As the Certkiller administrator you had installed a read-only domain controller (RODC) server at remote location.  The remote location doesn’t provide enough physical security for the server.  What should you do to allow administrative accounts to replicate authentication information to Read-Only Domain Controllers()A、Remove any administrative accounts from RODC’s groupB、Add administrative accounts to the domain Allowed RODC Password Replication groupC、Set the Deny on Receive as permission for administrative accounts on the RODC computer account security tab for the Group Policy Object (GPO)D、Configure a new Group Policy Object (GPO) with the Account Lockout settings enabled. Link the GPO to the remote location. Activate the Read Allow and the Apply group policy Allow permissions for the administrators on the Security tab for the GPO.E、None of the above

As the Certkiller administrator you had installed a read-only domain controller (RODC) server at remote location.  The remote location doesn’t provide enough physical security for the server.  What should you do to allow administrative accounts to replicate authentication information to Read-Only Domain Controllers()

  • A、Remove any administrative accounts from RODC’s group
  • B、Add administrative accounts to the domain Allowed RODC Password Replication group
  • C、Set the Deny on Receive as permission for administrative accounts on the RODC computer account security tab for the Group Policy Object (GPO)
  • D、Configure a new Group Policy Object (GPO) with the Account Lockout settings enabled. Link the GPO to the remote location. Activate the Read Allow and the Apply group policy Allow permissions for the administrators on the Security tab for the GPO.
  • E、None of the above

相关考题:

你安装一台新的服务器server1,运行windows server 2008.服务器已经安装了流媒体服务角色。你安装和激活了所有windows媒体服务控制协议。用户通过防火墙以本地或远程方式连接到server1.你需要确保只有用户从Internet访问server1时协议翻转才发生。应该怎么做?()A、在server1上安装多播协议B、在网络适配器上安装质量服务(QoS)C、配置防火墙允许端口1755流量到server1D、用通告使用户能够访问流媒体

You have a server that runs Windows Server 2008. You need to prevent the server from establishing communication sessions to other computers by using TCP port 25. What should you do()A、 From Windows Firewall, add an exceptionB、 From windows Firewall enable the block all incoming connections optionC、 From the Windows Firewall with Advanced Security snap-in, create an inbound ruleD、 From the Windows Firewall with Advanced Security snap-in, create an outbound rule.

You are the network administrator for The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. All confidential company files are stored on a file server named TestKing1. The written company security states that all confidential data must be stored and transmitted in a secure manner. To comply with the security policy, you enable Encrypting File System (EFS) on the confidential files. You also add EFS certificates to the data decryption field (DDF) of the confidential files for the users who need to access them. While performing network monitoring, you notice that the confidential files that are stored on TestKing1 are being transmitted over the network without encryption. You must ensure that encryption is always used when the confidential files on TestKing1 are stored and transmitted over the network. What are two possible ways to accomplish this goal? ()(Each correct answer presents a complete solution. Choose two)A、Enable offline files for the confidential files that are stored on TestKing1, and select the Encrypt offline files to secure data check box on the client computers of the users who need to access the files.B、Use IPSec encryption between TestKing1 and the client computers of the users who need to access the confidential files.C、Use Server Message Block (SMB) signing between TestKing1 and the client computers of the users who need to access the confidential files.D、Disable all LM and NTLM authentication methods on TestKing1.E、Use IIS to publish the confidential files. Enable SSL on the IIS server. Open the files as a Web folder.

You administer a SQL Server 2008 instance. The instance runs on a computer that has the following features: A 64-GB RAM  Four quad-core processors  Several independent physical raid volumes  You plan to implement a transactional database on the instance. The database is expected to have a high volume of INSERT, UPDATE, and DELETE activities. The activities include creation of new tables. You need to optimize the performance of the database by maximizing disk bandwidth and reducing the contention in the storage allocation structures. What should you do?()A、Create multiple data files for the database.B、Place database and log files on the same volume.C、Configure the affinity mask option appropriately.D、Configure the affinity I/O mask option appropriately.

Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 has the File Services role installed. You configure a file classification rule. You discover that scanned documents stored as JPG files are not being classified. You need to ensure that all file classification rules apply to scanned documents. What should you do?() A、Enable the Windows TIFF IFilter feature.B、Modify the properties of the file classification rule.C、Modify the properties of the Windows Search Service.D、Install the Office 2007 System Converter: Microsoft Filter Pack.