Your companys corpo

题目

Your companys corporate network uses Network Access Protection (NAP). Users are able to connect to the corporate network remotely. You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible.  What should you do()? 

  • A、Apply an IPsec NAP policy.
  • B、Configure a NAP Policy for 802.1x Wireless connections
  • C、Configure VPN connections to use MS-CHAP v2 authentication
  • D、Restrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Your company has an Active Directory forest. The company has servers that run Windows Server   2008 R2 and client computers that run Windows 7. The domain uses a set of GPO administrative  templates that have been approved to support regulatory compliance requirements.   Your partner company has an Active Directory forest that contains a single domain. The company has  servers that run Windows Server 2008 R2 and client computers that run Windows 7.   You need to configure your partner companys domain to use the approved set of administrative  templates.   What should you do()

  • A、Use the Group Policy Management Console (GPMC) utility to back up the GPO to a file. In each site,  import the GPO to the default domain policy.
  • B、Copy the ADMX files from your companys PDC emulator to the PolicyDefinitions folder on the partner  companys PDC emulator.
  • C、Copy the ADML files from your companys PDC emulator to the PolicyDefinitions folder on thepartner  companys PDC emulator.
  • D、Download the conf.adm, system.adm, wuau.adm, and inetres.adm files from the Microsoft Updates  Web site. Copy the ADM files to the PolicyDefinitions folder on the partner companys PDC emulator.

正确答案:B

第2题:

You have an Exchange Server 2010 organization.  You have a global security group named Legal that contains all the members of your companys legaldepartment.  The companys security policy states that the Legal group must be able to search all mailboxes for e-mailmessages that contain specific keywords.  You need to recommend a solution for the organization that complies with the security policy.  What should you include in the solution?()

  • A、a Discovery Management role group
  • B、a legal hold
  • C、administrator audit logging
  • D、Mailbox journaling

正确答案:A

第3题:

Your network contains a computer named Computer1. Computer1 is assigned an IP address of 39 / 84 192.168.1.112/26.Your companys corporate policy states that the first usable address in each subnet is allocated to the default gateway.You need to configure the default gateway for Computer1.Which address should you choose?()

  • A、192.168.1.1
  • B、192.168.1.63
  • C、192.168.1.65
  • D、192.168.1.93

正确答案:C

第4题:

单选题
The Company should ensure that the master is fully () with the Companys SMS.
A

familiar

B

understand

C

conversation

D

confused


正确答案: A
解析: 暂无解析

第5题:

You have an Exchange Server 2010 organization.  Your companys legal department sends compliance e-mail messages by adding recipients to the blindcarbon copy (Bcc) field.  The companys compliance policy includes the following requirements: .All e-mail messages sent to external recipients must be archived in a central repository .Compliance officers must be able to identify all the recipients of archived e-mail messages  You need recommend a solution to meet the compliance policy requirements.  What should you recommend?()

  • A、journal rules
  • B、message tracking
  • C、Personal Archives
  • D、transport rules

正确答案:A

第6题:

You have an Exchange Server 2010 organization.  Your company has a relationship with another company.  The partner company has an Exchange Server 2010 organization.  You need to recommend a security solution to meet the following requirements:  .Ensure that all e-mail delivery between your servers and the partner companys servers is encrypted .Ensure that all communication between your servers and the partner companys servers is authenticated What should you include in the solution?()

  • A、Active Directory Rights Management Services (AD RMS)
  • B、Domain Security
  • C、Forms-based Authentication
  • D、Secure/Multipurpose Internet Mail Extensions (S/MIME)

正确答案:B

第7题:

You have an Exchange Server 2010 organization.  Your companys security policy states that users must not be able to encrypt e-mail messages by usingOutlook Web App (OWA).  You need to recommend a client access solution that meets the requirements of the security policy.  What should you include in the solution?()

  • A、managed folder mailbox policies
  • B、multiple OWA virtual directories
  • C、OWA segmentation
  • D、WebReady Document Viewing

正确答案:C

第8题:

You have an Exchange Server 2010 organization. You design a deployment of multiple Mailbox servers.  Your companys Service Level Agreement (SLA) states that servers must support 1,000 concurrent connections to mailboxes while maintaining an RPC latency of less than 20 milliseconds.  You need to verify that your design meets the requirements of the SLA before you deploy servers in the production environment.  Which tool should you use?()

  • A、Exchange Server Jetstress 2010
  • B、Exchange Server User Monitor (ExMon)
  • C、Exchange Server Load Generator (LoadGen) 2010
  • D、Exchange Server Remote Connectivity Analyzer (ExRCA)

正确答案:C

第9题:

单选题
All servers on your companys network run Windows Server 2008 R2. All users have thin client computers. You need to recommend a virtualization solution that allows users to use applications that run only on Windows 7.  Which technology should you recommend?()
A

Windows Virtual PC

B

Microsoft Application Virtualization (App-V)

C

Microsoft Virtual Desktop Infrastructure (VDI)

D

Microsoft Enterprise Desktop Virtualization (MED-V)


正确答案: D
解析: 暂无解析

第10题:

单选题
You have an Exchange Server 2010 organization.  Your companys legal department sends compliance e-mail messages by adding recipients to the blindcarbon copy (Bcc) field.  The companys compliance policy includes the following requirements: .All e-mail messages sent to external recipients must be archived in a central repository .Compliance officers must be able to identify all the recipients of archived e-mail messages You need recommend a solution to meet the compliance policy requirements.  What should you recommend?()
A

journal rules

B

message tracking

C

Personal Archives

D

transport rules


正确答案: C
解析: 暂无解析

更多相关问题