网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()
A

Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access point

B

Configure IEEE 802.1x authentication with smart cards

C

Configure the wireless network to use Wired Equivalent Privacy (WEP)

D

Install and configure an Internet Authentication Service (IAS) server


参考答案

参考解析
解析: 暂无解析
更多 “单选题You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()A Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access pointB Configure IEEE 802.1x authentication with smart cardsC Configure the wireless network to use Wired Equivalent Privacy (WEP)D Install and configure an Internet Authentication Service (IAS) server” 相关考题
考题 Your computer uses both wired and wireless network connections. The networks are not connected to each other.You disallow incoming connections in Microsoft Windows Firewall. You create a shared folder. Users on the wireless network cannot access the shared folder. You need to allow access to the shared folder from the wireless network. You also need to maintain the security of the wired network.What should you do?()A.AB.BC.CD.D

考题 You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter.Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.You need to configure the wireless connection to allow your computer to discover other computers.What should you do?()A.AB.BC.CD.D

考题 You are designing the wireless networks for the three warehouses. Your design must support the inventory and shipping management solution, and it must meet security requirements. What should you do?()A、Ensure that all wireless networking equipment fully supports the IEE 802.11a, IEEE 802.11b, and IEEE 802.11g wireless networking protocolsB、Assign a random service set identifier (SSID) to each wireless access point. Disable broadcasting of SSIDs on all wireless access pointsC、Create a firewall to block traffic to any IP address that did not originate from the company’s DHCP servers. Ensure that all wireless access points connect behind this new firewallD、Configure a server to use Internet Authentication Service (IAS). Configure the wireless networking equipment to use the IEEE 802.1x protocol and the IAS server

考题 Your computer connects to both an ad hoc wireless network and a wired network. You need to allow other wireless clients to access the wired network.  What should you do? ()A、Set the security type to the No authentication (Open) option.B、Configure the wired and wireless network adapters as a network bridge.C、Modify the wireless network profile type to the Use all-user profiles only (recommended) option.D、On each wireless client, set the Service Set Identifier (SSID) for a new wireless network to the name of your wired network adapter.

考题 You need to design a security strategy for VPN2. Your solution must meet business requirements. What should you do?()A、Create and configure a new security template. Import the template into the Default Domain Policy Group Policy object (GPO)B、Install Internet Authentication Service (IAS) on RAS1. Configure VPN2 to be the RADIUS client of RAS1. Configure the remote access policy on VPN2C、Create and configure a new security template. Import the template into the local policy on VPN2D、Move VPN2 into the VPN Servers OU. Configure the remote access policy on VPN2

考题 Your company’s network includes client computers that run Windows 7. You design a wireless network to use Extensible Authentication Protocol-Transport Level Security (EAP-TLS).   The Network Policy Server has a certificate installed.   Client computers are unable to connect to the wireless access points.    You need to enable client computers to connect to the wireless network.   What should you do?()A、Configure client computers to use Protected Extensible Authentication Protocol-Microsoft Challenge Handshake Authentication Protocol version 2 (PEAP-MS-CHAP v2).B、Configure client computers to use Protected Extensible Authentication Protocol-Transport Layer Security (PEAP-TLS).C、Install a certificate in the Trusted Root Certification Authorities certificate store.D、Install a certificate in the Third-Party Root Certification Authorities certificate store.

考题 You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()A、Require client computers to connect to the marketing application by using a VPN connectionB、Use IPSec to encrypt communications between the servers in the New York and Atlanta officesC、Require the high security setting on Terminal Services connections to the marketing applicationD、Configure all marketing application Web pages to require SSL

考题 You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()A、Configure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addressesB、Configure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points useC、Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networksD、Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks

考题 You need to design a remote access strategy for the customer support users when they work from home. Your solution must meet security requirements. What should you do?()A、Deploy an L2TP/IPsec VPN server in each call center. Configure the portable computers as L2TP VPN clientsB、Create IPSec tunnel mode connections between the customer support users home and the company’s Internet-facing routersC、Create IP packet filters on the company’s Internet-facing routers to allow the Remote Desktop Protocol (RDP).Create IPSec filters on the terminal servers to allow only connections that use RDPD、Create IP packet filters on the company’s Internet-facing routers to allow the IPSec protocols. Assign the Secure Server (Require Security) IPSec policy to the terminal servers. Assign the Client (Respond only) IPSec policy to the portable computers

考题 You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()A、Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access pointB、Configure IEEE 802.1x authentication with smart cardsC、Configure the wireless network to use Wired Equivalent Privacy (WEP)D、Install and configure an Internet Authentication Service (IAS) server

考题 You need to design a Security strategy for the wireless network at all resort locations.What should you do?()A、Connect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Require company users to establish a VPN to access company resourcesB、Install Internet Authentication Service (IAS) on a domain controller.Configure the wireless access points to require IEEE 802.1x authenticationC、Establish IPSec policies on all company servers to request encryption from all computers that connect from the wireless IP networksD、Configure all wireless access points to require the Wired Equivalent Privacy (WEP) protocol for all connections. Use a Group Policy object (GPO) to distribute the WEP keys to all computers in the domain

考题 You are designing an authentication strategy for the accounting department. Your solution must meet business requirements. What should you do?()A、Install wireless network cards on all accounting department computers. Select PEAP authenticationB、Install user certificates on all accounting department computers. Configure these computers to respond to requests for IPSec encryptionC、Issue smart cards and smart card readers to all accounting department users and computers. Require NTLMv2 authenticationD、Issue smart cards and smart card readers to all accounting department users and computers. Configure the domain to require smart cards for the accounting department users during logon

考题 You need to design a method to ensure that research intellectual property remains confidential. You solution must meet security requirements. What should you do?()A、Require client computers to connect to research intellectual property through a SSL VPNB、Place SFSQL1 and ATLSQL1 on a separate virtual LAN from the internal network. Grant access to these virtual LAN segments to only the client computers that are used by authorized usersC、Require that communications between SFSQL1, SFFP1, ATLSQL1, and ATLFP1 use IPSecD、Create a separate subnet for all servers that contain research intellectual property

考题 You need to design a remote administration solution for servers on the internal network. Your solution must meet business and security requirements. What should you do?()A、Permit administrators to use an HTTP interface to manage servers remotelyB、Permit only administrators to connect to the servers’ Telnet serviceC、Permit administrators to manage the servers by using Microsoft NetMeetingD、Require administrators to use Remote Desktop for Administration connections to manage the servers

考题 You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter. Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.  You need to configure the wireless connection to allow your computer to discover other computers.  What should you do?()A、Configure the network category of your wireless network connection to Private.B、Configure the network category of your wireless network connection to Public.C、Configure the TCP/IP packet filtering on the wireless network connection.D、Configure the wireless network connection with the appropriate authentication to the router.

考题 You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()A、Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computersB、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersC、Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersD、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers

考题 You need to design an authentication strategy for users of portable computers. Your solution must meet business requirements. What should you do?()A、Issue smart cards and smart card readers to all portable computer users. Configure the domain to require smart cards for login and to log off users who remote their smart cardsB、Configure the portable computers to connect to only wireless networks that use Wired Equivalent Privacy (WEP). Install digital certificates on all portable computersC、Install computer certificates on all portable computers. Configure all portable computers to respond to requests for IPSec encryptionD、Install biometric authentication devices on all portable computers. Configure the Default Domain Policy GPO to require complex passwords for all users

考题 单选题You need to design a remote administration solution for servers on the internal network. Your solution must meet business and security requirements. What should you do?()A Permit administrators to use an HTTP interface to manage servers remotelyB Permit only administrators to connect to the servers’ Telnet serviceC Permit administrators to manage the servers by using Microsoft NetMeetingD Require administrators to use Remote Desktop for Administration connections to manage the servers

考题 单选题You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()A Configure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addressesB Configure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points useC Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networksD Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks

考题 单选题Your computer connects to both an ad hoc wireless network and a wired network. You need to allow other wireless clients to access the wired network.  What should you do? ()A Set the security type to the No authentication (Open) option.B Configure the wired and wireless network adapters as a network bridge.C Modify the wireless network profile type to the Use all-user profiles only (recommended) option.D On each wireless client, set the Service Set Identifier (SSID) for a new wireless network to the name of your wired network adapter.

考题 单选题You are designing an authentication strategy for the accounting department. Your solution must meet business requirements. What should you do?()A Install wireless network cards on all accounting department computers. Select PEAP authenticationB Install user certificates on all accounting department computers. Configure these computers to respond to requests for IPSec encryptionC Issue smart cards and smart card readers to all accounting department users and computers. Require NTLMv2 authenticationD Issue smart cards and smart card readers to all accounting department users and computers. Configure the domain to require smart cards for the accounting department users during logon

考题 单选题You need to design an authentication strategy for users of portable computers. Your solution must meet business requirements. What should you do?()A Issue smart cards and smart card readers to all portable computer users. Configure the domain to require smart cards for login and to log off users who remote their smart cardsB Configure the portable computers to connect to only wireless networks that use Wired Equivalent Privacy (WEP). Install digital certificates on all portable computersC Install computer certificates on all portable computers. Configure all portable computers to respond to requests for IPSec encryptionD Install biometric authentication devices on all portable computers. Configure the Default Domain Policy GPO to require complex passwords for all users

考题 单选题You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter. Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.  You need to configure the wireless connection to allow your computer to discover other computers.  What should you do?()A Configure the network category of your wireless network connection to Private.B Configure the network category of your wireless network connection to Public.C Configure the TCP/IP packet filtering on the wireless network connection.D Configure the wireless network connection with the appropriate authentication to the router.

考题 单选题You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()A Require client computers to connect to the marketing application by using a VPN connectionB Use IPSec to encrypt communications between the servers in the New York and Atlanta officesC Require the high security setting on Terminal Services connections to the marketing applicationD Configure all marketing application Web pages to require SSL

考题 单选题Your company’s network includes client computers that run Windows 7. You design a wireless network to use Extensible Authentication Protocol-Transport Level Security (EAP-TLS).   The Network Policy Server has a certificate installed.   Client computers are unable to connect to the wireless access points.    You need to enable client computers to connect to the wireless network.   What should you do?()A Configure client computers to use Protected Extensible Authentication Protocol-Microsoft Challenge Handshake Authentication Protocol version 2 (PEAP-MS-CHAP v2).B Configure client computers to use Protected Extensible Authentication Protocol-Transport Layer Security (PEAP-TLS).C Install a certificate in the Trusted Root Certification Authorities certificate store.D Install a certificate in the Third-Party Root Certification Authorities certificate store.

考题 单选题You are designing the wireless networks for the three warehouses. Your design must support the inventory and shipping management solution, and it must meet security requirements. What should you do?()A Ensure that all wireless networking equipment fully supports the IEE 802.11a, IEEE 802.11b, and IEEE 802.11g wireless networking protocolsB Assign a random service set identifier (SSID) to each wireless access point. Disable broadcasting of SSIDs on all wireless access pointsC Create a firewall to block traffic to any IP address that did not originate from the company’s DHCP servers. Ensure that all wireless access points connect behind this new firewallD Configure a server to use Internet Authentication Service (IAS). Configure the wireless networking equipment to use the IEEE 802.1x protocol and the IAS server

考题 单选题You need to design a remote access strategy for the customer support users when they work from home. Your solution must meet security requirements. What should you do?()A Deploy an L2TP/IPsec VPN server in each call center. Configure the portable computers as L2TP VPN clientsB Create IPSec tunnel mode connections between the customer support users home and the company’s Internet-facing routersC Create IP packet filters on the company’s Internet-facing routers to allow the Remote Desktop Protocol (RDP).Create IPSec filters on the terminal servers to allow only connections that use RDPD Create IP packet filters on the company’s Internet-facing routers to allow the IPSec protocols. Assign the Secure Server (Require Security) IPSec policy to the terminal servers. Assign the Client (Respond only) IPSec policy to the portable computers