Which two tasks should you perform? (Each correct answer presents part of the solution
Your company has a server that runs Windows Server 2008 R2. Active Directory Certificate Services (AD CS) is configured as a standalone Certification Authority (CA) on the server.
You need to audit changes to the CA configuration settings and the CA security settings.
Which two tasks should you perform? (Each correct answer presents part of the solution. Choose two.)
Which two actions should you perform? (Each correct answer presents part of the solution
Your company has 10 servers that run Windows Server 2008 R2. The servers have Remote Desktop Protocol (RDP) enabled for server administration. RDP is configured to use default security settings.
All administrators’ computers run Windows 7.
You need to ensure the RDP connections are as secure as possible. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
You need to access the Active Directory Schema snap-in
Your company has an Active Directory domain. You log on to the domain controller. The Active Directory Schema snap-in is not available in the Microsoft Management Console (MMC). You need to access the Active Directory Schema snap-in. What should you do?
Which command should you run on Server1?
Your network contains a server named Server1 that runs Windows Server 2008 R2. On Server1, you run route add 192.168.10.0 mask 255.255.255.0 172.23.1.2 metric 10. You restart Server1, and then run the route command as shown in the exhibit. (Refer to the Exhibit.)
You need to ensure that after you restart Server1, Server1 routes all of the traffic for 192.168.10.0/24 by using the router that has an IP address of 172.23.1.2. Which command should you run on Server1?
You need to configure your Windows Server 2008 R2 environment to allow zone transfers of the contoso
Your network contains an Active Directory forest. All domain controllers run Windows Server 2008 R2 and are configured as DNS servers. You have an Active Directory-integrated zone for contoso.com. You have a Unix-based DNS server. You need to configure your Windows Server 2008 R2 environment to allow zone transfers of the contoso.com zone to the Unix-based DNS server. What should you do in the DNS Manager console?
Which administrative tool should you use to achieve this task? To answer, select the appropriate tool from the
Your network contains a server named Server1 that runs Windows Server 2008 R2. You enable IPSec on Server1. You need to identify which client computers have active IPSec associations to Server1. Which administrative tool should you use to achieve this task? To answer, select the appropriate tool from the answer area.
Which utility should you run?
You create 200 new user accounts. The users are located in six different sites. New users report that they receive the following error message when they try to log on: “The username or password is incorrect.”
You confirm that the user accounts exist and are enabled. You also confirm that the user name and password information supplied are correct.
You need to identify the cause of the failure. You also need to ensure that the new users are able to log on.
Which utility should you run?
You need to ensure that the adatum
Your network contains an Active Directory domain named fabrikam.com. The domain contains five domain controllers named DC1, DC2, DC3, DC4, and DC5. All domain controllers run Windows Server 2008 R2 and have the DNS server role installed. On DC5, you create a new Active Directory-integrated DNS zone named adatum.com. You need to ensure that the adatum.com DNS zone is only replicated to DC5 and DC2. The solution must ensure that all zone replication traffic is encrypted. What should you do first?
Which three actions should you perform? (Each correct answer presents part of the solution
Your company has an Active Directory domain.
You plan to install the Active Directory Certificate Services (AD CS) server role on a member server that runs Windows Server 2008 R2.
You need to ensure that members of the Account Operators group are able to issue smartcard credentials. They should not be able to revoke certificates.
Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)