单项选择题
You are designing the Active Directory infrastructure to meet the business and technical requirements. You run ADSizer, and find that it provides a solution that contains only one domain controller for Amsterdam.
What should you do?()
A. Place at least two domain controllers in Amsterdam.
B. Configure the domain controller as a bridgehead server.
C. Configure the domain controller as a global catalog server.
D. Distribute the users among sites in ADSizer and recalculate the number of domain controllers.
相关考题
-
单项选择题
You are designing a strategy to optimize the DNS name resolution for the satellite offices that connect to the branch offices by using ISDN lines. What should you do?()
A. Use caching-only DNS servers at these satellite offices.
B. Configure a Hosts file for all client computers at these satellite offices.
C. Configure a DNS server to use WINS forward lookup at these satellite offices.
D. Place a DNS server with secondary zones of all domains at these satellite offices. -
单项选择题
You are designing a site topology to meet the business and technical requirements. What should you do?()
A. Increase the replication interval between sites,
B. Use SMTP as the transport protocol for replication.
C. Create site links to represent the physical topology.
D. Disable the Knowledge Consistency Checker (KCC) and manually configure site replication. -
多项选择题
You are designing a strategy for migrating the UNIX user accounts to Active Directory. Which three actions should you perform?()
A. Import the user accounts as inetOrgPerson objects.
B. Import the user accounts into Active Directory by using the Ldifde command-line tool.
C. Export all user accounts from the UNIX servers to a text file.
D. Export all user accounts and their passwords from the UNIX servers to a text file. Encrypt this file to achieve extra security.
E. Assign random passwords to each user object, and securely distribute the password to the users.
F. Create the same strong password for each user object, and require users to change their passwords at first logon.
G. Instruct users to use the same name and password as they used on the UNIX servers.