单项选择题
You are an administrator at Certkiller .com. Certkiller has a network of 5 member servers acting as file servers. It has an Active Directory domain. You have installed a software application on the servers. As soon as the application is installed, one of the member servers shuts down itself. To trace and rectify the problem, you create a Group Policy Object (GPO). You need to change the domain security settings to trace the shutdowns and identify the cause of it. What should you do to perform this task()
A.Link the GPO to the domain and enable System Events option
B.Link the GPO to the domain and enable Audit Object Access option
C.Link the GPO to the Domain Controllers and enable Audit Object Access option
D.Link the GPO to the Domain Controllers and enable Audit Process tracking option
E.Perform all of the above actions
相关考题
-
多项选择题
Certkiller .com has a software evaluation lab. There is a server in the evaluation lab named as CKT. CKT runs Windows Server 2008 and Microsoft Virtual Server 2005 R2. CKT has 200 virtual servers running on an isolated virtual segment to evaluate software. To connect to the internet, it uses physical network interface card. Certkiller .com requires every server in the company to access Internet. Certkiller .com security policy dictates that the IP address space used by software evaluation lab must not be used by other networks. Similarly, it states the IP address space used by other networks should not be used by the evaluation lab network. As an administrator you find you that the applications tested in the software evaluation lab need to access normal network to connect to the vendors update servers on the internet. You need to configure all virtual servers on the CKT server to access the internet. You also need to comply with company’s security policy. Which two actions should you perform to achieve this task()
A.Trigger the Virtual DHCP server for the external virtual network and run ipconfig/renew command on each virtual server
B.On CKT’s physical network interface, activate the Internet Connection Sharing (ICS)
C.Use Certkiller .com intranet IP addresses on all virtual servers on CKT.
D.Add and install a Microsoft Loopback Adapter network interface on CKT. Use a new network interface and create a new virtual network.
E.None of the above -
单项选择题
Certkiller.comhasamainofficeand30branchoffices.Tomanagethenetwork,eachbranchofficehasaseparateactivedirectorysitethathasadedicatedread-onlydomaincontroller(RODC).Abranchofficelocatedinafarofflocationreportsarobbery.TherobbershavestolentheRODCserver.WhichutilityshouldyoudotorecovertheuseraccountsthatwerecachedonthestolenRODCserver()
A.Execute Dsmod.exe
B.Use Active Directory Users and Computers
C.Use Active Directory Sites and Computers
D.Execute Ntdstuil.exe with -ato parameter -
多项选择题
The corporate network of Certkiller consists of a Windows Server 2008 single Active Directory domain. The domain has two servers named Certkiller 1 and Certkiller 2. To ensure central monitoring of events you decided to collect all the events on one server, Certkiller 1. To collect events from Certkiller 2. and transfer them to Certkiller 1, you configured the required event subscriptions. You selected the Normal option for the Event delivery optimization setting by using the HTTP protocol. However, you discovered that none of the subscriptions work. Which of the following actions would you perform to configure the event collection and event forwarding on the two servers()
A.Through Run window execute the winrm quickconfig command on Certkiller 2.
B.Through Run window execute the wecutil qc command on Certkiller 2.
C.Add the Certkiller 1 account to the Administrators group on Certkiller 2.
D.Through Run window execute the winrm quickconfig command on Certkiller 1.
E.Add the Certkiller 2 account to the Administrators group on Certkiller 1.
F.Through Run window execute the wecutil qc command on Certkiller 1.
