You need to design a strategy for remote client computer acc

题目
单选题
You need to design a strategy for remote client computer access that meets all business and technical requirements. What should you do?()
A

Configure the HTTP virtual server on the Exchange front-end server to require a secure connection. Instruct the sales personnel to use Microsoft Outlook Web Access to connect to the Exchange front-end server

B

Configure the back-end Exchange servers to use static ports for RPC connections. Open the required ports on the firewall. Install Microsoft Outlook 2003 on the portable computers and configure it to connect to the Exchange back-end server using a MAPI connection

C

Configure the Exchange front-end server to require secure connections from IMAP4 client computers. Install Microsoft Outlook 2003 on the portable computers and configure it to use a secure IMAP4 connection

D

Configure the Exchange servers to support RPC over HTTPS. Install Microsoft outlook 2003 on the portable computers and configure it to use RPC over HTTPS

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You need to connect to your computer by using the Remote Desktop Connection client.Which two actions should you perform?()

A.A

B.B

C.C

D.D

E.E


参考答案:A, C

第2题:

You need to design desktop and security settings for the client computers in the Seattle call center. Your solution must be implemented by using the minimum amount of administrative effort.Which two actions should you perform?()

  • A、On each client computer in the call center, configure a local policy that lists only authorized programs in the Allowed Windows Programs list
  • B、Using NTFS permissions, assign the Deny – Read permission for all unauthorized executable files to the client computer domain accounts
  • C、Design a Group Policy object (GPO) that enforces a software restriction policy on all client computers in the call center
  • D、Design a Group Policy object (GPO) that implements an IPSec policy on all client computers in the call center. Ensure that the IPSec policy rejects connections to any Web servers that the company does not operate

正确答案:C,D

第3题:

You have a desktop computer and a portable computer. Both the computers are configured to allow remote desktop connections. You connect to the desktop computer from the portable computer. You need to save files from within the remote session to the C: drive of the portable computer.What should you do?()

A.A

B.B

C.C

D.D


参考答案:C

第4题:

Your company is main office and a branch office are connected by a slow WAN link. All servers are located in the main office run Windows Server 2008 R2. All client computers run Windows 7. You install an application on a Remote Desktop Session Host (RD Session Host) server. Users in the branch office experience slow performance when accessing the application through Remote Desktop. You need to minimize the bandwidth utilization to the RD Session Host server. What should you do?()

  • A、Configure BranchCache in Hosted Cache mode.
  • B、On the RD Session Host server, configure the RDP-TCP properties to allow only Network Level Authentication.
  • C、On each client computer, configure the Connect Experience settings in the Remote Desktop Connection client.
  • D、On each client computer, configure the Connect From Anywhere settings in the Remote Desktop Connection client.

正确答案:C

第5题:

You need to connect to your computer by using the Remote Desktop Connection client.  Which two actions should you perform?()

  • A、Enable Remote Desktop in the System Properties dialog box.
  • B、Enable Remote Assistance in the System Properties dialog box.
  • C、Enable the Remote Desktop exception in Microsoft Windows Firewall.
  • D、Enable the Remote Assistance exception in Microsoft Windows Firewall.
  • E、Enable the Remote Administration exception in Windows Firewall.

正确答案:A,C

第6题:

You have two computers named Computer1 and Computer2 that run Windows 7. Both computers aremembers of an Active Directory domain. Windows Remote Management (WinRM) is enabled on bothcomputers. You need to remotely create additional disk volumes on Computer1 from Computer2. What should you do?()

  • A、On Computer2, run Winrs and then run Diskpart.
  • B、On Computer2, run Winrs and then run Diskmgmt.msc.
  • C、On Computer1, install the Telnet Client and then run Diskpart from Computer2.
  • D、On Computer1, install the Telnet Client and then use Disk Management from Computer2.

正确答案:A

第7题:

You need to design a remote access solution for the mobile sales users in the litwareinc.com domain. Which two actions should you perform?()

  • A、Configure autoenrollment for user certificates and computer certificates
  • B、Configure Web enrollment for user certificates and computer certificates
  • C、Configure a Certificate Services hierarchy in the litwareinc.com domain
  • D、Configure qualified subordination between the litwareinc.com and the contoso.com domains
  • E、Configure PEAP authentication on the remote access servers

正确答案:A,C

第8题:

You have two desktop computers at your home. You establish a remote desktop connection from one computer to the other.The remote session fails to show the desktop background of the remote computer. You need to view the desktop background when you establish a remote session.What should you do?()

A.A

B.B

C.C

D.D


参考答案:D

第9题:

You are designing a remote administration solution that meets business requirements. You need to specify client or server software that will be required. What should you do?()

  • A、Ensure that all client computers have a graphical Telnet client installed
  • B、Ensure that all client computers have the Remote Desktop Connection client software installed
  • C、Ensure that all server computers have RCONSOLE installed and that it is configured to start automatically
  • D、Ensure that all server computers have Remote Administration (HTML) installed

正确答案:B

第10题:

You need to design an e-mail access strategy for remote users. What should you do? () 

  • A、 Instruct remote users to connect to their e-mail by using RPC
  • B、 Instruct remote users to connect to Outlook Web Access by using only HTTPS
  • C、 Instruct remote users to connect to the company network by using PPTP connections
  • D、 Instruct remote users to connectd to their e-mail by using RPC over HTTP Configure the HTTP servers to require encryption.

正确答案:D

更多相关问题