单项选择题
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com.
Contoso.com has a domain controller, named ENSUREPASS-DC01, which has Windows Server 2012 R2 installed. Another Contoso.com domain controller, named ENSUREPASS-DC02, has Windows Server 2008 R2 installed.
You have deployed a server, named ENSUREPASS-SR15, on Contoso.com’s perimeter network. ENSUREPASSSR15 is running a Server Core Installation of Windows Server 2012 R2.
You have been instructed to make sure that ENSUREPASS-SR15 is part of the Contoso.com domain.
Which of the following actions should you take?()
A. You should consider making use of Set-Computer Windows PowerShell cmdlet on ENSUREPASS-SR15.
B. You should consider making use of Get-Computer Windows PowerShell cmdlet on ENSUREPASS-SR15.
C. You should consider making use of Test-Computer Windows PowerShell cmdlet on ENSUREPASS-SR15.
D. You should consider making use of Add-Computer Windows PowerShell cmdlet on ENSUREPASS-SR15.
相关考题
-
单项选择题
A company’s server administration team would like to take advantage of the newest file systems available with Windows Server 2012 R2. The team needs a file system capable of managing extremely large data drives that can auto-detect data corruption and automatically perform needed repairs without taking a volume offline. Which file system should the server administration team choose?()
A.NFS
B.DFS
C.NTFS
D.ReFS -
问答题
Your network contains an Active Directory domain named contoso.com. The domain contains 25 servers. All servers run Windows Server 2012 R2. You need to create a Windows Firewall rule to prevent administrators from connecting to Remote Assistance requests while they are logged on interactively to the servers. How should you configure the rule? To answer, select the appropriate options in the answer area. -
问答题
You have a server named Serverl that runs Windows Server 2012 R2. You need to create shares by using the New Share Wizard- The solution must meet the following requirements; A share named Sharel must have access-based enumeration enabled for the files and folders in the share. A share named Share2 must encrypt remote access to the files in the share. Which share profile should you use for each share? To answer, drag the appropriate share profiles to the correct shares. Each share profile may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
