单项选择题
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 installed.
Contoso.com has a server, named ENSUREPASS-SR07, which has four network adapters. Contoso.com has two SR07’s network adapters are connected to the one LAN,local area networks (LANs). Two of ENSUREPASS – while the other two are connected to the other LAN.
You are required to configure one of the network adapter pairs into a network adapter team.
Which of the following actions should you take?()
A. You should consider accessing the Group Policy Management Console (GPMC) on ENSUREPASS-SR07.
B. You should consider accessing the TS Manager console on ENSUREPASS-SR07.
C. You should consider accessing the Server Manager console on ENSUREPASS-SR07.
D. You should consider accessing the Remote Desktop Gateway Manager console on ENSUREPASS-SR07.
相关考题
-
单项选择题
Which of the following is not a correct reason for creating an OU?()
A. To create a permanent container that cannot be moved or renamed
B. To duplicate the divisions in your organization
C. To delegate administration tasks
D. To assign different Group Policy settings to a specific group of users or computers -
多项选择题
Your network contains one Active Directory domain named contoso.com. The domain contains 2,000 client computers used by students. You recently discover an increase in calls to the helpdesk that relate to security policy to meet the following requirement: Modify the UserName of the built-in account named Administrator Support a time mismatch between client computers and domain controllers of up to three minutes. Which Two security settings should you modify?()
A. Account Policies
B. Password Policy
C. Account Lockout Policy
D. Kerberos Policy
E. Local Policies
F. Audit Policy
G. User Rights Assignment
H. Security Options -
多项选择题
You have 10 domain controller in a domain. You need to prevent several members of domain admin groups from logging on the domain controller. Which two object should you create and configure?()
A. GPO to the domain
B. authentication policy
C. authentication policy silo
D. a central access policy
E. a user certificate
