单选题You need to design the configuration of the Windows Server 2003 Routing and Remote Access server in the Seattle office to meet business requirements. What should you do?()AConfigure a remote access policy on the Routing and Remote Access server to require MS-CHAP v2 for all connectionsBUse a Group Policy object (GPO) to configure a Restricted Groups policy that applies to the Routing and Remote Access server. Use this Restricted Groups policy to remove all accounts form the local Users group, and then add authorized computer accountsCConfigure the Routing and Remote Access server to use only PPTP connectionsDConfigure the Routing and Remote Access server to use only IPSec over L2TP connections.Configure IPSec to use certificates

单选题
You need to design the configuration of the Windows Server 2003 Routing and Remote Access server in the Seattle office to meet business requirements. What should you do?()
A

Configure a remote access policy on the Routing and Remote Access server to require MS-CHAP v2 for all connections

B

Use a Group Policy object (GPO) to configure a Restricted Groups policy that applies to the Routing and Remote Access server. Use this Restricted Groups policy to remove all accounts form the local Users group, and then add authorized computer accounts

C

Configure the Routing and Remote Access server to use only PPTP connections

D

Configure the Routing and Remote Access server to use only IPSec over L2TP connections.Configure IPSec to use certificates


参考解析

解析: 暂无解析

相关考题:

You want to debug the Windows Communication Foundation (WCF) client and server interaction through message and application tracing.You need to correlate traces generated on the client and the server. Which XML segment should you add to the system.diagnostics configuration element in the client and server application configuration file?()A.B.C.D.

Your organization includes two servers named Server1 and Server2 that run Windows Server 2003 ServicePack 2 (SP2).Server1 and Server2 host the same Web sites.You need to back up the server configuration on Server1 every hour and then apply the configuration to Server2.Which command should you use? ()A. IISBack.vbs /backupB. IISBack.vbs /listC. IISCnfg.vbs /copyD. IISCnfg.vbs /save

You need to deploy a read-only domain controller (RODC) that runs Windows Server 2008 R2.   What is the minimal forest functional level that you should use()A、Windows Server 2008 R2B、Windows Server 2008C、Windows Server 2003D、Windows 2000

Your network consists of a single Active Directory domain. You have a DHCP server named DHCP1 that runs Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Service Pack 3 (SP3). All client computers are configured as DHCP clients. You change the IP address on DHCP1. Users report that they cannot connect to the network. You verify that the client computers do not receive an IP address configuration from DHCP1. You need to ensure that the client computers receive an IP address configuration from DHCP1.  What should you do on DHCP1? ()A、Authorize the server.B、Reconcile the scope.C、Enable conflict resolution.D、Restore the server configuration by using the DHCP snap-in.

You have a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). Server1 runs a custom application. Users report that the performance of Server1 has decreased significantly during the last 30 minutes. You need to identify the current processor and memory usage for each process running on Server1. Which tool should you use? ()A、Event ViewerB、Task ManagerC、Query ProcessD、System Configuration Utility

You need to design an administrative model that meets the business and technical requirements. What should you do?()A、Assign permissions to manage Mailbox and Exchange Server configuration to the server-admins groupB、Assign permissions to manage Mailbox and Exchange Server configuration to the domain-admins groupC、Assign permissions to manage Mailboxes to the server-admins group. Assign permissions to manage Exchange Servers configuration to the domain-admins groupD、Assign permissions to manage Mailboxes to the domain-admins group. Assign permissions to manage Exchange Servers configuration to the server-admins group

You have a server that runs Windows Server 2003 Service Pack 2 (SP2). You create an Automated System Recovery (ASR) backup of the server. You restart the server and receive a critical error. You need to restore the server by using ASR. What should you do first? ()A、Start the computer by using Safe mode.B、Start the server by using the ASR floppy disk.C、Start the computer by using the Last Known Good Configuration option.D、Start the server by using the Windows Server 2003 SP2 installation media.

Your company has a single Active Directory Domain Services (AD DS) domain with Windows Server 2008 R2 member servers and 1,000 Windows 7 client computers. You are designing the deployment of a custom application.   You have the following requirements:   The application must be available to only users who need it. Minimize network traffic during deployment.   You need to design a deployment strategy that meets the requirements.   Which deployment method should you use?()A、RemoteApp and Desktop ConnectionsB、software installation in Group PolicyC、Microsoft Application Virtualization (App-V)D、Microsoft System Center Configuration Manager 2007

You have a server that runs Windows Server 2003 Service Pack 2 (SP2).You need to compare the current security settings of the server to a security template. Which tool should you use?()A、Security Templates snap-in B、Group Policy Management Console C、Security Configuration and Analysis snap-in D、Microsoft Baseline Security Analyzer (MBSA)

You need to design the configuration on one Windows Server 2003 terminal server that hosts the SalesForceMax application to meet security requirements. Which three actions should you take?()A、Configure the terminal server so that users log on by using local user accountsB、Configure the terminal server so that users log on by using domain accountsC、Configure the server to run SalesForceMax in a dedicated window when a user logs on to the terminal serverD、Configure the server to allow each user to have a Windows desktop when the user logs on to the terminal serverE、Use software restriction polices in Group Policy objects (GPOs) that apply to the terminal serverF、Use Appsec.exe to restrict applications on the terminal server

You have two stand-alone servers named Server1 and Server2. Both servers run Windows Server 2003 Service Pack 2 (SP2).On Server1, you save the local security policy as a template. You need to import the template to Server2. What should you run on Server2?()A、the Security Templates snap-inB、the Security Configuration WizardC、the Microsoft Baseline Security AnalyzerD、the Security Configuration and Analysis snap-in

Your network contains a server that runs Windows Server 2008 R2.You need to create a script to identify known configuration issues. What should you include in the script?() A、the Get-BPAModel cmdletB、the Invoke-BPAModel cmdletC、the Mrinfo toolD、the Systeminfo tool

Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). You have two servers named Server1 and Server2. Both servers have Windows Server Update Services (WSUS) 3.0 installed.You need to ensure that Server2 automatically receives the same update approvals as Server1.What should you do?()A、On Server2, modify the Update Source and Proxy Server settings. B、On Server2, modify the Update Files and Languages settings. C、On Server2, run the Windows Server Update Services 3.0 setup wizard. D、On Server1, run the WSUS Server Configuration Wizard.

单选题Your organization includes two servers named Server1 and Server2 that run Windows Server 2003 Service Pack 2 (SP2). Server1 and Server2 host the same Web sites. You need to back up the server configuration on Server1 every hour and then apply the configuration to Server2. Which command should you use? ()AIISBack.vbs /backupBIISBack.vbs /listCIISCnfg.vbs /copyDIISCnfg.vbs /save

单选题You need to design a method to deploy security configuration settings to servers. What should you do?()ARun the Resultant Set of Policy wizard with a Windows Management Instrumentation (WMI) filter on each department’s Server OUBLog on to each server and use local policy to configure and manage the security settingsCCreate a customer security template. Log on to a domain controller and run the seceditcommand to import the security templateDCreate a customer security template. Create a GPO and import the security template. Link the GPO to each department’s Server OU

多选题You need to design the configuration on one Windows Server 2003 terminal server that hosts the SalesForceMax application to meet security requirements. Which three actions should you take?()AConfigure the terminal server so that users log on by using local user accountsBConfigure the terminal server so that users log on by using domain accountsCConfigure the server to run SalesForceMax in a dedicated window when a user logs on to the terminal serverDConfigure the server to allow each user to have a Windows desktop when the user logs on to the terminal serverEUse software restriction polices in Group Policy objects (GPOs) that apply to the terminal serverFUse Appsec.exe to restrict applications on the terminal server

单选题You have a file server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3). The IP configuration for Server1 is shown in the following table.You replace the network card on Server1. You configure the new network card to use the existing IP configuration.Users reports that they receive a time-out error message when they connect to Server1. You need to ensure that users can immediately connect to Server1.  Which command should you instruct users to run?()AArp –d 172.16.90.13 BIpconfig /flushdns CNbtstat –R DNetstat –r 172.16.90.13

单选题You have two stand-alone servers named Server1 and Server2. Both servers run Windows Server 2003 Service Pack 2 (SP2).On Server1, you save the local security policy as a template. You need to import the template to Server2. What should you run on Server2?()Athe Security Templates snap-inBthe Security Configuration WizardCthe Microsoft Baseline Security AnalyzerDthe Security Configuration and Analysis snap-in

多选题You are configuring a Windows Server 2008 R2 server to support a virtual machine (VM) that uses a passthrough disk. You need to install the operating system on the VM. Which two actions should you perform?()A.Attach the pass-through disk to an IDE controller.BAttach the pass-through disk to a SCSI controller.CPlace the VM configuration file on the host server.DPlace the VM configuration file on the pass-through disk.

单选题Your network contains a server that runs Windows Server 2008 R2.You need to create a script to identify known configuration issues. What should you include in the script?()Athe Get-BPAModel cmdletBthe Invoke-BPAModel cmdletCthe Mrinfo toolDthe Systeminfo tool

单选题Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2).  You have two servers named Server1 and Server2. Both servers have Windows Server Update Services (WSUS) 3.0 installed.You need to ensure that Server2 automatically receives the same update approvals as Server1.  What should you do?()AOn Server2, modify the Update Source and Proxy Server settings.BOn Server2, modify the Update Files and Languages settings.COn Server2, run the Windows Server Update Services 3.0 setup wizard.DOn Server1, run the WSUS Server Configuration Wizard.

单选题You need to design a method to monitor the security configuration of the IIS server to meet the requirements in the written security policy. What should you do?()ALog on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the IIS server computer accountBRun the Microsoft Baseline Security Analyzer (MBSA) on the IIS server and scan for vulnerabilities in Windows and IIS checksCRun Security Configuration and Analysis to analyze the IIS server’s security settings by using a custom security templateDOn the IIS server, run the gpresult command from a command prompt and analyze the output

单选题You have two servers named Server1 and Server2 that run Windows Server 2003 Service Pack 2 (SP2). Server1 is configured as a DHCP server. You plan to decommission the DHCP service on Server1. You need to move the DHCP server configuration to Server2. The configuration must include all configured scopes, leases, and DHCP options. What should you do first? ()AFrom the DHCP snap-in, export list.BFrom the DHCP snap-in, back up the server.CFrom Windows Explorer, copy the %systemroot%/System32/Dhcp/DHCP.mdb file.DFrom Windows Explorer, copy the %systemroot%/System32/Dhcp/backup/dhcpcfg file.

单选题Your organization includes two servers named Server1 and Server2 that run Windows Server 2003 Service Pack 2 (SP2). Server1 and Server2 host the same Web sites. You need to back up the server configuration on Server1 every hour and then apply the configuration to Server2. Which command should you use? ()AIISBack.vbs /backupBIISBack.vbs /listCIISCnfg.vbs /copyDIISCnfg.vbs /save

单选题You install three servers that run Windows Server 2003 Service Pack 2 (SP2). The servers are on the same subnet.You get the IP configuration for the servers as shown in the following table. You need to ensure that you can establish communication between the three servers. What should you do?()AModify the IP address on Server3. BModify the IP address on Server1. CConfigure the hosts file on each server. DModify the default gateway for each server.