单项选择题
Your company has a domain controller named Server1 that runs Windows Server 2008 R2 and the DNS Server server role. A server named Server2 runs a custom application.You need to configure DNS to include the following parameters for the custom application: ˆService ˆPriority ˆ Weight ˆ Protocol ˆ Port number ˆHost offering this service Which record should you create?()
A. Host Info (HINFO)
B. Service Location (SRV)
C. Canonical Name (CNAME)
D. Well-Known Service (WKS)
相关考题
-
单项选择题
YourcompanyhasaservernamedFS1.FS1hoststhedomain-basedDFSnamespacenamed\\contoso.com\dfs.AlldomainusersstoretheirdatainsubfolderswithintheDFSnamespace.Youneedtopreventallusers,exceptadministrators,fromcreatingnewfoldersornewfilesattherootofthe\\contoso.com\dfsshare.Whatshouldyoudo?()
A.Run the dfscmd.exe \\FS1\dfs /restore command on FS1.
B.Configure the NTFS permissions for the C:\DFSroots\dfs folder on FS1. Set the Create folders/append data special permission to Deny for the Authenticated Users group. Set the Full Control permission to Allow for the Administrators group.
C.Start the Delegate Management Permissions Wizard for the DFS namespace named \\contoso.com\dfs. Remove all groups that have the permission type Explicit except the Administrators group.
D.Configure the \\FS1\dfs shared folder permissions. Set the permissions for the Authenticated Users group to Reader. Set the permissions for the Administrators group to Co-owner. -
单项选择题
YouhaveaserverthatrunsWindowsServer2008.YouneedtopreventtheserverfromestablishingcommunicationsessionstoothercomputersbyusingTCPport25.Whatshouldyoudo?()
A.From Windows Firewall, add an exception.
B.From Windows Firewall, enable the Block all incoming connections option.
C.From the Windows Firewall with Advanced Security snap-in, create an inbound rule.
D.From the Windows Firewall with Advanced Security snap-in, create an outbound rule. -
单项选择题
NetworkAccessProtection(NAP)isconfiguredforthecorporatenetwork.Usersconnecttothecorporatenetworkbyusingportablecomputers.Thecompanypolicyrequiredconfidentialityofdatawhenthedataisintransmitbetweentheportablecomputersandtheservers.Youneedtoensuretahtuserscanaccessnetworkresourcesonlyfromcomputersthatcomplywiththecompanypolicy.Whatshouldyoudo?()
A. Create an IPsec Enforcement Network policy
B. Create an 802.1X enforcement network policy
C. Create a wired network (IEEE 802.3) Group Policy
D. Create an Extensible Authentication Portocol (EAP) Enforcement Network Policy
