You have an Exchange Server 2010 organization named contoso.com.Your company is Investigating a user named User1.You need to prevent User1 from permanently deleting the items in his mailbox. What should you run?()
What should you do( )
You create an ASP.NET page named TestPage.aspx that contains validation controls. You need to verify that all input values submitted by the user have been validated by testing the Page.IsValid property. Which page event should you add an event handler to?()
You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You work in a company named Wiikigo, Ltd. and there is a two-node Network Load Balancing cluster. Onlythe intranet Web site will be provided with the high availability and load balancing by the cluster. Thecompany names the cluster as web.wiikigo.com. You find a problem that the Network Load Balancingcluster can be seen in the network neighborhood by the Wiikigo users. And the users can utilize the web.wiikigo.com name to get access to various services. The web.wiikigo.com Network Load Balancing clusteris set with only one port rule. Since you are the technical support, you are required have the web.wiikigo.com Network Load Balancing cluster configured to receive only HTTP traffic. Which two actions should be performed to achieve the goal?()
Your company has a server named FS1. FS1 hosts the domain-based DFS namespace named //contoso.com/dfs. All domain users store their data in subfolders within the DFS namespace. You need to prevent all users, except administrators, from creating new folders or new files at the root of the //contoso.com/dfs share. What should you do?()
You perform a security audit on a server named Server1. You install the Microsoft Network Monitor 3.0 application on Server1. You find that only some of the captured frames display host mnemonic names in the Source column and the Destination column. All other frames display IP addresses. You need to display mnemonic host names instead of IP addresses for all the frames. What should you do?()
Contoso, Ltd. has an Active Directory domain named ad.contoso.com. Fabrikam, Inc. has an Active Directory domain named intranet.fabrikam.com. Fabrikam’s security policy prohibits the transfer of internal DNS zone data outside the Fabrikam network. You need to ensure that the Contoso users are able to resolve names from the intranet.fabrikam.com domain. What should you do()
Your company named Contoso, Ltd. has a Web server named WEB1. The Web server runs Windows Server 2008. The fully qualified domain name of WEB1 is web1.contoso.com. The public DNS server has an alias record named owa.contoso.com that maps to web1.contoso.com. Users access WEB1 from the Internet by using http://owa.contoso.com. The new company security policy states that the owa.contoso.com site must be available for Internet users only through secure HTTP (HTTPS) protocol. The security policy also states that users must not get security warnings when they connect to the site. You need to request a certificate from a public certification authority (CA). Which Common Name should you use?()
As an administrator at Cer-tech .com, you have installed a new server named MS12 that runs WindowsServer 2008. This server should be used for steaming media purposes. So you install Streaming MediaServices role on the server. Since all client machines have Windows Vista as their operating system andthey only use Windows Media Player 11 application, you configure a Publishing Point and assign source ofcontent that has video media. Users report that they are unable to pause and rewind the video usingWindows Media Player 11. What should you do to ensure that users have full playback control of the streaming media?()
You have a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). Server1 is configured as a VPN server.You need to enable trace logging for all Routing and Remote Access components. Which tool should you use?()