Your network contains an Active Directory forest.All domain controllers run Windows Server 2008. You need to ensure that you can install an Exchange Server 2010 server in the Active Directory forest. What should you do?()A、From the Exchange Server 2010 in

题目

Your network contains an Active Directory forest.All domain controllers run Windows Server 2008. You need to ensure that you can install an Exchange Server 2010 server in the Active Directory forest. What should you do?()

  • A、From the Exchange Server 2010 installation media, run setup /ps.
  • B、From the Exchange Server 2010 installation media, run setup /NewProvisionedServer.
  • C、From the Windows Server 2008 installation media, run adprep.exe /forestprep.
  • D、From the Windows Server 2008 installation media, run adprep.exe /domainprep.

相似考题
参考答案和解析
正确答案:A
更多“Your network contain”相关问题
  • 第1题:

    To provide quality of service (QoS) for voice traffic in an IEEE 802.1 q network, which class of service (CoS) value should be used in the 3-bit, user priority bits (PRI) field? ()

    • A、The PRI field should contain the Cos value of 010
    • B、The PRI field should contain the Cos value of 011
    • C、The PRI field should contain the Cos value of 100
    • D、The PRI field should contain the Cos value of 101
    • E、The PRI field should contain the Cos value of 110
    • F、The PRI field should contain the CoS value of 111

    正确答案:D

  • 第2题:

    Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system .Which two of these are characteristics of an IDS sensor?()

    • A、 has a permissive interface that is used to monitor networks
    • B、 is an active device in the traffic path
    • C、 passively listens to network traffic
    • D、 has a promiscuous interface that is used to monitor the network

    正确答案:C,D

  • 第3题:

    Your network contains an Exchange Server 2010 server.You need to prevent e-mail messages that contain specific words from being sent between users in the organization. What should you do?()

    • A、Create a transport rule.
    • B、Create an Outlook Protection Rule.
    • C、Configure the content filtering feature.
    • D、Configure the sender reputation feature.

    正确答案:A

  • 第4题:

    You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster.   The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template.   You need to implement protective measures against the cluster’s most significant security vulnerability.   What should you do?  ()

    • A、 Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.
    • B、 Use packet filtering on all inbound traffic to the cluster.
    • C、 Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.
    • D、 Use intrusion detection on the perimeter network.

    正确答案:B

  • 第5题:

    A router that performs Network Address Translation (NAT) is installed between your computer and the Internet.  The router fails. You connect the computer directly to the Internet.  You need to ensure that the computer is connected to the Internet in the most secure manner possible.  What should you do?()

    • A、Enable the Remote Desktop feature in the System Properties dialog box.
    • B、Configure the network category of your network connection to Public.
    • C、Configure the network category of your network connection to Private.
    • D、Enable the Windows Collaboration Computer Name Registration Service exception in Microsoft Windows Firewall.

    正确答案:B

  • 第6题:

    单选题
    Your network contain 10 domain controller that run Windows Server    R2.   The network contain a member server that is configured to collect all of events that occur on the  domain controllers.   Your need to ensure that administrators are notified when a specific event occurs on any of the  domain controllers. You want to achive the goal by using the minimum amount effort.   What should you do()
    A

    From Event Viewer on the member server, create a subscription.

    B

    From Event Viewer on each domain controller, create a subscription.

    C

    From Event Viewer on the member server, run the Create Basic Task Wizard.

    D

    From Event Viewer on each domain controller,run the Create Basic Task Wizard.


    正确答案: C
    解析: 暂无解析

  • 第7题:

    单选题
    You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()
    A

    STP

    B

    GVRP

    C

    SNMP

    D

    VTP

    E

    DHCP


    正确答案: D
    解析: 暂无解析

  • 第8题:

    单选题
    As a network engineer at Certpaper.com, you are responsible for Certpaper network. Which will benecessarily taken into consideration when implementing Syslogging in your network?()
    A

    Enable the highest level of Syslogging available to ensure you log all possible event messages

    B

    Use SSH to access your Syslog information

    C

    Log all messages to the system buffer so that they can be displayed when accessing the router

    D

    Syncronize clocks on the network with a protocol such as Network Time Protocol


    正确答案: A
    解析: 暂无解析

  • 第9题:

    问答题
    Directions: In this part of the test, you will write an essay in response to a question that asks you to state, explain, and support your opinion on an issue. Typically, an effective essay will contain a minimum of 300 words. Your response will be scored on:·whether your opinion is supported with reasons and/or examples·grammar,·vocabulary, and·organization.Practice 1Directions: Read the question below. You have 30 minutes to plan, write, and revise your essay. Typically, an effective response will contain a minimum of 300 words.Some people believe that hard work is the only way to be successful. Other people believe that success comes from luck. Which do you agree with and why?

    正确答案: (1)
    In my opinion, I believe hard work is the most important element to be successful. The meaning of success varies for different people. As for me, success is being financially well off and being emotionally happy as well. And hard work is the gateway to success.
    The main reason why people are successful is to work hard. A hard worker is able to follow directions from superior, act in obedience to the orders given to him. And in most cases, works set goals for themselves. But the difference that sets hard workers apart from regular workers is hard workers make any effort to accomplish their objectives. Hard workers are well aware of their goal and do not stop until they achieve it. Consequently, success is due to those who truly work hard.
    A good example of this is Tiger Woods. He is a person who has been extremely successful. Maybe he possesses some natural talent, but in fact, he spent a tot of time and efforts on practicing, and finally became an excellent golfer. He did not just rely on luck one day and win a championship in a tournament. It is the years of dedication and hard work he put into golf that leads to his success. Natural talent can only get you to the entrance of the field.
    Hard work provides consistent or sustained power to become success too, because people do not necessarily depend on chance factors, such as luck. Hard work is something people work at doing. They are in the process of pursuing success instead of relying on luck to give them a break. If success is the goal for a hard worker then they will achieve it, and they will be sure to. Their hard work will lead them there.
    (2)
    At one time I regarded hard work as more important than luck, but now I think chance is of the great importance for success. Luck, or chance, comes about not by design but accidentally. It is the reason why many unqualified people are successful. This success, from the financial perspective, is a matter of chance.
    In the movie industry, a lot of actors and models were discovered by chance or owing to some type of luck in many countries around the world. Some of the situations might be that they were sitting next to an agent or a director at lunch, or when they were walking down the street. Someone spotted them. Under Such circumstances, these people were picked out because they happened to be next to the one who could help promote them into a better career and situation. They may then have successful careers and make a lot of money just because of one chance lucky meeting. They were lucky indeed.
    Assuming a real world situation. A man owns a restaurant, and he works hard every day to run his business, but the result turns to be that he does not make much money. One day, he gets a call for a special food delivery order. His employee delivers the food to the customer, who is the owner of another large restaurant chain. The franchise owner especially enjoys the food, hence he offers the man a deal that the man is invited to join in the restaurant chain. Then, the man, who was struggling, becomes successful. It was very lucky for the man that the chain restaurant owner tries the food; as a result, he gets the opportunity to achieve success. I believe a lot of people work hard, but do not benefit from luck. Though they do a great job at work and try their very best. If they do not happen to have a certain lucky situations, they may never be successful.
    解析: 暂无解析

  • 第10题:

    单选题
    Which of the following would contain information regarding network device alerts using SNMP?()
    A

    Syslog

    B

    Audit log

    C

    History log

    D

    Ping sweep reports


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    The shipping papers for the products being carried in your tanker are NOT required to contain the().
    A

    exact quantity of the cargoes

    B

    grades of the cargoes

    C

    location of the delivery point(s)

    D

    name of the consignee(s)


    正确答案: A
    解析: 暂无解析

  • 第12题:

    多选题
    Your wireless network is not listed in the Connect to a network window of your computer. You need to connect to your wireless network.  Which two actions should you perform?()
    A

    Right-click and click the Diagnose option in the Connect to a network window.

    B

    Set the security type value to No authentication in the wireless network properties dialog box.

    C

    Click the Manually connect to a wireless network option in the Set up a connection or network window.

    D

    In the Wireless Network properties dialog box, click the Connect even if the network is not broadcasting option.

    E

    Configure the correct IP address, subnet mask, and default gateway for the target network in the wireless network connection properties dialog box.


    正确答案: A,D
    解析: 暂无解析

  • 第13题:

    You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()

    • A、Repeater
    • B、Wireless router
    • C、Hub
    • D、Wireless network adapter

    正确答案:D

  • 第14题:

    Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()

    • A、 core layer
    • B、 bridging two VLANs on one switch
    • C、 between two Layer 2 devices with trunking
    • D、 between two Layer 2 devices without trunking

    正确答案:C,D

  • 第15题:

    You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker.  You need to prevent your co-worker from modifying your wireless network profile.  What should you do?()

    • A、Disable the Connect even if the network is not broadcasting option.
    • B、In the Network and Sharing Center window, click the Diagnose and repair option.
    • C、Set the default wireless profile type to the Use all-users only profile (recommended) option. Recreate the wireless network.
    • D、Set the default wireless profile type to the Use all-users and per-user profiles option. Recreate the wireless network by using the Save this network for me only option.

    正确答案:D

  • 第16题:

    You are the network administrator for ExamSheet.net.  You install Windows 2000 Professional on your portable computer. You use a docking station for your portable computer when you are in the office. You install a ISA-based network adapter in your docking station. You insert your computer into the docking station and start the computer. The network adapter is not detected during the startup process. You obtain a disk that contains the supported driver from the network adapter manufacturer. You want to allow Windows 2000 Professional to use the network adapter. What should you do?()

    • A、Restart the computer in the docking station.
    • B、Run the Add/Remove Hardware wizard.
    • C、Use Device Manager to scan for hardware changes.
    • D、Copy the network adapter driver to the Winnt/Driver Cache/i386 folder.
    • E、Install the new network adapter driver.

    正确答案:B,E

  • 第17题:

    单选题
    You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker.  You need to prevent your co-worker from modifying your wireless network profile.  What should you do?()
    A

    Disable the Connect even if the network is not broadcasting option.

    B

    In the Network and Sharing Center window, click the Diagnose and repair option.

    C

    Set the default wireless profile type to the Use all-users only profile (recommended) option. Recreate the wireless network.

    D

    Set the default wireless profile type to the Use all-users and per-user profiles option. Recreate the wireless network by using the Save this network for me only option.


    正确答案: D
    解析: 暂无解析

  • 第18题:

    单选题
    You want to connect your Windows 2000 Professional computer to multiple TCP/IP subnets on your company’s network. Your computer currently has an ISA network adapter installed. You install a second ISA network adapter. After you restart your computer, you notice that the second ISA network adapter is not functioning. What should you do?()
    A

    Set the driver signing option to block.

    B

    Set the driver signing option to ignore.

    C

    In the computer’s BIOS, reserve an unused IRQ for ISA devices.

    D

    In the Device Manager, configure the second ISA network adapter to use an unused IRQ.


    正确答案: D
    解析: 暂无解析

  • 第19题:

    单选题
    According to the “Vessel Bridge-to-Bridge Radiotelephone Act”,your radiotelephone log must contain().
    A

    a record of all routine calls

    B

    a record of your transmissions only

    C

    the home address of the vessel's Master or owner

    D

    a summary of all distress calls and messages


    正确答案: D
    解析: 暂无解析

  • 第20题:

    多选题
    Your network consists of three Active Directory forests. Forest trust relationships exist between all forests. Each forest contains one domain. All domain controllers run Windows Server 2008 R2. Your company has three network administrators. Each network administrator manages a forest and the Group Policy objects (GPOs) within that forest.   You need to create standard GPOs that the network administrators in each forest will use. The GPOs must meet the following requirements:   èThe GPOs must only contain settings for either user configurations or computer configurations. èThe number of GPOs must be minimized.   Which two actions should you perform?()
    A

    Export the new GPOs to .cab files. Ensure that the .cab files are available to the network administrator  in each forest.

    B

    Create two new GPOs. Configure both GPOs to use the required user configurations and the required  computer configurations.

    C

    Create two new GPOs. Configure one GPO to use the required user configuration. Configure the other GPO to use the required computer configuration.

    D

    Back up the Sysvol folder that is located on the domain controller where the new GPOs were created. Provide the backup to the network administrator in each forest.


    正确答案: B,A
    解析: 暂无解析

  • 第21题:

    单选题
    To provide quality of service (QoS) for voice traffic in an IEEE 802.1 q network, which class of service (CoS) value should be used in the 3-bit, user priority bits (PRI) field? ()
    A

    The PRI field should contain the Cos value of 010

    B

    The PRI field should contain the Cos value of 011

    C

    The PRI field should contain the Cos value of 100

    D

    The PRI field should contain the Cos value of 101

    E

    The PRI field should contain the Cos value of 110

    F

    The PRI field should contain the CoS value of 111


    正确答案: F
    解析: 暂无解析

  • 第22题:

    多选题
    You are unable to connect your computer to a wireless network projector. The wireless network projector does not appear in the list of available network projectors provided by the Connect to a Network Projector wizard.  You need to connect to the network projector.  What are two possible ways to achieve this goal?()
    A

    Start the Microsoft Windows Media Center Service Launcher service.

    B

    Enable the File and Printer Sharing Windows Firewall exception.

    C

    Connect your computer to the same subnet as the network projector.

    D

    Type the IP address of the network projector in the Connect to a Network Projector wizard.


    正确答案: B,A
    解析: 暂无解析

  • 第23题:

    多选题
    Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system.Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()
    A

    core layer

    B

    bridging two VLANs on one switch

    C

    between two Layer 2 devices withtrunking

    D

    between two Layer 2 devices withouttrunking


    正确答案: D,B
    解析: 暂无解析

  • 第24题:

    单选题
    You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter. Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.  You need to configure the wireless connection to allow your computer to discover other computers.  What should you do?()
    A

    Configure the network category of your wireless network connection to Private.

    B

    Configure the network category of your wireless network connection to Public.

    C

    Configure the TCP/IP packet filtering on the wireless network connection.

    D

    Configure the wireless network connection with the appropriate authentication to the router.


    正确答案: A
    解析: 暂无解析