You are the network administrator of a network that spans three locations, Atlanta, Chicago, and Denver. Your organization started in Atlanta, and that’s where you installed your first Active Directory domain controller. The Chicago and Denver locations were later added to the domain with their own domain controllers. These three locations each have their own subnet and are connected using dedicated WAN links. You have used Active Directory Sites and Services to change to the name of the Default-First-Site-Name to Atlanta, but that’s all you’ve done so far. The IT manager wants you to continue configuring Active Directory Sites and Services to direct clients to local network resources for authentication. He does not want you to manage replication traffic at this time. Which of the following steps must you perform to complete this configuration? (Select three.)
Blog
You are an administrator for a company that uses Windows ser…
You are an administrator for a company that uses Windows servers. In addition to Active Directory, you also provide file and print services, DHCP, DNS, and email services. There is a single domain and a single site. There are two member servers, one that handles file and print services only, and one database server. You are considering adding additional servers as business increases. Your company produces mass mailings for its customers. The mailing list and contact information provided to your company by its clients is strictly confidential. Because of the private information sometimes contained in the data (one of your clients is a hospital), and because of the importance of the data to your operation, the data can also be considered a trade secret. You want to ensure the data stored on your member servers is only accessed by authorized personnel for business purposes. You’ve set file permissions to restrict access, but you want to track the authorized users. How should you configure your security policy to track access to the data files?
You have decided to install third-party anti-malware softwar…
You have decided to install third-party anti-malware software on your Windows notebook system. During the installation, the installer warns you that the third-party anti-malware conflicts with Windows Defender, which is already running on the system. Which tool do you use to disable Windows Defender so you can proceed with the installation?
You have a folder on your Windows server that you would like…
You have a folder on your Windows server that you would like to share with members of your development team. Users should be able to view and edit any file in the shared folder. You share the folder and give everyone full control permission to the shared folder. Users connect to the shared folder and report that they can open the files, but they cannot modify any of the files. What should you do?
You have a computer that runs Windows connected to a domain…
You have a computer that runs Windows connected to a domain network. One day, you find that the computer is unable to connect to the Internet, although it can communicate with a few other computers on the local subnet. You run the ipconfig command and find that the network connection has been assigned the address of 169.254.12.155 with a mask of 255.255.0.0. What can you try as first step to resolve this issue?
You are the network administrator for westsim.com, and you m…
You are the network administrator for westsim.com, and you manage a server named App1 that is running an application that uses a service named Custom App Service. This service is required to contact an internal database running on a server named SQL1. After installing the application, you determine that Custom App Service is not able to contact SQL1. You need to enable the Custom App Service to contact SQL1. What should you do?
You are the administrator for a network with a single Active…
You are the administrator for a network with a single Active Directory domain named widgets.local. The widgets.local domain has an organizational unit object for each major department in the company, including the information systems department. User objects are located in their respective departmental OUs. Users who are members of the Domain Admins group belong to the Information Systems department. However, not all employees in the Information Systems department are members of the Domain Admins group. To simplify employees’ computing environment and prevent problems, you link a Group Policy object (GPO) to the widgets.local domain that disables the control panel for users. How can you prevent this Group Policy object from applying to members of the Domain Admins group?
The professor is quizzing student on synovial fluid. Which s…
The professor is quizzing student on synovial fluid. Which statement shows the students need further instruction?
What is the most common characteristic associated with pulmo…
What is the most common characteristic associated with pulmonary disease?
Which normal physiologic change occurs in the aging pulmonar…
Which normal physiologic change occurs in the aging pulmonary system?