多项选择题
You have a server named Server 1.Server1 runs Windows Server 2012 R2. Server1 has a thin provisioned disk named Disk1.You need to expand Disk1.Which two actions should you perform?()
A.From File and Storage Services, extend Disk1
B.From File and Storage Services, add a physical disk to the storage pool
C.From Disk Management, extend the volume
D.From Disk Management, delete the volume, create a new volume, and then format the volume
E.From File and Storage Services, detach Disk1
相关考题
-
多项选择题
You have a server named Server1 that runs a Server Core Installation of Windows Server 2012 R2 Datacenter.You have a WIM file that contains the four images of Windows Server 2012 R2 as shown in the Images exhibit. (Click the Exhibit button.) You review the installed features on Server1 as shown in the Features exhibit. (Click the Exhibit button.) You need to install the Server Graphical Shell feature on Server1.Which two possible sources can you use to achieve this goal?()
A.Index 1
B.Index 2
C.Index 3
D.Index 4 -
单项选择题
Your network contains two subnets. The subnets are configured as shown in the following table. You have a server named Server1 that runs Windows Server 2012 R2. Server1 is connected to LAN1. You run the route print command as shown in the exhibit. (Click the Exhibit button.) You need to ensure that Server1 can communicate with the client computers on LAN2. What should you do?()
A.Change the default gateway address
B.Set the state of the Teredo interface to disable
C.Change the metric of the 10.10.1.0 route
D.Set the state of the Microsoft ISATAP Adapter #2 interface to disable -
单项选择题
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.AllserversrunWindowsServer2012R2.ThedomaincontainsamemberservernamedServer1.Server1hastheFileServerserverroleinstalled.OnServer1,youcreateasharenamedDocuments.TheDocumentssharewillcontainthefilesandfoldersofallusers.YouneedtoensurethatwhentheusersconnecttoDocuments,theyonlyseethefilestowhichtheyhaveaccess.Whatshouldyoudo?()
A.Modify the NTFS permissions
B.Modify the Share permissions
C.Enable access-based enumeration
D.Configure Dynamic Access Control
