网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Using an LDAP authentication server, what do you configure to validate certificate attributes?()
A

Use the is exactly or contains operators.

B

Create a user filter matching the dn of the certificate.

C

Verify that the certificate is issued by a publicly trusted cs.

D

Match the certificate type and value with an attribute from the ldap server.


参考答案

参考解析
解析: 暂无解析
更多 “单选题Using an LDAP authentication server, what do you configure to validate certificate attributes?()A Use the is exactly or contains operators.B Create a user filter matching thedn of the certificate.C Verify that the certificate is issued by a publicly trusted cs.D Match the certificate type and value with an attribute from theldap server.” 相关考题
考题 you have 10 standalone servers that run windows server 2008. You install WSUS on a server named server1. You need to configure all of the servers to receive updates from server1. What should you do?() A.Configure the windows update settings on each server by using control panel.B.Run the wuauclt.exe /detectnow command on each server.C.Run the wuauclt.exe /reauthorization command on each server.D.Configure the windows update settings on each server by using local group policy.

考题 When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?() A. Configure IP helper to forward the authentication requests from the clients to the external RADIUS serverB. Configure the supplicant as anexternal authentication serverC. Configure RADIUS proxy on the realmD. Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service

考题 You are configuring an LDAP authentication server, and you want to configure role-mapping rules based on group membership. When you attempt to search for groups in the server catalog, no groups appear.Assuming the LDAP server is reachable and functioning properly, in the admin GUI. Which two parts of the configuration should you verify are correct?()A. Finding user entriesB. Authentication requiredC. LDAP Server TypeD. Determining group membership

考题 you have 10 standalone servers that run windows server 2008. You install WSUS on a server named server1. You need to configure all of the servers to receive updates from server1. What should you do?()A、Configure the windows update settings on each server by using control panel.B、Run the wuauclt.exe /detectnow command on each server.C、Run the wuauclt.exe /reauthorization command on each server.D、Configure the windows update settings on each server by using local group policy.

考题 You install WSUS on a server that runs Windows Server 2008. You need to ensure that the traffic between the WSUS administrative web site and the server administrators computer is encrypted  What should you do()?  A、Configure SSL encryption on the WSUS server websiteB、Run the netdom trust /SecurePasswordPrompt command on the WSUS serverC、Configure the NTFS permissions on the content directory to Deny Full control permission to the Everyone groupD、Configure the WSUS server to require integrated Windows authentication (IWA) hen users connect to the WSUS server.

考题 You design a Business Intelligence (BI) solution by using SQL Server 2008.  The solution includes a SQL Server 2008 Reporting Services (SSRS) infrastructure in a scale-out deployment. All reports use a SQL Server 2008 relational database as the data source. You implement row-level security. You need to ensure that all reports display only the expected data based on the user who is viewing the report. What should you do?()A、 Store the credential of a user in the data source.B、 Configure the infrastructure to support Kerberos authentication.C、 Configure the infrastructure to support anonymous authentication by using a custom authentication extension.D、 Ensure that all report queries add a filter that uses the User.UserID value as a hidden parameter.

考题 You have 10 standalone servers that run Windows Server 2008 R2.You install the Windows Server Update Services (WSUS) server role on a server named Server1.You need to configure all of the servers to receive updates from Server1.What should you do?()A、Configure the Windows Update settings on each server by using the Control Panel.B、Run the wuauclt.exe /detectnow command on each server.C、Run the wuauclt.exe /reauthorization command on each server.D、Configure the Windows Update settings on each server by using a local group policy.

考题 You work as a network administrator at, You have been asked to configure 802.1x port-based authentication. You notice that the client workstation is not compatible with 802.1x port-based authentication.  What supported authentication server should be chosen?()A、TACACS with LEAP extensionsB、RADIUS with EAP extensionsC、TACACS+D、LDAP

考题 When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()A、Configure IP helper to forward the authentication requests from the clients to the external RADIUS serverB、Configure the supplicant as anexternal authentication serverC、Configure RADIUS proxy on the realmD、Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service

考题 You are configuring an LDAP authentication server, and you want to configure role-mapping rules based on group membership. When you attempt to search for groups in the server catalog, no groups appear.Assuming the LDAP server is reachable and functioning properly, in the admin GUI. Which two parts of the configuration should you verify are correct?()A、Finding user entriesB、Authentication requiredC、LDAP Server TypeD、Determining group membership

考题 You manage a server named Server2 that runs Windows Server 2008. You install and test the Terminal Services role on Server2. You publish an application by using Terminal Services. All users must connect to the Terminal Services application by using the Remote Desktop Protocol.  You install and configure the Terminal Services Gateway (TS Gateway) role service on Server2. You configure a default domain policy to enable the Enable Connection through TS Gateway setting. Users report that they cannot connect to the Terminal Services application.  You need to ensure that users can access the Terminal Services application on the intranet and from the Internet.  What should you do?()A、Configure the Enable Connection through TS Gateway Group Policy setting to Disabled.B、Configure the Set TS Gateway server address Group Policy and configure the IP address of the TSGateway server. Link the GPO to the domain.C、Configure Server Authentication on the Remote Desktop Connection client to Always connect, even if server authentication fails for all users.D、Enable the Set TS Gateway server authentication method Group Policy to the Ask for credential, use NTLM protocol setting. Link the GPO to the domain.

考题 You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()A、Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access pointB、Configure IEEE 802.1x authentication with smart cardsC、Configure the wireless network to use Wired Equivalent Privacy (WEP)D、Install and configure an Internet Authentication Service (IAS) server

考题 You manage a server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. The Web developer at your company creates a new Web site that runs an ASP.NET 3.0 Web application.  The ASP.NET Web application must run under a security context that is separate from any other ASP.NET application on the Web server.  You create a local user account and grant account rights and permissions to run the ASP.NET Web application.  You need to configure authentication for the new Web site to support the Web application. What should you do?()A、Configure the Windows Authentication setting to Enabled.B、Configure the Forms Authentication setting to Enabled by using all the default settings.C、Configure the ASP.NET State service to log on to the new local user account by using the Services console.D、Configure the ASP.NET Impersonation setting to Enabled. Edit the ASP.NET Impersonation setting by specifying the new local user account.

考题 Your company has an Active Directory Domain Serv ices (AD DS) domain. All client computers run Windows 7. You have a Remote Desktop Session Host (RD Session Host) server. You need to ensure that computer identities are validated before user authentication is performed. What should you do?()A、Configure the Set RD Gateway authentication method Group Policy setting to Use smart card.B、Configure the Set RD Gateway authentication method Group Policy setting to Use locally logged - on credentials.C、Enable the Configure server authentication for client Group Poli cy setting and then select Do not connect if authentication fails.D、Enable the Configure server authentication for client Group Policy setting and then select Always connect, even if authentication fails.

考题 Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  What should you do?()A、Configure all access points as RADIUS clients to the Remediation Servers.B、Configure all access points as RADIUS clients to the Network Policy Server (NPS).C、Create a Network Policy that defines Remote Access Server as a network connection method.D、Create a Network Policy that specifies EAP-TLS as the only available authentication method.

考题 You have a server that runs Windows Server 2003 Service Pack 2 (SP2). The server has one hard disk that contains one volume. You need to receive a notification when the volume has less than 15 percent free disk space. What should you do? ()A、Configure a Trace Log by using the File details system provider.B、Configure a Trace Log by using the Disk input/output system provider.C、Configure an Alert by using a counter from the Logical Disk performance object.D、Configure an Alert by using a counter from the Physical Disk performance object.

考题 You have 10 stand alone servers taht run Windows Server 2008. You install WSUS on a server named Server1. You need to configure all of the servers to receive updates from Server1  What should you do()?  A、configure the windows Update Settings on each server by using control panelB、Run the wuauclt.exe /detectnow command on each serverC、Run the wuauclt.exe /reauthorization command on each serverD、Configure the Windows Update settings on each server by using local group policy.

考题 You have a server that runs Windows Server 2003 Service Pack 2 (SP2). Routing and Remote Access is enabled and the server is configured as a remote access server.  You need to configure the server to support only the MS-CHAP v2 authentication protocol for remote access authentication. What should you do from the Routing and Remote Access snap-in?()A、Configure the port properties.B、Create and configure a new demand-dial interface.C、From the server’s properties, modify the security options.D、From the Connections to Microsoft Routing and Remote Access Server policy, add a new condition.

考题 Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  what should you do()? A、Configure all access points as RADIUS clients to the Remediation ServersB、Configure all access points as RADIUS clients to the Network Policy Server (NPS)C、Create a Network Policy that defines Remote Access Server as a network connection methodD、Create a Network Policy that specifies EAP-TLS as the only availible authentication method.

考题 You have 10 standalone servers that run Windows Server 2008.You install Windows Server Update Services (WSUS) on a server named Server1. You need to configure all of the servers to receive updates from Server1. What should you do? ()A、Configure the Windows Update settings on each server by using the Control Panel.B、Run the wuauclt.exe /detectnow command on each server.C、Run the wuauclt.exe /reauthorization command on each server.D、Configure the Windows Update settings on each server by using a local group policy.

考题 You administer a SQL Server 2008 Reporting Services (SSRS) instance. You plan to design an authentication method for SSRS reports that use SQL Server data connections. You need to ensure that all SSRS reports communicate to the SQL Server instance by using the Kerberos authentication protocol. What should you do?()A、Configure the default Web site on the instance to use the Integrated Security type.B、Configure the application pool used by the default Web site to use a domain account. C、Configure the default Web site on the instance to use the Secure Sockets Layer (SSL) protocol.D、Register a service principal name (SPN) in the Active Directory directory service for the SSRSinstance.

考题 单选题You design a Business Intelligence (BI) solution by using SQL Server 2008.  The solution includes a SQL Server 2008 Reporting Services (SSRS) infrastructure in a scale-out deployment. All reports use a SQL Server 2008 relational database as the data source. You implement row-level security. You need to ensure that all reports display only the expected data based on the user who is viewing the report. What should you do?()A  Store the credential of a user in the data source.B  Configure the infrastructure to support Kerberos authentication.C  Configure the infrastructure to support anonymous authentication by using a custom authentication extension.D  Ensure that all report queries add a filter that uses the User.UserID value as a hidden parameter.

考题 单选题You manage a server named Server2 that runs Windows Server 2008. You install and test the Terminal Services role on Server2. You publish an application by using Terminal Services. All users must connect to the Terminal Services application by using the Remote Desktop Protocol.  You install and configure the Terminal Services Gateway (TS Gateway) role service on Server2. You configure a default domain policy to enable the Enable Connection through TS Gateway setting. Users report that they cannot connect to the Terminal Services application.  You need to ensure that users can access the Terminal Services application on the intranet and from the Internet.  What should you do?()A Configure the Enable Connection through TS Gateway Group Policy setting to Disabled.B Configure the Set TS Gateway server address Group Policy and configure the IP address of the TSGateway server. Link the GPO to the domain.C Configure Server Authentication on the Remote Desktop Connection client to Always connect, even if server authentication fails for all users.D Enable the Set TS Gateway server authentication method Group Policy to the Ask for credential, use NTLM protocol setting. Link the GPO to the domain.

考题 单选题You have an Exchange Server 2010 organization.You need to prevent users in the organization from changing passwords by using Outlook Web App.The solution must not prevent users from changing passwords by using Windows. What should you do? ()A From the properties of the user accounts, configure the settings on the Account tab.B From the properties of the mailboxes, configure the settings on the Mailbox Features tab.C From the properties of the OWA virtual directory, configure the settings on the Segmentation tab.D From the properties of the OWA virtual directory, configure the settings on the Authentication tab.

考题 单选题You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()A Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access pointB Configure IEEE 802.1x authentication with smart cardsC Configure the wireless network to use Wired Equivalent Privacy (WEP)D Install and configure an Internet Authentication Service (IAS) server

考题 多选题You are configuring an LDAP authentication server, and you want to configure role-mapping rules based on group membership. When you attempt to search for groups in the server catalog, no groups appear.Assuming the LDAP server is reachable and functioning properly, in the admin GUI. Which two parts of the configuration should you verify are correct?()AFinding user entriesBAuthentication requiredCLDAP Server TypeDDetermining group membership

考题 单选题You install WSUS on a server that runs Windows Server 2008. You need to ensure taht the traffic between the WSUS administrative website and the server administrators computer is encrypted. What should you do? ()A  Configure SSL encryption on the WSUS server website.B  Run the netdom trust /SecurePasswordPrompt command on the WSUS serverC  Configure the NTFS permissions on the content directory to Deny Full Controll permission to the Everyone groupD  Configure the WSUS server to require Integrated Windows Authentication (IWA) when users connect to the WSUS server.