网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP. What should you do?()
A
Configure all access points as RADIUS clients to the Remediation Servers.
B
Configure all access points as RADIUS clients to the Network Policy Server (NPS).
C
Create a Network Policy that defines Remote Access Server as a network connection method.
D
Create a Network Policy that specifies EAP-TLS as the only available authentication method.
参考答案
参考解析
解析:
暂无解析
更多 “单选题Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP. What should you do?()A Configure all access points as RADIUS clients to the Remediation Servers.B Configure all access points as RADIUS clients to the Network Policy Server (NPS).C Create a Network Policy that defines Remote Access Server as a network connection method.D Create a Network Policy that specifies EAP-TLS as the only available authentication method.” 相关考题
考题
Network Access Protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The company policy required confidentiality of data when the data is in transmit between the portable computers and the servers. You need to ensure taht users can access network resources only from computers that comply with the company policy. What should you do? ()A、 Create an IPsec Enforcement Network policyB、 Create an 802.1X enforcement network policyC、 Create a wired network (IEEE 802.3) Group PolicyD、 Create an Extensible Authentication Portocol (EAP) Enforcement Network Policy
考题
Your company has Active Directory Certificate Services (AD CS) and Network Access Protection (NAP) deployed on the network. You need to ensure that NAP policies are enforced on portable computers taht use a wireless connection to access the network. What should you do?()A、 Configure all access points to use 802.1X authenticationB、 Configure all protable computers to use MS-CHAP v2 authenticationC、 Use the Group Policy Management Console to access the wireless group policy settings, and enable the Prevent connections to ad-hoc networks option.D、 Use the Group Policy Management Console to access the wireless group policy settings, and disable the Prevent connections to infrastructure networks option.
考题
Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point.You need to ensure that all client computers that access the network are evaluated by NAP. What should you do?()A、Configure all access points as RADIUS clients to the Remediation Servers.B、Configure all access points as RADIUS clients to the Network Policy Server (NPS).C、Create a Network Policy that defines Remote Access Server as a network connection method.D、Create a Network Policy that specifies EAP-TLS as the only available authentication method.
考题
Your company's corporate network uses Network Access Protection (NAP).Users are able to connect to the corporate network remotely.You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do?()A、Apply an IPsec NAP policy.B、Configure a NAP policy for 802.1X wireless connections.C、Configure VPN connections to use MS-CHAP v2 authentication.D、Restrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP.
考题
Your company has active directory certificate services (AD CS) and network access protection (NAP) deployed on the network. You need to configure the wireless network to accept smart cards. What should you do?()A、Configure the wireless network to use WPA2, PEAP and MSCHAP v2.B、Configure the wireless network to use WPA2, 802.1X authentication and EAP-TLS.C、Configure the wireless network to use WEP, 802.1X authentication, PEAP, and MSCHAP v2.D、Configure the wireless network to use WEP,PEAP, and MSCHAP v2 and also require strong user passwords.
考题
Network Access Protection (NAP) is configured for the corporate network.Users connect to the corporate network by using portable computers.The company policy requires confidentiality of data when the data is in transit between the portable computers and the servers.You need to ensure that users can access network resources only from computers that comply with the company policy.What should you do?()A、Create an IPsec Enforcement Network policy.B、Create an 802.1X Enforcement Network policy.C、Create a Wired Network (IEEE 802.3) Group policy.D、Create an Extensible Authentication Protocol (EAP) Enforcement Network policy.
考题
You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()A、Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access pointB、Configure IEEE 802.1x authentication with smart cardsC、Configure the wireless network to use Wired Equivalent Privacy (WEP)D、Install and configure an Internet Authentication Service (IAS) server
考题
Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP. What should you do?()A、Configure all access points as RADIUS clients to the Remediation Servers.B、Configure all access points as RADIUS clients to the Network Policy Server (NPS).C、Create a Network Policy that defines Remote Access Server as a network connection method.D、Create a Network Policy that specifies EAP-TLS as the only available authentication method.
考题
You need to design a Security strategy for the wireless network at all resort locations.What should you do?()A、Connect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Require company users to establish a VPN to access company resourcesB、Install Internet Authentication Service (IAS) on a domain controller.Configure the wireless access points to require IEEE 802.1x authenticationC、Establish IPSec policies on all company servers to request encryption from all computers that connect from the wireless IP networksD、Configure all wireless access points to require the Wired Equivalent Privacy (WEP) protocol for all connections. Use a Group Policy object (GPO) to distribute the WEP keys to all computers in the domain
考题
Your companys corporate network uses network access protection (NAP). Users are able to connect to the corporate network remotely. You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do?()A、Apply an IPsec NAP policy.B、Configure a NAP Policy for 802.1x Wireless connections.C、Configure VPN connections to use MS-CHAP v2 authentication.D、Restrict dynamic host configuration protocol (DHCP) clients by using NAP.
考题
Your company has Active Directory Certificate Services (AD CS) and Network Access Protection (NAP) deployed on the network.You need to ensure that NAP policies are enforced on portable computers that use a wireless connection to access the network. What should you do?()A、Configure all access points to use 802.1X authentication.B、Configure all portable computers to use MS-CHAP v2 authentication.C、Use the Group Policy Management Console to access the wireless Group Policy settings, and enable the Prevent connections to ad-hoc networks option.D、Use the Group Policy Management Console to access the wireless Group Policy settings, and disable the Prevent connections to infrastructure networks option.
考题
Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP. what should you do()? A、Configure all access points as RADIUS clients to the Remediation ServersB、Configure all access points as RADIUS clients to the Network Policy Server (NPS)C、Create a Network Policy that defines Remote Access Server as a network connection methodD、Create a Network Policy that specifies EAP-TLS as the only availible authentication method.
考题
Your companys corporate network uses Network Access Protection (NAP). Users are able to connect to the corporate network remotely. You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do()? A、Apply an IPsec NAP policy.B、Configure a NAP Policy for 802.1x Wireless connectionsC、Configure VPN connections to use MS-CHAP v2 authenticationD、Restrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP
考题
Your company has active directory certificate services (AD CS) and network access protection (NAP) deployed on the network. You need to ensure that NAP policies are enforced on portable computers that use a wireless connection to access the network. What should you do?()A、Configure all access points to use 802.1x authentication.B、Configure all protable computers to use MS-CHAP v2 authentication.C、Use the group policy management console to access the wireless group policy settings, and enable the prevent connections to ad-hoc network option.D、Use the group policy management console to access the wireless group policy settings, and disable the prevent connections to infrastructure networks option.
考题
单选题Your company has Active Directory Certificate Services (AD CS) and Network Access Protection (NAP) deployed on the network. You need to ensure that NAP policies are enforced on portable computers taht use a wireless connection to access the network. What should you do?()A
Configure all access points to use 802.1X authenticationB
Configure all protable computers to use MS-CHAP v2 authenticationC
Use the Group Policy Management Console to access the wireless group policy settings, and enable the Prevent connections to ad-hoc networks option.D
Use the Group Policy Management Console to access the wireless group policy settings, and disable the Prevent connections to infrastructure networks option.
考题
单选题Your company’s corporate network uses Network Access Protection (NAP). Users are able to connect to the corporate network remotely.You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do? ()A
Apply an IPsec NAP policy.B
Configure a NAP policy for 802.1X wireless connections.C
Configure VPN connections to use MS-CHAP v2 authentication.D
Restrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP
考题
单选题Your companys corporate network uses Network Access Protection (NAP). Users are able to connect to the corporate network remotely. You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do()?A
Apply an IPsec NAP policy.B
Configure a NAP Policy for 802.1x Wireless connectionsC
Configure VPN connections to use MS-CHAP v2 authenticationD
Restrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP
考题
单选题Network Access Protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The company policy required confidentiality of data when the data is in transmit between the portable computers and the servers. You need to ensure taht users can access network resources only from computers that comply with the company policy. What should you do? ()A
Create an IPsec Enforcement Network policyB
Create an 802.1X enforcement network policyC
Create a wired network (IEEE 802.3) Group PolicyD
Create an Extensible Authentication Portocol (EAP) Enforcement Network Policy
考题
单选题Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP. what should you do()?A
Configure all access points as RADIUS clients to the Remediation ServersB
Configure all access points as RADIUS clients to the Network Policy Server (NPS)C
Create a Network Policy that defines Remote Access Server as a network connection methodD
Create a Network Policy that specifies EAP-TLS as the only availible authentication method.
考题
单选题Your company has Active Directory Certificate Services (AD CS) and Network Access Protection (NAP) deployed on the network.You need to ensure that NAP policies are enforced on portable computers that use a wireless connection to access the network. What should you do?()A
Configure all access points to use 802.1X authentication.B
Configure all portable computers to use MS-CHAP v2 authentication.C
Use the Group Policy Management Console to access the wireless Group Policy settings, and enable the Prevent connections to ad-hoc networks option.D
Use the Group Policy Management Console to access the wireless Group Policy settings, and disable the Prevent connections to infrastructure networks option.
考题
单选题You need to design a Security strategy for the wireless network at all resort locations.What should you do?()A
Connect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Require company users to establish a VPN to access company resourcesB
Install Internet Authentication Service (IAS) on a domain controller.Configure the wireless access points to require IEEE 802.1x authenticationC
Establish IPSec policies on all company servers to request encryption from all computers that connect from the wireless IP networksD
Configure all wireless access points to require the Wired Equivalent Privacy (WEP) protocol for all connections. Use a Group Policy object (GPO) to distribute the WEP keys to all computers in the domain
考题
单选题Your company has active directory certificate services (AD CS) and network access protection (NAP) deployed on the network. You need to ensure that NAP policies are enforced on portable computers that use a wireless connection to access the network. What should you do?()A
Configure all access points to use 802.1x authentication.B
Configure all protable computers to use MS-CHAP v2 authentication.C
Use the group policy management console to access the wireless group policy settings, and enable the prevent connections to ad-hoc network option.D
Use the group policy management console to access the wireless group policy settings, and disable the prevent connections to infrastructure networks option.
考题
单选题Your company has active directory certificate services (AD CS) and network access protection (NAP) deployed on the network. You need to configure the wireless network to accept smart cards. What should you do?()A
Configure the wireless network to use WPA2, PEAP and MSCHAP v2.B
Configure the wireless network to use WPA2, 802.1X authentication and EAP-TLS.C
Configure the wireless network to use WEP, 802.1X authentication, PEAP, and MSCHAP v2.D
Configure the wireless network to use WEP,PEAP, and MSCHAP v2 and also require strong user passwords.
考题
单选题Your companys corporate network uses network access protection (NAP). Users are able to connect to the corporate network remotely. You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do?()A
Apply an IPsec NAP policy.B
Configure a NAP Policy for 802.1x Wireless connections.C
Configure VPN connections to use MS-CHAP v2 authentication.D
Restrict dynamic host configuration protocol (DHCP) clients by using NAP.
考题
单选题Your company uses network access protection (NAP) to enforce policies on client computers that connect to the network. Client computers run windows vista. A group Policy is used to configure client computers to obtain updates from WSUS. Company policy requires that updates labeled important and critical must be applied before client computers can access network resources. You need to ensure that client computes meet the company policy requirement. What should you do?()A
Enable automatic updates on each client.B
Enable the security center on each client.C
Quarantine clients that do not have all available security updates installed.D
Disconnect the remote connection until the required updates are installed.
考题
单选题Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point.You need to ensure that all client computers that access the network are evaluated by NAP.What should you do?()A
Configure all access points as RADIUS clients to the Remediation Servers.B
Configure all access points as RADIUS clients to the Network Policy Server (NPS).C
Create a Network Policy that defines Remote Access Server as a network connection method.D
Create a Network Policy that specifies EAP-TLS as the only available authentication method.
考题
单选题Network Access Protection (NAP) is configured for the corporate network.Users connect to the corporate network by using portable computers.The company policy requires confidentiality of data when the data is in transit between the portable computers and the servers.You need to ensure that users can access network resources only from computers that comply with the company policy.What should you do?()A
Create an IPsec Enforcement Network policy.B
Create an 802.1X Enforcement Network policy.C
Create a Wired Network (IEEE 802.3) Group policy.D
Create an Extensible Authentication Protocol (EAP) Enforcement Network policy.
热门标签
最新试卷