单项选择题
A.Execute an attended installation of AD DS
B.Execute an unattended installation of AD DS
C.Execute RODC through AD DS
D.Execute AD DS by using deploying the image of AD DS
E.none of the above
多项选择题 Certkiller .com boosts a two-node Network Load Balancing cluster which is called web. CK1 .com. The purpose of this cluster is to provide load balancing and high availability of the intranet website only. With monitoring the cluster, you discover that the users can view the Network Load Balancing cluster in their Network Neighborhood and they can use it to connect to various services by using the name web. CK1 .com. You also discover that there is only one port rule configured for Network Load Balancing cluster. You have to configure web. CK1 .com NLB cluster to accept HTTP traffic only. Which two actions should you perform to achieve this objective()
单项选择题 As the Certkiller administrator you had installed a read-only domain controller (RODC) server at remote location. The remote location doesn’t provide enough physical security for the server. What should you do to allow administrative accounts to replicate authentication information to Read-Only Domain Controllers()
单项选择题 YourcompanyhasanActiveDirectoryforest.EachbranchofficehasanorganizationalunitandachildorganizationalunitnamedSales.TheSalesorganizationalunitcontainsallusersandcomputersofthesalesdepartment.YouneedtoinstallanOffice2007applicationonlyonthecomputersintheSalesorganizationalunit.YoucreateaGPOnamedSalesAppGPO.Whatshouldyoudonext()