IPsec enforcement
802.1X enforcement
Source IP enforcement
Odyssey Access Client
第1题:
A Customer has a functional server deployment solution that uses a combination of disk imaging and application pushing technology. They need to get a working Windows 2003 image for their new servers as soon as possible. What method can achieve this?()
第2题:
You are deploying an ASP.NET Web application to a remote server. You need to choose a deployment method that will ensure that all IIS settings, in addition to the Web content, will deploy to the remote server. Which deployment method should you choose?()
第3题:
A customer has installed UAC in their network. They have both Windows and Linux endpoints andmust choose a deployment method that everyone can use. Which deployment method allows for multiple platforms? ()
A. IPsec enforcement
B. 802.1X enforcement
C. Source IP enforcement
D. Odyssey Access Client
第4题:
A customer has installed UAC in their network. They have both Windows and Linux endpoints andmust choose a deployment method that everyone can use. Which deployment method allows for multiple platforms? ()
第5题:
A Customer has a proprietary server deployment solution that uses a combination of disk imaging and application pushing technology. They need to get a working Windows 2003 image for their new servers as soon as possible for deployment with their provisioning system. Which of the following methods can achieve this?()
第6题:
Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows Vista computers. You are planning to deploy Windows 7 and a custom application. You have the following requirements: The application must be available to only a specific group of users. You must be able to monitor application usage. You need to design a deployment method for the custom application that meets the requirements. Which deployment method should you use in your design?()
第7题:
You must configure access to the corporate network for employees using a client access method. Users require IPsec tunneling to protected resources and an 802.1X supplicant. Users will access the network using Windows platforms.Which two client access methods would support these requirements?()
第8题:
A customer asks the pSeries technical specialist to recommend which remote access (SSH or Telnet) method to use. What question should the customer be asked to best determine the proper recommendation?()
第9题:
Which two statements are true about using the isUserInRole method to implement security in a Java EEapplication?()
第10题:
All servers on your network run Windows Server 2008 R2. You are planning a deployment of a virtual desktop infrastructure (VDI). You need to estimate the number of servers required for the deployment. Which factor should you consider?()