC) mode for the DAG

多选题Your network contains a server that runs Windows Server 2008 R2. You need to schedule backups of the server. The solution must ensure that multiple versions of the backup are available. Which two possible backup locations should you use?()Aexternal hard diskBinternal hard diskCoptical mediaDremote shared folder

多选题Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system.Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()Acore layerBbridging two VLANs on one switchCbetween two Layer 2 devices withtrunkingDbetween two Layer 2 devices withouttrunking

单选题Your network contains two Exchange Server 2010 Edge Transport servers.  The network also contains five Hub Transport servers in two Active Directory sites. All e-mail sent to the network is received by the Edge Transport servers. You plan to configure anti-spam filtering.  You need to ensure that the anti-spam filtering configurations are applied to both Edge Transport servers. The solution must use a minimum amount of administrative effort.  What should you do?()AConfigure EdgeSync synchronization.BImplement Active Directory Federation Services (AD FS).CJoin both Edge Transport servers to an Active Directory domain and then create a forest trust from the internal forest.DManually configure settings on one Edge Transport server and then export the settings to the othe rEdge Transport server.