单选题Using an LDAP authentication server, what do you configure to validate certificate attributes?()A Use the is exactly or contains operators.B Create a user filter matching thedn of the certificate.C Verify that the certificate is issued by a publicly tr

题目
单选题
Using an LDAP authentication server, what do you configure to validate certificate attributes?()
A

Use the is exactly or contains operators.

B

Create a user filter matching the dn of the certificate.

C

Verify that the certificate is issued by a publicly trusted cs.

D

Match the certificate type and value with an attribute from the ldap server.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Using an LDAP authentication server, what do you configure to validate certificate attributes?()

  • A、Use the "is exactly" or "contains" operators.
  • B、Create a user filter matching the dn of the certificate.
  • C、Verify that the certificate is issued by a publicly trusted cs.
  • D、Match the certificate type and value with an attribute from the ldap server.

正确答案:D

第2题:

You are the network administrator for Contoso Pharmaceuticals. The network consists of a single Active Directory forest. The forest contains Windows Server 2003 servers and Windows XP Professional computers.   The forest consists of a forest root domain named contoso.com and two child domains named child1.contoso.com and child2.contoso.com. The child1.contoso.com domain contains a member server named Server1. You configure Server1 to be an enterprise certification authority (CA), and you configure a user certificate template. You enable the Publish certificate in Active Directory setting in the certificate template. You instruct users in both the child1.contoso.com and the child2.contoso.com domains to enroll for user certificates.   You discover that the certificates for user accounts in the child1.contoso.com domain are being published to Active Directory, but the certificates for user accounts in the child2.contoso.com domain are not.   You want certificates issued by Server1 to child2.contoso.com domain user accounts to be published in Active Directory.   What should you do? ()

  • A、 Configure user certificate autoenrollment for all domain user accounts in the contoso.com domain.
  • B、 Configure user certificate autoenrollment for all domain user accounts in the child2.contoso.com domain.
  • C、 Add Server1 to the Cert Publishers group in the contoso.com domain.
  • D、 Add Server1 to the Cert Publishers group in the child2.contoso.com domain.

正确答案:D

第3题:

Your network contains an Active Directory forest. The functional level of the forest is Windows Server 2008 R2.You plan to deploy DirectAccess.You need to configure the DNS servers on your network to support DirectAccess.What should you do?()

A. Modify the GlobalQueryBlockList registry key and restart the DNS Server service.

B. Modify the EnableGlobalNamesSupport registry key and restart the DNS Server service.

C. Create a trust anchor that uses a certificate issued by an internal certification authority (CA).

D. Create a trust anchor that uses a certificate issued by a publicly trusted certification authority (CA).


参考答案:A

第4题:

Your network contains a Network Policy and Access Services server named Server1. All certificates in theorganization are issued by an enterprise certification authority (CA) named Server2. You have a standalonecomputer named Computer1 that runs Windows 7. Computer1 has a VPN connection that connects toServer1 by using SSTP. You attempt to establish the VPN connection to Server1 and receive the followingerror message: A certificate chain processed, but terminated in a root certificate which is not trusted by thetrust provider. You need to ensure that you can successfully establish the VPN connection to Server1.  What should you do on Computer1?()

  • A、Import the root certificate to the user s Trusted Publishers store.
  • B、Import the root certificate to the computer s Trusted Root Certification Authorities store.
  • C、Import the server certificate of Server1 to the user s Trusted Root Certification Authorities store.
  • D、Import the server certificate of Server1 to the computer s Trusted Root Certification Authorities store.

正确答案:B

第5题:

Which additional configuration must be completed when setting up role restrictions using certificates? ()

  • A、Set up a certificate authentication server.
  • B、Configure the authentication realm to remember certificate information.
  • C、Configure the authentication realm to use a certificate server for authentication.
  • D、Configure a role mapping rule requiring certification information to map user to role.

正确答案:B

第6题:

You design a Business Intelligence (BI) solution by using SQL Server 2008.  The solution includes a SQL Server 2008 Reporting Services (SSRS) infrastructure in a scale-out deployment. All reports use a SQL Server 2008 relational database as the data source. You implement row-level security. You need to ensure that all reports display only the expected data based on the user who is viewing the report. What should you do?()

  • A、 Store the credential of a user in the data source.
  • B、 Configure the infrastructure to support Kerberos authentication.
  • C、 Configure the infrastructure to support anonymous authentication by using a custom authentication extension.
  • D、 Ensure that all report queries add a filter that uses the User.UserID value as a hidden parameter.

正确答案:B

第7题:

You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed.The network contains an internal root certification authority (CA).Users on the network use Outlook Anywhere.A Client Access server uses a wildcard certificate issued by a trusted third-party root CA.You need to ensure that users can send and receive encrypted e-mail messages by using S/MIME. What should you do?()

  • A、Instruct all users to import the third-party root CA certificate.
  • B、Import the internal root CA certificate to the Client Access server.
  • C、Instruct all users to import the internal root CA certificate.
  • D、Issue a certificate to each user from the internal root CA

正确答案:D

第8题:

Which additional configuration must be completed when setting up role restrictions using certificates? ()

A. Set up a certificate authentication server.

B. Configure the authentication realm to remember certificate information.

C. Configure the authentication realm to use a certificate server for authentication.

D. Configure a role mapping rule requiring certification information to map user to role.


参考答案:B

第9题:

Your company’s network includes client computers that run Windows 7. You design a wireless network to use Extensible Authentication Protocol-Transport Level Security (EAP-TLS).   The Network Policy Server has a certificate installed.   Client computers are unable to connect to the wireless access points.    You need to enable client computers to connect to the wireless network.   What should you do?()

  • A、Configure client computers to use Protected Extensible Authentication Protocol-Microsoft Challenge Handshake Authentication Protocol version 2 (PEAP-MS-CHAP v2).
  • B、Configure client computers to use Protected Extensible Authentication Protocol-Transport Layer Security (PEAP-TLS).
  • C、Install a certificate in the Trusted Root Certification Authorities certificate store.
  • D、Install a certificate in the Third-Party Root Certification Authorities certificate store.

正确答案:C

第10题:

Your network contains a stand-alone certification authority (CA) and a Web server. The Web server hosts a secure Web site. The Web site uses a server certificate that was issued from the CA. Users report that they receive a certificate warning message when they connect to the Web site. You need to prevent users from receiving the certificate warning message when they connect to the Web site. What should you do from the Internet Options in Internet Explorer?() 

  • A、Import the CA certificate to the trusted root CA certificate store. 
  • B、Import the server authentication certificate to the trusted publishers certificate store.
  • C、Clear the Check for publisher's certificate revocation check box. 
  • D、Clear the Require server verification (https:) for all sites in this zone check box for the Trusted sites zone.

正确答案:A

更多相关问题