You need to design a Security strategy for the wireless netw

题目
单选题
You need to design a Security strategy for the wireless network at all resort locations.What should you do?()
A

Connect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Require company users to establish a VPN to access company resources

B

Install Internet Authentication Service (IAS) on a domain controller.Configure the wireless access points to require IEEE 802.1x authentication

C

Establish IPSec policies on all company servers to request encryption from all computers that connect from the wireless IP networks

D

Configure all wireless access points to require the Wired Equivalent Privacy (WEP) protocol for all connections. Use a Group Policy object (GPO) to distribute the WEP keys to all computers in the domain

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You need to design a method to standardize and deploy a baseline security configuration for servers. You solution must meet business requirements. What should you do?()

  • A、Create a script that installs the Hisecdc.inf security template
  • B、Use a GPO to distribute and apply the Hisec.inf security template
  • C、Use the System Policy Editor to configure each server’s security settings
  • D、Use a GPO to distribute and apply a custom security template

正确答案:D

第2题:

Your company’s network includes client computers that run Windows 7. You design a wireless network to use Extensible Authentication Protocol-Transport Level Security (EAP-TLS).   The Network Policy Server has a certificate installed.   Client computers are unable to connect to the wireless access points.    You need to enable client computers to connect to the wireless network.   What should you do?()

  • A、Configure client computers to use Protected Extensible Authentication Protocol-Microsoft Challenge Handshake Authentication Protocol version 2 (PEAP-MS-CHAP v2).
  • B、Configure client computers to use Protected Extensible Authentication Protocol-Transport Layer Security (PEAP-TLS).
  • C、Install a certificate in the Trusted Root Certification Authorities certificate store.
  • D、Install a certificate in the Third-Party Root Certification Authorities certificate store.

正确答案:C

第3题:

你们需要安保专家对场馆做安全评估吗?

A.Do you need a security expert to value the potential danger of the region?

B.Do you need a security expert to calculate the potential adventure of the area?

C.Do you need a security expert to account the potential risks of the region?

D.Do you need a security expert to evaluate the potential risks of the place?


正确答案:D

第4题:

You need to recommend a Group Policy strategy for the Remote Desktop servers. What should you include in the recommendation?()

  • A、block inheritance
  • B、loopback processing
  • C、security filtering
  • D、WMI filtering

正确答案:B

第5题:

You need to design an audit strategy for Southbridge Video. Your solution must meet business requirements.What should you do?()

  • A、Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPO
  • B、Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPO
  • C、Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPO
  • D、Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPO

正确答案:D

第6题:

You need to design a security strategy for VPN2. Your solution must meet business requirements. What should you do?()

  • A、Create and configure a new security template. Import the template into the Default Domain Policy Group Policy object (GPO)
  • B、Install Internet Authentication Service (IAS) on RAS1. Configure VPN2 to be the RADIUS client of RAS1. Configure the remote access policy on VPN2
  • C、Create and configure a new security template. Import the template into the local policy on VPN2
  • D、Move VPN2 into the VPN Servers OU. Configure the remote access policy on VPN2

正确答案:D

第7题:

You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains 50 application servers that run Windows Server 2003.   The security configuration of the application servers is not uniform. The application servers were deployed by local administrators who configured the settings for each of the application servers differently based on their knowledge and skills. The application servers are configured with different authentication methods, audit settings, and account policy settings.   The security team recently completed a new network security design. The design includes a baseline configuration for security settings on all servers. The baseline security settings use the Hisecws.inf predefined security template. The design also requires modified settings for servers in an application role. These settings include system service startup requirements, renaming the administrator account, and more stringent account lockout policies. The security team created a security template named Application.inf that contains the modified settings.   You need to plan the deployment of the new security design. You need to ensure that all security settings for the application servers are standardized, and that after the deployment, the security settings on all application servers meet the design requirements.   What should you do? ()

  • A、 Apply the Setup security.inf template first, the Hisecws.inf template next, and then the Application.inf template.
  • B、 Apply the Application.inf template and then the Hisecws.inf template.
  • C、 Apply the Application.inf template first, the Setup security.inf template next, and then the Hisecws.inf template.
  • D、 Apply the Setup security.inf template and then the Application.inf template.

正确答案:A

第8题:

Your computer uses both wired and wireless network connections. The networks are not connected to each other.You disallow incoming connections in Microsoft Windows Firewall. You create a shared folder. Users on the wireless network cannot access the shared folder. You need to allow access to the shared folder from the wireless network. You also need to maintain the security of the wired network.What should you do?()

A.A

B.B

C.C

D.D


参考答案:D

第9题:

You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()

  • A、Require client computers to connect to the marketing application by using a VPN connection
  • B、Use IPSec to encrypt communications between the servers in the New York and Atlanta offices
  • C、Require the high security setting on Terminal Services connections to the marketing application
  • D、Configure all marketing application Web pages to require SSL

正确答案:D

第10题:

You need to design a security strategy for the DHCP servers in the Seattle office. Which two actions should you perform?()

  • A、Disable all unnecessary services on each DHCP server
  • B、Modify the discretionary access control lists (DACLs) in Active Directory so that only members of the Enterprise Admins security group can authorize additional DHCP servers
  • C、Use an IPSec policy that allows only the packets necessary for DHCP and domain membership for each DHCP server
  • D、Install a digital certificate for SSL on each DHCP server

正确答案:A,C

更多相关问题