单项选择题
Your network contains multiple subnets.
On one of the subnets, you deploy a server named Server1 that runs Windows Server 2012 R2.
You install the DNS Server server role on Server1, and then you create a standard primary zone named contoso.com.
You need to ensure that client computers can resolve single-label names to IP addresses.
What should you do first?()
A. Create a reverse lookup zone.
B. Convert the contoso.com zone to an Active Directory-integrated zone.
C. Configure dynamic updates for contoso.com.
D. Create a GlobalNames zone.
相关考题
-
单项选择题
Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2012 R2. The domain contains a user named User1 and a global security group named Group1. User1 logs on to a client computer named Computer1. You need to disable the computer account of Computer1. Which cmdlet should you run?()
A. Add-AdPrincipalGroupMember.hip
B. Install-AddsDomainController
C. Install WindowsFeature
D. Install AddsDomain
E. Roname-AdObject
F. Set-AdAccountControl
G. Set-AdGroup
H. Set-User -
单项选择题
Your network contains an Active Directory domain named contoso.com. All client computer accounts are in an organizational unit (OU) named AllComputers. Client computers run either Windows 7 or Windows 8. You create a Group Policy object (GPO) named GP1. You link GP1 to the AllComputers OU. You need to ensure that GP1 applies only to computers that have more than 8 GB of memory. What should you configure?()
A. The Security settings of GP1
B. The Block Inheritance option for AllComputers
C. The Security settings of AllComputers
D. The WMI filter for GP1 -
单项选择题
Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2. You create a security template named Template1 by using the security template snap-in. You need to apply Template1 to Server2. Which tool should you use?()
A. Security Templates
B. Computer Management
C. Security Configuration and Analysis
D. System Configuration
