问答题
Your network contains an Active Directory domain named contoso.com. The domain contains 25 servers. All servers run Windows Server 2012 R2.
You need to create a Windows Firewall rule to prevent administrators from connecting to Remote Assistance requests while they are logged on interactively to the servers.
How should you configure the rule?
To answer, select the appropriate options in the answer area.
相关考题
-
问答题
You have a server named Serverl that runs Windows Server 2012 R2. You need to create shares by using the New Share Wizard- The solution must meet the following requirements; A share named Sharel must have access-based enumeration enabled for the files and folders in the share. A share named Share2 must encrypt remote access to the files in the share. Which share profile should you use for each share? To answer, drag the appropriate share profiles to the correct shares. Each share profile may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. -
多项选择题
You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 installed. You are running a training exercise for junior administrators. You are currently discussing Storage Spaces. Which of the following is TRUE with regards to Storage Spaces?()
A. Mirroring and parity are optional resilient storage modes of Storage Spaces.
B. Failover clustering is not supported by Storage Spaces.
C. Storage spaces are virtual disks with associated attributes such as a preferred level of resiliency, and thin or fixed provisioning.
D. Storage spaces are a collection of physical disks with associated attributes such as a preferred level of resiliency, and thin or fixed provisioning. -
多项选择题
You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed. You are running a training exercise for junior administrators. You are currently discussing connection security rules. Which of the following is TRUE with regards to connection security rules? ()
A. Connection security rules allows for traffic to be secured via IPsec.
B. Connection security rules do not allow the traffic through the firewall.
C. Connection security rules are applied to programs or services.
D. Connection security rules are applied between two computers.
