网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

our company uses network access protection (NAP) to enforce policies on client computers that connect to the network. Client computes run windows vista. A group policy is used to configure client computers to obtain updates from WSUS. Company policy requires that updates labeled important and critical must be applied before client computers can access network resources. You need to ensure that client computers meet the company policy requirement. What should you do?()

  • A、Enable automatic updates on each client.
  • B、Enable the security center on each client.
  • C、Quarantine clients that do not have all available security updates installed.
  • D、Disconnect the remote connection until the required updates are installed.

参考答案

更多 “our company uses network access protection (NAP) to enforce policies on client computers that connect to the network. Client computes run windows vista. A group policy is used to configure client computers to obtain updates from WSUS. Company policy requires that updates labeled important and critical must be applied before client computers can access network resources. You need to ensure that client computers meet the company policy requirement. What should you do?()A、Enable automatic updates on each client.B、Enable the security center on each client.C、Quarantine clients that do not have all available security updates installed.D、Disconnect the remote connection until the required updates are installed.” 相关考题
考题 ● A (75) system placed between the company network and the outside world may limit outside access to the internal network.(75)A. firewallB. modemC. gatewayD. key

考题 our company uses network access protection (NAP) to enforce policies on client computers that connect to the network. Client computes run windows vista. A group policy is used to configure client computers to obtain updates from WSUS. Company policy requires that updates labeled important and critical must be applied before client computers can access network resources. You need to ensure that client computers meet the company policy requirement. What should you do?()A.Enable automatic updates on each client.B.Enable the security center on each client.C.Quarantine clients that do not have all available security updates installed.D.Disconnect the remote connection until the required updates are installed.

考题 A(75)system placed between the company network and the outside world may limit outside access to the internal network.A.firewallB.modemC.gatewayD.key

考题 A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A. WEP encryptionB. Channel rotationC. Disable SSIDD. WPA encryption

考题 A ______ system placed between the company network and the outside world may limit outside access to the internal network.A.firewallB.modemC.gatewayD.key

考题 A brand new network application is required for the Acme Company, and they are considering the use of a connectionless service. What are the characteristics of a connectionless service?()A、It uses a Reliable transport mechanism.B、It uses a Non-reliable transport mechanismC、It is less bandwidth-intensive than connection oriented servicesD、it uses handshaking

考题 our company has a single Active Directory domain.The company has a main office and three branch offices. The domain controller in the main office runs Windows Server 2008 and provides DNS for the main office and all of the branch offices. Each branch office contains a file server that runs Windows Server 2008.Users in the branch offices report that it takes a long time to access network resources. You confirm that there are no problems with WAN connectivity or bandwidth.You need to ensure that users in the branch offices are able to access network resources as quickly as possible.Which two actions should you perform? ()A、Configure a standard primary zone in each of the branch offices.B、Configure forwarders that point to the DNS server in the main office.C、Configure a secondary zone in each of the branch offices that uses the main office DNS server as a master.D、Install DNS servers in each of the branch offices.

考题 A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()A、The network uses MAC filteringB、The network uses WEPC、The network uses SSID broadcastD、The network uses WPA

考题 Your network consists of a single Active Directory domain. The network is located on the 172.16.0.0/23  subnet.   The company hires temporary employees. You provide user accounts and computers to the temporaryem ployees. The temporary employees receive computers that are outside the Active Directory domain.   The temporary employees use their computers to connect to the network by using wired connections andwireless connections. The company’s security policy specifies that the computers connected to the network must have the latest updates for the operating system.   You need to plan the network’s security so that it complies with the company 's security policy. What should you include in your plan?()A、Implement a Network Access Protection (NAP) strategy for the 172.16.0.0/23 subnet.B、Create an extranet domain within the same forest. Migrate the temporary employees user accounts to the extranet domain. Install the necessary domain resources on the 172.16.0.0/23 subnet.C、Move the temporary employees user accounts to a new organizational unit (OU). Create a new Group Policy object (GPO) that uses an intranet Microsoft Update server. Link the new GPO tothe new OU.D、Create a new subnet in a perimeter network. Relocate the wireless access point to the perimeter network. Require authentication through a VPN server before allowing access to the internal resources.

考题 Your company's corporate network uses Network Access Protection (NAP).Users are able to connect to the corporate network remotely.You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do?()A、Apply an IPsec NAP policy.B、Configure a NAP policy for 802.1X wireless connections.C、Configure VPN connections to use MS-CHAP v2 authentication.D、Restrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP.

考题 Your company uses network access protection (NAP) to enforce policies on client computers that connect to the network. Client computers run windows vista. A group Policy is used to configure client computers to obtain updates from WSUS. Company policy requires that updates labeled important and critical must be applied before client computers can access network resources. You need to ensure that client computes meet the company policy requirement. What should you do?()A、Enable automatic updates on each client.B、Enable the security center on each client.C、Quarantine clients that do not have all available security updates installed.D、Disconnect the remote connection until the required updates are installed.

考题 Network Access Protection (NAP) is configured for the corporate network.Users connect to the corporate network by using portable computers.The company policy requires confidentiality of data when the data is in transit between the portable computers and the servers.You need to ensure that users can access network resources only from computers that comply with the company policy.What should you do?()A、Create an IPsec Enforcement Network policy.B、Create an 802.1X Enforcement Network policy.C、Create a Wired Network (IEEE 802.3) Group policy.D、Create an Extensible Authentication Protocol (EAP) Enforcement Network policy.

考题 Your corporate network has a member server named RAS1 that runs windows server 2008. You configure RAS1 to use the routing and remote access service (RRAS). The companys remote access policy allows members of the domain users group to dial in to RAS1. The company issues smart cards to all employees. You need to ensure that smart card users are able to connect to RAS1 by using a dial-up connection. What should you do?()A、Install the network policy server (NPS) on the RAS1 server.B、Create a remote access policy that requires users to authenticate by using SPAP.C、Create a remote access policy that requires uses to authenticate by using EAP-TLS.D、Create a remote access policy that requires uses to authenticate by using MS-CHAPv2.

考题 Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  What should you do?()A、Configure all access points as RADIUS clients to the Remediation Servers.B、Configure all access points as RADIUS clients to the Network Policy Server (NPS).C、Create a Network Policy that defines Remote Access Server as a network connection method.D、Create a Network Policy that specifies EAP-TLS as the only available authentication method.

考题 Your company uses Network Access Protection (NAP) to enforce policies on client computers that connect to the network. Client computers run Windows 7. A Group Policy is used to configure client computers to obtain updates from Windows Server Update Services (WSUS).Company policy requires that updates labeled Important and Critical must be applied before client computers can access network resources.You need to ensure that client computers meet the company policy requirement. What should you do?()A、Enable automatic updates on each client.B、Enable the Security Center on each client.C、Quarantine clients that do not have all available security updates installed.D、Disconnect the connection until the required updates are installed.

考题 Your network contains a single Active Directory domain. All domain controllers run Windows Server   2008 R2. There are 1,000 client computers that run Windows 7 and that are connected to managedswitches.   You need to recommend a strategy for network access that meets the following requirements:   èUsers are unable to bypass network access restrictions.   èOnly client computers that have up-to-date service packs installed can access the network.   èOnly client computers that have up-to-date anti-malware software installed can access the network.   What should you recommend?()A、Implement Network Access Protection (NAP) that uses DHCP enforcement.B、Implement Network Access Protection (NAP) that uses 802.1x enforcement.C、Implement a Network Policy Server (NPS), and enable IPsec on the domain controllers.D、Implement a Network Policy Server (NPS), and enable Remote Authentication Dial-In User Service  (RADIUS) authentication on the managed switches.

考题 You are the network administrator for Company.You need to connect to Company’s network from your Windows 2000 Professional computer at home.You have a DSL line that is used for Internet connectivity. You create an L2TP virtual private network(VPN) connection and are able to connect successfully to Company’s network. While connected toCompany’s network, you are unable to access the Internet.You want to be able to access the Internet while connected to Company’s network.How should you configure the connection properties?()A、Configure the DSL connection to use PPTP instead of L2TP. B、Enable Internet Connection Sharing for the DSL connection properties. C、CLEAR THE Use default gateway on remote network check box. D、Clear the Require data encryption check box. 

考题 Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  what should you do()? A、Configure all access points as RADIUS clients to the Remediation ServersB、Configure all access points as RADIUS clients to the Network Policy Server (NPS)C、Create a Network Policy that defines Remote Access Server as a network connection methodD、Create a Network Policy that specifies EAP-TLS as the only availible authentication method.

考题 单选题A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A WEP encryptionB Channel rotationC Disable SSIDD WPA encryption

考题 单选题A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()A The network uses MAC filteringB The network uses WEPC The network uses SSID broadcastD The network uses WPA

考题 单选题A user is unable to access the company website on a laptop. A network technician verifies that theuser can access other Internet pages. According to network troubleshooting methodology, which of the following steps should be taken NEXT?()A Remotely connect to the user's laptop and review the network configuration settingsB Ping the web server from inside the network to ensure it is still up and running.C Check to make sure the company's website is accessible from the Internet.D Ensure the Ethernet cable is securely plugged into the user's laptop

考题 单选题Which of the following authentication protocols uses certificates to negotiate access to the network?()A PAPB CHAPC EAP-TLSD Kerberos

考题 单选题Network Access Protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The company policy required confidentiality of data when the data is in transmit between the portable computers and the servers. You need to ensure taht users can access network resources only from computers that comply with the company policy. What should you do? ()A  Create an IPsec Enforcement Network policyB  Create an 802.1X enforcement network policyC  Create a wired network (IEEE 802.3) Group PolicyD  Create an Extensible Authentication Portocol (EAP) Enforcement Network Policy

考题 单选题our company uses network access protection (NAP) to enforce policies on client computers that connect to the network. Client computes run windows vista. A group policy is used to configure client computers to obtain updates from WSUS. Company policy requires that updates labeled important and critical must be applied before client computers can access network resources. You need to ensure that client computers meet the company policy requirement. What should you do?()A Enable automatic updates on each client.B Enable the security center on each client.C Quarantine clients that do not have all available security updates installed.D Disconnect the remote connection until the required updates are installed.