单项选择题
Your company has two Active Directory Domain Services (AD DS) domains, Domain1 and Domain2. A two-way trust relationship exists between the domains.
Users in both domains can log on to client computers in only their own domains.
System logs on the domain controllers display the error message "Clock skew too great" when users in Domain1 attempt to log on to client computers in Domain2.
You need to ensure that users can log on to client computers in both domains.
What should you do?()
A.Run a startup script that includes Net Time /querysntp on all client computers.
B.Run a startup script that includes Net Time /setsntp on all client computers.
C.Configure the primary domain controller (PDC) emulator in each domain to synchronize its clock with the same external time source.
D.Decrease the Maximum tolerance for computer clock synchronization setting in the default Domain Group Policy object (GPO).
相关考题
-
单项选择题
Your company’s client computers run Windows 7. Your company’s network has a wireless access point (WAP). A user reports that he regularly loses connectivity to the WAP. You need to display information about client connectivity to the WAP. What should you do?()
A.Use Event Viewer to view events from a source of WlanConn.
B.Use Event Viewer to view events from a source of WLAN AutoConfig.
C.Use auditpol.exe to enable failed attempts in the Object Access category.
D.Use auditpol.exe to enable successful attempts in the Object Access category. -
单项选择题
Your company infrastructure includes a Windows Server 2008 R2 file server and 1,000 Windows 7 Enterprise client computers. The company wants to require a secure connection between client computers and the file server. You need to create and deploy a Group Policy object (GPO) that includes a rule for Windows Firewall with Advanced Security. What should you do?()
A.Create a Tunnel rule and specify Gateway-to-client as the tunnel type.
B.Create a Server-to-server rule and specify the endpoints as Any IP address and the file server IP address.
C.Create an Isolation rule and specify Request authentication for inbound and outbound connections.
D.Create an Authentication exemption rule and add the file server IP address to the Exempt Computers list. -
单项选择题
Your company’s network includes client computers that run Windows 7. You design a wireless network to use Extensible Authentication Protocol-Transport Level Security (EAP-TLS). The Network Policy Server has a certificate installed. Client computers are unable to connect to the wireless access points. You need to enable client computers to connect to the wireless network. What should you do?()
A.Configure client computers to use Protected Extensible Authentication Protocol-Microsoft Challenge Handshake Authentication Protocol version 2 (PEAP-MS-CHAP v2).
B.Configure client computers to use Protected Extensible Authentication Protocol-Transport Layer Security (PEAP-TLS).
C.Install a certificate in the Trusted Root Certification Authorities certificate store.
D.Install a certificate in the Third-Party Root Certification Authorities certificate store.
