题目详情
当前位置:首页 > 职业培训考试
题目详情:
发布时间:2024-01-16 05:25:11

[多项选择] Certkiller。COM有一个软件评估实验室。有一个服务器在命名为CKT评估实验室。 CKT运行Windows Server 2008和微软虚拟服务器2005 R2。 CKT有200虚拟服务器上运行一个独立的虚拟段,以评估软件。要连接到互联网,它使用物理网络接口卡。 Certkiller。COM需要在公司的每一台服务器访问Internet。  Certkiller。安全政策的规定,不得用于其他网络软件评估实验室所使用的IP地址空间。同样,国家其他网络使用的IP地址空间不应该被用来评估实验室网络。作为管理员,你发现你在软件评估实验室测试的应用程序需要访问正常网络连接互联网上的供应商更新服务器。您需要配置的CKT服务器上的所有虚拟服务器访问Internet。您还需要遵守公司的安全政策。你应该执行哪两个动作来实现这一任务呢()
A. 触发外部虚拟网络的虚拟DHCP服务器和运行ipconfig / renew命令,每个虚拟服务器上
B. 在CKT的物理网络接口,激活的Internet连接共享(ICS)
C. 使用Certkiller。COM的Intranet上CKT的所有虚拟服务器的IP地址。
D. 添加并安装Microsoft环回适配器网络接口上CKT。使用新的网络接口,并创建一个新的虚拟网络。
E. 以上都不是

更多"Certkiller。COM有一个软件评估实验室。有一个服务器在命名为"的相关试题:

[单项选择] In your Certkiller .com production database, you find that the database users are able to create and read files with unstructured data, available in any location on the host machine from an application.  You want to restrict the database users to access files in a specific location on the host machine.  What could do to achieve this?()
A. Modify the value for the UTL_FILE_DIR parameter in the parameter file
B. Grant read and write privilege on the operating system path to the database users
C. Modify the value for the LDAP_DIRECTORY_ACCESS parameter in the parameter file
D. Modify the value for the PLSQL_NATIVE_LIBRARY_DIR parameter in the parameter file
E. Create a directory object referring to the operating system path, and grant read and write privilege on the directory object to the database users
[多项选择] Certkiller .com has a software evaluation lab. There is a server in the evaluation lab named as CKT. CKT runs Windows Server 2008 and Microsoft Virtual Server 2005 R2. CKT has 200 virtual servers running on an isolated virtual segment to evaluate software. To connect to the internet, it uses physical network interface card.  Certkiller .com requires every server in the company to access Internet.  Certkiller .com security policy dictates that the IP address space used by software evaluation lab must not be used by other networks. Similarly, it states the IP address space used by other networks should not be used by the evaluation lab network. As an administrator you find you that the applications tested in the software evaluation lab need to access normal network to connect to the vendors update servers on the internet. You need to configure all virtual servers on the CKT server to access the internet. You also need to comply with company’s security policy.  Which two actions should you perform to achieve this task()
A. Trigger the Virtual DHCP server for the external virtual network and run  ipconfig/renew command on each virtual server
B. On CKT’s physical network interface, activate the Internet Connection Sharing (ICS)
C. Use Certkiller .com intranet IP addresses on all virtual servers on CKT.
D. Add and install a Microsoft Loopback Adapter network interface on CKT. Use a new network interface and create a new virtual network.
E. None of the above
[单项选择] Certkiller .com boosts a main office and 20 branch offices. Configured as a separate site, each branch office has a Read-Only Domain Controller (RODC) server installed.  Users in remote offices complain that they are unable to log on to their accounts.  What should you do to make sure that the cached credentials for user accounts are only stored in their local branch office RODC server()
A. Open the RODC computer account security tab and set Allow on the Receive as permission only for the users that are unable to log on to their accounts
B. Add a password replication policy to the main Domain RODC and add user accounts in the security group
C. Configure a unique security group for each branch office and add user accounts to the respective security group. Add the security groups to the password replication allowed group on the main RODC server
D. Configure and add a separate password replication policy on each RODC computer account
[单项选择] Certkiller .com has a network that is comprise of a single Active Directory Domain.  As an administrator at Certkiller .com, you install Active Directory Lightweight Directory Services (AD LDS) on a server that runs Windows Server 2008. To enable Secure Sockets Layer (SSL) based connections to the AD LDS server, you install certificates from a trusted Certification Authority (CA) on the AD LDS server and client computers.  Which tool should you use to test the certificate with AD LDS()
A. Ldp.exe
B. Active Directory Domain services
C. ntdsutil.exe
D. Lds.exe
E. wsamain.exe
F. None of the above
[单项选择] Certkiller .com has a server that runs on Windows Server 2008. The server also has an instance of Active Directory Lightweight Directory Services (AD LDS) running.  In order to test AD LDS, you need to replicate the AD LDS instance on a test computer located on the network.  What should you do to achieve this objective()
A. Execute AD LDS Setup wizard on the test computer to create and install a replica of AD LDS.
B. Execute repadmin/bs  command on the test computer
C. Install and configure a new AD LDS instance on the test computer by copy and pasting the entire partition on the test computer
D. Execute the Dsmgmt command on the test computer and create a naming context

[单项选择] Certkiller .com has a domain controller that runs Windows Server 2008. The Certkiller .com network boosts 40 Windows Vista client machines. As an administrator at Certkiller .com, you want to deploy Active Directory Certificate service (AD CS) to authorize the network users by issuing digital certificates.  What should you do to manage certificate settings on all machines in a domain from one main location()
A. Configure Enterprise CA certificate settings
B. Configure Enterprise trust certificate settings
C. Configure Advance CA certificate settings
D. Configure Group Policy certificate settings
E. All of the above
[单项选择] Certkiller .com has a main office and a branch office. Certkiller .com’s network consists of a single Active Directory forest. Some of the servers in the network run Windows Server 2008 and the rest run Windows server 2003.  You are the administrator at Certkiller .com. You have installed Active Directory Domain Services (AD DS) on a computer that runs Windows Server 2008. The branch office is located in a physically insecure place. It has not IT personnel onsite and there are no administrators over there. You need to setup a Read-Only Domain Controller (RODC) on the Server Core installation computer in the branch office. What should you do to setup RODC on the computer in branch office()
A. Execute an attended installation of AD DS
B. Execute an unattended installation of AD DS
C. Execute RODC through AD DS
D. Execute AD DS by using deploying the image of AD DS
E. none of the above
[多项选择] Certkiller .com boosts a two-node Network Load Balancing cluster which is called web. CK1 .com. The purpose of this cluster is to provide load balancing and high availability of the intranet website only. With monitoring the cluster, you discover that the users can view the Network Load Balancing cluster in their Network Neighborhood and they can use it to connect to various services by using the name web. CK1 .com.  You also discover that there is only one port rule configured for Network Load Balancing cluster.  You have to configure web. CK1 .com NLB cluster to accept HTTP traffic only.  Which two actions should you perform to achieve this objective()
A. Create a new rule for TCP port 80 by using the Network Load Balancing Cluster console
B. Run the wlbs disable command on the cluster nodes
C. Assign a unique port rule for NLB cluster by using the NLB Cluster console
D. Delete the default port rules through Network Load Balancing Cluster console
[单项选择] Certkiller has an Active Directory forest with six domains. The company has 5 sites. The company requires a new distributed application that uses a custom application directory partition named ResData for data replication.  The application is installed on one member server in five sites.  You need to configure the five member servers to receive the ResData application directory partition for data replication. What should you do()
A. Run the Dcpromo utility on the five member servers.
B. Run the Regsvr32 command on the five member servers
C. Run the Webadmin command on the five member servers
D. Run the RacAgent utility on the five member servers
[单项选择] Certkiller is having an Active Directory Rights Management Service (AD RMS) server.  Users machines are running Windows Vista and an Active Directory domain is configured at Microsoft Windows Server 2003 functional level.  Users are complaining that they cannot protect their documents. You need to configure AD RMS so that users are able to protect their documents. What should you do()
A. Use a group policy to install the AD RMS client computers
B. Add the ADRMSADMIN account to the local administrators group on the computers
C. Add the ADRMSSRVC account to the local administrators on the AD RMS server
D. Establish an e-mail account in Active Directory Domain Services (AD DS) for each user
E. Upgrade the active directory domain to the functional level of Windows 2008 server
[单项选择] As the Certkiller administrator you had installed a read-only domain controller (RODC) server at remote location.  The remote location doesn’t provide enough physical security for the server.  What should you do to allow administrative accounts to replicate authentication information to Read-Only Domain Controllers()
A. Remove any administrative accounts from RODC’s group
B. Add administrative accounts to the domain Allowed RODC Password Replication group
C. Set the Deny on Receive as permission for administrative accounts on the RODC computer account security tab for the Group Policy Object (GPO)
D. Configure a new Group Policy Object (GPO) with the Account Lockout settings enabled. Link the GPO to the remote location. Activate the Read Allow and the Apply group policy Allow permissions for the administrators on the Security tab for the GPO.
E. None of the above
[单项选择] Certkiller.com has installed a server. You are assigned to install and run an instance of Active Directory Lightweight Directory Service (AD LDS). After doing necessary configurations, you start an instance of AD LDS successfully.  Now you need to create new Organizational Units in the AD LDS application directory partition. What should you do to create new OUs in the AD LDS application directory partition()
A. To create the OUs, use the dsmod OU  command
B. Employ ADSI Edit Snap-in to create the OUs on the AD LDS application directory partition.
C. Create OUs by executing dsadd OU  command
D. Create OUs on the AD LDS application directory partition by using Active Directory Users and computers snap-in.

[单项选择] Certkiller.com has hired you as a system administrator for their network. You make use of .NETFramework v3.5 in order to create a Microsoft ASP.NET application.  You decide to create a Web form. You add the subsequent code fragment to the Web form. ’ />   The DataSource control named CKDataSource recovers the Quantity column values from a tablenamed Orders. You the create the rptData_ItemDataBound event handler using the subsequentcode fragment. (The line numbers is included for reference purposes)  1 protected void rept_b(object sender, RepeaterItemEventArgs e) 2 { 3 4 if(CKLbl != null) 5 if(int.Parse(CKLbl.Text) < 10)6 CKLbl.ForeColor = Color.Red;7 }  You receive an instruction from management to recover a reference to the lblQuantity Labelcontrol into a variable. The variable is named CKLbl.  What should you do?()
A. Your best option would be to insert Label CKLbl = e.Item.FindControl("lblQty") as Label at line4.
B. Your best option would be to insert Label CKLbl = Page.FindControl("lblQty") as Label at line 4.
C. Your best option would be to insert Label CKLbl = rptData.FindControl("lblQty") as Label at line4.
D. Your best option would be to insert Label CKLbl = e.Item.Parent.FindControl("lblQty") as Labelat line 4
[多项选择] Certkiller.com has an active directory forest on a single domain.  Certkiller needs a distributed application that employs a custom application. The application is directory partition software named PARDAT. You need to implement this application for data replication.  Which two tools should you use to achieve this task()
A. Dnscmd.
B. Ntdsutil.
C. Ipconfig
D. Dnsutil
E. All of the above

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

截图扫码使用小程序[完全免费查看答案]
请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码