单项选择题X 纠错
A. From the Licensing console on Server1, modify the Products View configuration.
B. From the Licensing Control Panel applet on Server2, modify the Replication configuration.
C. From the Active Directory Sites and Services console, modify the Licensing Site Settings.
D. From the Active Directory Users and Computers console, modify the AdminSDHolder object.
你可能喜欢
多项选择题
A. Configure a license group for each shared computer.
B. Configure a local security group for each shared computer.
C. Configure Server1 to support Per Server licensing mode.
D. Configure Server1 to support either Per Device or Per User licensing mode.
单项选择题
A. to use a proxy server
B. as a replica of Server1
C. as a stand-alone WSUS 3.0 server
D. as an autonomous downstream server
单项选择题
A. On each client computer, run Gpupdate /Force.
B. On each client computer, run wuauclt /detectnow.
C. From GPO1, configure the Enable client-side targeting setting.
D. From GPO1, configure the Specify intranet Microsoft update service location setting.
单项选择题
A. Configure a Trace Log by using the File details system provider.
B. Configure a Trace Log by using the Disk input/output system provider.
C. Configure an Alert by using a counter from the Logical Disk performance object.
D. Configure an Alert by using a counter from the Physical Disk performance object.
单项选择题
A. Connect to each Web Server by using Event Viewer. Save the Application logs as the CSV file type.
B. Connect to each Web Server by using Event Viewer. Save the Application logs as the Event Log file type.
C. On each Web server, open the Security Configuration and Analysis snap-in, analyze the computer, and then export the settings.
D. Run Security Configuration Wizard for each Web Server. Save the data to an .inf file.
单项选择题
A. Examine the System Event Log on the user’s computer.
B. Examine the System Event Log on both domain controllers.
C. Examine the Security Event Log on both domain controllers.
D. Examine the Application Event Log on the user’s computer.
单项选择题
A. From the Security Templates snap-in, open the hisecdc template. Modify the Retain System Log setting.
B. From the Security Templates snap-in, open the securedc template. Modify the Retain Security Log setting.
C. Open the Default Domain Policy. Modify the Retain System Log setting.
D. Open the Default Domain Controller Policy. Modify the Retain Security Log setting.
单项选择题
A. On ResearchData, enable permission inheritance.
B. On ResearchConfidential.rtf, enable permission inheritance.
C. On ResearchData, assign the Read permission to ResearchUsers.
D. On ResearchConfidential.rtf, assign the Read permission to ResearchUsers.
单项选择题
A. On the CorpData share, assign the Read permission to Domain Users.
B. On the CorpData share, remove Domain Users and assign the Change permission to HRUsers.
C. On the CorporateData folder, disable permission inheritance and remove the inherited permissions.
D. On the HumanResources folder, disable permission inheritance and remove the inherited permissions.