You are configuring an active/passive cluster of SRX Series devices as the firewall enforcer on a MAG Series device.Which statement is true?()A、Multiple Infranet Enforcer instances are created with a single serial number of an SRX Series device defined in each configuration.B、A single Infranet Enforcer instance is created with both serial numbers of the clustered SRX Series devices defined in the configuration.C、Multiple Infranet Enforcer instances are created with a single IP address of an SRX Series device defined in each configuration.D、A single Infranet enforcer instance is created with the VIP of the clustered SRX Series device defined in the configuration.

You are configuring an active/passive cluster of SRX Series devices as the firewall enforcer on a MAG Series device.Which statement is true?()

  • A、Multiple Infranet Enforcer instances are created with a single serial number of an SRX Series device defined in each configuration.
  • B、A single Infranet Enforcer instance is created with both serial numbers of the clustered SRX Series devices defined in the configuration.
  • C、Multiple Infranet Enforcer instances are created with a single IP address of an SRX Series device defined in each configuration.
  • D、A single Infranet enforcer instance is created with the VIP of the clustered SRX Series device defined in the configuration.

相关考题:

You have a domain controller named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).You start Server1 in Directory Services Restore Mode and attempt to log on by using the username administrator and a password of Pa$$w0rd. The logon attempt fails.You restart Server1 normally and successfully log on to the server by using the username administrator and a password of Pa$$w0rd.You need to ensure that you can log on to Server1 in Directory Services Restore Mode.What should you do? ()A. From ntdsutil.exe, run Set DSRM Password.B. From ntdsutil.exe, run Security account management.C. From Active Directory Users and Computers, select the Account is trusted for delegation option for the Administrator account.D. From Active Directory Users and Computers, select the Store password using reversible encryption option for the Administrator account.

You need to recommend a strategy for recovering objects deleted from Active Directory that supports the planned changes.   What should you include in the recommendation? ()A、Active Directory Recycle BinB、Active Directory snapshotsC、non-authoritative restoresD、tombstone reanimation

You work as the exchange administrator at Company.com.the Company.com network contains an exchange server 2010 organization.Company.com has its headquarters in stockholm where you are located.you are responsible for an exchange 2010 edge transport server named -ex01.during the course of the week you receive an instruction from the cio to make sure that e-mail messages sent to unknown addresses in the organization is rejected automatically.What should you do?()A、You should consider configuring recipient filtering.B、You should consider configuring sender reputation.C、You should consider configuring content filtering.D、You should consider configuring sender filtering.

You have an existing Active Directory site named Site1. You create a new Active Directory site  and name it Site2.     You need to configure Active Directory replication between Site1 and Site2. You install a new  domain controller. You create the site link between Site1 and Site2.     What should you do next()A、Use the Active Directory Sites and Services console to configure a new site link bridge object.B、Use the Active Directory Sites and Services console to decrease the site link cost between Site1 and Site2.C、Use the Active Directory Sites and Services console to assign a new IP subnet to Site2. Move the new domain contD、Use the Active Directory Sites and Services console to configure the new domain controller as a preferred bridgehe

You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services, configuring name resolution and network access and so on. You are in charge of a domain controller that runs windows server 2008 and the DNS server role. The dns server hosts an active directory-integrated zone for your domain. You need to provide a user with the ability to manage records in the zone. But the user must not so what action should you perform?()A、The user permissions on the zone should be granted.B、The user permissions on the DNS zone should be granted.C、The user should be added to the DNSUpdateProxy Global security group.D、The user should be added to the DNSAdmins domain local security group.

ou work as an administrator at ABC.com. The ABC.com network consists of an Active Directory forest that contains a root domain, named ABC.com, and two child domains, named us.ABC.com and uk.ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed. The root domain hosts a domain local distribution group, named ABCGroup. You are preparing to issue ABCGroup read-only access to a shared folder hosted by the us.ABC.com domain. You want to make sure that ABCGroup is able to access the shared folder in the us.ABC.com domain.  Which of the following actions should you take?()A、You should consider re-configuring ABCGroup as a universal Admins group.B、You should consider re-configuring ABCGroup as a universal security group.C、You should consider re-configuring ABCGroup as a global administrators group.D、You should consider re-configuring ABCGroup as a local administrators group.

You have a domain controller named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You start Server1 in Directory Services Restore Mode and attempt to log on by using the username administrator and a password of Pa$$w0rd. The logon attempt fails. You restart Server1 normally and successfully log on to the server by using the username administrator and a password of Pa$$word. You need to ensure that you can log on to Server1 in Directory Services Restore Mode. What should you do? ()A、From ntdsutil.exe, run Set DSRM Password.B、From ntdsutil.exe, run Security account management.C、From Active Directory Users and Computers, select the Account is trusted for delegation option for the Administrator account.D、From Active Directory Users and Computers, select the Store password using reversible encryption option for the Administrator account.

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is an Active Directory domain in your company. The company runsTerminal Services. All Terminal Services accounts are configured to allow session takeover without permission. A user has used an account named User1 to log on to a server named S02. The session ID forUser1 is 1337. You need to perform a session takeover for session ID 1337. Which commands should you run?()A、You should run Tsdiscon 1337, and then Tscon 1337B、You should run Chgusr 1337 /disable, and then Tscon 1337C、You should run Takeown /U User1 1337, and then Tscon 1337D、You should run Tsdiscon 1337, and then Chgport /U User1 1337

You work as the exchange administrator at TestKing.com. The TestKing.com network has just been migrated to Exchange Server 2010. You are responsible for managing the Exchange network for TestKing.com. The organization contains two Exchange Server 2010 Edge Transport servers and six Hub Transport servers that are located in two Active Directory sites. The Edge Transport servers receive all e-mail messages that are send to the network. You receive an instruction from TestKing to configure anti-spamfiltering. You should make sure that the anti-spam filtering configurations are applied to the EdgeTransport servers. This should be accomplished with the least amount of adminstrative effort. What should you do?()A、You should consider configuring the setting of the one Edge Transport server manually and export it to the other one.B、You should consider configuring EdgeSync synchronization.C、You should consider joining both Edge Transport servers to an Active Directory domain.Thereafter a forest trust should be created for the internal forest.D、You should consider implementing the Active Directory Federation Services (AD FS).

You are designing a strategy for configuring a newly installed Windows Server 2003 computer to meet the Active Directory DNS requirements. How should you configure the computer?()A、As a caching-only DNS servers  B、As the primary DNS server for the fourthcoffee.com DNS zoneC、With a stub zone for the fourthcoffee.com DNS zone hosted by the ISP  D、As a secondary DNS server for the fourthcoffee.com DNS zone hosted by the ISP

You need to recommend a solution for configuring the Web servers. The solution must meet the  company’s technical requirements.What should you include in the recommendations?()A、Active Directory Lightweight Directory Services (AD LDS)B、Failover ClusteringC、HTTP redirectionD、IIS Shared Configuration

Your company has three Active Directory domains in a single forest. You install a new Active Directory enabled application. The application ads new user attributes to the Active Directory schema. You discover that the Active Directory replication traffic to the Global Catalogs has increased. You need to prevent the new attributes from being replicated to the Global Catalog. You must achieve this goal without affecting application functionality. What should you do()A、Change the replication interval for the DEFAULTIPSITELINK object to 9990.B、Change the cost for the DEFAULTIPSITELINK object to 9990.C、Make the new attributes in the Active Directory as defunct.D、Modify the properties in the Active Directory schema for the new attributes.

Company.com has employed you as their Exchange administrator.The Company.com network contains an Exchange Server 2010 Organization.You are responsible for managing the Company.com network.You receive an instruction from management to reject e-mail messages that have a spam confidence level (SCL) of 5.You thus decide to configure the organization to accomplish this task. What should you do?()A、You should consider configuring the sender reputation.B、You should consider configuring the sender filtering.C、You should consider configuring the content filtering.D、You should consider configuring the recipient filtering.

Your network contains an Active Directory forest.   You add an additional user principal name (UPN) suffix to the forest.   You need to modify the UPN suffix of all users. You want to achieve this goal by using the minimum  amount of administrative effort.   What should you use()A、the Active Directory Domains and Trusts consoleB、the Active Directory Users and Computers consoleC、the Csvde toolD、the Ldifde tool

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a single Active Directory domain in your company. The domaincontains a server that runs Windows Server 2008. The server has Windows SharePoint Services (WSS)installed. Now you receive an order from the company management. According to the company requirement, you should allow users to create distribution lists from a SharePoint site. What action should you perform on the WSS server?()A、The site should be configured to use the default Rights Management server in Active Directory DomainServices.B、The outgoing mail character set should be set to 1200(Unicode).C、The SharePoint Directory Management Service should be enabled.D、The site should be configured to accept messages from authenticated users only.

You are designing a strategy for configuring a newly installed Windows Server 2003 computer to meet the Active Directory DNS requirements.  How should you configure the computer?()A、 As a caching-only DNS serversB、 As the primary DNS server for the fourthcoffee.com DNS zoneC、 With a stub zone for the fourthcoffee.com DNS zone hosted by the ISPD、 As a secondary DNS server for the fourthcoffee.com DNS zone hosted by the ISP

You want users to log on to Active Directory by using a new Principal Name (UPN). You need to modify the UPN suffix for all user accounts. Which tool should you use()A、DsmodB、NetdomC、RedirusrD、Active Directory Domains and Trusts

All servers on your network run Windows Server 2008 R2. You deploy Remote Desktop Services  (RDS). You are configuring the Remote Desktop Session Host (RD Session Host) role service. You need to ensure that programs that are running continue to run when users are no longer actively connected to the RD Session Host server. Which setting should you configure?()A、Idle session limitB、Active session limitC、End a disconnected sessionD、When a session limit is reached or connection is broken

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 cluster. According to the company requirement, the failover response of the cluster has to be tested. The company assigns this task to you. On the cluster, you have to implement a manual failover.  What should you do? () A、The contents of a shared folder on the active node should be encrypted by using Encrypting File System (EFS) B、You should restore a backup to the active node C、You should get rid of the shared array from the active node D、From the active node, you have to uplug the network cable(s)

单选题You are designing a strategy for configuring a newly installed Windows Server 2003 computer to meet the Active Directory DNS requirements.  How should you configure the computer?()A As a caching-only DNS serversB As the primary DNS server for the fourthcoffee.com DNS zoneC With a stub zone for the fourthcoffee.com DNS zone hosted by the ISPD As a secondary DNS server for the fourthcoffee.com DNS zone hosted by the ISP

单选题You work as the exchange administrator at Company.com.the Company.com network contains an exchange server 2010 organization.Company.com has its headquarters in stockholm where you are located.you are responsible for an exchange 2010 edge transport server named -ex01.during the course of the week you receive an instruction from the cio to make sure that e-mail messages sent to unknown addresses in the organization is rejected automatically.What should you do?()AYou should consider configuring recipient filtering.BYou should consider configuring sender reputation.CYou should consider configuring content filtering.DYou should consider configuring sender filtering.

单选题ou work as an administrator at ABC.com. The ABC.com network consists of an Active Directory forest that contains a root domain, named ABC.com, and two child domains, named us.ABC.com and uk.ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed. The root domain hosts a domain local distribution group, named ABCGroup. You are preparing to issue ABCGroup read-only access to a shared folder hosted by the us.ABC.com domain. You want to make sure that ABCGroup is able to access the shared folder in the us.ABC.com domain.  Which of the following actions should you take?()AYou should consider re-configuring ABCGroup as a universal Admins group.BYou should consider re-configuring ABCGroup as a universal security group.CYou should consider re-configuring ABCGroup as a global administrators group.DYou should consider re-configuring ABCGroup as a local administrators group.

单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a single Active Directory domain in your company. The domaincontains a server that runs Windows Server 2008. The server has Windows SharePoint Services (WSS)installed. Now you receive an order from the company management. According to the company requirement, you should allow users to create distribution lists from a SharePoint site. What action should you perform on the WSS server?()AThe site should be configured to use the default Rights Management server in Active Directory DomainServices.BThe outgoing mail character set should be set to 1200(Unicode).CThe SharePoint Directory Management Service should be enabled.DThe site should be configured to accept messages from authenticated users only.

单选题You work as the exchange administrator at TestKing.com. The TestKing.com network has just been migrated to Exchange Server 2010. You are responsible for managing the Exchange network for TestKing.com. The organization contains two Exchange Server 2010 Edge Transport servers and six Hub Transport servers that are located in two Active Directory sites. The Edge Transport servers receive all e-mail messages that are send to the network. You receive an instruction from TestKing to configure anti-spamfiltering. You should make sure that the anti-spam filtering configurations are applied to the EdgeTransport servers. This should be accomplished with the least amount of adminstrative effort. What should you do?()AYou should consider configuring the setting of the one Edge Transport server manually and export it to the other one.BYou should consider configuring EdgeSync synchronization.CYou should consider joining both Edge Transport servers to an Active Directory domain.Thereafter a forest trust should be created for the internal forest.DYou should consider implementing the Active Directory Federation Services (AD FS).

单选题Company.com has employed you as their Exchange administrator.The Company.com network contains an Exchange Server 2010 Organization.You are responsible for managing the Company.com network.You receive an instruction from management to reject e-mail messages that have a spam confidence level (SCL) of 5.You thus decide to configure the organization to accomplish this task. What should you do?()AYou should consider configuring the sender reputation.BYou should consider configuring the sender filtering.CYou should consider configuring the content filtering.DYou should consider configuring the recipient filtering.

单选题You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services, configuring name resolution and network access and so on. You are in charge of a domain controller that runs windows server 2008 and the DNS server role. The dns server hosts an active directory-integrated zone for your domain. You need to provide a user with the ability to manage records in the zone. But the user must not so what action should you perform?()AThe user permissions on the zone should be granted.BThe user permissions on the DNS zone should be granted.CThe user should be added to the DNSUpdateProxy Global security group.DThe user should be added to the DNSAdmins domain local security group.

多选题You are configuring SQL1 so that the distributed query in the Sales database can access data in the CRM database on SQL2. You create a linked server for SQL2, and you create a linked server login that uses impersonation.Now, you need to ask the network administrator to configure SQL1. Which two tasks should you ask the administrator to perform?()AAdd the user account that is used by the SQL Server service to the local Administrators group.BEnable the Do not trust this user for delegation Active Domain property for the user account that is used by the SQL Server service.CCreate a Service Principal Name (SPN) for the user account that is used by the SQL Server service.DEnable the Trusted for delegation Active Domain property for the user account that is used by the SQL Server service.

多选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 cluster. According to the company requirement, the failover response of the cluster has to be tested. The company assigns this task to you. On the cluster, you have to implement a manual failover.  What should you do? ()AThe contents of a shared folder on the active node should be encrypted by using Encrypting File System (EFS)BYou should restore a backup to the active nodeCYou should get rid of the shared array from the active nodeDFrom the active node, you have to uplug the network cable(s)