-
Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2).You need to ensure that computers can receive IP configurations from the DHCP server. What should you do?()
A . Add a scope option.
B . Add a server option.
C . Authorize the DHCP server.
D . Reconcile the DHCP scope.
-
Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2008 R2. You need to capture all replication errors from all domain controllers to a central location. What should you do()
A . Configure event log subscriptions.
B . Start the System Performance data collector set.
C . Start the Active Directory Diagnostics data collector set.
D . Install Network Monitor and create a new capture.
-
Your network consists of a single Active Directory domain. You have a member server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You need to track all authentication attempts on Server1. What should you do?()
A . Enable auditing of logon event events in Server1’s local policy.
B . Enable auditing of logon event events in the Default Domain Controller Policy.
C . Enable auditing of account logon event events in Server1’s local policy.
D . Enable auditing of account logon event events in the Default Domain Controller Policy.
-
Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2008 R2. You need to capture all replication errors from all domain controllers to a central location. What should you do()
A . Configure event log subscriptions.
B . Start the System Performance data collector set.
C . Start the Active Directory Diagnostics data collector set.
D . Install Network Monitor and create a new capture.
-
Your network consists of a single Active Directory domain. You have a member server that runs Windows Server 2003 Service Pack 2 (SP2). Your need to manage domain user accounts from the member server. What should you do? ()
A . Install Windows Support Tools, and then run lusrmgr.msc.
B . Run control userpasswords2. Use the advanced user management option.
C . Run mmc.exe and then add the Active Directory Users and Computers snap-in.
D . Install the Management and Monitoring Tools components, and then run compmgmt.msc.
-
Your network consists of a single Active Directory domain. The functional level of the forest is Windows Server 2008 R2. You need to create multiple password policies for users in your domain. What should you do()
A . From the Active Directory Schema snap-in, create multiple class schema objects.
B . From the ADSI Edit snap-in, create multiple Password Setting objects.
C . From the Security Configuration Wizard, create multiple security policies.
D . From the Group Policy Management snap-in, create multiple Group Policy objects.
-
Your network consists of a single Active Directory domain All domain controllers run WIndows Server 2008. You need to capture all replication errors from all domain controllers to a central localion What should you do()
A . configure event log subscriptions.
B . Start the System Performance data collector set.
C . start the Active Directory Diagnostics data collector set.
D . Install Network Monitor and create a new a new capture.
-
Your network consists of a single Active Directory domain. The functional level of the forest is Windows Server 2008 R2. You need to create multiple password policies for users in your domain. What should you do()
A . From the Active Directory Schema snap-in, create multiple class schema objects.
B . From the ADSI Edit snap-in, create multiple Password Setting objects.
C . From the Security Configuration Wizard, create multiple security policies.
D . From the Group Policy Management snap-in, create multiple Group Policy objects.
-
Your network consists of a single Active Directory domain. You have a terminal server that runs Windows Server 2003 Service Pack 2 (SP2). You need to prevent users from establishing multiple Remote Desktop connections to the server. What should you do? ()
A . Install and configure Terminal Server Licensing.
B . From Terminal Services Manager, modify the user sessions.
C . From Terminal Services Configuration, modify the server settings.
D . From Active Directory Users and Computers, modify the Sessions settings for each user account.
-
You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .What actions must you take to allow a room mailbox to automatically take requests for meetings?()
A . You must use log transactions.
B . You must use Calendar Repair Assistant (CRA).
C . You must select the resource booking attendant.
D . You must set up Task Scheduler.
-
You network consists of a single Active Directory domain. All domain controllers run Windows Server 2008. You need to reset the Directory Services Recovery Mode (DSRM) password on a domain controller. What tool should you use()
A . dsmod
B . ntdsutil
C . Local Users and Groups snap-in
D . Active Directory Users and Computers snap-i
-
The Testking corporate LAN consists of one large flat network. You decide to segment this LAN into two separate networks with a router. What will be the affect of this change?()
A . The number of broadcast domains will be decreased.
B . It will make the broadcasting of traffic between domains more efficient between segments.
C . It will increase the number of collisions.
D . It will prevent segment 1's broadcasts from getting to segment 2.
E . It will connect segment 1's broadcasts to segment 2.
-
You are a network administrator for The network consists of a single Active Directory domain named.
The domain contains two Windows Server 2003 terminal servers that host applications that are used by company employees. An organization unit (OU) named TerminalServers contains only the computer accounts for these two Terminal servers. A Group Policy object (GPO) named TSPolicy is linked to the TerminalServers OU, and you have been granted the right to modify the GPO.
Users should use the terminal servers to run only authorized applications. A custom financial application suite is currently the only allowed application. The financial application suite is installed in the folder C:\Program Files\MT Apps. The financial application suite contains many executable files.
Users must also be able to use Internet Explorer to access a browser-based application on the company intranet. The browser-based application makes extensive use of unsigned ActiveX components.
The financial application suite and the browser-based application are frequently updates with patches or new versions.
You need to configure the terminal servers to prevent users from running unauthorized applications. You plan to configure software restriction policies in the TSPolicy GPO. To reduce administrative overhead, you want to create a solution that can be implemented once, without requiring constant reconfiguration.
Which three actions should you perform to configure software restriction polices?()
(Each correct answer presents part of the solution. Choose three)
-
Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2003.You extend the Active Directory Schema to support a custom user attribute.You need to assign the same value to the custom attribute for 1,500 users. You must achieve this goal by using the minimum amount of administrative effort.Which tool should you use? ()
A.Adsiedit.msc
B.Csvde.exe
C. Dsmod.exe
D. Ldifde.exe
-
You are the network administrator for your company. The network originally consists of a single Windows NT 4.0 domain.
You upgrade the domain to a single Active Directory domain. All network servers now run Windows Server 2003, and all client computers run Windows XP Professional.
Your staff provides technical support to the network. They frequently establish Remote Desktop connections with a domain controller named DC1.
You hire 25 new support specialists for your staff. You use Csvde.exe to create Active Directory user accounts for all 25.
A new support specialist named Paul reports that he cannot establish a Remote Desktop connection with DC1. He receives the message shown in the Logon Message exhibit. (Click the Exhibit button.)
<img src='https://img2.soutiyun.com/ask/uploadfile/2019-03-27/c1ca10b5ef7976b1e62efd8e32fc3420.jpg' />
You open Gpedit.msc on DC1. You see the display shown in the Security Policy exhibit. (Click the Exhibit button.)
<img src='https://img2.soutiyun.com/ask/uploadfile/2019-03-27/35218487c59e1ec9d3305e8d5fd23b81.jpg' />
You need to ensure that Paul can establish Remote Desktop connections with DC1.
What should you do? ()
-
Your network consists of a single Active Directory domain. All servers run Windows Server 2003 ServicePack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3).You have a user account named User1.You need to identify which permissions User1 has on a file.What should you do?()
A. At a command prompt, run Net file.
B. At a command prompt, run Attrib.exe.
C. From the file properties, view the Summary settings.
D. From the file properties, view the Advanced Security settings.
-
You are the administrator of the Coho Vineyard network. The network consists of 10 Windows 2000 Advanced Server computers and 250 Windows 2000 Professional computers.
Your company has two domains cohovineyard.com and westcoastsales.com.
The company's intranet site is on a Windows 2000 Advanced Server computer named ServerA. ServerA is in the cohovineyard.com domain and is running Internet Information Services (IIS) and Microsoft Proxy Server 2.0
You want to configure the Windows 2000 Professional computers in the westcoastsales.com domain to access the intranet site. You want users to be able to connect to the intranet site by using the URL http://serverA rather than its fully qualified domain name.
What should you do?
A.Add cohovineyard.com to the Domain Suffix Search Order on the computers.
B.Add westcoastsales.com to the Domain Suffix Search Order on the computers.
C.Add westcoastsales.com to the exceptions list in the proxy server settings on the computers.
D.Configure the proxy server settings on the computers to bypass the proxy server for intranet addresses.
-
You are the network administrator for The network consists of a single Active Directory domain named The domain contains 352,000 Windows 2000 Professional computers.You install and configure Software Update Services (SUS) on a server named TestKing3. You need to scan all computers in the domain to find out whether they have received all approved updates that are located on the SUS server.What should you do?()
A. On a server, install and run the mbsacli.exe command with the appropriate configuration switches.
B. On a server that runs IIS, install and configure urlscan.exe.
C. Edit and configure the Default Domain Policy to enable the Configure Automatic Updates policy.
D. From a command prompt on TestKing3, run the netsh.exe command to scan all computers in the domain.
-
You are the network administrator for TestKing.com. All network servers run Windows Server 2003.The network consists of 10 offices located across Europa. The OU structure consists of one top-level OU for each branch office. Each top-level OU contains eight or more child OUs, one for each department. User accounts are located in the appropriate departmental OU within the appropriate office OU.For security purposes, you routinely disable user accounts for terminated employees. As part of an internal audit, you need to create a list of all disabled user accounts.You need to generate the list of disabled user accounts as quickly as possible.What are two possible ways to achieve this goal? ()(Each correct answer presents a complete solution. Choose two.)
A. In Active Directory Users and Computers, create a new saved query.
B. Run the dsget user command.
C. Run the dsquery user command.
D. Run the netsh command.
-
You are the network administrator for TestKing. The network consists of a single Active Directory domain named testking.com. All domain controllers run Windows Server 2003.The sales department recently hired 10 new employees. User accounts for these employees were created in Active Directory. The manager of the sales department sent you a list of a new users and asked you to add the user accounts to an existing global group named SalesDept.You need to add the users to the SalesDept global group.What are two possible ways to achieve this goal? Each correct answer presents a complete solution. Choose two.()
A. Use the dsadd user command to add the user accounts to the SalesDept global group.
B. Use the dsadd group command to add the user accounts to the SalesDept global group.
C. In Active Directory Users and Computers, select all 10 user accounts. Right-click the selected users, and then select the Properties menu command.
D. In Active Directory Users and Computers, select all 10 user accounts. Right-click the selected users, and then select the Add to a Group menu command.
-
You are the network administrator for your company. The network consists of a single Active Directorydomain. All network servers run Windows Server 2003, and all client computers run Windows XPProfessional.A user named Peter uses a client computer named Client1. This computer has a locally attached tapedevice.You grant Peter the necessary permissions to perform backups of a member server named Server1. Peter runs the Backup utility on Client1 to back up the files located on Server1.You need use your client computer to view the most recent backup logs for Server1.What should you do? ()
A. Use Notepad to view the contents of the backup report located on Server1.
B. Use Notepad to view the contents of the backup report located on Client1.
C. Use Event Viewer to view the contents of the application log located on Server1.
D. Use Event Viewer to view the contents of the application log located on Client1.
-
Your network consists of a single Active Directory domain. All servers run Windows Server 2003Service Pack 2 (SP2).You enable auditing for failed logon attempts on all domain controllers.You need to ensure that a record of failed logon attempts is retained for 90 days on all domain controllers.What should you do?()
A. From the Security Templates snap-in, open the hisecdc template. Modify the Retain System Log setting.
B. From the Security Templates snap-in, open the securedc template. Modify the Retain Security Log setting.
C. Open the Default Domain Policy. Modify the Retain System Log setting.
D. Open the Default Domain Controller Policy. Modify the Retain Security Log setting.
-
You are a network administrator for your company. The network consists of a single Active Directorydomain.A user named Mary works in the information technology security department. Mary is a member of theITSecurity global group. Mary reports that no one in the ITSecurity global group can access the securitylog from the console of a computer named Server1.You need to grant the ITSecurity global group the minimum rights necessary to view the security log onServer1.How should you modify the local security policy?()
A. Assign the Generate security audits user right to the ITSecurity global group.
B. Assign the Manage auditing and security logs user right to the ITSecurity global group.
C. Assign the Allow logon through Terminal Services user right to the ITSecurity global group.
D. Assign the Act as part of the operating system user right to the ITSecurity global group.
-
You are the network administrator for The network consists of asingle Active Directory domain named All network servers run Windows Server 2003, and all client computers run Windows XP Professional.
All summer interns in the company are members of the Interns global group. Allusers in the engineering department are members of the Engineering global group.
A member server named TK1 contains a folder that is shared as Blueprints.
Permissions on Blueprints are shown in the following table.
<img src='https://img2.soutiyun.com/shangxueba/ask/17127001-17130000/17129229/cecc0a8c429af4cd959fd19562338c8b.jpg' />
User accounts in Interns and Engineers do not have the Log on locally user right on TK1.
A user named Mark is a member of both Interns and Engineers. You discover that data in Blueprints was modified by Mark.
You need to reconfigure the permissions on Blueprints to ensure that Mark cannot access the folder. You must not affect the access of any other users. You must ensure that Mark remains in Engineers so he can access other appropriate resources.
What should you do?()