多项选择题
You are the network administrator for The network consists of a single Active Directory domain All network servers run Windows Server 2003.
Recovery Console is installed on each domain controller. The disk configuration for each domain controller is shown in the following table.
MAINis configured with both the system partition and the boot partition.
Every Friday at 6:00 P.M., you run the Automated System Recovery (ASR) wizard in conjunction with removable storage media. Every night at midnight, you use third-party software to perform full backups of user profiles and user data on removable storage media.
One Friday at 8:00 P.M., an administrator reports that the CA database on a domain controller named DC1 is corrupted. You need to restore the database as quickly as possible.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two)()
A. Restart DC1 by using Directory Services Restore Mode.
B. Restart DC1 by using the installation CD-ROM.
C. Perform a nonauthorative restoration of Active Directory.
D. Perform an authoritative restoration of Active Directory.
E. Use the ASR disk to restore the content of the ASR back file
相关考题
-
单项选择题
You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003. One domain controller on the network is configured as a certification authority (CA). The network contains a Web server that runs IIS 6.0 and hosts a secure intranet site. The server also hosts other sites that do not require HTTPS. You configure a server certificate on the IIS server by using a certificate from your internal CA. All users are required to connect to the intranet site by using HTTPS. Some users report that they cannot connect to the secure intranet site by using HTTPS. You confirm that all users can connect to the nonsecure sites hosted on the Web server by using HTTP. You want to view the failed HTTPS requests. What should you do?()
A. Review the log files created by IIS on the Web server.
B. Review the security log in Event Viewer on the Web server.
C. Review the security log in Event Viewer on the ca.
D. Review the contents of the Failed Requests folder on the ca. -
单项选择题
You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003. The network contains a Web server that runs IIS 6.0 and hosts a secure intranet site. All users are required to connect to the intranet site by authenticating and using HTTPS. However, because an automated Web application must connect to the Web site by using HTTP, you cannot configure the intranet site to require HTTPS. You need to collect information about which users are connecting to the Web site by using HTTPS. What should you do?()
A. Check the application log on the Web server.
B. Use Network Monitor to capture network traffic on the Web server.
C. Review the log files created by IIS on the Web server.
D. Configure a performance log to capture all Web service counters. Review the performance log data. -
多项选择题
You are the network administrator for The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. All confidential company files are stored on a file server named TestKing1. The written company security states that all confidential data must be stored and transmitted in a secure manner. To comply with the security policy, you enable Encrypting File System (EFS) on the confidential files. You also add EFS certificates to the data decryption field (DDF) of the confidential files for the users who need to access them. While performing network monitoring, you notice that the confidential files that are stored on TestKing1 are being transmitted over the network without encryption. You must ensure that encryption is always used when the confidential files on TestKing1 are stored and transmitted over the network. What are two possible ways to accomplish this goal? ()(Each correct answer presents a complete solution. Choose two)
A. Enable offline files for the confidential files that are stored on TestKing1, and select the Encrypt offline files to secure data check box on the client computers of the users who need to access the files.
B. Use IPSec encryption between TestKing1 and the client computers of the users who need to access the confidential files.
C. Use Server Message Block (SMB) signing between TestKing1 and the client computers of the users who need to access the confidential files.
D. Disable all LM and NTLM authentication methods on TestKing1.
E. Use IIS to publish the confidential files. Enable SSL on the IIS server. Open the files as a Web folder.
