A.Deploy an offline enterprise root CA in the corp.woodgrovebank.com domain. Deploy subordinate enterprise root CAs in each child domain. Install Internet Authentication Service (IAS) on one member server in the la.corp.woodgrovebank.com domain and one member server in the den.corp.woodgrovebank.com domain
B.Deploy an enterprise root CA in each domain. Install Internet Authentication Service (IAS) on a member server in the corp.woodgrovebank.com domain. Install the Routing and Remote Access service on a member server in each child domain, and configure these servers as RADIUS clients
C.Enroll and deploy user certificates to all administrators in each domain. Enroll and deploy computer certificates to all portable computers that have wireless network adapters. Configure each portable computer to use Protected EAP (PEAP) for authentication
D.Enroll and deploy computer certificates to all portable computers that have wireless network adapters. Configure each portable computer to use EAP-MS-CHAP v2 for authentication. Configure each portable computer to connect to the Internet Authentication Service (IAS) server
您可能感兴趣的试卷
你可能感兴趣的试题
A.Implement an enterprise root CA in the corp.woodgrovebank.com domain.Implement subordinate CAs in each child domain. Take the root CA offline
B.Implement an enterprise root CA in the corp.woodgrovebank.com domain
C.Implement an enterprise root CA in each of the child domains. Take the enterprise CA in each domain offline
D.Implement an enterprise root CA in the corp.woodgrovebank.com domain. Implement a stand-alone root CA in each of the child domains
A.In the Default Domain Policy Group Policy object (GPO) for the corp.woodgrovebank.com domain, add the LA\HRUsers group to the Restricted Groups list. Add only the HR department user accounts to the Allowed Members list
B.In the Default Domain Policy Group Policy object (GPO) for the la.corp.woodgrovebank.com domain, add the LA\HRUsers group to the Restricted Groups list. Add only the HR department user accounts to the Allowed Members list
C.In the Default Domain Policy Group Policy object (GPO) for the corp.woodgrovebank.com domain, add the LA\HRUsers group and the CORP\Backup Operators group to the Restricted Groups list. Add only the HR department user accounts and the administrator user accounts to the Allowed Members list for each group
D.In the Default Domain Policy Group Policy object (GPO) for the la.corp.woodgrovebank.com domain, add the LA\HRUsers group and the CORP\Backup Operators group to the Restricted Groups list. Add only the HR department user accounts to the Allowed Members list for the LA\HRUsers group. Add only the administrator user accounts to the Allowed Members list for the CORP\Backup Operators group
A.Configure the Web site to require SSL connections. Configure the Web site to require client certificates. Enable and configure client certificate mapping on the Web site
B.Configure the Web site to require SSL connections. Disable anonymous access to the Web site.Assign the Allow – Read permission to the customer user accounts for the folder that contains the Web site files
C.Configure the Web site to use only Microsoft .NET Passport authentication. Specify the den.corp.woodgrovebank.com domain as the default domain for .NET Passport authentication.Configure a custom local IPSec policy on the Web servers to require IPSec communications
D.Configure the Web site to use only Windows Integrated authentication. Configure a custom local IPSec policy on the Web servers to require IPSec communications. Configure the IPSec policy to use certificate-based authentication and encryption
A.Install Internet Authentication Services (IAS) on a server in the den.corp.woodgrovebank.com domain. Configure the VPN servers as RADIUS clients
B.Install Internet Authentication Services (IAS) on a stand-alone server in the Denver extranet. Create local user accounts for the IT personnel on the IAS server. Configure the VPN servers as RADIUS clients
C.Create a remote access policy on each of the VPN servers. Configure the policy to use the den.corp.woodgrovebank.com to authenticate remote access users. Configure the policy to require L2TP to establish a connection
D.Create a remote access policy on each of the VPN servers. Create local user accounts for the IT personnel on the VPN servers. Configure the policy to use the VPN servers’ local accounts database to authenticate users. Configure the policy to require L2TP to establish a connection
A.Create a new child domain named extranet.corp.woodgrovebank.com in the existing forest. Create user accounts for users from partner companies in the new child domain. Create shortcut trusts in which the child domain trusts every domain in the forest
B.Create a new forest and domain named extranet.woodgrovebank.com. Create user accounts for users from partner companies in the new domain. Create a one-way forest trust relationship in which the extranet forest trusts the company forest
C.Create a new forest and domain named extranet.woodgrovebank.com. Create user accounts for users from partner companies in the new domain. Create an external trust relationship in which the extranet domain trusts the den.corp.woodgrovebank.com domain
D.Create a child domain of the den.corp.woodgrovebank.com domain for the extranet. Create user accounts for users from partner companies in the new child domain. Create an external trust relationship in which the forest root domain trusts the extranet domain
A.Deploy an L2TP/IPsec VPN server in each call center. Configure the portable computers as L2TP VPN clients
B.Create IPSec tunnel mode connections between the customer support users home and the company’s Internet-facing routers
C.Create IP packet filters on the company’s Internet-facing routers to allow the Remote Desktop Protocol (RDP).Create IPSec filters on the terminal servers to allow only connections that use RDP
D.Create IP packet filters on the company’s Internet-facing routers to allow the IPSec protocols. Assign the Secure Server (Require Security) IPSec policy to the terminal servers. Assign the Client (Respond only) IPSec policy to the portable computers
A.Configure all client computers to use Automatic Updates to obtain security patches from the Windows Update Web site. Test and install all patches
B.Configure a batch file to download security patches daily. Distribute the security patches by using a.zap file and the Default Domain Policy Group Policy object (GPO)
C.Deploy a Software Update Services (SUS) server. Test all security patches and then approve them. Configure all client computers to automatically obtain updates from the server
D.Configure a batch file to download security patches daily. Manually install the security patches on all computers
A.Install a Windows Server 2003 enterprise root CA, Configure certificate templates for autoenrollment
B.Install a Windows Server 2003 enterprise subordinate CA, Configure certificate templates for autoenrollment
C.Install a Windows Server 2003 stand-alone subordinate CA, Write a logon script for the client computers in the HR department that contains the Certreq.execommand
D.Install a Windows Server 2003 stand-alone root CA,Write a logon script for the client computers in the HR department that contains the Certreq.execommand
A.Configure the software restriction policy in the Default Domain Policy Group Policy object (GPO)
B.Create a new connection object by using the Connection Manager Administration Kit (CMAK), and install the new connection object on all client computers
C.Create and configure a local security policy on both of the ISA server computers
D.Configure the Internet Explorer settings in the Default Domain Policy Group Policy object (GPO)
A.Enable Web distributed Authoring and Versioning (WebDAV) components on WEB1
B.Install and configure the URLScan ISAPI filter on WEB1
C.Install a computer certificate on WEB1, and enable the Server (Request Security) IPSec policy on WEB1
D.Configure the Web site redirection option on the properties of WEB1 in the Internet Service Manager console
最新试题
You need to design a strategy to move confidential data from research users’ client computers to ATLFP2. Your solution must meet the business requirements. What should you instruct the research users to do?()
You need to design security changes that provide maximum protection for customer data and courier assignments.What should you do?()
You are designing a remote administration solution that meets business requirements. You need to specify client or server software that will be required. What should you do?()
You need to design a PKI that meets business requirements. What should you do?()
You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()
You need to design a domain model that meets the company business and security requirements for controlling access to the new Web-based ordering application. What should you do?()
You need to design a method to modify the current e-mail ordering system. Which will be used until Fourth Coffee deploys the Web-based ordering application. Your solution must address business concerns and improve security. What should you do?()
You need to design a method for junior IT administrators to perform more IT support tasks. Your solution must meet business and security requirements. What should you do?()
You need to configure ISA3 in Seattle to enable communication with the network in New York.What should you do?()
You need to design a security patch management strategy. Your solution must meet business and security requirements, and it must accommodate the company’s resource restrictions. What should you do?()