A.Open the ports for DNS, HTTP, HTTPS, Kerberos, RADIUS, LDAP, RPC endpoint mapper and client, and Server Message Block (SMB) over IP
B.Enable the Routing and Remote Access Basic Firewall. Open the ports for DNS, Kerberos, LDAP, Exchange RPCs, RADIUS, L2TP, and Internet Key Exchange (IKE)
C.Create a PPTP tunnel from ISA3 to the New York network
D.Create an L2TP/IPSec tunnel from ISA3 to the New York network
您可能感兴趣的试卷
你可能感兴趣的试题
A.Use IPSec in transport mode
B.Use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV)
C.Use PEAP-EAP-TLS
D.Use Encrypting File System (EFS) remote encryption
A.Add one offline stand-alone root certificate authority(CA).Add two online enterprise subordinate CAs
B.Add one online stand-alone root certification authority(CA).Add two online enterprise subordinate CAs
C.Add one online enterprise root certification authority CA).Add one offline enterprise subordinate CA
D.Add one online enterprise root certification authority(CA).Add two online enterprise subordinate CAs
A.Create a security group named HelpDesk. Add the HelpDesk group to the Enterprise Admins group in both domains
B.Create a security group named HelpDesk. Add the HelpDesk group to the Domain Admins groups in both domains
C.Add the Domain Admins group in the litwareinc.com domain to the Domain Admins group in the contoso.com domain. Delegate full control of the litwareinc.com domain to the Domain Admins group in the contoso.com domain
D.Create a security group named HelpDesk for each office. Delegate administrative tasks to their respective OU or domain.Delegate full control of the contoso.com domain to the Domain Admins group from the litwareinc.com domain
A.Configure autoenrollment for user certificates and computer certificates
B.Configure Web enrollment for user certificates and computer certificates
C.Configure a Certificate Services hierarchy in the litwareinc.com domain
D.Configure qualified subordination between the litwareinc.com and the contoso.com domains
E.Configure PEAP authentication on the remote access servers
A.Install a digital certificate for Encrypting File System (EFS) on FinServ
B.Activate failure auditing on the access to files and objects
C.Configure all firewalls to track when any packets addresses to FinServ are dropped
D.Create an IPSec policy that requires IPSec encryption between FinServ and the firewall
A.Ensure that all wireless networking equipment fully supports the IEE 802.11a, IEEE 802.11b, and IEEE 802.11g wireless networking protocols
B.Assign a random service set identifier (SSID) to each wireless access point. Disable broadcasting of SSIDs on all wireless access points
C.Create a firewall to block traffic to any IP address that did not originate from the company’s DHCP servers. Ensure that all wireless access points connect behind this new firewall
D.Configure a server to use Internet Authentication Service (IAS). Configure the wireless networking equipment to use the IEEE 802.1x protocol and the IAS server
A.Use a password generator application to create a preshared key, and distribute it to all mobile users
B.Use computer autoenrollment to create digital certificates that can be used to authenticate to a VPN server
C.Acquire a digital certificate that can be used for SSL from a commercial CA for each computer that established a VPN connection
D.Configure IPSec policies on all Routing and Remote Access servers to require the use of digital certificates
A.Designate a data recovery agent and issue an EFS certificate to the data recovery agent. Export the private key and restrict access to the exported key
B.Make the data recovery agent a local administrator on all client computers
C.Remove the default data recovery agent from the Default Domain Policy GPO. Then, include the new data recovery agent instead
D.Delete the Default Domain Policy GPO. Configure a new GPO linked to the domain that does not specify a data recovery agent
A.Configure a remote access policy on the Routing and Remote Access server to require MS-CHAP v2 for all connections
B.Use a Group Policy object (GPO) to configure a Restricted Groups policy that applies to the Routing and Remote Access server. Use this Restricted Groups policy to remove all accounts form the local Users group, and then add authorized computer accounts
C.Configure the Routing and Remote Access server to use only PPTP connections
D.Configure the Routing and Remote Access server to use only IPSec over L2TP connections.Configure IPSec to use certificates
A.Configure the terminal server so that users log on by using local user accounts
B.Configure the terminal server so that users log on by using domain accounts
C.Configure the server to run SalesForceMax in a dedicated window when a user logs on to the terminal server
D.Configure the server to allow each user to have a Windows desktop when the user logs on to the terminal server
E.Use software restriction polices in Group Policy objects (GPOs) that apply to the terminal server
F.Use Appsec.exe to restrict applications on the terminal server
最新试题
You need to design a security patch management strategy. Your solution must meet business and security requirements, and it must accommodate the company’s resource restrictions. What should you do?()
You need to design a method to ensure that research intellectual property remains confidential. You solution must meet security requirements. What should you do?()
The company is evaluating using a new Active Directory domain to contain all customer user accounts. You need to design a monitoring or logging strategy that meets business and security requirements for the new Web-based ordering application. Your solution must minimize overhead on existing domain controllers and servers. What should you do?()
You need to design an access control strategy for the external and intranet Web sites. Which two actions should you perform?()
You need to design a method to ensure that only scripts that are approved by the IT department can run on company computers. Your solution must meet business requirements. What should you do?()
You need to improve the company’s security patch management process. Your solution must meet existing business requirements and it cannot increase the number of employees or unnecessarily increase ongoing administrative effort. What should you do?()
You need to design an authentication solution for Terminal Services that meets the business requirements.What should you do?()
You are designing a remote administration solution that meets business requirements. You need to specify client or server software that will be required. What should you do?()
You need to design an authentication strategy for users of portable computers. Your solution must meet business requirements. What should you do?()
You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()