You are the administrator of a Windows 2000 Server computer named Intra. Intra is a member of an Active Directory domain and hosts an Intranet Web-Ske for your company. Company policy requires that only authenticated users have access to the intranet site. All company users have a user account in the Active Directory domain. You configure directory security for the Web Site to use integrated security. However, you discover that users can access the Web Site without authentication. You need to ensure that only authenticated users can access the web site. What should you do?
A. Install Active Directory on the server
B. Select Basic Authentication check box
C. Clear the Allow Anonymous Connection check box
D. Disable the IUSE_inta user account on Intra
E. Clear the Allow IIS to Control Password check box
Answer: Option C
A. Convert the disk to dynamic disk shut doWn and restart the server
B. Backup the data on the stripe volume and delete the stripe volume. Create a raidS volume on the four disks, restore the data to the new raid5 volume
C. Backup the data on the stripe volume and delete the stripe volume. Create a mirror volume, shut down and restart the server. Restore the data to new mirror volumes
D. Backup the data on the stripe volume and delete the stripe
E. None of above
A. Copy the Windows NT 4.0 Printer Drivers to the Net logon shared folders on all Windows NT Server 4.0 computers still configured as BDCs
B. Copy the Windows NT 4.0 printer drivers to the Net logon shared folder on the PDC emulator
C. Change the sharing options on the printer to install additional drivers for Windows NT 4.0 or Windows 2000
D. Copy the Windows NT 4.0 printer drivers to the WinntSystem32 pri liter sdri vers folder on the Windows 2000 print server
E. None of above
A. Configure the Terminal server to run in Remote Administration mode
B. Grant the IT department Full Control permission to the Remote Desktop Protocol (RDP) on the Terminal server
C. Add the members of the IT department to the Power Users group on the Terminal server
D. Use third-party software to enable remote control of users' sessions
E. None of above
A. From the group policy options from the contoso.local domains set the option not override
B. From the group policy options from the Michigan and Florida OU, set the option not override
C. Block the group policy inheritance for the contoso.local domain
D. Block the group policy inheritance for Michigan and Florida OU
E. None of above
Join The Discussion