You are the network administrator for Testking.com. The network consists of a single Active Directory domain testking.com. All domain controllers run Windows Server 2003.Users who enter an invalid password more than twice in one day must be locked out.You need to configure domain account policy settings to enforce this rule.Which two actions should you perform?() (Each correct answer presents part of the solution. Choose two)A. Set the minimum password age to one day.B. Set the maximum password age to one day.C. Change the Enforce password history setting to three passwords remembered.D. Change the Account lockout duration setting to 1440 minutes.E. Change the Account lockout threshold setting to three invalid logon attempts.F. Change the Reset account lockout counter after setting to 1440 minutes.

You are the network administrator for Testking.com. The network consists of a single Active Directory domain testking.com. All domain controllers run Windows Server 2003.Users who enter an invalid password more than twice in one day must be locked out.You need to configure domain account policy settings to enforce this rule.Which two actions should you perform?() (Each correct answer presents part of the solution. Choose two)

A. Set the minimum password age to one day.

B. Set the maximum password age to one day.

C. Change the Enforce password history setting to three passwords remembered.

D. Change the Account lockout duration setting to 1440 minutes.

E. Change the Account lockout threshold setting to three invalid logon attempts.

F. Change the Reset account lockout counter after setting to 1440 minutes.


相关考题:

You are the administrator of a Windows 2000 Active Directory network. The network consists of a single domain. The domain includes 20 Windows NT Workstation 4.0 client computers. All other client computers are Windows 2000 Professional computers.You create a Windows NT 4.0 default user policy on the Windows 2000 Server computer that is configured as the PDC emulator. This default user policy denies access to Network Neighborhood. You then install Terminal Services on one of the servers and Terminal Services Client on the 20 Windows NT Workstation client computers.You find that the users of the Terminal Server can still browse the network when they open My Network Places. You want to prevent all users from browsing the network.What should you do?A.Modify the Windows NT policy template file so that you can restrict access to both My Network Places and Network Neighborhood. Save the policy file on the Terminal Server.B.Copy the Windows NT policy file to the 20 Windows NT Workstation computers.C.Create a Windows 2000 Group Policy that denies user access to My Network Places.D.Edit the local registry on the Windows NT Workstation computers to deny access to Entire Network in Network Neighborhood.

You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. TestKing.com contains two global catalog servers and one DNSserver. During the course of the day you receive an instruction from the CIO to deploy Exchange Server 2010 intothe environment.  In order to accomplish this you need to propose a DNS implementation that will providesredundancy in the event of a DNS server failure. ()A、The test option is to use multiple MX records.B、The test option is to use integrated DNS and WINS.C、The test option is to use Active Directory integrated DNS Server.D、The test option is to use DNS forwarding.

You work as a network administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.The network as a server named ABC_SR05 that provides DHCP services.You need to create the DHCP scopes to support a subnet that has 800 hosts.You want to minimize the number of unused IP addresses on each subnet. How would you configure DHCP to support these subnets?()A、You should assign the network 172.16.0.0/16.B、You should assign the network 172.16.0.0/17.C、You should assign the network 172.16.0.0/18.D、You should assign the network 172.16.0.0/19.E、You should assign the network 172.16.0.0/20.F、You should assign the network 172.16.0.0/22.

You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully.   To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster.   You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster.  You want to add the port rule to the nodes of the cluster.   What should you do?  ()A、 Use Network Load Balancing Manager on the Network Load Balancing default host to add the port rule.B、 Change the host priority of the second node to be the highest in the cluster, and then use Network Load Balancing Manager to add the port rule.C、 Run the nlb.exe drain command on each node, and then use Network Load Balancing Manager to add the port rule.D、 Add the port rule through Network Connections Properties on each node.

You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a four-node Network Load Balancing cluster. All nodes run Windows Server 2003. The cluster has converged successfully. You use Network Load Balancing Manager on the default host to configure all nodes of the cluster.   The nodes have a single network adapter and are connected to the same switching hub device.   Administrators of non-cluster servers that are connected to the same switching hub device report that their servers receive traffic that is destined for the cluster nodes. Receiving this additional network traffic impairs the network performance of the non-cluster servers.   You need to ensure that traffic destined for only the cluster nodes is not sent to all ports of the switching hub device.  You do not want to move the cluster to another switching hub device.   What should you do? ()A、 On one node, run the nlb.exe reload command.B、 On each node, run the wlbs.exe drainstop command.C、 Use Network Load Balancing Manager to enable Internet Group Management Protocol (IGMP) support on the cluster.D、 Use Network Load Balancing Manager to add a second cluster IP address.

You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. A firewall at Testking.com separates the internal network and a perimeter network. The perimeter networkcontains an Exchange Server 2010 Edge Transport server. You have received instructions from the CIO to install an internal Exchange Server 2010 with the followingcriteria: 1. The support of EdgeSync synchronizaiton and encrypted delivery of outbound e-mail messages to theEdge Transport server. 2. The minimization of the attack surface of the internal network. What should you do?()A、The best option is to use port 3309 and 25 from the internal network to the perimeter network.B、The best option is to use port 3309 and 636 from the internal network to the perimeter network.C、The best option is to use port 50636 and 25 from the internal network to the perimeter network.D、The best option is to use port 50636 and 135 from the internal network to the perimeter network.

You are the network administrator for TestKing.com. The network consists of a single Active Directory domain named testking.com. All network servers run Windows Server 2003. You place computer accounts for servers in OUs that are organized by server roles. You apply GPOs to these servers at the OU level. You need to add a new server to the domain. You need to ensure that the appropriate GPOs are applied to this server. What should you do?()A、Prestage a domain computer account for the new server in the appropriate OU. Join the server to the domain by using the prestaged computer account.B、On the server, add the domain name for the Active Directory domain to the DNS suffix setting. Join the server to the domain.C、Assign a user account the Allow - Create permission for the appropriate OU. Join the new server to the domain by using the user account.D、Join the new server to the Active Directory domain. On the new server, run the gpupdate /force command.

You are the network administrator for Testking.com. The network consists of a single Active Directory domain testking.com. All domain controllers run Windows Server 2003. Users who enter an invalid password more than twice in one day must be locked out. You need to configure domain account policy settings to enforce this rule. Which two actions should you perform?() (Each correct answer presents part of the solution. Choose two)A、Set the minimum password age to one day.B、Set the maximum password age to one day.C、Change the Enforce password history setting to three passwords remembered.D、Change the Account lockout duration setting to 1440 minutes.E、Change the Account lockout threshold setting to three invalid logon attempts.F、Change the Reset account lockout counter after setting to 1440 minutes.

You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.You are running a training exercise for junior administrators. You are currently discussing what happens when you run the Remove-NetLbfoTeam Windows PowerShell cmdlet.Which of the following describes the results of running this cmdlet?()A、It removes one or more network adapters from a specified NIC team.B、It removes a team interface from a NIC team.C、It removes a specified NIC team from the host.D、It removes a network adapter member from a switch team.

You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. The domain contains three domain controllers: DC1, DC2, and DC3. Each one hosts user data. DC1 experiences hard disk failure. You need to temporary restore the user data to DC2. Which type of restoration should you perform?()A、Automated System Recovery (ASR)B、NormalC、PrimaryD、Authoritative

You work as a network administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed. The Hyper-V server role is installed on a server named ABC_SR07.ABC_SR07 has a legacy network card that you use when creating a virtual machine named ABC_VT01.  What is the first thing you should do when assigning bandwidth to ABC_VT01?()A、You need to install a Hyper-V Virtual Switch on ABC_SR07.B、You need to install Integration Services on ABC_VT01.C、You need to remove the legacy network card and replace it with a new one.D、You need to install a second legacy network card on ABC_SR07.E、You need to create an external virtual network.

You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to ensure that all the network users are able to automatically schedule the use of a projector.What should you do?()A、You should consider having the schedule for the Managed Folder Assistant modified.B、You should consider having the properties of the Calendar managed default folder modified.C、You should consider having a new Sharing policy created.D、You should consider having an equipment mailbox created.

You work as a network administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.The ABC.com network contains a network attached printer named HPNet01.You share HPNet01 from a server named ABC_SR02 and publish the printer in Active Directory. How would you ensure that members of a group named PrinterAdmin can manage HPNet01?()A、You should enable Branch Office Direct Printing.B、You should configure the Printer defaults.C、You should share HPNet01 from a domain controller.D、You should configure the Security settings.

You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains an application server running Windows Server 2003.   Users report intermittent slow performance when they access the application server throughout the day. You find out that the network interface on the application server is being heavily used during the periods of slow performance. You suspect that a single computer is causing the problem.You need to create a plan to identify the problem computer.   What should you do?()A、 Monitor the performance monitor counters on the application server by using System Monitor.  B、 Monitor the network traffic on the application server by using Network Monitor.C、 Monitor network statistics on the application server by using Task Manager.D、 Run network diagnostics on the application server by using Network Diagnostics.

You are the network administrator for Testking.com. The network consists of a single Active Directory domain testking.com. The functional level of the domain is Windows 2000 native. Some network servers run Windows 2000 Server, and others run Windows Server 20003. All users in your accounting department are members of an existing global distribution group named Global-1. You create a new network share for the accounting users. You need to enable the members of Global-1 to access the file share. What should you do?()A、Raise the functional level of the domain to Windows Server 2003.B、Change the group type of Global-1 to security.C、Change the group scope of Global-1 to universal.D、Raise the functional level of the forest to Windows Server 2003.

You are the network administrator for TestKing.com. The network consists of a single Active Directory domain named testking.com. All network servers run Windows Server 2003, and all client computers run Windows XP Professional. A user named King will leave TestKing in one week. A replacement will be hired in one month. The replacement will need the same access to network resources that King currently has. The replacement will also need ownership of all files that currently reside in King's home folder. You need to minimize the administrative effort that will be required when the replacement is hired. You also need to ensure that no one can use King's user account to log on to the domain until the replacement is hired. What should you do?()A、Move King's user account to the LostAndFound organizational unit (OU).B、Disable King's user account.C、Configure King's user account to require a change in password at next logon.D、Delete King's user account.

You are the network administrator for The network consists of a single Active Directory domain All network servers run Windows Server 2003. Your network includes a shared folder named TestKingDocs. This folder must not be visible in a browse list. However, users report that they can see TestKingDocs when they browse for shared folders. How should you solve this problem?()A、Modify the share permissions to remove the All - Read permission on TestKingDocs from the Users group.B、Modify the NTFS permissions to remove the Allow - Read permissions on TestKingDocs from the Users group.C、Change the share name to TestKingDocs#.D、Change the share name to TestKingDocs$.

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All network servers run Windows Server 2003. The domain contains three domain controllers: DC1, DC2, and DC3. Each one hosts user data. DC1 experiences hard disk failure. You need to temporarily restore the user data to DC2. Which type of restoration should you perform? ()AAutomated System Recovery (ASR)BnormalCprimaryDauthoritative

单选题You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory forest with one domain. The internal network of TestKing.com contains a perimeter network. You have received instructions fromthe CIO to install 15 Edge Transport servers on the perimeter network with the following criteria: * The Edge Transport servers should have a security policy, applied by the administrators. * The minimization of the administrative overhead towards the servers. * The minimization the attack surface of the perimeter network. What should you do?()AThe best option is to set up a new Active Directory domain in the internal forest and then join all EdgeTransport servers to the new domain.BThe best option is to make use of Active Directory Federation Services (AD FS).CThe best option is to make use of Network Policy and Access Services (NPAS).DThe best option is to set up a new Active Directory domain in the perimeter network and then join all Edge Transport Servers to the new domain.

单选题You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain have Windows Server 2012 R2 installed. The ABC.com network uses the network ID 192.168.1.0/26 and has a single DNS server named ABC_SR07. ABC_SR07 has a Standard Primary DNS zone.Which of the following options is the correct reverse lookup zone for the ABC.com network?()A192.168.1-0.in-addr.arpaB192.168.1.26.in-addr.arpaC26.1.168.192.in-addr.arpaD1.168.192-26.in-addr.arpaE0.1.168.192.in-addr.arpa

多选题You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.  You are running a training exercise for junior administrators. You are currently discussing the Windows Firewall with Advanced Security feature.  Which of the following is TRUE with regards to Windows Firewall with Advanced Security?()AIt provides host-based,two-way network traffic filtering for a computer.BIt provides host-based,one-way network traffic filtering for a computer.CIt blocks unauthorized network traffic flowing into or out of the local computer.DIt only blocks unauthorized network traffic flowing into the local computer.EIt only blocks unauthorized network traffic flowing out of the local computer.

单选题You work as a network administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.The network as a server named ABC_SR05 that provides DHCP services.You need to create the DHCP scopes to support a subnet that has 800 hosts.You want to minimize the number of unused IP addresses on each subnet. How would you configure DHCP to support these subnets?()AYou should assign the network 172.16.0.0/16.BYou should assign the network 172.16.0.0/17.CYou should assign the network 172.16.0.0/18.DYou should assign the network 172.16.0.0/19.EYou should assign the network 172.16.0.0/20.FYou should assign the network 172.16.0.0/22.

多选题You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2 installed.ABC.com has a Hyper-V server, named ABC-SR13, which hosts multiple virtual machines. You have enabled the use of Single-root I/O virtualization.Which of the following is TRUE with regards to using Single-root I/O virtualization?()AIt maximizes network throughput, while minimizing network latency.BIt maximizes network throughput, as well as network latency.CIt avoids the virtual switch stack and allows the virtual machine direct access to the actual network switch.DIt prevents the virtual machine from accessing the network switch directly.

单选题You are the network administrator for TestKing.com. The network consists of a single Active Directory domain named testking.com. The domain contains Windows Server 2003 computers and Windows XP Professional computers. You use a non-administrative user account named Joseph to log on to a client computer. You need to change the password for a domain user account named Sophia. You open the Active Directory Users and Computers console. When you attempt to change Sophia's password, you receive the following error message: "Access is denied". You need to remain logged on to the client computer as Joseph, and you need to be able to change Sophia's password. What should you do?()AAdd the non-administrative domain user account to the local Administrators group.BUse the runas command to run Active Directory Users and Computers with domain administrative credentials.CFrom a command prompt, run the net user Sophia /add /passwordreq:yes command.DFrom a command prompt, run the net accounts /uniquepw: /domain command.

单选题You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. A firewall at Testking.com separates the internal network and a perimeter network. The perimeter networkcontains an Exchange Server 2010 Edge Transport server. You have received instructions from the CIO to install an internal Exchange Server 2010 with the followingcriteria: 1. The support of EdgeSync synchronizaiton and encrypted delivery of outbound e-mail messages to theEdge Transport server. 2. The minimization of the attack surface of the internal network. What should you do?()AThe best option is to use port 3309 and 25 from the internal network to the perimeter network.BThe best option is to use port 3309 and 636 from the internal network to the perimeter network.CThe best option is to use port 50636 and 25 from the internal network to the perimeter network.DThe best option is to use port 50636 and 135 from the internal network to the perimeter network.

单选题You are the network administrator for . The network consists of a single Active Directory domain. All domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. TestKing acquires a subsidiary. You receive a comma delimited file that contains the names of all user accounts at the subsidiary. You need to import these accounts into your domain. Which command should you use?()AldifdeBcsvdeCntdsutil with the authoritative restore optionDdsadd user

单选题You are the network administrator for TestKing.com. The network consists of a single Active Directory domain named testking.com. All network servers run Windows Server 2003, and all client computers run Windows XP Professional. All user accounts in the Sales department are located in the Sales organizational unit (OU). You suspect that one or more user accounts in the OU have compromised passwords. You need to force all users in the Sales department to reset their passwords. What should you do?()ASelect all user accounts in the Sales OU. Disable the accounts and re-enable them.BSelect all user accounts in the Sales OU. Modify the account properties to force all passwords to be changed on next logon.CCreate a Group Policy object (GPO) and link it to the Sales OU. Modify the password policy to set the maximum password age to 0.DCreate as Group Policy object (GPO) and link it to the domain. Modify the password policy to set the maximum password age to 0.

单选题You are the network administrator for TestKing.com. The network consists of a single Active Directory domain named testking.com. All network servers run Windows Server 2003. You create an organizational unit (OU) named Engineering, which will hold all objects associated with the users and computers in the engineering department. You also create a global group named Engineering Admins, whose members will administer these objects. Now you need to assign the appropriate permissions to the Engineering Admins group so its members can administer the objects in the Engineering OU. First, you use Active Directory Users and Computers to view the properties of the Engineering OU. However, the Security tab is not available. What should you do next?()AConvert the system partition to NTFS.BEnable the Advanced Features option in the View menu of Active Directory Users and Computers.CEnable the Users, Groups, and Computers as Containers option in the View menu of Active Directory Users and Computers.DLog on by using a user account that has Administrator permissions for the Engineering OU.