Your network contains a server that runs Windows Server 2008 R2. The server has the Network Policy and Access Services server role installed.You need to allow only members of a global group named Group1 VPN access to the network.What should you do?()
第1题:
Your company has two data centers. Each data center contains a perimeter network. Your network contains an Exchange Server 2010 organization. You plan to deploy Exchange Server 2010 Edge Transport servers in the perimeter networks. You need to recommend a solution for the Edge Transport servers that meets the following requirements:.Distribute inbound e-mail messages across all Edge Transport servers .Ensure that users receive inbound e-mail messages if an Edge Transport server fails .Ensure that users receive inbound e-mail messages if a single data center network becomes unavailable .Minimize costs What should you recommend?()
第2题:
Your network contains 100 servers that run Windows Server 2008 R2.A server named Server1 is deployed on the network. Server1 will be used to collect events from the Security event logs of the other servers on the network.You need to define the Custom Event Delivery Optimization settings on Server1.Which tool should you use?()
第3题:
Your network contains an internal network and a perimeter network. The internal network contains a single Active Directory site. The perimeter network contains two Exchange Server 2010 Edge Transport servers. You plan to deploy an Exchange Server 2010 organization on the internal network. You need to plan the deployment of Hub Transport server roles to meet the following requirements:.If a single Hub Transport server fails, e-mail messages from the Internet must be delivered to the Mailboxservers. .If a single Hub Transport server fails, users must be able to send e-mail messages to other users thathave mailboxes on the same Mailbox server. What should you include in the plan?()
第4题:
Your network contains a Network Policy Server (NPS) named Server1.NPS1 provides authentication for all of the VPN servers on the network.You need to track the usage information of all VPN connections.Which RADIUS attribute should you log?()
第5题:
You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains an application server running Windows Server 2003. Users report intermittent slow performance when they access the application server throughout the day. You find out that the network interface on the application server is being heavily used during the periods of slow performance. You suspect that a single computer is causing the problem.You need to create a plan to identify the problem computer. What should you do?()
第6题:
Your network contains an Active Directory domain named adatum.com. The domain contains a member server named LON-DC1. LON-DC1 runs Windows Server 2012 R2 and has the DHCP Server server role installed.The network contains 100 client computers and 50 IP phones. The computers and the phones arefrom the same vendor. You create an IPv4 scope that contains addresses from 172.16.0.1 to 172.16.1.254.You need to ensure that the IP phones receive IP addresses in the range of 172.16.1.100 to 172.16.1.200. The solution must minimize administrative effort. What should you create?()
第7题:
Your network contains two Hyper-V hosts that run Windows Server 2012 R2. The Hyper-V hosts contains several virtual machines that run Windows Server 2012 R2. You install the Network Load Balancing feature on the virtual machines. You need to configure the virtual machines to support Network Load Balancing (NLB). Which virtual machine settings should you configure?()
第8题:
File Server Resource Manager (FSRM)
New-StoragePool
Diskpart
Share and Storage Management
第9题:
3389 and 25
3389 and 636
50636 and 25
50636 and 135
第10题:
Acct-Session-Id
Acct-Status-Type
Class
NAS-Identifier
第11题:
Local Security Policy
Scw
Secedit
Services console
第12题:
Edge traversal
Authorized computers
Interface types
Remote IP address
第13题:
Your network contains an internal network and a perimeter network that are separated by a firewall. The perimeter network contains an Exchange Server 2010 Edge Transport server. You plan to deploy an internal Exchange Server 2010 organization that meets the following requirements:.Support EdgeSync synchronization .Support encrypted delivery of outbound e-mail messages to the Edge Transport server .Minimize the attack surface of the internal network Which TCP ports should you allow from the internal network to the perimeter network?()
第14题:
Your network contains a single Active Directory domain named contoso.com.The domain contains a DNS server named Server1 that hosts the contoso.com zone.The network is connected to the network of a partner company. The partner companys network contains a DNS server that hosts a zone named nwtraders.com.You need to ensure that computers in contoso.com can resolve the names of computers in nwtraders.com.The solution must not require any changes to the zone configuration of nwtraders.com.What should you configure on Server1?()
第15题:
Your network contains a server that runs Windows Server 2008 R2.You need to enable access-based enumeration (ABE) on a shared folder.Which console should you use?()
第16题:
Your network contains a server named Server1 that runs Windows Server 2003 Service Pack (SP2). You install a new network adapter on Server1. You need to view the media access control (MAC) address for the new network adapter. What should you do? ()
第17题:
Your network contains an internal network and a perimeter network.You have one Exchange Server 2010 server on the internal network. You install Windows Server 2008 R2 on a new server in the perimeter network.You need to ensure that you can install the Edge Transport server role on the new server. What should you do?()
第18题:
Your network contains a server that runs Windows Server 2008 R2.You need to create a script to identify known configuration issues. What should you include in the script?()
第19题:
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper- V server role installed. The domain contains a virtual machine named VM1. A developer wants to attach a debugger to VM1. You need to ensure that the developer can connect to VM1 by using a named pipe. Which virtual machine setting should you configure?()
第20题:
Windows Deployment Services (WDS)
Windows Automated Installation Kit (Windows AIK) and folder redirection
the Multipath I/O feature and Volume Shadow Copies
the Windows Server Backup feature and System Image Recovery
第21题:
an exclusion range
a reservation
a superscope
a user class
第22题:
Change the settings of the private firewall profile.
Change the settings of the domain firewall profile.
Modify the properties of the inbound firewall rules.
Modify the properties of the outbound firewall rules.
第23题:
a conditional forwarder
a GlobalNames zone
a secondary zone
a zone delegation
第24题:
Server level policies
Filters
Reservations
Scope level policies