多项选择题
A. Connection security rules allows for traffic to be secured via IPsec.
B. Connection security rules do not allow the traffic through the firewall.
C. Connection security rules are applied to programs or services.
D. Connection security rules are applied between two computers.
单项选择题 You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 installed. You have been instructed to modify an Active Directory computer object. Which of the following actions should you take?()
单项选择题 You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 R2 installed. When you recently added new workstations to the Contoso.com manually, you found that that the computer accounts were created in the default container. You want to make sure that the default container for newly created computers is redirected to a specified, target organizational unit (OU). Which of the following actions should you take?()
单项选择题 You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 installed. A server named, ENSUREPASS-SR13, has a Server Core Installation of Windows Server 2012 installed. You are instructed to convert ENSUREPASS-SR13’s installation to a Server with GUI installation. You want to use a Windows PowerShell cmdlet that uses Windows Update as a source. Which of the following actions should you take?()