考题
You need to design a security strategy for VPN2. Your solution must meet business requirements. What should you do?()A、Create and configure a new security template. Import the template into the Default Domain Policy Group Policy object (GPO)B、Install Internet Authentication Service (IAS) on RAS1. Configure VPN2 to be the RADIUS client of RAS1. Configure the remote access policy on VPN2C、Create and configure a new security template. Import the template into the local policy on VPN2D、Move VPN2 into the VPN Servers OU. Configure the remote access policy on VPN2
考题
You need to design a remote access solution for the mobile sales users in the litwareinc.com domain. Which two actions should you perform?()A、Configure autoenrollment for user certificates and computer certificatesB、Configure Web enrollment for user certificates and computer certificatesC、Configure a Certificate Services hierarchy in the litwareinc.com domainD、Configure qualified subordination between the litwareinc.com and the contoso.com domainsE、Configure PEAP authentication on the remote access servers
考题
You need to design an e-mail access strategy for remote users. What should you do? () A、 Instruct remote users to connect to their e-mail by using RPCB、 Instruct remote users to connect to Outlook Web Access by using only HTTPSC、 Instruct remote users to connect to the company network by using PPTP connectionsD、 Instruct remote users to connectd to their e-mail by using RPC over HTTP Configure the HTTP servers to require encryption.
考题
You have a server that runs Windows Server 2003 Service Pack 2 (SP2). Routing and Remote Access is enabled and the server is configured as a remote access server. You need to configure the server to support only the MS-CHAP v2 authentication protocol for remote access authentication. What should you do from the Routing and Remote Access snap-in?()A、Configure the port properties.B、Create and configure a new demand-dial interface.C、From the server’s properties, modify the security options.D、From the Connections to Microsoft Routing and Remote Access Server policy, add a new condition.
考题
You are designing a remote access strategy to meet the business and technical Requirement. What should you do?()A、 Configure each server running Routing and Remote Access as a RADIUS Client.B、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.C、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.D、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.
考题
You are designing a remote access strategy to meet the business technical requirements. Which authentication mechanism should you use?()A、MS-CHAP v2.B、Internet Authentication service (IAS).C、Multilink Bandwidth Allocation Protocol (BAP).D、Remote access policies on all servers running Routing Remote Access.
考题
Your company runs Remote Desktop Services. You have a Remote Desktop Web Access (RD Web Access) server. You publish several applications on the internal networ k by using RD Web Access. You need to ensure that the published applications are accessible from the Internet via an HTTPS connection over port 443. What should you do first?()A、Use Internet Information Services (IIS) Manager to disable Forms Authentication .B、Use Internet Information Services (IIS) Manager to enable Windows Authentication.C、Install and configure the Remote Desktop Gateway (RD Gateway) role service on the RD Web Access server.D、Install and configure the Remote Desktop Connection Broker (RD Connection Broker) role service on the RD Web Access server.
考题
You are designing a security strategy for users who need remote access to the corporate network. What should you do?()A、Configure Internet Authentication Service (IAS) for accounting.B、Configure the server running Routing and Remote Access to support L2TP.C、Configure the server running Routing and Remote Access to restrict dial-in traffic to the NewApp servers only.D、Create a separate account for remote access users. Configure these accounts to access the NewApp server only.
考题
You need to recommend a strategy to ensure that the administration of AD LDS is encrypted. What should you include in the recommendation?()A、a server authentication certificateB、client authentication certificatesC、Digest authenticationD、Windows Integrated authentication
考题
You are designing a Windows 7 virtual desktop infrastructure.You have the following requirements: Provide access to Remote Desktop Services RemoteApp sources from multiple remote desktop servers. Support network load balancing. Support reconnection to existing sessions on virtual desktops. You need to specify a design that meets the requirements. What should you include in your design?()A、Remote Desktop GatewayB、Remote Desktop Connection BrokerC、Windows Deployment ServicesD、Windows Virtual PC and Windows XP Mode
考题
You need to recommend an IP addressing strategy for the client computers in the new sales office. What should you recommend implementing in the new sales office?()A、DHCP server rolesB、the DirectAccess featureC、the Network Policy Server (NPS) role serviceD、the Remote Access Service role service
考题
单选题You are designing a security strategy for users who need remote access to the corporate network. What should you do?()A
Configure Internet Authentication Service (IAS) for accounting.B
Configure the server running Routing and Remote Access to support L2TP.C
Configure the server running Routing and Remote Access to restrict dial-in traffic to the NewApp servers only.D
Create a separate account for remote access users. Configure these accounts to access the NewApp server only.
考题
单选题You need to design a security strategy for a remote e-mail access. What should you do?()A
Require remote users to access e-mails by using Outlook Mobile AccessB
Require Outlook Web Access users to install the secure MIME ActiveX-Control and to encrypt all messagesC
On Outlook Web Access servers that accept connections from the Internet configure IIS to require SSL for all connectionsD
On Outlook Web Access servers that accept connections from the Internet configure IIS to require Integrated Windows Authentication
考题
单选题You need to design an access control strategy for the Payment folder for the Sales Managers group. What should you do?()A
Use IPSec in transport modeB
Use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV)C
Use PEAP-EAP-TLSD
Use Encrypting File System (EFS) remote encryption
考题
单选题You are designing a remote access strategy to meet the business technical requirements. Which authentication mechanism should you use?()A
MS-CHAP v2.B
Internet Authentication service (IAS).C
Multilink Bandwidth Allocation Protocol (BAP).D
Remote access policies on all servers running Routing Remote Access.
考题
单选题ou have a server that runs Windows Server 2003 Service Pack 2 (SP2). Routing and Remote Access is enabled and the server is configured as a remote access server.You need to configure the server to support only the MS-CHAP v2 authentication protocol for remote access authentication.What should you do from the Routing and Remote Access snap-in?()A
Configure the port properties. B
Create and configure a new demand-dial interface. C
From the server’s properties, modify the security options. D
From the Connections to Microsoft Routing and Remote Access Server policy, add a new condition.
考题
单选题You need to design an authentication solution for Terminal Services that meets the business requirements.What should you do?()A
Configure the terminal server to use smart cardsB
Configure IPSec to permit only Remote Desktop Protocol (RDP) connections to the terminal serverC
Deny the Remote Desktop Users group access to the terminal serverD
Restrict treyresearch.com users from logging on locally to the terminal server
考题
单选题You need to design a remote access strategy for portable computers. Your solution must meet business requirements. What should you do?()A
Issue a computer certificate to P_RAS1. Reconfigure the remote access policy on P_RAS1 to accept only EAP-MD5 authentication. Then, specify that P_RAS1’s computer certificate is to be used for authenticationB
Issue a user certificate to the Administrator account on P_RAS1. Reconfigure the remote access policy to accept only EAP-MD5 authentication. Then, specify that the Administrator account’s user certificate is to be used for authenticationC
Issue a computer certificate to P_RAS1. Reconfigure the remote access policy to accept only EAP-TLS authentication. Then, specify the P_RAS1’s computer certificate is to be used for authenticationD
Issue a user certificate to the Administrator account on P_RAS1. Reconfigure the remote access policy to accept only EAP-TLS authentication. Then, specify that the Administrator account’s user certificate is to be used for authentication
考题
单选题You need to recommend a strategy to ensure that the administration of AD LDS is encrypted. What should you include in the recommendation?()A
a server authentication certificateB
client authentication certificatesC
Digest authenticationD
Windows Integrated authentication
考题
多选题Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2).You have a VPN server named Server1. You have an Internet Authentication Service (IAS) server named Server2. You need to ensure that all VPN connections to Server1 are authenticated by Server2.Which two actions should you perform?()AFrom the Internet Authentication Service snap-in on Server2, create a new RADIUS client.BFrom the Internet Authentication Service snap-in on Server2, create a new remote access policy.CFrom the Routing and Remote Access snap-in, configure Server1 to use RADIUS accounting.DFrom the Routing and Remote Access snap-in, configure Server1 to use RADIUS authentication.
考题
单选题You are designing a remote access strategy to meet the business technical requirements. Which authentication mechanism should you use?()A
MS-CHAP v2.B
Internet Authentication service (IAS).C
Multilink Bandwidth Allocation Protocol (BAP).D
Remote access policies on all servers running Routing Remote Access.
考题
单选题You need to design a remote access authentication strategy that will allow users in the IT department to remotely connect to the network. Your solution must meet security requirements. What should you do?()A
Install Internet Authentication Services (IAS) on a server in the den.corp.woodgrovebank.com domain. Configure the VPN servers as RADIUS clientsB
Install Internet Authentication Services (IAS) on a stand-alone server in the Denver extranet. Create local user accounts for the IT personnel on the IAS server. Configure the VPN servers as RADIUS clientsC
Create a remote access policy on each of the VPN servers. Configure the policy to use the den.corp.woodgrovebank.com to authenticate remote access users. Configure the policy to require L2TP to establish a connectionD
Create a remote access policy on each of the VPN servers. Create local user accounts for the IT personnel on the VPN servers. Configure the policy to use the VPN servers’ local accounts database to authenticate users. Configure the policy to require L2TP to establish a connection
考题
单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers. You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized. You need to configure Server1 to log the details of access attempts by VPN users. What should you do? ()A
Configure the system event log to Do not overwrite.B
In IAS, in Remote Access Logging, enable the Authentication requests setting.C
Configure the Remote Access server to Log all events.D
Create a custom remote access policy and configure it for Authentication-Type.