Your network contains an internal network and a perimeter ne

题目
单选题
Your network contains an internal network and a perimeter network. The internal network contains a single Active Directory site.  The perimeter network contains two Exchange Server 2010 Edge Transport servers. You plan to deploy an Exchange Server 2010 organization on the internal network.  You need to plan the deployment of Hub Transport server roles to meet the following requirements: .If a single Hub Transport server fails, e-mail messages from the Internet must be delivered to the Mailboxservers. .If a single Hub Transport server fails, users must be able to send e-mail messages to other users thathave mailboxes on the same Mailbox server.  What should you include in the plan?()
A

Deploy one Edge Transport server on the internal network, and then configure EdgeSync   synchronization.

B

Deploy one Hub Transport server on the internal network, and then configure EdgeSync   synchronization.

C

Deploy one Hub Transport server on the internal network and one Hub Transport server on the   perimeter network.

D

Deploy two Hub Transport servers on the internal network.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest. The forest contains a single domain.  You plan to deploy 10 Edge Transport servers on the perimeter network.  You need to recommend a solution for the Edge Transport server deployment. The solution must meet the following requirements: .Allow administrators to apply a single security policy to all Edge Transport servers .Reduce the administrative overhead that is required to manage servers .Minimize the attack surface of the internal network What should you recommend?()

  • A、Implement Network Policy and Access Services (NPAS).
  • B、Implement Active Directory Federation Services (AD FS).
  • C、Create a new Active Directory domain in the internal forest, and then join all Edge Transport servers to the new domain.
  • D、Create an Active Directory forest in the perimeter network, and then join all Edge Transport servers to the new domain.

正确答案:D

第2题:

You are the network administrator for The network consists of an internal network and a perimeter network. The internal network is protected by a firewall. The perimeter network is exposed to the Internet. You are deploying 10 Windows Server 2003 computers as Web servers. The servers will be located in the perimeter network. The servers will host only publicly available Web pages. You want to reduce the possibility that users can gain unauthorized access to the servers. You are concerned that a user will probe the Web servers and find ports or services to attack. What should you do?()

  • A、Disable File and Printer Sharing on the servers.
  • B、Disable the IIS Admin service on the servers.
  • C、Enable Server Message Block (SMB) signing on the servers.
  • D、Assign the Secure Server (Require Security) IPSec policy to the servers.

正确答案:A

第3题:

Your company has two data centers.  Each data center contains a perimeter network.  Your network contains an Exchange Server 2010 organization.  You plan to deploy Exchange Server 2010 Edge Transport servers in the perimeter networks.  You need to recommend a solution for the Edge Transport servers that meets the following requirements:.Distribute inbound e-mail messages across all Edge Transport servers  .Ensure that users receive inbound e-mail messages if an Edge Transport server fails  .Ensure that users receive inbound e-mail messages if a single data center network becomes unavailable .Minimize costs  What should you recommend?()

  • A、In each perimeter network, deploy one Edge Transport server. Implement failover clustering.
  • B、In each perimeter network, deploy two Edge Transport servers. Implement failover clustering.
  • C、In each perimeter network, deploy one Edge Transport server. Configure a mail exchange (MX) record for each server.
  • D、In each perimeter network, deploy two Edge Transport servers. Configure a mail exchange (MX) record for each server.

正确答案:C

第4题:

You are a network administrator for Alpine Ski House. The internal network has an Active Directory-integrated zone for the alpineskihouse.org domain. Computers on the internal network use the Active Directory-integrated DNS service for all host name resolution.   The Alpine Ski House Web site and DNS server are hosted at a local ISP. The public Web site for Alpine Ski House is accessed at www.alpineskihouse.com. The DNS server at the ISP hosts the alpineskihouse.com domain.   To improve support for the Web site, your company wants to move the Web site and DNS service from the ISP to the company’s perimeter network. The DNS server on the perimeter network must contain only the host (A) resource records for computers on the perimeter network.   You install a Windows Server 2003 computer on the perimeter network to host the DNS service for the alpineskihouse.com domain. You need to ensure that the computers on the internal network can properly resolve host names for all internal resources, all perimeter resources, and all Internet resources.   Which two actions should you take? ()

  • A、 On the DNS server that is on the perimeter network, install a primary zone for alpineskihouse.com.
  • B、 On the DNS server that is on the perimeter network, install a stub zone for alpineskihouse.com.
  • C、 Configure the DNS server that is on the internal network to conditionally forward lookup requests to the DNS server that is on the perimeter network.
  • D、 Configure the computers on the internal network to use one of the internal DNS servers as the preferred DNS server. Configure the the TCP/IP settings on the computers on the internal network to use the DNS server on the perimeter network as an alternate DNS server.
  • E、 On the DNS server that is on the perimeter network, configure a root zone.

正确答案:A,C

第5题:

All servers and client computers in your company are configured to use WINS for name resolution. The internal network is separated from a perimeter network (also known as DMZ) by a third-party firewall. Firewall rules do not allow name resolution between the internal network and the perimeter network. You move a Windows Server 2003 server named Server1 to the perimeter network. You need to ensure that all computers on the internal network can connect to Server1 by name.  What should you do?()

  • A、 Create an LMHOSTS file on Server1.
  • B、 Create a static WINS entry for Server1.
  • C、 Configure Server1 to use Broadcast (B-node) mode.
  • D、 Configure Server1 to use Peer-to-Peer (P-node) mode.

正确答案:B

第6题:

Your network is configured as shown in the following diagram.You deploy an enterprise certification authority (CA) on the internal network. You also deploy a Microsoft   Online Responder on the internal network.   You need to recommend a secure method for Internet users to verify the validity of individual certificates.   The solution must minimize network bandwidth. What should you recommend?()

  • A、Deploy a subordinate CA on the perimeter network.
  • B、Install a stand-alone CA and the Network Device Enrollment Service (NDES) on a server on the perimeter network.
  • C、Install a Network Policy Server (NPS) on a server on the perimeter network. Redirect authentication  requests to a server on the internal network.
  • D、Install Microsoft Internet Information Services (IIS) on a server on the perimeter network. Configure IIS  to redirect requests to the Online Responder on the internal network.

正确答案:D

第7题:

You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster.   The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template.   You need to implement protective measures against the cluster’s most significant security vulnerability.   What should you do?  ()

  • A、 Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.
  • B、 Use packet filtering on all inbound traffic to the cluster.
  • C、 Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.
  • D、 Use intrusion detection on the perimeter network.

正确答案:B

第8题:

Your network contains an internal network and a perimeter network that are separated by a firewall. The perimeter network contains an Exchange Server 2010 Edge Transport server.  You plan to deploy an internal Exchange Server 2010 organization that meets the following requirements:.Support EdgeSync synchronization .Support encrypted delivery of outbound e-mail messages to the Edge Transport server .Minimize the attack surface of the internal network  Which TCP ports should you allow from the internal network to the perimeter network?()

  • A、3389 and 25
  • B、3389 and 636
  • C、50636 and 25
  • D、50636 and 135

正确答案:C

第9题:

Your network contains an internal network and a perimeter network. The internal network contains a single Active Directory site.  The perimeter network contains two Exchange Server 2010 Edge Transport servers. You plan to deploy an Exchange Server 2010 organization on the internal network.  You need to plan the deployment of Hub Transport server roles to meet the following requirements:.If a single Hub Transport server fails, e-mail messages from the Internet must be delivered to the Mailboxservers. .If a single Hub Transport server fails, users must be able to send e-mail messages to other users thathave mailboxes on the same Mailbox server.  What should you include in the plan?()

  • A、Deploy one Edge Transport server on the internal network, and then configure EdgeSync  synchronization.
  • B、Deploy one Hub Transport server on the internal network, and then configure EdgeSync  synchronization.
  • C、Deploy one Hub Transport server on the internal network and one Hub Transport server on the   perimeter network.
  • D、Deploy two Hub Transport servers on the internal network.

正确答案:D

第10题:

You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. A firewall at Testking.com separates the internal network and a perimeter network. The perimeter networkcontains an Exchange Server 2010 Edge Transport server. You have received instructions from the CIO to install an internal Exchange Server 2010 with the followingcriteria: 1. The support of EdgeSync synchronizaiton and encrypted delivery of outbound e-mail messages to theEdge Transport server. 2. The minimization of the attack surface of the internal network. What should you do?()

  • A、The best option is to use port 3309 and 25 from the internal network to the perimeter network.
  • B、The best option is to use port 3309 and 636 from the internal network to the perimeter network.
  • C、The best option is to use port 50636 and 25 from the internal network to the perimeter network.
  • D、The best option is to use port 50636 and 135 from the internal network to the perimeter network.

正确答案:C

更多相关问题