How should you configure the servers?

DRAG DROP
A company has a single-domain Active Directory Domain Services (AD DS) environment. Some
servers and all domain controllers are deployed on the internal network. All servers in the perimeter
network are joined to a workgroup. The company uses System Center 2012 R2 Operations Manager
to monitor the server infrastructure on the internal network.
The company plans to use Audit Collection Services (ACS) for one Internet Information Services (IIS)
server that is in the perimeter network.
You need to configure the authentication type and ACS role for Operations Manager and the IIS
server.

How should you configure the servers? To answer, drag the appropriate authentication type and ACS
role to the location or locations in the answer area. Each authentication type and ACS role may be
used once, more than once, or not at all. You may need to drag the split bar between panes or scroll
to view content.

DRAG DROP
A company has a single-domain Active Directory Domain Services (AD DS) environment. Some
servers and all domain controllers are deployed on the internal network. All servers in the perimeter
network are joined to a workgroup. The company uses System Center 2012 R2 Operations Manager
to monitor the server infrastructure on the internal network.
The company plans to use Audit Collection Services (ACS) for one Internet Information Services (IIS)
server that is in the perimeter network.
You need to configure the authentication type and ACS role for Operations Manager and the IIS
server.

How should you configure the servers? To answer, drag the appropriate authentication type and ACS
role to the location or locations in the answer area. Each authentication type and ACS role may be
used once, more than once, or not at all. You may need to drag the split bar between panes or scroll
to view content.

Answer:

Explanation:
Note:
* When the Audit Collection Service (ACS) Forwarder is located in a domain separate from the
domain where the ACS Collector is located, and no two-way trust exists between the two domains,
certificates must be used so that authentication can take place between the ACS Forwarder and the
ACS Collector.



Leave a Reply 0

Your email address will not be published. Required fields are marked *