多项选择题
A. Create a security group.
B. Create a distribution group.
C. Configure the group to be a global group.
D. Configure the group to be a universal group.
E. Configure the group to be a domain local group.
多项选择题 You are the network administrator for TestKing.com. All user accounts and groups in the domain are in the container named Users. Company naming conventions require that names of global groups begin with G_ and names of domain local groups begin with DL_. A domain local group named HRServices does not meet the requirements. The HRServices group has one global group member named G_HRUsers. The HRServices group is assigned to Allow - Full Control permission for a shared folder named HRFiles. The shard folder is located on a file server. You need to rename the HRServices group to meet the naming convention requirements. In addition, you need to ensure that user access to the HRFiles shared folder is not disrupted while you perform the procedure. What are two possible ways to achieve this goal? ()(Each correct answer presents a cplete solution. Choose two.)
多项选择题 You are the network administrator for TestKing.com. All network servers run Windows Server 2003. The network consists of 10 offices located across Europa. The OU structure consists of one top-level OU for each branch office. Each top-level OU contains eight or more child OUs, one for each department. User accounts are located in the appropriate departmental OU within the appropriate office OU. For security purposes, you routinely disable user accounts for terminated employees. As part of an internal audit, you need to create a list of all disabled user accounts. You need to generate the list of disabled user accounts as quickly as possible. What are two possible ways to achieve this goal? ()(Each correct answer presents a complete solution. Choose two.)
单项选择题 You are the network administrator for TestKing.com Active Directory domain. The domain includes Windows Server 2003 domain controllers and Windows XP Professonal client computers. A new administrator named Sandra is hired to assist you in deploying Windows XP Professional to 100 new computers. Sandra installs the operating system on a new computer named TestKing11. However, when Sandra tries to log on to the domain from TestKing11, she is unsuccessful. The logon box does now allow her to view and select the domain name. You need to ensure that Sandra can log on to the domain from TestKing11. What should you do?()