考题
Your company has deployed Network Access Protection (NAP) enforcement for VPNs.You need to ensure that the health of all clients can be monitored and reported. What should you do?()
A. Create a Group Policy object (GPO) that enables Security Center and link the policy to the domain.B. Create a Group Policy object (GPO) that enables Security Center and link the policy to the Domain Controllers organizational unit (OU).C. Create a Group Policy object (GPO) and set the Require trusted path for credential entry option to Enabled. Link the policy to the domain.D. Create a Group Policy object (GPO) and set the Require trusted path for credential entry option to Enabled. Link the policy to the Domain Controllers organizational unit (OU).
考题
Your network has Network Access Protection (NAP) deployed. The network contains two servers named Server1 and Server2. Server1 is a Network Policy Server (NPS). Server2 has a third-party antivirus solution installed.Server1 is configured to use a custom system health validator provided by the antivirus vendor. The system health validator uses Server2 to identify the version of the current antivirus definition.You need to ensure that NAP clients are considered noncompliant if Server1 cannot connect to Server2.Which error code resolution setting should you configure?()A. SHA not responding to NAP clientB. SHA unable to contact required servicesC. SHV not respondingD. SHV unable to contact required services
考题
Your IT director has decided to allow employees to use their laptops at home as well as in the office. You have deployed the Junos Pulse client to allow access to the offices 802.1X-enabled wired network. Your company also has the Junos Pulse Secure Access Service deployed. You want the Junos Pulse client to automatically launch the appropriate access method depending on each users location.Which three are supported to determine the users location?()A. MAC addressB. DNS serverC. DHCP serverD. resolve addressE. endpoint address
考题
Your company has Active Directory Certificate Services (AD CS) and Network Access Protection (NAP) deployed on the network. You need to ensure that NAP policies are enforced on portable computers taht use a wireless connection to access the network. What should you do?()A、 Configure all access points to use 802.1X authenticationB、 Configure all protable computers to use MS-CHAP v2 authenticationC、 Use the Group Policy Management Console to access the wireless group policy settings, and enable the Prevent connections to ad-hoc networks option.D、 Use the Group Policy Management Console to access the wireless group policy settings, and disable the Prevent connections to infrastructure networks option.
考题
Your company's corporate network uses Network Access Protection (NAP).Users are able to connect to the corporate network remotely.You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do?()A、Apply an IPsec NAP policy.B、Configure a NAP policy for 802.1X wireless connections.C、Configure VPN connections to use MS-CHAP v2 authentication.D、Restrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP.
考题
Your company uses network access protection (NAP) to enforce policies on client computers that connect to the network. Client computers run windows vista. A group Policy is used to configure client computers to obtain updates from WSUS. Company policy requires that updates labeled important and critical must be applied before client computers can access network resources. You need to ensure that client computes meet the company policy requirement. What should you do?()A、Enable automatic updates on each client.B、Enable the security center on each client.C、Quarantine clients that do not have all available security updates installed.D、Disconnect the remote connection until the required updates are installed.
考题
Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP. What should you do?()A、Configure all access points as RADIUS clients to the Remediation Servers.B、Configure all access points as RADIUS clients to the Network Policy Server (NPS).C、Create a Network Policy that defines Remote Access Server as a network connection method.D、Create a Network Policy that specifies EAP-TLS as the only available authentication method.
考题
Your company uses Network Access Protection (NAP) to enforce policies on client computers that connect to the network. Client computers run Windows 7. A Group Policy is used to configure client computers to obtain updates from Windows Server Update Services (WSUS).Company policy requires that updates labeled Important and Critical must be applied before client computers can access network resources.You need to ensure that client computers meet the company policy requirement. What should you do?()A、Enable automatic updates on each client.B、Enable the Security Center on each client.C、Quarantine clients that do not have all available security updates installed.D、Disconnect the connection until the required updates are installed.
考题
Your company has deployed network access protection (NAP) enforcement for VPNs. You need to ensure that the health of all clients can be monitored and reported. What should you do?()A、Create a group policy object (GPO) that enabled security center and link the policy to the domain.B、Create a group policy object (GPO) that enabled security center and link the policy to the domain controllers organizational unit (OU).C、Create a group policy object (GPO) and set the require trusted path for credential entry option to enabled. Link the policy to the domain.D、Create a group policy object (GPO) and set the require trusted path for credential entry option to Enabled. Link the policy to the domain controllers organizational unit (OU).
考题
Your company has Active Directory Certificate Services (AD CS) and Network Access Protection (NAP) deployed on the network.You need to ensure that NAP policies are enforced on portable computers that use a wireless connection to access the network. What should you do?()A、Configure all access points to use 802.1X authentication.B、Configure all portable computers to use MS-CHAP v2 authentication.C、Use the Group Policy Management Console to access the wireless Group Policy settings, and enable the Prevent connections to ad-hoc networks option.D、Use the Group Policy Management Console to access the wireless Group Policy settings, and disable the Prevent connections to infrastructure networks option.
考题
Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP. what should you do()? A、Configure all access points as RADIUS clients to the Remediation ServersB、Configure all access points as RADIUS clients to the Network Policy Server (NPS)C、Create a Network Policy that defines Remote Access Server as a network connection methodD、Create a Network Policy that specifies EAP-TLS as the only availible authentication method.
考题
Your companys corporate network uses Network Access Protection (NAP). Users are able to connect to the corporate network remotely. You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do()? A、Apply an IPsec NAP policy.B、Configure a NAP Policy for 802.1x Wireless connectionsC、Configure VPN connections to use MS-CHAP v2 authenticationD、Restrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP
考题
单选题Your network has Network Access Protection (NAP) deployed. The network contains two servers named Server1 and Server2. Server1 is a Network Policy Server (NPS). Server2 has a third-party antivirus solution installed.Server1 is configured to use a custom system health validator provided by the antivirus vendor. The system health validator uses Server2 to identify the version of the current antivirus definition.You need to ensure that NAP clients are considered noncompliant if Server1 cannot connect to Server2.Which error code resolution setting should you configure?()A
SHA not responding to NAP clientB
SHA unable to contact required servicesC
SHV not respondingD
SHV unable to contact required services
考题
单选题Your company has active directory certificate services (AD CS) and network access protection (NAP) deployed on the network. You need to configure the wireless network to accept smart cards. What should you do?()A
Configure the wireless network to use WPA2, PEAP and MSCHAP v2.B
Configure the wireless network to use WPA2, 802.1X authentication and EAP-TLS.C
Configure the wireless network to use WEP, 802.1X authentication, PEAP, and MSCHAP v2.D
Configure the wireless network to use WEP,PEAP, and MSCHAP v2 and also require strong user passwords.
考题
多选题Your IT director has decided to allow employees to use their laptops at home as well as in the office. You have deployed the Junos Pulse client to allow access to the offices 802.1X-enabled wired network. Your company also has the Junos Pulse Secure Access Service deployed. You want the Junos Pulse client to automatically launch the appropriate access method depending on each users location. Which three are supported to determine the users location?()AMAC addressBDNS serverCDHCP serverDresolve addressEendpoint address
考题
单选题Your company has active directory certificate services (AD CS) and network access protection (NAP) deployed on the network. You need to ensure that NAP policies are enforced on portable computers that use a wireless connection to access the network. What should you do?()A
Configure all access points to use 802.1x authentication.B
Configure all protable computers to use MS-CHAP v2 authentication.C
Use the group policy management console to access the wireless group policy settings, and enable the prevent connections to ad-hoc network option.D
Use the group policy management console to access the wireless group policy settings, and disable the prevent connections to infrastructure networks option.
考题
单选题Network Access Protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The company policy required confidentiality of data when the data is in transmit between the portable computers and the servers. You need to ensure taht users can access network resources only from computers that comply with the company policy. What should you do? ()A
Create an IPsec Enforcement Network policyB
Create an 802.1X enforcement network policyC
Create a wired network (IEEE 802.3) Group PolicyD
Create an Extensible Authentication Portocol (EAP) Enforcement Network Policy