A system administrator wants to couple two servers together so that users from server A can access server B without entering their password. How would this be accomplished?()A、employ NIS to synchronize user names and passwordsB、create a /.rhosts on server

题目

A system administrator wants to couple two servers together so that users from server A can access server B without entering their password. How would this be accomplished?()

  • A、employ NIS to synchronize user names and passwords
  • B、create a /.rhosts on server A and serve B
  • C、create a $HOME/.netrc for all users on server A and serve rB
  • D、create a /etc/hosts.equiv on server A and server B
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1 (Choose two.)()。

  • A、Configure port Fa0/1 to accept connections only from the static IP address of the server.
  • B、Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.
  • C、Configure the MAC address of the server as a static entry associated with port Fa0/1.
  • D、Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.
  • E、Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.
  • F、Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.

正确答案:C,E

第2题:

You are configuring SQL1 so that the distributed query in the Sales database can access data in the CRM database on SQL2. You create a linked server for SQL2, and you create a linked server login that uses impersonation.Now, you need to ask the network administrator to configure SQL1. Which two tasks should you ask the administrator to perform?()

  • A、Add the user account that is used by the SQL Server service to the local Administrators group.
  • B、Enable the Do not trust this user for delegation Active Domain property for the user account that is used by the SQL Server service.
  • C、Create a Service Principal Name (SPN) for the user account that is used by the SQL Server service.
  • D、Enable the Trusted for delegation Active Domain property for the user account that is used by the SQL Server service.

正确答案:C,D

第3题:

The network consists of a single domain named Ezonexam.com that includes 20 Windows NT workstation 4.0 client computers. All other client computers are Windows 2000 Professional computers. You install Terminal Services on one of the Windows Server computers and Terminal Services Client on the 20 Windows NT Workstation 4.0 client computers. You create a system policy on the server that is configured as the terminal server. This system policy denies access to Network Neighborhood. You find that the users of the terminal server can still browse the network when they open My Network Places from Windows 2000 Professional computer or when they open Network Neighborhood from Windows NT Workstation 4.0 computers.

You want to prevent all users from browsing the network.

What should you do? (Each correct answer presents a complete solution. Choose two.)

A.Create a Windows Group Policy that denies user access to My Network Places.

B.Copy the Windows NT policy file to the 20 Windows NT Workstation 4.0 computers.

C.Create a Windows NT 4.0 default user policy on the Windows 2000 Server computer that is configured as the PDC emulator.

D.Modify the Windows NT policy template file so that you can restrict access to both My Network Places and Network Neighborhood. Save the policy file on the terminal server.

E.Configure the terminal server to use Application server mode. Select the Permissions compatible with Terminal Server 4.0 Users option.


正确答案:AC
解析:Explanation: The primary domain controller (PDC) is the server that maintains the master copy of the domain's user-accounts database and that validates logon requests. Prior to Windows 2000 every Windows NT network domain was required to have one, and only one, PDC. If you want to deny users of the terminal server browsing ability of the Network Neighborhood, you should create a group policy that denies access to My Network Places. (Microsoft is colloquially stuck with Network Neighborhood for My Network Places.)

第4题:

You have a Microsoft Internet Security and Accelerator (ISA) 2006 server that provides all Internet accessfor your company.  You have two Mailbox servers configured in a database availability group (DAG), two Client Accessservers, and two Hub Transport servers.  You need to recommend changes to the environment to ensure that users can access Outlook Web App(OWA) from the Internet if any single server fails.  What should you recommend?()

  • A、Configure a Client Access server array.
  • B、Deploy a second ISA server and create an ISA server array.
  • C、Implement Windows Network Load Balancing for the Client Access servers.
  • D、Deploy two Edge Transport servers that are configured to use EdgeSync synchronization.

正确答案:B

第5题:

You need to design a configuration for the mailbox servers. What should you do?()

  • A、Create two Exchange Server 2003 computers. Place the mailboxes for main office users on one server, and place the mailboxes for remote users on the other server
  • B、Create a Network Load Balancing cluster that contains two Exchange Server 2003 computers. Place half of the user mailboxes on one server, and place half of the user mailboxes on the other server
  • C、Create a Microsoft Cluster Server cluster that contains two Exchange Server 2003 computers. Place all of the user mailboxes on one server and configure the other server as a failover node
  • D、Create a Microsoft Cluster Server cluster that contains two Exchange Server 2003 computers. Place half of the user mailboxes on one server, and place half of the user mailboxes on the other server

正确答案:D

第6题:

The following entry is in the /etc/host.equiv and /home/jsmith/.rhosts file on server Alpha:+ jsmith.What does this entry indicate?()

  • A、The user "jsmith" can use r-commands from any server to server Alpha system-wide
  • B、The user "jsmith" can use r-commands from server Alpha to any server system-wide
  • C、The user "jsmith" can use r-commands from server Alpha to any server with a /home/jsmith directory
  • D、The user "jsmith" can use r-commands from any server to server Alpha only in the /home/jsmith directory

正确答案:A

第7题:

Companycom LPAR that is using a Virtual IO Server needs to be more highly available. How can this be accomplished using APV features?()

  • A、Reallocate the Virtual IO Server disks to the user LPAR
  • B、Create a stripe-group within the Virtual IO Server to protect against disk failure
  • C、Reconfigure the user LPAR to use both locally owned disk and a Virtual SCSI disk
  • D、Create a second Virtual IO Server and reconfigure the user LPAR to mirror across both Virtual IO  Servers

正确答案:D

第8题:

You are the administrator of a Windows Server 2003 computer named Server4.You install Terminal Services on Server4. You add users from the technical support department to the Power Users group and to the Remote Desktop Users group on Server4. You notice that Server4 is periodically unavailable. You open Event Viewer on Server4 and discover that theserver was restarted accidentally by users in the technical support department.You need to ensure that users in the technical support department can establish a Terminal Service session and can manage local user accounts on Server4 without having the ability to restart Server 4.Which action or actions should you perform?() (Choose all that apply.)

A. Remove the technical support user accounts from the Power Users group.

B. Remove the technical support user accounts from the Remote Desktop Users group.

C. Remove the Power Users group from the Shut down the system user right.

D. Add the Power Users group to the Deny log on locally user right.

E. Modify the permissions on the RDP-Tcp connection by using Terminal Services Configuration. Assign the Power Users group the Deny - Full Control permission.


参考答案:C

第9题:

You are the network administrator for your company. Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2003. You add eight servers for a new application. You create an organizational unit (OU) named Application to hold the servers and other resources for the application. Users and groups in the domain will need varied permissions on the application servers. The members of a global group named Server Access Team need to be able to grant access to the servers. The Server Access Team group does not need to be able to perform any other tasks on the servers. You need to allow the Server Access Team group to grant permissions for the application servers without granting the Server Access Team group unnecessary permissions.  What should you do?()

  • A、 Create a Group Policy object (GPO) for restricted groups. Configure the GPO to make the Server Access Team group a member of the Power Users group on each application server. Link the GPO to the Application OU.
  • B、 Grant the Server Access Team group permissions to modify computer objects in the Application OU.
  • C、 Move the Server Access Team group object into the Application OU.
  • D、 Create domain local groups that grant access to the application servers. Grant the Server Access Team group permissions to modify the membership of the domain local groups.

正确答案:D

第10题:

You have two Exchange Server 2010 servers that have the Client Access, Hub Transport, and Mailbox server roles installed.The servers are members of a database availability group (DAG).You need to ensure that all users can access the Client Access server if a single server or service fails.What should you do?()

  • A、from DNS manager, create two new records for the Client Access servers.
  • B、from Failover Cluster Manager, create a new service named Client Access Server and assign a new IP address.
  • C、Install the Network Load Balancing feature on each server and assign a second IP address to each network adapter.
  • D、Deploy a hardware load balancer.Create a DNS record for the virtual IP address and configure a Client Access server array.

正确答案:D

更多相关问题