Your company has an Active Directory domain.
The company runs Remote Desktop Services.
All Remote Desktop Services accounts are configured to allow session takeover without permission.
A user has logged on to a server named Server2 by using an account named User1.
The session ID for User1 is 1337.
You need to perform a session takeover for session ID 1337.
Which commands should you run?
A.
Chgusr 1337 /disable, and then Tscon 1337
B.
Takeown /U User1 1337, and then Tscon 1337
C.
Tsdiscon 1337, and then Chgport /U User1 1337
D.
Tsdiscon 1337, and then Tscon 1337
Explanation:
* tsdiscon
Disconnects a session from a terminal server.
tsdiscon [<SessionID> | <SessionName>] [/server:<ServerName>] [/v]Source: http://technet.microsoft.com/en-us/library/cc770592(WS.10).aspx
* tscon
Connects to another session on a terminal server.
tscon {<SessionID> | <SessionName>} [/dest:<SessionName>] [/password:<pw> | /password:*] [/v]Source: http://technet.microsoft.com/en-us/library/cc770988(WS.10).aspx
Wrong answers:
* chgport
Lists or changes the COM port mappings to be compatible with MS-DOS applications.
Source: http://technet.microsoft.com/en-us/library/cc771976(WS.10).aspx* chgusr
Changes the install mode for the terminal server.
Source: http://technet.microsoft.com/en-us/library/cc755189(WS.10).aspx* takeown
Enables an administrator to recover access to a file that previously was denied, by making the administrator the owner of the file.
Source: http://technet.microsoft.com/en-us/library/cc753024(WS.10).aspx