当前位置:MCSE(70-293)题库

问题:

[单选]

You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers.  
You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized.  You need to configure Server1 to log the details of access attempts by VPN users. 
 What should you do?  ()

A .  Configure the system event log to Do not overwrite.
B .  In IAS, in Remote Access Logging, enable the Authentication requests setting.
C .  Configure the Remote Access server to Log all events.
D .  Create a custom remote access policy and configure it for Authentication-Type.

事物运动是有规律的要求我们按客观规律办事,才能成功。 You are preparing for an upgrade of Windows 2000 Professional using Remote Installation Services (RIS) on a member server, which is in the Installation organizational unit (OU). You loaded the RIS software and all images for the Windows 2000 Professional computer types into a shared NTFS version 5 volume.   You distributed a remote installation boot disk to all users in case their adapter doesn’t support PXE boot ROM and doesn’t have BIOS support for using the PXE boot ROM as the primary boot device. The users report that they are unable to install Windows 2000 Professional.  What do you need to do in order to resolve the problem?()  Include the users who will do the install in the Installation OU where the RIS server object is located. Assign them rights to "Bypass traverse checking." 。 Load the Windows 2000 Professional images onto the server's boot drive, which is a  separate hard disk from the RIS software. 。 Create a security group for the users who will do the installation and assign the group "Log on  as a batch job" rights. Assign the group permission to create computer accounts. 。 Reinstall the RIS software on a domain controller in a shared volume and modify the boot  disks to map to the shared volume.&e。 现实生活中,有的人学富五车、满腹经纶,却不曾有丝毫创见,一个很重要的原因就是缺乏() 创新精神。 创新意识。 创新思维。 创新能力。 You have a Windows Server 2008 R2 Hyper-V failover cluster. You manage the cluster by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2.   You plan to monitor the environment by using Microsoft System Center Operations Manager 2007. You need to identify when Hyper-V server load exceeds specific CPU and memory thresholds, and you must rebalance the environment accordingly.  What should you do?() Configure the Placement settings to maximize resources for each of the Hyper-V servers。 Configure Performance and Resource Optimization (PRO) to automatically implement PRO tips。 Configure the Placement settings for CPU and Memory as Very Important for each of the Hyper-V servers。 Install the Windows Server Operating System Management Pack for Operations Manager 2007, and set the threshold。 邓小平南巡讲话围绕了一个首要的理论问题是()。 什么是社会主义,怎样建设社会主义。 建设一个什么的党,怎样建设党。 社会主义也可以实行市场经济。 “三个有利于”的问题。

You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers.  
You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized.  You need to configure Server1 to log the details of access attempts by VPN users. 
 What should you do?  ()

参考答案:

  参考解析

本题暂无解析

相关题目:

在线 客服