You deploy a Windows Server 2008 R2 VPN server behind a firewall. Remote users connect to the VPN by using portable computers that run Windows 7.The firewall is configured to allow only secured Web communications.You need to enable remote users to connect as securely as possible. You must achieve this goal without opening any additional ports on the firewall.What should you do?()
第1题:
Your network contains a stand-alone root certification authority (CA). You have a server named Server1 that runs Windows Server 2008 R2. You issue a server certificate to Server1. You deploy Secure Socket Tunneling Protocol (SSTP) on Server1. You need to recommend a solution that allows external partner computers to access internalnetwork resources by using SSTP. What should you recommend?()
第2题:
You need to deploy a read-only domain controller (RODC) that runs Windows Server 2008 R2. What is the minimal forest functional level that you should use()
第3题:
Your network contains a server named Server1 that runs Windows Server 2008 R2. You plan to deploy DirectAccess on Server1.You need to configure Windows Firewall on Server1 to support DirectAccess connections.What should you allow from Windows Firewall on Server1?()
A. ICMPv6 Echo Requests
B. ICMPv6 Redirect
C. IGMP
D. IPv6-Route
第4题:
You need to deploy a read-only domain controller (RODC) that runs Windows Server 2008. What is the minimal forest functional level that you should use()
第5题:
Your company has an Active Directory Domain Services (AD DS) domain that runs at the Windows Server 2008 functional level. All servers run Windows Server 2008 R2. All client computers run Windows XP Professional. You use the Key Management Service (KMS) to manage your volume license activations. All servers have been activated by using KMS. You deploy 20 Windows 7 virtual desktops. The virtual desktop operating systems do not activate. You need to ensure that the virtual desktops activate by using KMS. What should you do?()
第6题:
You need to identify which operating system must be installed on the Hyper-V server in the new branch office. Which operating system should you identify?()
第7题:
Certkiller .com has a main office and branch office in another city. You are assigned to deploy and implement a Read-only Domain Controller (RODC) at the branch office. You deploy a RODC that runs Windows Server 2008. What should you do to ensure that the users at the branch office can log on to the domain using RODC()
第8题:
You need to recommend a backup solution for the VMs that meets the museum's technical requirements. What should you include in the recommendation?()
第9题:
Your network consists of a single Active Directory site that includes two network segments. Thenetwork segments connect by using a router that is RFC 1542 compliant. You plan to use Windows Deployment Services (WDS) to deploy Windows Server 2008 R2 servers. All new servers support Pre-Boot Execution Environment (PXE). You need to design a deployment strategy to meet the following requirements: èSupport Windows Server?2008 R2 èDeploy the servers by using WDS in both network segments èMinimize the number of servers used to support WDS What should you include in your design?()
第10题:
Your company plans to deploy eight file servers that run Windows Server 2008 R2. All file servers will connect to Ethernet switches. You need to plan a data storage solution that meets the followingrequirements: èAllocates storage to the servers as needed èUtilizes the existing network infrastructure èMaximizes performance èMaximizes fault tolerance Which actions should you include in your plan?()