Connect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Require company users to establish a VPN to access company resources
Install Internet Authentication Service (IAS) on a domain controller.Configure the wireless access points to require IEEE 802.1x authentication
Establish IPSec policies on all company servers to request encryption from all computers that connect from the wireless IP networks
Configure all wireless access points to require the Wired Equivalent Privacy (WEP) protocol for all connections. Use a Group Policy object (GPO) to distribute the WEP keys to all computers in the domain
第1题:
You need to design a method to standardize and deploy a baseline security configuration for servers. You solution must meet business requirements. What should you do?()
第2题:
Your company’s network includes client computers that run Windows 7. You design a wireless network to use Extensible Authentication Protocol-Transport Level Security (EAP-TLS). The Network Policy Server has a certificate installed. Client computers are unable to connect to the wireless access points. You need to enable client computers to connect to the wireless network. What should you do?()
第3题:
你们需要安保专家对场馆做安全评估吗?
A.Do you need a security expert to value the potential danger of the region?
B.Do you need a security expert to calculate the potential adventure of the area?
C.Do you need a security expert to account the potential risks of the region?
D.Do you need a security expert to evaluate the potential risks of the place?
第4题:
You need to recommend a Group Policy strategy for the Remote Desktop servers. What should you include in the recommendation?()
第5题:
You need to design an audit strategy for Southbridge Video. Your solution must meet business requirements.What should you do?()
第6题:
You need to design a security strategy for VPN2. Your solution must meet business requirements. What should you do?()
第7题:
You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains 50 application servers that run Windows Server 2003. The security configuration of the application servers is not uniform. The application servers were deployed by local administrators who configured the settings for each of the application servers differently based on their knowledge and skills. The application servers are configured with different authentication methods, audit settings, and account policy settings. The security team recently completed a new network security design. The design includes a baseline configuration for security settings on all servers. The baseline security settings use the Hisecws.inf predefined security template. The design also requires modified settings for servers in an application role. These settings include system service startup requirements, renaming the administrator account, and more stringent account lockout policies. The security team created a security template named Application.inf that contains the modified settings. You need to plan the deployment of the new security design. You need to ensure that all security settings for the application servers are standardized, and that after the deployment, the security settings on all application servers meet the design requirements. What should you do? ()
第8题:
Your computer uses both wired and wireless network connections. The networks are not connected to each other.You disallow incoming connections in Microsoft Windows Firewall. You create a shared folder. Users on the wireless network cannot access the shared folder. You need to allow access to the shared folder from the wireless network. You also need to maintain the security of the wired network.What should you do?()
A.A
B.B
C.C
D.D
第9题:
You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()
第10题:
You need to design a security strategy for the DHCP servers in the Seattle office. Which two actions should you perform?()