多项选择题You need to design a security strategy for the Web folders and files created by the consultants and the internal Web developers. What are two possible ways to achieve this goal?()

A.Require the internal Web developers to use Telnet with Kerberos authentication. Require the consultants to use L2TP with IPSec
B.Require the internal Web developers to use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV). Require the consultants to use Microsoft.NET Passport authentication with Security Level 0
C.Require the internal Web developers to use Web Distributed Authoring and Versioning (WebDAV) over SSL.Require the consultants to use WebDAV over SSL
D.Require the internal Web developers to use L2TP with IPSec. Require the consultants to use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV)
E.Require the internal Web developers to use Web Distributed Authoring and Versioning (WebDAV) over SSL.Require the consultants to use L2TP with IPSec


您可能感兴趣的试卷

你可能感兴趣的试题

1.多项选择题You need to design a strategy to increase security for the client computers in the finance department. Which two actions should you perform?()

A.Enable automatic certificate enrollment
B.Enforce smart card logons
C.Enable Encrypting File System (EFS) for offline files
D.Enable a screen saver password

2.单项选择题You need to design a security strategy for communications between the Boston and New York offices. What should you do?()

A.Configure RRAS2 as a VPN server. Use Web enrollment to acquire computer certificates for both RRAS1 and RRAS2. Create demand-dial L2TP/IPSec connections on both RRAS1 and RRAS2. Configure dial-out credentials on both RRAS1 and RRAS2. Enable the Basic Firewall settings on RRAS1 and RRAS2
B.Configure RRAS2 as a VPN server. Create demand-dial L2TP/IPSec connections on both RRAS1 and RRAS2. Configure dial-out credentials on both RRAS1 and RRAS2. Configure static routes on both RRAS1 and RRAS2. Set the connection type to persistent on the demand-dial interface on both RRAS1 and RRAS2
C.Create a new OU named RRAS Servers in the boston.northwindtraders.com domain. Move RRAS1 into the RRAS Servers OU. On the Default Domain Policy Group Policy object (GPO), edit the Secure Server (Require Security) IPSec policy. Configure the IPSec policy to use a certificate for authentication. Specify RRAS2 as the tunnel endpoint. Assign the IPSec policy.
D.Create a new OU named RRAS Server in the northwindtraders.com domain. Move the RRAS2 into the RRAS Servers OU. On the RRAS Servers OU create new Group Policy object (GPO) named IPSECPOL. In IPSECPOL create an IPSec policy and specify RRAS as the tunnel.

3.单项选择题You need to configure ISA3 in Seattle to enable communication with the network in New York.What should you do?()

A.Open the ports for DNS, HTTP, HTTPS, Kerberos, RADIUS, LDAP, RPC endpoint mapper and client, and Server Message Block (SMB) over IP
B.Enable the Routing and Remote Access Basic Firewall. Open the ports for DNS, Kerberos, LDAP, Exchange RPCs, RADIUS, L2TP, and Internet Key Exchange (IKE)
C.Create a PPTP tunnel from ISA3 to the New York network
D.Create an L2TP/IPSec tunnel from ISA3 to the New York network

4.单项选择题You need to design an access control strategy for the Payment folder for the Sales Managers group. What should you do?()

A.Use IPSec in transport mode
B.Use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV)
C.Use PEAP-EAP-TLS
D.Use Encrypting File System (EFS) remote encryption

5.单项选择题You need to design a PKI for Litware, Inc. What should you do?()

A.Add one offline stand-alone root certificate authority(CA).Add two online enterprise subordinate CAs
B.Add one online stand-alone root certification authority(CA).Add two online enterprise subordinate CAs
C.Add one online enterprise root certification authority CA).Add one offline enterprise subordinate CA
D.Add one online enterprise root certification authority(CA).Add two online enterprise subordinate CAs

6.单项选择题You need to design an administrative control strategy for Denver administrators. What should you do?()

A.Create a security group named HelpDesk. Add the HelpDesk group to the Enterprise Admins group in both domains
B.Create a security group named HelpDesk. Add the HelpDesk group to the Domain Admins groups in both domains
C.Add the Domain Admins group in the litwareinc.com domain to the Domain Admins group in the contoso.com domain. Delegate full control of the litwareinc.com domain to the Domain Admins group in the contoso.com domain
D.Create a security group named HelpDesk for each office. Delegate administrative tasks to their respective OU or domain.Delegate full control of the contoso.com domain to the Domain Admins group from the litwareinc.com domain

7.多项选择题You need to design a remote access solution for the mobile sales users in the litwareinc.com domain. Which two actions should you perform?()

A.Configure autoenrollment for user certificates and computer certificates
B.Configure Web enrollment for user certificates and computer certificates
C.Configure a Certificate Services hierarchy in the litwareinc.com domain
D.Configure qualified subordination between the litwareinc.com and the contoso.com domains
E.Configure PEAP authentication on the remote access servers

8.单项选择题You are designing the settings for FinServ. You specify the permissions that will be used. You need to specify any additional settings required by the company. What should you do?()

A.Install a digital certificate for Encrypting File System (EFS) on FinServ
B.Activate failure auditing on the access to files and objects
C.Configure all firewalls to track when any packets addresses to FinServ are dropped
D.Create an IPSec policy that requires IPSec encryption between FinServ and the firewall

9.单项选择题You are designing the wireless networks for the three warehouses. Your design must support the inventory and shipping management solution, and it must meet security requirements. What should you do?()

A.Ensure that all wireless networking equipment fully supports the IEE 802.11a, IEEE 802.11b, and IEEE 802.11g wireless networking protocols
B.Assign a random service set identifier (SSID) to each wireless access point. Disable broadcasting of SSIDs on all wireless access points
C.Create a firewall to block traffic to any IP address that did not originate from the company’s DHCP servers. Ensure that all wireless access points connect behind this new firewall
D.Configure a server to use Internet Authentication Service (IAS). Configure the wireless networking equipment to use the IEEE 802.1x protocol and the IAS server

10.多项选择题You need to design the network to support the company’s VPN requirements for mobile users who connect to the network in Seattle. Which two actions should you perform?()

A.Use a password generator application to create a preshared key, and distribute it to all mobile users
B.Use computer autoenrollment to create digital certificates that can be used to authenticate to a VPN server
C.Acquire a digital certificate that can be used for SSL from a commercial CA for each computer that established a VPN connection
D.Configure IPSec policies on all Routing and Remote Access servers to require the use of digital certificates

最新试题

You need to design an authentication solution for Terminal Services that meets the business requirements.What should you do?()

题型:单项选择题

You need to design an access control strategy for the external and intranet Web sites. Which two actions should you perform?()

题型:多项选择题

You need to design a method to standardize and deploy a baseline security configuration for servers. You solution must meet business requirements. What should you do?()

题型:单项选择题

You need to design a certificate management process for internal users. What should you do?()

题型:单项选择题

You need to design a patch management strategy for Northwind Traders. What should you do?()

题型:单项选择题

You are designing a remote administration solution that meets business requirements. You need to specify client or server software that will be required. What should you do?()

题型:单项选择题

You are designing a security strategy for the public Web server. You solution must address the chief security officer’s concerns. What should you do?()

题型:单项选择题

You need to design a PKI for the Northwind Traders internal network. What should you do?()

题型:单项选择题

You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()

题型:单项选择题

You need to design a security strategy for the Web folders and files created by the consultants and the internal Web developers. What are two possible ways to achieve this goal?()

题型:多项选择题