Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. Your environment includes Microsoft Enterprise Desktop Virtualization (MED-V). You are preparing to update a MED-V Workspace that is used by 1000 client computers. You need to minimize the network impact of updating the Workspace. What are two possible ways to achieve this goal?()
Your network contains an Active Directory domain. All domain controllers run Windows Server 2008. The functional level of the domain is Windows Server 2003. All client computers run Windows 7. You install Windows Server 2008 R2 on a server named Server1. You need to perform an offline domain join of Server1. Which two actions should you perform()
Your company has a single Active Directory domain. All servers run Windows Server 2008. You install an iSCSI storage area network (SAN) for a group of file servers. Corporate security policy requires that all data communication to and from the iSCSI SAN must be as secure as possible. You need to implement the highest security available for communications to and from the iSCSI SAN. What should you do?()
Your company has a single Active Directory Domain Services (AD DS) forest with a single domain named PassGuide.com. All client computers run Windows 7. All client computer accounts are located in the Computers container in the PassGuide.com domain. You discover that multiple client computers were automatically shut down because the security log was full. You need to ensure that client computers are not shut down when the security log becomes full. What should you do?()
A workstation is having connectivity issues when being added to the domain. Which of the following commands would allow the administrator to see the DNS and WINS servers that are currently configured for the workstation?()
Your network has a single domain with 1,000 client computers that run Windows 7. You use Microsoft System Center Configuration Manager 2007 to distribute and install software applications. All users have standard user accounts. You plan to use Group Policy to ensure that application installation functions properly. You need to design the User Account Control (UAC) policy. What should you do?()
Your company has an Active Directory domain. The company has purchased 100 new computers. You want to deploy the computers as members of the domain. You need to create the computer accounts in an organizational unit. What should you do()
You have a domain that was created and configured with WebLogic 10.3.5. You want to upgrade the domain to use WebLogic 12c. Which Oracle tool must you use to upgrade your domain?()
Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. All portable computers run Windows 7. You virtualize applications by usi ng Microsoft Application Virtualization (App - V). You are deploying servers to five new branch offices. Each branch office has its own subnet, and will stream virtual applications from a local IIS server. Users frequently move between branch offices with th eir portable computers. You need to ensure that branch office users access virtualized applications only from the local IIS server. What should you do?()
Your company has a single active directory domain. All servers run windows server 2008. The company network has 10 servers that perform as web servers. All confidential files are located on a server named FSS1. The company security policy states that all confidential data must be transmitted in the most secure manner. When you monitor the network, you notice that the confidential files are stored on FSS1 server are being transmitted over the network without encryption. You need to ensure that encryption is always used when the confidential files on the FSS1 server are transmitted over the network. What are two possible ways to achieve this goal? ()