多项选择题
A. the list of computers that are authorized to use the application
B. the list of Active Directory users who are authorized to use the application
C. the hash of the application
D. the name of the IPSec policies that apply to Server1
E. the local path of the application
单项选择题 A company’s server deployment team needs to introduce many new Windows Server 2012 R2 domain controllers throughout the network into a single Windows Server 2008 R2 domain. The team has chosen to use Windows PowerShell. Which Windows PowerShell module includes the command-line options for installing domain controllers?()
单项选择题 Your network contains one Active Directory domain named contoso.com. The domain contains 10 domain controllers and a read-only domain controller (RODC) named RODC01. You plan to replace a domain controller named DC1. DC1 has the schema operations master role. You need to transfer the schema master role to another domain controller named DC10 before you remove Active Directory from DC1. Which tool should you use?()
单项选择题 You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. Contoso.com has a Windows Server 2012 R2 domain controller, named ENSUREPASS-DC01, which has the Domain Naming master and the Schema master roles installed. Contoso.com also has a Windows Server 2008 R2 domain controller, named ENSUREPASS-DC02, which has the PDC Emulator, RID master, and Infrastructure master roles installed. You have deployed a new Windows Server 2012 server, which belongs to a workgroup, in Contoso.com’s perimeter network. You then executed the djoin.exe command. Which of the following is the purpose of the djoin.exe command?()