You need to ensure that when you change the IP address of web1
Your network contains a DNS server that hosts a zone for fabrikam.com. Dynamic updates are enabled on the zone.
The network contains a Web server named web1.fabrikam.com. Web1.fabrikam.com uses the 172.23.1.6 IP address.
Web1.fabrikam.com hosts three websites as shown in the exhibit. (Refer to the Exhibit.)
You change the IP address of web1.fabrikam.com to 172.23.1.20.
After the change, users report that they cannot access Web2 and Web3. The users can access Web1.
You change the IP address of web1.fabrikam.com to 172.23.1.6.
The users report that they can access all three websites.
You need to ensure that when you change the IP address of web1.fabrikam.com, the users can access all three websites.
What should you do?
Exhibit:
Which security policy setting should you configure?
Your network contains an Active Directory domain named contoso.com.
You need to audit changes to a service account. The solution must ensure that the audit logs contain the before and after values of all the changes.
Which security policy setting should you configure?
Which tool should you run in the script?
Your network contains a domain controller named DC1 that runs Windows Server 2008 R2 Service Pack 1 (SP1). You need to create a script to clear the address table cache of the physical network interface. Which tool should you run in the script?
You need to ensure that GPO10 is applied only to client computers that run Windows 7
Your network contains a single Active Directory domain. Client computers run either Windows XP
Service Pack 3 (SP3) or Windows 7. All of the computer accounts for the client computers are located in an organizational unit (OU) named OU1.
You link a new Group Policy object (GPO) named GPO10 to OU1.
You need to ensure that GPO10 is applied only to client computers that run Windows 7.
What should you do?
Which tools should you use?
You need to ensure that only the members of the Power Users group and the members of the Administrators group can view the events in the System log.
Which tools should you use?
You need to ensure that the support technicians can reset the passwords for the user accounts in their respect
Your company has four offices. The network contains a single Active Directory domain. Each office has a domain controller. Each office has an organizational unit (OU) that contains the user accounts for the users in that office. In each office, support technicians perform basic troubleshooting for the users in their respective office. You need to ensure that the support technicians can reset the passwords for the user accounts in their respective office only. The solution must prevent the technicians from creating user accounts. What should you do?
You need to ensure that the DNS server resolves queries for isatap
Your network contains an Active Directory domain named contoso.com. The domain contains a DNS server named Server1.
You are configuring DirectAccess.
You create a static host (A) record for isatap.contoso.com.
You discover that the DNS server fails to respond to queries for the isatap.contoso.com record.
You need to ensure that the DNS server resolves queries for isatap.contoso.com.
What should you do?
You need to configure the RODC to store only the passwords of users in the remote site
Your network contains an Active Directory forest. The forest contains an Active Directory site for a remote office. The remote site contains a read-only domain controller (RODC). You need to configure the RODC to store only the passwords of users in the remote site. What should you do?
Which tool should you use? (Each correct answer presents a complete solution
Your network contains two Active Directory forests named contoso.com and fabrikam.com. Fabrikam.com contains a server named Server1 that has the Print and Document Services server role installed.
Server1 contains 50 shared printers.
You join Server1 to the contoso.com domain.
You need to ensure that all of the shared printers on Server1 are listed in the contoso.com forest.
Which tool should you use? (Each correct answer presents a complete solution. Choose two.)
Which two actions should you perform? (Each correct answer presents part of the solution
Active Directory Rights Management Services (AD RMS) is deployed on your network. You need to configure AD RMS to use Kerberos authentication. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)