网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You are designing an authentication strategy for the accounting department. Your solution must meet business requirements. What should you do?()
A

Install wireless network cards on all accounting department computers. Select PEAP authentication

B

Install user certificates on all accounting department computers. Configure these computers to respond to requests for IPSec encryption

C

Issue smart cards and smart card readers to all accounting department users and computers. Require NTLMv2 authentication

D

Issue smart cards and smart card readers to all accounting department users and computers. Configure the domain to require smart cards for the accounting department users during logon


参考答案

参考解析
解析: 暂无解析
更多 “单选题You are designing an authentication strategy for the accounting department. Your solution must meet business requirements. What should you do?()A Install wireless network cards on all accounting department computers. Select PEAP authenticationB Install user certificates on all accounting department computers. Configure these computers to respond to requests for IPSec encryptionC Issue smart cards and smart card readers to all accounting department users and computers. Require NTLMv2 authenticationD Issue smart cards and smart card readers to all accounting department users and computers. Configure the domain to require smart cards for the accounting department users during logon” 相关考题
考题 You are designing the NetBIOS domain naming strategy for the company. Which NetBIOS domain name or names should you use?()A、eastB、westC、quebecD、newyorkE、northamericaF、wideworldimporters

考题 You are designing a strategy to ensure that VPN users are able to access all internal resources.  What should you do?()A、 Specify a static routing table entry on VPN1 for the Dallas network.B、 Specify a static routing table entry on VPN1 for the Seattle network.C、 Implement Internet Authentication Service (IAS) on VPN1.D、 Define a User Class option for Routing  Remote Access Clients on the DHCP Server.

考题 You are designing an IP addressing strategy for your VPN solution. How many public addresses should you use?()A、1B、25C、50D、255

考题 You are designing an authentication solution to meet the security needs of the network administrators. You install an enterprise certification authority (CA). Which three additional actions should you take?()A、Enroll each administrative account for a smart card authentication certificate.B、Configure autoenrollment for computer authentication certificates. C、Install a smart card reader on each server computer.  D、Install a smart card reader on each network administrator’s computer.  E、Configure each administrative account to require a smart card for interactive logon.F、Configure the Default Domain Policy GPO to require smart cards for interactive login.

考题 You are designing a remote access strategy to meet the business  technical requirements. Which authentication mechanism should you use?()A、MS-CHAP v2.B、Internet Authentication service (IAS).C、Multilink  Bandwidth Allocation Protocol (BAP).D、Remote access policies on all servers running Routing  Remote Access.

考题 You are designing a strategy to perform inplace upgrade of domain controller in Boston and San Diego. Which method should you use?()A、adprepB、sysprepC、Answer FileD、Remote Installtion Services (RIS)

考题 You are designing a security strategy for users who need remote access to the corporate network. What should you do?()A、Configure Internet Authentication Service (IAS) for accounting.B、Configure the server running Routing and Remote Access to support L2TP.C、Configure the server running Routing and Remote Access to restrict dial-in traffic to the NewApp servers only.D、Create a separate account for remote access users. Configure these accounts to access the NewApp server only.

考题 You need to recommend a strategy to ensure that the administration of AD LDS is encrypted.  What should you include in the recommendation?()A、a server authentication certificateB、client authentication certificatesC、Digest authenticationD、Windows Integrated authentication

考题 You need to recommend a security strategy for WebApp2 that meets the company’s applicaton  requirements.What should you include in the recommendation?()A、Basic authentication and connection security rulesB、Basic authentication and SSLC、Digest authentication and connection security rulesD、Digest authentication and SSL

考题 单选题You are designing a security strategy for users who need remote access to the corporate network.  What should you do?()A  Configure Internet Authentication Service (IAS) for accounting.B  Configure the server running Routing and Remote Access to support L2TP.C  Configure the server running Routing and Remote Access to restrict dial-in traffic to the NewApp servers only.D  Create a separate account for remote access users. Configure these accounts to access the NewApp server only.

考题 单选题You are designing a remote access strategy to meet the business  technical requirements.  Which authentication mechanism should you use?()A  MS-CHAP v2.B  Internet Authentication service (IAS).C  Multilink  Bandwidth Allocation Protocol (BAP).D  Remote access policies on all servers running Routing  Remote Access.

考题 单选题You are designing a WAN implementation strategy to meet the business and technical requirements. What should you do?()A Configure a demand-dial router.B Create multiple Active Directory site links.C Configure a VPN connection between each branch office.D Install an Internet Authentication Service (IAS) server in each branch office.

考题 单选题You need to design a remote access strategy for portable computers. Your solution must meet business requirements. What should you do?()A Issue a computer certificate to P_RAS1. Reconfigure the remote access policy on P_RAS1 to accept only EAP-MD5 authentication. Then, specify that P_RAS1’s computer certificate is to be used for authenticationB Issue a user certificate to the Administrator account on P_RAS1. Reconfigure the remote access policy to accept only EAP-MD5 authentication. Then, specify that the Administrator account’s user certificate is to be used for authenticationC Issue a computer certificate to P_RAS1. Reconfigure the remote access policy to accept only EAP-TLS authentication. Then, specify the P_RAS1’s computer certificate is to be used for authenticationD Issue a user certificate to the Administrator account on P_RAS1. Reconfigure the remote access policy to accept only EAP-TLS authentication. Then, specify that the Administrator account’s user certificate is to be used for authentication

考题 单选题You need to recommend a strategy to ensure that the administration of AD LDS is encrypted.  What should you include in the recommendation?()A a server authentication certificateB client authentication certificatesC Digest authenticationD Windows Integrated authentication

考题 单选题You are designing a WAN implementation strategy to meet the business and technical requirements.  What should you do? ()A  Configure a demand-dial router.B  Create multiple Active Directory site links.C  Configure a VPN connection between each branch office.D  Install an Internet Authentication Service (IAS) server in each branch office.

考题 单选题You are designing a new NETBIOS naming strategy for the corporate environment.  Which domain name should you use?()A  adB  woodgroveadC  woodgrovebankD  woodgrovebank.com

考题 多选题You are designing the NetBIOS domain naming strategy for the company. Which NetBIOS domain name or names should you use?()AeastBwestCquebecDnewyorkEnorthamericaFwideworldimporters

考题 单选题You are designing an IP addressing strategy for your VPN solution. How many public addresses should you use?()A 1B 25C 50D 255

考题 单选题You are designing a new NETBIOS naming strategy for the corporate environment. Which domain name should you use?()A adB woodgroveadC woodgrovebankD woodgrovebank.com