单项选择题

A.Log on to Server2 as Administrator and add http:// to the list of trusted sites in Internet Explorer.
B.Instruct the 20 employees to add http:// to the list of trusted sites in Internet Explorer on their client computers.
C.Instruct the 20 employees to change the Internet Explorer privacy settings on their client computers to Low.
D.Uninstall Internet Explorer Enhanced Security Configuration on Server2.

相关考题

多项选择题 You are the administrator of an Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional and are members of the domain.  The domain contains a single DNS server named Server1. Root hints are enabled on Server1. Internet access for the company is provided by a Network Address Translation (NAT) server named Server2. Server2 is connected to the Internet by means of a permanent connection to the company’s ISP.  Users report that they can no longer connect to http://www.adatum.com. Users can connect to internal resources and to other Internet Web sites. You can successfully access http://www.adatum.com from a computer outside of the corporate network.You need to ensure that the users can access http://www.adatum.com. You must also ensure that users retain their ability to access internal resources.   Which two actions should you perform?()

单项选择题 You are the administrator of an Active Directory domain. The network contains a Windows Server 2003 domain controller named Server1Users report that they experience intermittent delays when they log on to Server1. Administrators report that replication attempts between Server1 and other domain controllers are occasionally delayed.You need to verify the cause of the intermittent connection delays to Server1. You also need to find out whether the problem is related to a hardware deficiency on Server1. You need to track these delays over a period of one day.   What should you do first?()

单项选择题 You are the administrator of a Windows Server 2003 computer named Server1. Server1 is an FTP server located in the company’s internal network.Administrators report an increased amount of FTP traffic to Server1.   You need to configure Server1 to achieve the following goals: Identify the media access control (MAC) address of any computer that is performing FTP transfers from Server1.Find out the exact FTP commands that were executed.  Ensure that you do not disrupt the operation of Server1. What should you do?()