You are an Enterprise Architect in a large IT organization. Your organization has deployed applications on a variety of containers such as WLS, WebSphere, and JBoss. Why would you consider consolidating on a single type of container (instead of mix) ? ()
Your company has an Active Directory forest. All domain controllers run the DNS Server server role.The company plans to decommission the WINS service.You need to enable forest-wide single name resolution.What should you do?()
Your company has a server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. You need to activate SSL for the default Web site. Which two actions should you perform?()
Your company has a main office and 50 branch offices. Each office contains multiple subnets. You need to automate the creation of Active Directory subnet objects. What should you use()
Your company has a single Active Directory domain. All servers run Windows Server 2008 R2.You install an additional DNS server that runs Windows Server 2008 R2.You need to delete the pointer record for the IP address 10.3.2.127. What should you do?()
Your company has a main office and 50 branch offices. Each office contains multiple subnets. You need to automate the creation of Active Directory subnet objects. What should you use()
Your company has four DNS servers that run Windows Server 2008. Each server has a static IP address.You need to prevent DHCP from assigning the addresses of the DNS servers to DHCP clients.What should you do?()
Your company has a single Active Directory domain. All servers run Windows Server 2008. you install an additional DNS server that runs Windows Server 2008. You need to delete the pointer record for the IP address 10.3.2.127. What should you do?()
Your company has a domain controller that runs Windows Server 2008. The domain controller has the backup features installed. You need to perform a non-authoritative restore of the doman controller using an existing backup file. What should you do()
Your company has a Microsoft Hyper-V Server 2008 R2 environment. You need to manually back up a child partition while it is turned off. Which two elements should you back up?()
Your company has a single Active Directory directory service forest with three domains. You plan to modify the Active Directory schema. You need to identify the schema master for the forest. What should you do?()
Your company has a single Active Directory domain. All domain controllers run Windows Server 2003. You install Windows Server 2008 R2 on a server. You need to add the new server as a domain controller in your domain. What should you do first()
Your company has an Active Directory forest. All domain controllers run the DNS server role. The company plans to decommission the WINS service. You need to enable forest-wide single name resolution. What should you do?()
Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers. You are planning to deploy Windows 7 Enterprise to the client computers. You need to design a zero-touch installation strategy.()
Your company has a single active directory domain. All servers run windows server 2008. You install an additional DNS server that runs windows server 2008. You need to delete the pointer record for the IP address 10.3.2.127. what should you do?()
Since your error has caused a great loss to our company, we are reluctantly to lodge a claim ____you.
One of your project team members has made a technological breakthrough on an R & D project. The result will be new business for the company, as well as a company patent. The team member received a company bonus. The motivational strategy used here is:
Your company network consists of a single Active Directory domain named The network has a print server running Windows 2003 Server. A single printer is installed on the print server. Technicians in the IT Support department have the necessary permissions to manage printers on the print server.You are a member of the Domain Admins group.A user in the Accounts department reports that his documents are not printing. A technician named John examines the print queue and finds a list of documents waiting to be printed. John tries to delete the documents from the queue but is unsuccessful.You need to enable users to successfully print.What should you do?()
Your partner company has a single domain named partner.com. The partner.com DNS zone is Active Directory-integrated. The IP addresses of the DNS servers in the partner domain will change. You need to
You are the network administrator for your company. The network originally consists of a single Windows NT 4.0 domain.
Your company network includes 6,000 Windows 2000 Professional client computers and 35 Windows 2000 Server computers in a single domain.
You are the network administrator for your company. The network consists of a single Active Directorydomain. All network servers run Windows Server 2003, and all client computers run Windows XPProfessional.A user named Peter uses a client computer named Client1. This computer has a locally attached tapedevice.You grant Peter the necessary permissions to perform backups of a member server named Server1. Peter runs the Backup utility on Client1 to back up the files located on Server1.You need use your client computer to view the most recent backup logs for Server1.What should you do? ()
Your company has a single Active Directory domain. The company network is protected by a firewall.Remote users connect to your network through a VPN server by using PPTP.When the users try to connect to the VPN server, they receive the following error message: °Error 721:The remote computer is not responding.You need to ensure that users can establish a VPN connection.What should you do?()
Your company has a main office and 15 branch offices. The company has a single Active Directory domain. All servers run Windows Server 2008 R2.You need to ensure that the VPN connections between the main office and the branch offices meet the following requirements:¡¤All data must be encrypted by using en-to-end encryption.¡¤The VPN connection must use compute-level authentication.¡¤User names and passwords cannot be used for authenticationWhat should you do?()