Which two actions should you perform? (Each correct answer presents part of the solution
All servers in your company run Windows Server 2003. You have a secure network segment protected by a firewall. You configure a DHCP scope for the secure network segment on a DHCP server that is located outside the secure network segment. Client computers inside the secure network segment do not receive IP addressing information. You need to ensure that client computers inside the secure network segment receive IP addressing information.
Which two actions should you perform? (Each correct answer presents part of the solution.Choose two.)
Which tool should you use?
Your company has a single Active Directory directory service domain. All servers in your environment run Windows Server 2003. You need to verify the DNS infrastructure and automatically generate an HTML report of the results.
Which tool should you use?
You need to ensure that the member servers can use the required IP addresses and that their TCP/IP properties
You plan to deploy Windows Server 2003 member servers that must use specific IP addresses. You need to ensure that the member servers can use the required IP addresses and that their TCP/IP properties can be updated dynamically.
What should you do?
Which two settings in the Default Domain Policy should you plan to configure? (Each correct answer presents pa
Your company has an Active Directory directory service domain. All servers run Windows Server 2003. You are creating a security monitoring plan. You need to audit all domain authentication attempts and write these events to an event log on the local computer and also to an event log on the domain controller.
Which two settings in the Default Domain Policy should you plan to configure? (Each correct answer presents part of the solution. Choose two.)
You need to ensure that the server does not continue to send the unsolicited commercial e-mail messages
All servers in your company run Windows Server 2003. You discover that your public IP address is listed on an SMTP blacklist, and that one of your servers is sending unsolicited commercial e-mail that originates from outside your network. You need to ensure that the server does not continue to send the unsolicited commercial e-mail messages.
What should you do?
You need to enforce a maximum session time for all remote connections
Your company has an Active Directory directory service domain. All servers run Windows Server 2003. You control remote access to the internal network by using several custom remote access policies. You need to enforce a maximum session time for all remote connections. In the Routing and Remote Access console, you create a new remote session policy.
What should you do next?
Which IP address scheme should you choose?
Your company has 1,000 computers and network devices. Your network uses private IP address ranges. You plan to create subnets that each contain a maximum of 30 hosts. You need to choose the appropriate IP address scheme for your network.
Which IP address scheme should you choose?
What should you specify in your design?
Your company has an Active Directory directory service domain. All servers run Windows Server 2003. All servers are located in an organizational unit (OU) named Servers. You need to design an IPSec policy strategy that provides security for the duration of the server startup process. What should you specify in your design?
You need to find out why Group Policy is not applying the new IPSec policy
Your company has a single Active Directory directory service domain. All servers in your environment run Windows Server 2003. You assign an IPSec policy to a member server. Group Policy does not apply the IPSec policy when the member server communicates with a domain controller. You need to find out why Group Policy is not applying the new IPSec policy. What should you do?
You need to ensure that support technicians have the appropriate remote administration access to all servers
Your company has an Active Directory directory service domain. All servers run Windows Server 2003. You are planning security policies for remote network administration. You plan to deploy the policies by using Group Policy. You must support the following requirements. Tier 1 support technicians must be able to request support from Tier 2 support technicians. Tier 1 support technicians must not be able to remotely connect to server consoles. Tier 2 support technicians must be able to remotely connect to server consoles.
You need to ensure that support technicians have the appropriate remote administration access to all servers.
What should you do?