单项选择题
A. From the properties of the Sources folder, remove the Sources share, and then share the Sources folder as Sources$
B. From the properties of the Sources folder, deny the List Folder Contents permission for the Everyone group
C. From the properties of the Sources share, configure access-based enumeration
D. From the properties of the Sources folder, configure the hidden attribute
单项选择题 hosts an Active Directory-integrated zone for the domain. You need to reduce how long it takes until stale records are deleted from the zone. What should you do?()
单项选择题 You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed, and all workstations have Windows 8 installed. You are running a training exercise for junior administrators. You are currently discussing a Windows PowerShell cmdlet that activates previously de-activated firewall rules. Which of the following is the cmdlet being discussed?()
单项选择题 You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed. Contoso.com has a server, named ENSUREPASS-SR07, which has two physical disks installed. The C: drive hosts the boot partition, while the D: drive is not being used. Both disks are online. You have received instructions to create a virtual machine on ENSUREPASS-SR07. Subsequent to creating the virtual machine, you have to connect the D: drive to the virtual machine. Which of the following is TRUE with regards to connecting a physical disk to a virtual machine?()