网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
What is the primary use of a remote access VPN?()
A
to secure communication between two remote PCs
B
to secure communication between two remote offices
C
to secure communication betweenan remote PC and the corporate intranet
D
to secure communication between a corporate intranet and the public internet
参考答案
参考解析
解析:
暂无解析
更多 “单选题What is the primary use of a remote access VPN?()A to secure communication between two remote PCsB to secure communication between two remote officesC to secure communication betweenan remote PC and the corporate intranetD to secure communication between a corporate intranet and the public internet” 相关考题
考题
A route-based VPN is required for which scenario? ()
A. when the remote VPN peer is behind a NAT deviceB. when multiple networks need to be reached across the tunnelC. when the remote VPN peer is a dialup or remote access clientD. when a dynamic routing protocol such as OSPF is required across the VPN
考题
For the following items, which one acts as a VPN termination device and is located at a primary networklocation?()A、Broadband serviceB、Headend VPN deviceC、VPN access deviceD、Tunnel
考题
What is the primary use of a remote access VPN?()A、to secure communication between two remote PCsB、to secure communication between two remote officesC、to secure communication betweenan remote PC and the corporate intranetD、to secure communication between a corporate intranet and the public internet
考题
A route-based VPN is required for which scenario?()A、when the remote VPN peer is behind a NAT deviceB、when multiple networks need to be reached across the tunnel and GRE cannot be usedC、when the remote VPN peer is a dialup or remote access clientD、when a dynamic routing protocol is required across the VPN and GRE cannot be used
考题
Your portable computer has a Virtual Private Network (VPN) connection configured. You need to connect to the VPN. What should you do?()A、Use the Mobile PC program.B、Use the Ease of Access program.C、Use the System and Maintenance program.D、Use the Network and Sharing Center program.
考题
You need to design a security strategy for VPN2. Your solution must meet business requirements. What should you do?()A、Create and configure a new security template. Import the template into the Default Domain Policy Group Policy object (GPO)B、Install Internet Authentication Service (IAS) on RAS1. Configure VPN2 to be the RADIUS client of RAS1. Configure the remote access policy on VPN2C、Create and configure a new security template. Import the template into the local policy on VPN2D、Move VPN2 into the VPN Servers OU. Configure the remote access policy on VPN2
考题
You are designing a strategy to ensure that VPN users are able to access all internal resources. What should you do?()A、 Specify a static routing table entry on VPN1 for the Dallas network.B、 Specify a static routing table entry on VPN1 for the Seattle network.C、 Implement Internet Authentication Service (IAS) on VPN1.D、 Define a User Class option for Routing Remote Access Clients on the DHCP Server.
考题
You are designing a remote access strategy to meet the business and technical Requirement. What should you do?()A、 Configure each server running Routing and Remote Access as a RADIUS Client.B、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.C、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.D、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.
考题
You install Windows 2000 Professional on your computer at home. You create a new dial-up connection to connect to your company’s remote access server. You configure the connection to use both of your external modems and to use multilink to bind the modems together. You start the dial-up connection and connect to the remote access server. You notice that only one of the modems is connected to the remote access server. What should you do?()A、Configure the dial-up connection to use a SLIP connection.B、Configure the company’s remote access server to accept multilink connections.C、Replace your modems with new modems that support multilink.D、Grant your user account multilink permission on the company’s remote access.
考题
Your network consists of a single Active Directory domain. The remote access permission for all users is set to Control access through Remote Access Policy.You have a VPN server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). The current configuration allows all authenticated users to establish VPN connections to Server1. You create a global group named Group1.You need to prevent all members of Group1 from establishing VPN connections to Server1. What should you do?()A、From the local computer policy on Server1, modify the Account Policies settings.B、From Active Directory Users and Computers, modify the Security settings of Group1.C、From the Routing and Remote Access snap-in, create a new remote access policy.D、From the Routing and Remote Access snap-in, open the properties of Server1 and modify the security options.
考题
You are designing a strategy to provide Internet access to all users. What should you do?()A、 Configure Internet Connection Sharing on all client computers.B、 Configure Automatic Private IP Addressing (APIPA) on all client computers.C、 Configure one server as a Routing and Remote Access VPN server.D、 Configure one server as a Routing and Remote Access NAT router.
考题
You are the network administrator for your company. The network consists of a single Active Directory domain. The company has remote users in the sales department who work from home. The remote users’ client computers run Windows XP Professional, and they are not members of the domain. The remote users’ client computers have local Internet access through an ISP. The company is deploying a Windows Server 2003 computer named Server1 that has Routing and Remote Access installed. Server1 will function as a VPN server, and the remote users will use it to connect to the company network. Confidential research data will be transmitted from the remote users’ client computers. Security is critical to the company and Server1 must protect the remote users’ data transmissions to the main office. The remote client computers will use L2TP/IPSec to connect to the VPN server. You need to choose a secure authentication method. What should you do? ()A、 Use the authentication method of the default IPSec policies.B、 Create a custom IPSec policy and use the Kerberos version 5 authentication protocol.C、 Create a custom IPSec policy and use certificate-based authentication.D、 Create a custom IPSec policy and use preshared key authentication.E、 Use the authentication method of the Routing and Remote Access custom IPSec policy for L2TP connection.
考题
You need to design the configuration of the Windows Server 2003 Routing and Remote Access server in the Seattle office to meet business requirements. What should you do?()A、Configure a remote access policy on the Routing and Remote Access server to require MS-CHAP v2 for all connectionsB、Use a Group Policy object (GPO) to configure a Restricted Groups policy that applies to the Routing and Remote Access server. Use this Restricted Groups policy to remove all accounts form the local Users group, and then add authorized computer accountsC、Configure the Routing and Remote Access server to use only PPTP connectionsD、Configure the Routing and Remote Access server to use only IPSec over L2TP connections.Configure IPSec to use certificates
考题
单选题You are designing a remote access strategy to meet the business and technical Requirement. What should you do?()A
Configure each server running Routing and Remote Access as a RADIUS Client.B
Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.C
Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.D
Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.
考题
单选题You are designing a strategy to provide Internet access to all users. What should you do?()A
Configure Internet Connection Sharing on all client computers.B
Configure Automatic Private IP Addressing (APIPA) on all client computers.C
Configure one server as a Routing and Remote Access VPN server.D
Configure one server as a Routing and Remote Access NAT router.
考题
单选题All client computers on your company network run Windows XP and are members of an Active Directory Domain Services domain. You plan to migrate all computers to Windows 7. You also plan to deploy a new VPN server to support remote network access for the computers. You need to ensure that all computers will be supported for remote access during the migration to Windows 7. What should you do?()A
Set the VPN server to Layer 2 Tunneling Protocol.B
Set the VPN server to Secure Socket Tunneling Protocol.C
Set the VPN server to Internet Key Exchange version 2.D
Configure the Direct Access feature on the VPN server.
考题
单选题Your company consists of a single Active Directory domain that is configured in Windows 2000 native mode. All servers run Windows Server 2003 Service Pack 2 (SP2). You deploy a Routing and Remote Access server to provide VPN access to the network.You need to ensure that only members of a group named Sales can access the network through the VPN. The solution must minimize the administrative effort required to manage remote access. What should you do?()A
Allow dial-in access for the user accounts of all Sales group members. B
Deny dial-in access for the user accounts of all users except the Sales group members. C
Create a remote access policy and assign the Allow - Remote Access permission. Add the Windows-Groups condition and specify the Sales group. D
Create a remote access policy and assign the Deny - Remote Access permission. Add the Windows-Groups condition and specify all Active Directory groups except for Sales.
考题
单选题A route-based VPN is required for which scenario? ()A
when the remote VPN peer is behind a NAT deviceB
when multiple networks need to be reached across the tunnelC
when the remote VPN peer is a dialup or remote access clientD
when a dynamic routing protocol such as OSPF is required across the VPN
考题
单选题What is the benefit of using the Cisco Easy VPN Server feature along with the Cisco software VPN client for implementing remote-access VPNs? ()A
The Cisco Easy VPN Server feature and the Cisco software VPN client use the same GUI configuration tool to simplify remote-access VPN configurations.B
The Cisco Easy VPN Server feature allows the Cisco software VPN client to receive its security policies from the central site VPN device. This minimizes the configuration requirements at the remote location for large remote access VPN deployments.C
The Cisco Easy VPN Server feature and the Cisco software VPN client use hardware-based encryption to reduce the CPU overhead of the central site VPN router.D
The Cisco Easy VPN Server feature and the Cisco software VPN client enable scalable remote-access VPNs deployment by using a thick client/thin server model where the central site VPN router can handle thousands of incoming VPN connections.
考题
单选题You have a computer that runs Windows 7. You connect to your company s network by using a VPNconnection. You discover that when you establish the VPN connection, you are unable to access InternetWeb sites. When you disconnect the VPN connection, you can access Internet Web sites. You need toaccess Internet Web sites while you are connected to the VPN. What should you do?()A
Configure the VPN connection to use only PPTP.B
Configure the VPN connection to use only L2TP/IPSec.C
From the Internet Protocol Version 4 (TCP/IPv4) properties of the local area connection, disable theAutomatic metric setting.D
From the Internet Protocol Version 4 (TCP/IPv4) properties of the VPN connection, disable the Usedefault gateway on remote network setting.
考题
单选题You need to design a remote access authentication strategy that will allow users in the IT department to remotely connect to the network. Your solution must meet security requirements. What should you do?()A
Install Internet Authentication Services (IAS) on a server in the den.corp.woodgrovebank.com domain. Configure the VPN servers as RADIUS clientsB
Install Internet Authentication Services (IAS) on a stand-alone server in the Denver extranet. Create local user accounts for the IT personnel on the IAS server. Configure the VPN servers as RADIUS clientsC
Create a remote access policy on each of the VPN servers. Configure the policy to use the den.corp.woodgrovebank.com to authenticate remote access users. Configure the policy to require L2TP to establish a connectionD
Create a remote access policy on each of the VPN servers. Create local user accounts for the IT personnel on the VPN servers. Configure the policy to use the VPN servers’ local accounts database to authenticate users. Configure the policy to require L2TP to establish a connection
考题
单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers. You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized. You need to configure Server1 to log the details of access attempts by VPN users. What should you do? ()A
Configure the system event log to Do not overwrite.B
In IAS, in Remote Access Logging, enable the Authentication requests setting.C
Configure the Remote Access server to Log all events.D
Create a custom remote access policy and configure it for Authentication-Type.
考题
单选题You need to design the configuration of the Windows Server 2003 Routing and Remote Access server in the Seattle office to meet business requirements. What should you do?()A
Configure a remote access policy on the Routing and Remote Access server to require MS-CHAP v2 for all connectionsB
Use a Group Policy object (GPO) to configure a Restricted Groups policy that applies to the Routing and Remote Access server. Use this Restricted Groups policy to remove all accounts form the local Users group, and then add authorized computer accountsC
Configure the Routing and Remote Access server to use only PPTP connectionsD
Configure the Routing and Remote Access server to use only IPSec over L2TP connections.Configure IPSec to use certificates
考题
单选题You are designing a strategy for implementing Internet Authentication Service (IAS) to meet the business and technical requirements. What should you do?()A
Install IAS on VPN1, VPN2, and VPN3.B
Install IAS on VPN1, Configure VPN2 and VPN3 as RADIUS clients.C
Install IAS on VPN1, Configure VPN1, VPN2, and VPN3 as RADIUS clients.D
Install IAS on DC1, Configure VPN2 and VPN3 as RADIUS clients. Create all remote access policies on VPN1.E
Install IAS on DC2, Configure VPN2 and VPN3 as RADIUS clients. Configure remote access logging on VPN1.
热门标签
最新试卷