A. Pointer (PTR) B. Host Info (HINFO) C. Service Location (SRV) D. Canonical Name (CNAME)
A. TCP ports 80, 443, 389 and 1645 B. TCP ports 88, 135, 139 and 1813 C. UDP ports 53, 67, 68 and 69 D. UDP ports 1812, 1813, 1645 and 1646
A. In the Performance Monitor console, create a counter log to track processor usage. B. In Event Viewer, open and review the application log for Performance events. C. In Resource Monitor, use the Resource View to see the percentage of processor capacity used by each application. D. In Performance Monitor, create performance counter alert that will be triggered when processor usage exceeds 80 percent for more than five minutes on Server1.
A. Disk Management B. Reliability Monitor C. Resource Monitor D. Storage Explorer
A.Create a Group Policy object (GPO) that enables Security Center and link the policy to the domain. B.Create a Group Policy object (GPO) that enables Security Center and link the policy to the Domain Controllers organizational unit (OU). C.Create a Group Policy object (GPO) and set the Require trusted path for credential entry option to Enabled. Link the policy to the domain. D.Create a Group Policy object (GPO) and set the Require trusted path for credential entry option to Enabled. Link the policy to the Domain Controllers organizational unit (OU).