网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You are designing an access control strategy for WEB2. Your solution must meet business requirements. What should you do?()
A

Install the Terminal Services Advanced Client Web client on WEB2

B

Modify the Winreg registry key on WEB2

C

Install the RPC over HTTP service on WEB2

D

Modify the RestrictAnonymous registry key on WEB2


参考答案

参考解析
解析: 暂无解析
更多 “单选题You are designing an access control strategy for WEB2. Your solution must meet business requirements. What should you do?()A Install the Terminal Services Advanced Client Web client on WEB2B Modify the Winreg registry key on WEB2C Install the RPC over HTTP service on WEB2D Modify the RestrictAnonymous registry key on WEB2” 相关考题
考题 You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()A. show access-listB. show ip access-listC. show ip interfaceD. show interfaceE. show interface list

考题 You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()A、show access-listB、show ip access-listC、show ip interfaceD、show interfaceE、show interface list

考题 You are designing a strategy to allow users to have remote access to internal resources. Which service or services should you allow on the public interface of the NAT Server?()A、HTTPB、LDAPC、POP3D、SMTPE、VPN Gateway

考题 You are designing a NetBIOS naming strategy for the internal domain.  What are two possible NetBIOS domain names you can use to achieve your goal? ()A、 adB、 dallasC、 internalD、 externalE、 Research

考题 You are designing an IP addressing strategy for your VPN solution. How many public addresses should you use?()A、1B、25C、50D、255

考题 You are the enterprise administrator for an Exchange Server 2010 organization. All users run Microsoft Office Outlook 2010.  You are designing a sharing solution for your organization and a partner organization. The partner organization also uses Exchange Server 2010.  You need to recommend a strategy for sharing information with the partner organization to meet thefollowing requirements: .Provide cross-organizational access to user contacts  .Provide cross-organizational access to free/busy information What should you recommend?()A、Creating cross-forest trustsB、Implementing Federated SharingC、Implementing Microsoft Identify Lifecycle Manager (ILM) 2007D、Running the Microsoft Exchange Inter-Organization Replication tool

考题 You are designing a remote access strategy to meet the business and technical Requirement.  What should you do?()A、 Configure each server running Routing and Remote Access as a RADIUS Client.B、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.C、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.D、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.

考题 You are designing a remote access strategy to meet the business  technical requirements. Which authentication mechanism should you use?()A、MS-CHAP v2.B、Internet Authentication service (IAS).C、Multilink  Bandwidth Allocation Protocol (BAP).D、Remote access policies on all servers running Routing  Remote Access.

考题 You are designing a security strategy for users who need remote access to the corporate network. What should you do?()A、Configure Internet Authentication Service (IAS) for accounting.B、Configure the server running Routing and Remote Access to support L2TP.C、Configure the server running Routing and Remote Access to restrict dial-in traffic to the NewApp servers only.D、Create a separate account for remote access users. Configure these accounts to access the NewApp server only.

考题 You are designing a strategy to provide Internet access to all users.  What should you do?()A、 Configure Internet Connection Sharing on all client computers.B、 Configure Automatic Private IP Addressing (APIPA) on all client computers.C、 Configure one server as a Routing and Remote Access VPN server.D、 Configure one server as a Routing and Remote Access NAT router.

考题 You are designing an access control strategy for WEB2. Your solution must meet business requirements. What should you do?()A、Install the Terminal Services Advanced Client Web client on WEB2B、Modify the Winreg registry key on WEB2C、Install the RPC over HTTP service on WEB2D、Modify the RestrictAnonymous registry key on WEB2

考题 单选题You are designing an IP addressing strategy for your VPN solution.  How many public addresses should you use?()A  1B  25C  50D  255

考题 单选题You are designing a remote access strategy to meet the business and technical Requirement.  What should you do?()A  Configure each server running Routing and Remote Access as a RADIUS Client.B  Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.C  Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.D  Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.

考题 单选题You are designing a strategy to provide Internet access to all users.  What should you do?()A  Configure Internet Connection Sharing on all client computers.B  Configure Automatic Private IP Addressing (APIPA) on all client computers.C  Configure one server as a Routing and Remote Access VPN server.D  Configure one server as a Routing and Remote Access NAT router.

考题 单选题You are the enterprise administrator for an Exchange Server 2010 organization. All users run Microsoft Office Outlook 2010.  You are designing a sharing solution for your organization and a partner organization. The partner organization also uses Exchange Server 2010.  You need to recommend a strategy for sharing information with the partner organization to meet the following requirements: .Provide cross-organizational access to user contacts  .Provide cross-organizational access to free/busy information  What should you recommend?()A Creating cross-forest trustsB Implementing Federated SharingC Implementing Microsoft Identify Lifecycle Manager (ILM) 2007D Running the Microsoft Exchange Inter-Organization Replication tool

考题 单选题You are designing a remote access strategy to meet the business  technical requirements.  Which authentication mechanism should you use?()A  MS-CHAP v2.B  Internet Authentication service (IAS).C  Multilink  Bandwidth Allocation Protocol (BAP).D  Remote access policies on all servers running Routing  Remote Access.

考题 单选题Your database instance is running.You are not able to access Oracle Enterprise Manager Database Control because the listener is not started.Which tool or utility would you use to start the listener?()A Oracle Net ManagerB Listener Control utilityC Database Configuration AssistantD Oracle Net Configuration Assistant

考题 单选题You are designing a strategy to allow users to have remote access to internal resources. Which service or services should you allow on the public interface of the NAT Server?()A HTTPB LDAPC POP3D SMTPE VPN Gateway

考题 多选题You are designing a strategy for migrating to the new environment. Which two factions from your current environment will affect your migration strategy?()ATrusts between domainsBNumber of BDC s in each domainCUsers and resources in each domainDCurrent hardware for domain controllersECurrent amount of replication traffic over WAN links

考题 单选题You are designing a strategy to allow users to have remote access to internal resources.   Which service or services should you allow on the public interface of the NAT Server?()A  HTTPB  LDAPC  POP3D  SMTPE  VPN Gateway

考题 单选题You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()A show access-listB show ip access-listC show ip interfaceD show interfaceE show interface list

考题 多选题You are designing a NetBIOS naming strategy for the internal domain. What are two possible NetBIOS domain names you can use to achieve your goal?()AadBdallasCinternalDexternalEResearch

考题 单选题You are designing an IP addressing strategy for your VPN solution. How many public addresses should you use?()A 1B 25C 50D 255