You are designing a security strategy for users who need rem

题目
单选题
You are designing a security strategy for users who need remote access to the corporate network.  What should you do?()
A

 Configure Internet Authentication Service (IAS) for accounting.

B

 Configure the server running Routing and Remote Access to support L2TP.

C

 Configure the server running Routing and Remote Access to restrict dial-in traffic to the NewApp servers only.

D

 Create a separate account for remote access users. Configure these accounts to access the NewApp server only.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You are designing a strategy to allow users to have remote access to internal resources. Which service or services should you allow on the public interface of the NAT Server?()

  • A、HTTP
  • B、LDAP
  • C、POP3
  • D、SMTP
  • E、VPN Gateway

正确答案:B

第2题:

You are the network administrator for The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. All confidential company files are stored on a file server named TestKing1. The written company security states that all confidential data must be stored and transmitted in a secure manner. To comply with the security policy, you enable Encrypting File System (EFS) on the confidential files. You also add EFS certificates to the data decryption field (DDF) of the confidential files for the users who need to access them. While performing network monitoring, you notice that the confidential files that are stored on TestKing1 are being transmitted over the network without encryption. You must ensure that encryption is always used when the confidential files on TestKing1 are stored and transmitted over the network. What are two possible ways to accomplish this goal? ()(Each correct answer presents a complete solution. Choose two)

  • A、Enable offline files for the confidential files that are stored on TestKing1, and select the Encrypt offline files to secure data check box on the client computers of the users who need to access the files.
  • B、Use IPSec encryption between TestKing1 and the client computers of the users who need to access the confidential files.
  • C、Use Server Message Block (SMB) signing between TestKing1 and the client computers of the users who need to access the confidential files.
  • D、Disable all LM and NTLM authentication methods on TestKing1.
  • E、Use IIS to publish the confidential files. Enable SSL on the IIS server. Open the files as a Web folder.

正确答案:B,E

第3题:

我是安保部经理, 将协助这次安保工作

A.I’m a manager of the enterprise, who will assist you in this security department

B.I’m a manager of the security department. , who will assist you in this security work

C.The security manager who will assist you in this security work, is on the way

D.The security work will be assisted by the manager of the security department


正确答案:B

第4题:

You have a server that runs the Terminal Services Gateway (TS Gateway) role service. Users need to connect remotely through the gateway to desktop computers located in their offices.  You create a security group named Remote1 for the users who need to connect to computers in their offices.  You need to enable the users to connect to the TS Gateway. What should you do?()

  • A、Add the Remote1 security group to the local remote desktop users group on the TS Gateway server.
  • B、Create a client authorization policy. Add the Remote1 security group and enable Device redirection.
  • C、Create a resource authorization policy. Add the Remote1 security group and enable Users to connect to any resource.
  • D、Create a Group Policy object and enable the Set TS Gateway authentication method properties to Ask for credentials, use Basic protocol. Apply the policy to the TS Gateway server.

正确答案:B

第5题:

You need to design an e-mail access strategy for remote users. What should you do? () 

  • A、 Instruct remote users to connect to their e-mail by using RPC
  • B、 Instruct remote users to connect to Outlook Web Access by using only HTTPS
  • C、 Instruct remote users to connect to the company network by using PPTP connections
  • D、 Instruct remote users to connectd to their e-mail by using RPC over HTTP Configure the HTTP servers to require encryption.

正确答案:D

第6题:

Active Directory Rights Management Services (AD RMS) is deployed on your network. Users who have Windows Mobile 6 devices report that they cannot access documents that are protected by  AD RMS.   You need to ensure that all users can access AD RMS protected content by using Windows  Mobile 6 devices.  What should you do()

  • A、Modify the security of the ServerCertification.asmx file.
  • B、Modify the security of the MobileDeviceCertification.asmx file.
  • C、Enable anonymous authentication for the _wmcs virtual directory.
  • D、Enable anonymous authentication for the certification virtual directory.

正确答案:B

第7题:

You need to recommend a Group Policy strategy for the Remote Desktop servers. What should you include in the recommendation?()

  • A、block inheritance
  • B、loopback processing
  • C、security filtering
  • D、WMI filtering

正确答案:B

第8题:

You are designing a strategy to upgrade the DHCP servers after the new Active Directory structure is in place.  Who can authorize the DHCP servers?()

  • A、 Chief information officer
  • B、 IT support staff in Boston
  • C、 IT support staff in New York
  • D、 Network administrator in Chicago
  • E、 Network administrator in New York

正确答案:A

第9题:

You are designing a strategy to meet the security and financial requirements related to the Manifest application.  What should you do? ()

  • A、 Configure a VPN server in Sydney.
  • B、 Configure a VPN server in each branch office.
  • C、 Configure a dial-up server in Sydney
  • D、 Configure a dial-up server in each branch office.

正确答案:A

第10题:

Your company has a single Active Directory Domain Services (AD DS) domain with Windows Server 2008 R2 member servers and 1,000 Windows 7 client computers. You are designing the deployment of a custom application.   You have the following requirements:   The application must be available to only users who need it. Minimize network traffic during deployment.   You need to design a deployment strategy that meets the requirements.   Which deployment method should you use?()

  • A、RemoteApp and Desktop Connections
  • B、software installation in Group Policy
  • C、Microsoft Application Virtualization (App-V)
  • D、Microsoft System Center Configuration Manager 2007

正确答案:A

更多相关问题