网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Your network consists of an internal network and a perimeter network. On the internal network there is a server named Server1. On the perimeter network there is a server named Server2. All servers run Windows Server 2003 Service Pack 2 (SP2).  You schedule a task to transfers files from Server1 to Server2 by using FTP.You monitor the network traffic from Server1 to Server2 and notice that the user name and password used for the FTP transfer are sent as plain text. You need to ensure that all FTP traffic between Server1 and Server2 is encrypted.  What should you do?()
A

Implement IPSec.

B

Install a server certificate on Server1.

C

Install a server certificate on Server2.

D

Use the Encrypting File System on Server1.


参考答案

参考解析
解析: 暂无解析
更多 “单选题Your network consists of an internal network and a perimeter network. On the internal network there is a server named Server1. On the perimeter network there is a server named Server2. All servers run Windows Server 2003 Service Pack 2 (SP2).  You schedule a task to transfers files from Server1 to Server2 by using FTP.You monitor the network traffic from Server1 to Server2 and notice that the user name and password used for the FTP transfer are sent as plain text. You need to ensure that all FTP traffic between Server1 and Server2 is encrypted.  What should you do?()A Implement IPSec.B Install a server certificate on Server1.C Install a server certificate on Server2.D Use the Encrypting File System on Server1.” 相关考题
考题 our network consists of an internal network and a perimeter network. On the internal network there is a server named Server1. On the perimeter network there is a server named Server2. All servers run Windows Server 2003 Service Pack 2 (SP2).You schedule a task to transfers files from Server1 to Server2 by using FTP.You monitor the network traffic from Server1 to Server2 and notice that the user name and password used for the FTP transfer are sent as plain text.  You need to ensure that all FTP traffic between Server1 and Server2 is encrypted.  What should you do?()A、Implement IPSec. B、Install a server certificate on Server1. C、Install a server certificate on Server2. D、Use the Encrypting File System on Server1.

考题 Your company has two data centers.  Each data center contains a perimeter network.  Your network contains an Exchange Server 2010 organization.  You plan to deploy Exchange Server 2010 Edge Transport servers in the perimeter networks.  You need to recommend a solution for the Edge Transport servers that meets the following requirements:.Distribute inbound e-mail messages across all Edge Transport servers  .Ensure that users receive inbound e-mail messages if an Edge Transport server fails  .Ensure that users receive inbound e-mail messages if a single data center network becomes unavailable .Minimize costs  What should you recommend?()A、In each perimeter network, deploy one Edge Transport server. Implement failover clustering.B、In each perimeter network, deploy two Edge Transport servers. Implement failover clustering.C、In each perimeter network, deploy one Edge Transport server. Configure a mail exchange (MX) record for each server.D、In each perimeter network, deploy two Edge Transport servers. Configure a mail exchange (MX) record for each server.

考题 Your network contains an internal network and a perimeter network that are separated by a firewall. The perimeter network contains an Exchange Server 2010 Edge Transport server.  You plan to deploy an internal Exchange Server 2010 organization that meets the following requirements:.Support EdgeSync synchronization .Support encrypted delivery of outbound e-mail messages to the Edge Transport server .Minimize the attack surface of the internal network  Which TCP ports should you allow from the internal network to the perimeter network?()A、3389 and 25B、3389 and 636C、50636 and 25D、50636 and 135

考题 Your network consists of a single Active Directory domain. The network is located on the 172.16.0.0/23  subnet.   The company hires temporary employees. You provide user accounts and computers to the temporaryem ployees. The temporary employees receive computers that are outside the Active Directory domain.   The temporary employees use their computers to connect to the network by using wired connections andwireless connections. The company’s security policy specifies that the computers connected to the network must have the latest updates for the operating system.   You need to plan the network’s security so that it complies with the company 's security policy. What should you include in your plan?()A、Implement a Network Access Protection (NAP) strategy for the 172.16.0.0/23 subnet.B、Create an extranet domain within the same forest. Migrate the temporary employees user accounts to the extranet domain. Install the necessary domain resources on the 172.16.0.0/23 subnet.C、Move the temporary employees user accounts to a new organizational unit (OU). Create a new Group Policy object (GPO) that uses an intranet Microsoft Update server. Link the new GPO tothe new OU.D、Create a new subnet in a perimeter network. Relocate the wireless access point to the perimeter network. Require authentication through a VPN server before allowing access to the internal resources.

考题 Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest. The forest contains a single domain.  You plan to deploy 10 Edge Transport servers on the perimeter network.  You need to recommend a solution for the Edge Transport server deployment. The solution must meet the following requirements: .Allow administrators to apply a single security policy to all Edge Transport servers .Reduce the administrative overhead that is required to manage servers .Minimize the attack surface of the internal network What should you recommend?()A、Implement Network Policy and Access Services (NPAS).B、Implement Active Directory Federation Services (AD FS).C、Create a new Active Directory domain in the internal forest, and then join all Edge Transport servers to the new domain.D、Create an Active Directory forest in the perimeter network, and then join all Edge Transport servers to the new domain.

考题 Your network is configured as shown in the following diagram.You deploy an enterprise certification authority (CA) on the internal network. You also deploy a Microsoft   Online Responder on the internal network.   You need to recommend a secure method for Internet users to verify the validity of individual certificates.   The solution must minimize network bandwidth. What should you recommend?()A、Deploy a subordinate CA on the perimeter network.B、Install a stand-alone CA and the Network Device Enrollment Service (NDES) on a server on the perimeter network.C、Install a Network Policy Server (NPS) on a server on the perimeter network. Redirect authentication  requests to a server on the internal network.D、Install Microsoft Internet Information Services (IIS) on a server on the perimeter network. Configure IIS  to redirect requests to the Online Responder on the internal network.

考题 You are the network administrator for The network consists of an internal network and a perimeter network. The internal network is protected by a firewall. The perimeter network is exposed to the Internet. You are deploying 10 Windows Server 2003 computers as Web servers. The servers will be located in the perimeter network. The servers will host only publicly available Web pages. You want to reduce the possibility that users can gain unauthorized access to the servers. You are concerned that a user will probe the Web servers and find ports or services to attack. What should you do?()A、Disable File and Printer Sharing on the servers.B、Disable the IIS Admin service on the servers.C、Enable Server Message Block (SMB) signing on the servers.D、Assign the Secure Server (Require Security) IPSec policy to the servers.

考题 All servers and client computers in your company are configured to use WINS for name resolution. The internal network is separated from a perimeter network (also known as DMZ) by a third-party firewall. Firewall rules do not allow name resolution between the internal network and the perimeter network. You move a Windows Server 2003 server named Server1 to the perimeter network. You need to ensure that all computers on the internal network can connect to Server1 by name.  What should you do?()A、 Create an LMHOSTS file on Server1.B、 Create a static WINS entry for Server1.C、 Configure Server1 to use Broadcast (B-node) mode.D、 Configure Server1 to use Peer-to-Peer (P-node) mode.

考题 Your network contains an internal network and a perimeter network. The internal network contains a single Active Directory site.  The perimeter network contains two Exchange Server 2010 Edge Transport servers. You plan to deploy an Exchange Server 2010 organization on the internal network.  You need to plan the deployment of Hub Transport server roles to meet the following requirements:.If a single Hub Transport server fails, e-mail messages from the Internet must be delivered to the Mailboxservers. .If a single Hub Transport server fails, users must be able to send e-mail messages to other users thathave mailboxes on the same Mailbox server.  What should you include in the plan?()A、Deploy one Edge Transport server on the internal network, and then configure EdgeSync synchronization.B、Deploy one Hub Transport server on the internal network, and then configure EdgeSync synchronization.C、Deploy one Hub Transport server on the internal network and one Hub Transport server on the perimeter network.D、Deploy two Hub Transport servers on the internal network.

考题 You are a network administrator for Alpine Ski House. The internal network has an Active Directory-integrated zone for the alpineskihouse.org domain. Computers on the internal network use the Active Directory-integrated DNS service for all host name resolution.   The Alpine Ski House Web site and DNS server are hosted at a local ISP. The public Web site for Alpine Ski House is accessed at www.alpineskihouse.com. The DNS server at the ISP hosts the alpineskihouse.com domain.   To improve support for the Web site, your company wants to move the Web site and DNS service from the ISP to the company’s perimeter network. The DNS server on the perimeter network must contain only the host (A) resource records for computers on the perimeter network.   You install a Windows Server 2003 computer on the perimeter network to host the DNS service for the alpineskihouse.com domain. You need to ensure that the computers on the internal network can properly resolve host names for all internal resources, all perimeter resources, and all Internet resources.   Which two actions should you take? ()A、 On the DNS server that is on the perimeter network, install a primary zone for alpineskihouse.com.B、 On the DNS server that is on the perimeter network, install a stub zone for alpineskihouse.com.C、 Configure the DNS server that is on the internal network to conditionally forward lookup requests to the DNS server that is on the perimeter network.D、 Configure the computers on the internal network to use one of the internal DNS servers as the preferred DNS server. Configure the the TCP/IP settings on the computers on the internal network to use the DNS server on the perimeter network as an alternate DNS server.E、 On the DNS server that is on the perimeter network, configure a root zone.

考题 You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. A firewall at Testking.com separates the internal network and a perimeter network. The perimeter networkcontains an Exchange Server 2010 Edge Transport server. You have received instructions from the CIO to install an internal Exchange Server 2010 with the followingcriteria: 1. The support of EdgeSync synchronizaiton and encrypted delivery of outbound e-mail messages to theEdge Transport server. 2. The minimization of the attack surface of the internal network. What should you do?()A、The best option is to use port 3309 and 25 from the internal network to the perimeter network.B、The best option is to use port 3309 and 636 from the internal network to the perimeter network.C、The best option is to use port 50636 and 25 from the internal network to the perimeter network.D、The best option is to use port 50636 and 135 from the internal network to the perimeter network.

考题 Your network contains an internal network and a perimeter network.You have one Exchange Server 2010 server on the internal network. You install Windows Server 2008 R2 on a new server in the perimeter network.You need to ensure that you can install the Edge Transport server role on the new server. What should you do?()A、Join the new server to an Active Directory domain.B、Install Active? Directory Lightweight Directory Services on the new server.C、Run ImportEdgeConfig.ps1 on the existing Exchange Server 2010 server.D、Open TCP port 88 and TCP port 3268 on the firewall between the perimeter network and the internal network.

考题 Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest. The forest contains a single domain.  You plan to deploy 10 Edge Transport servers on the perimeter network.  You need to recommend a solution for the Edge Transport server deployment. The solution must meet the following requirements: .Allow administrators to apply a single security policy to all Edge Transport servers .Reduce the administrative overhead that is required to manage servers .Minimize the attack surface of the internal network  What should you recommend?()A、Implement Network Policy and Access Services (NPAS).B、Implement Active Directory Federation Services (AD FS).C、Create a new Active Directory domain in the internal forest, and then join all EdgeTransport servers to the new domain.D、Create an Active Directory forest in the perimeter network, and then join all Edge Transport servers to the new domain.

考题 单选题You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory forest with one domain. The internal network of TestKing.com contains a perimeter network. You have received instructions fromthe CIO to install 15 Edge Transport servers on the perimeter network with the following criteria: * The Edge Transport servers should have a security policy, applied by the administrators. * The minimization of the administrative overhead towards the servers. * The minimization the attack surface of the perimeter network. What should you do?()A The best option is to set up a new Active Directory domain in the internal forest and then join all EdgeTransport servers to the new domain.B The best option is to make use of Active Directory Federation Services (AD FS).C The best option is to make use of Network Policy and Access Services (NPAS).D The best option is to set up a new Active Directory domain in the perimeter network and then join all Edge Transport Servers to the new domain.

考题 单选题Your network contains an internal network and a perimeter network that are separated by a firewall. The perimeter network contains an Exchange Server 2010 Edge Transport server.  You plan to deploy an internal Exchange Server 2010 organization that meets the following requirements:.Support EdgeSync synchronization .Support encrypted delivery of outbound e-mail messages to the Edge Transport server .Minimize the attack surface of the internal network  Which TCP ports should you allow from the internal network to the perimeter network?()A 3389 and 25B 3389 and 636C 50636 and 25D 50636 and 135

考题 单选题You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. A firewall at Testking.com separates the internal network and a perimeter network. The perimeter networkcontains an Exchange Server 2010 Edge Transport server. You have received instructions from the CIO to install an internal Exchange Server 2010 with the followingcriteria: 1. The support of EdgeSync synchronizaiton and encrypted delivery of outbound e-mail messages to theEdge Transport server. 2. The minimization of the attack surface of the internal network. What should you do?()A The best option is to use port 3309 and 25 from the internal network to the perimeter network.B The best option is to use port 3309 and 636 from the internal network to the perimeter network.C The best option is to use port 50636 and 25 from the internal network to the perimeter network.D The best option is to use port 50636 and 135 from the internal network to the perimeter network.

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The company has an internal network and a perimeter network. The internal network is protected by a firewall. Application servers on the perimeter network are accessible from the Internet.   You are deploying 10 Windows Server 2003 computers in application server roles. The servers will be located in theperimeter network and will not be members of the domain. The servers will host only publicly available Web pages.  The network design requires that custom security settings must be applied to the application servers. These custom security settings must be automatically refreshed every day to ensure compliance with the design.   You create a custom security template named Baseline1.inf for the application servers. You need to comply with the design requirements.   What should you do?  ()A  Import Baseline1.inf into the Default Domain Policy Group Policy object (GPO).B  Create a task on each application server that runs Security and Configuration Analysis with Baseline1.inf every day.C  Create a task on each application server that runs the secedit command with Baseline1.inf every day.D  Create a startup script in the Default Domain Policy Group Policy object (GPO) that runs the secedit command with Baseline1.inf.

考题 单选题Your network consists of a single Active Directory domain named contoso.local. All servers run Windows Server 2003 Service Pack 2 (SP2). All internal computers are part of the domain. You deploy a stand-alone Web server in a perimeter network. Users on the Internet access the server by using the URL http://www.contoso.com.You need to ensure that internal users can connect to the Web server by using the URL http://ContosoWeb.  What should you add?()A a host record for ContosoWeb to the contoso.com DNS zoneB a host record for ContosoWeb to the contoso.local DNS zoneC contoso.com as a DNS suffix on the network adapter for each computerD contoso.com to the DNS search suffix list on the network adapter for each computer

考题 单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of an internal network and perimeter network.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently deployed a new server to the perimeter network which runs Microsoft Windows Server 2008 R2.During the course of the business week you receive instruction from Company.com to install the Microsoft Exchange Server Edge Transport server role on the server in the perimeter network. What should you do?()A You should consider having the ImportEdgeConfig.ps1 script run on the existing Exchange Server 2010 server.B You should consider having TCP port 88 and TCP port 3268 opened on the firewall between the perimeter network and the internal network.C You should consider having the new server joined to an Active Directory domain.D You should consider having the Active Directory Lightweight Directory Services installed on the new server in the perimeter network.

考题 单选题All servers and client computers in your company are configured to use WINS for name resolution. The internal network is separated from a perimeter network (also known as DMZ) by a third-party firewall. Firewall rules do not allow name resolution between the internal network and the perimeter network. You move a Windows Server 2003 server named Server1 to the perimeter network. You need to ensure that all computers on the internal network can connect to Server1 by name.  What should you do?()A  Create an LMHOSTS file on Server1.B  Create a static WINS entry for Server1.C  Configure Server1 to use Broadcast (B-node) mode.D  Configure Server1 to use Peer-to-Peer (P-node) mode.