How should you configure each portable computer?
Your company uses DHCP to lease IPv4 addresses to computers at the main office. A WAN link connects the main office to a branch office. All computers in the branch office are configured with static IP addresses. The branch office does not use DHCP and uses a different subnet. You need to ensure that the […]
What should you do to capture the HTTP traffic to and from a server every day between 09:00 and 10:00?
You need to capture the HTTP traffic to and from a server every day between 09:00 and 10:00. What should you do? A. Create a scheduled task that runs the Netsh tool. B. Create a scheduled task that runs the Nmcap tool. C. From Network Monitor, configure the General options. D. From Network Monitor, configure […]
What should you do minimize the amount of data collected?
Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 has the Routing and Remote Access service (RRAS) role service installed. You need to view all inbound VPN packets. The solution must minimize the amount of data collected. What should you do? A. From RRAS, create an inbound packet filter. B. […]
Which tool should you use to configure the SNMP security settings on the server?
Your network contains a server that has the SNMP Service installed. You need to configure the SNMP security settings on the server. Which tool should you use? A. Local Security Policy B. Scw C. Secedit D. Services console
What should you do to change the identification information returned by Server1?
Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 has the SNMP Service installed. You perform an SNMP query against Server1 and discover that the query returns the incorrect identification information. You need to change the identification information returned by Server1. What should you do? A. From the properties of […]
Which tool should you use to ensure that each time the script runs, an entry is added to the Application event
Your network contains a server that runs Windows Server 2008 R2. You plan to create a custom script. You need to ensure that each time the script runs, an entry is added to the Application event log. Which tool should you use? A. Eventcreate B. Eventvwr C. Wecutil D. Wevtutil Explanation/Reference: You can create custom […]
Which tool should you use to define the Custom Event Delivery Optimization settings on Server1?
Your network contains 100 servers that run Windows Server 2008 R2. A server named Server1 is deployed on the network. Server1 will be used to collect events from the Security event logs of the other servers on the network. You need to define the Custom Event Delivery Optimization settings on Server1. Which tool should you […]
What should you do to ensure that you can deploy DirectAccess on Server3?
Your network contains an Active Directory domain named contoso.com. Contoso.com contains three servers. The servers are configured as shown in the following table.
You plan to give users access to the files shares on Server2 by using DirectAccess.
You need to ensure that you can deploy DirectAccess on Server3.
exhibit What should you do?
What should you do to ensure that only members of Group1 can add files to Folder1 over the network?
Your network contains a file server named Server1. Server1 contains a folder named Folder1. The permissions for Folder1 are in the following table.
You need to ensure that only members of Group1 can add files to Folder1 over the network.
exhibit What should you do?
Which command should you run on Server1?
Your network contains a server named Server1 that runs Windows Server 2008 R2.
On Server1, you run route add 192.168.10.0 mask 255.255.255.0 172.23.1.2 metric 10.
You restart Server1, and then run route command as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that after you restart Server1, Server1 routes all of the traffic for 192.168.10.0/24 by using the route of 172.23.1.2.
exhibit Which command should you run on Server1?
Exhibit: