You need to resolve the issue that causes Application1 to fail

Your network contains an Active Directory forest. The functional level of the forest is
Windows Server 2008 R2.
Your company’s corporate security policy states that the password for each user account
must be changed at least every 45 days.
You have a user account named Service1. Service1 is used by a network application named
Application1.
Every 45 days, Application1 fails.
After resetting the password for Service1, Application1 runs properly. You need to resolve
the issue that causes Application1 to fail. The solution must adhere to the corporate security
policy.
What should you do?

Your network contains an Active Directory forest. The functional level of the forest is
Windows Server 2008 R2.
Your company’s corporate security policy states that the password for each user account
must be changed at least every 45 days.
You have a user account named Service1. Service1 is used by a network application named
Application1.
Every 45 days, Application1 fails.
After resetting the password for Service1, Application1 runs properly. You need to resolve
the issue that causes Application1 to fail. The solution must adhere to the corporate security
policy.
What should you do?

A.
Run the cmdlet.

B.
Run the Set-ADServiceAccount cmdlet.

C.
Create a new password policy.

D.
Create a new Password Settings object (PSO).

Explanation:
http://technet.microsoft.com/en-us/library/ee617252.aspx
Set-ADServiceAccount
Syntax
Set-ADServiceAccount [-Identity] <ADServiceAccount> [-AccountExpirationDate
<System.Nullable[System.DateTime]>] [-AccountNotDelegated <System.Nullable[bool]>] [-
Add <hashtable>] [-Certificates<string[]>] [-Clear <string[]>] [-Description <string>] [-
DisplayName <string>] [-Enabled <System.Nullable[bool]>] [-HomePage <string>] [-Remove
<hashtable>] [-Replace <hashtable>] [-SamAccountName <string>] [-ServicePrincipalNames
<hashtable>] [-TrustedForDelegation <System.Nullable[bool]>] [-AuthType{<Negotiate> |
<Basic>}] [-Credential <PSCredential>] [-Partition <string>] [-PassThru <switch>] [-
Server<string>] [-Confirm] [-WhatIf] [<CommonParameters>]Detailed Description
The Set-ADServiceAccount cmdlet modifies the properties of an Active Directory service
account. You can modify commonly used property values by using the cmdlet parameters.
Property values that are not associated with cmdlet parameters can be modified by using the
Add, Replace, Clear and Remove parameters.
The Identity parameter specifies the Active Directory service account to modify. You can
identify a service account by its distinguished name (DN), GUID, security identifier (SID), or
Security Accounts Manager (SAM) account name. You can also set the Identity parameter to
an object variable such as $<localServiceAccountObject>, or you can pass an object
through the pipeline to the Identity parameter. For example, you can use the GetADServiceAccount cmdlet to retrieve a service account object and then pass the object
through the pipeline to the Set-ADServiceAccount cmdlet.
The Instance parameter provides a way to update a service account object by applying the
changes made to a copy of the object. When you set the Instance parameter to a copy of an
Active Directory service account object that has been modified, the Set-ADServiceAccount
cmdlet makes the same changes to the original service account object. To get a copy of the
object to modify, use the Get-ADServiceAccount object. When you specify the Instance
parameter you should not pass the Identity parameter. For more information about the
Instance parameter, see the Instance parameter description.



Leave a Reply 0

Your email address will not be published. Required fields are marked *