网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Your network has Network Access Protection (NAP) deployed. The network contains two servers named Server1 and Server2. Server1 is a Network Policy Server (NPS). Server2 has a third-party antivirus solution installed.Server1 is configured to use a custom system health validator provided by the antivirus vendor. The system health validator uses Server2 to identify the version of the current antivirus definition.You need to ensure that NAP clients are considered noncompliant if Server1 cannot connect to Server2.Which error code resolution setting should you configure?()

  • A、SHA not responding to NAP client
  • B、SHA unable to contact required services
  • C、SHV not responding
  • D、SHV unable to contact required services

参考答案

更多 “Your network has Network Access Protection (NAP) deployed. The network contains two servers named Server1 and Server2. Server1 is a Network Policy Server (NPS). Server2 has a third-party antivirus solution installed.Server1 is configured to use a custom system health validator provided by the antivirus vendor. The system health validator uses Server2 to identify the version of the current antivirus definition.You need to ensure that NAP clients are considered noncompliant if Server1 cannot connect to Server2.Which error code resolution setting should you configure?()A、SHA not responding to NAP clientB、SHA unable to contact required servicesC、SHV not respondingD、SHV unable to contact required services” 相关考题
考题 Your network contains a server that runs Windows Server 2008 R2. The server has the Network Policy and Access Services server role installed. You need to allow only members of a global group named Group1 VPN access to the network.What should you do? ()A. Add Group1 to the RAS and IAS Servers group.B. Add Group1 to the Network Configuration Operators group.C. Create a new network policy and define a group-based condition for Group1. Set the access permission of the policy to Access granted. Set the processing order of the policy to 1.D. Create a new network policy and define a group-based condition for Group1. Set the access permission of the policy to Access granted. Set the processing order of the policy to 3.

考题 Your computer has a wireless network adapter installed. However, the computer fails to connect to the wireless network. You need to ensure that the computer is able to connect to the wireless network.What should you do?()A.AB.BC.CD.D

考题 Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system .Which two of these are characteristics of an IDS sensor?()A、 has a permissive interface that is used to monitor networksB、 is an active device in the traffic pathC、 passively listens to network trafficD、 has a promiscuous interface that is used to monitor the network

考题 Your company has Active Directory Certificate Services (AD CS) and Network Access Protection (NAP)  deployed on the network. You need to ensure that NAP policies are enforced on portable computers taht  use a wireless connection to access the network. What should you do?()A、 Configure all access points to use 802.1X authenticationB、 Configure all protable computers to use MS-CHAP v2 authenticationC、 Use the Group Policy Management Console to access the wireless group policy settings, and enable the Prevent connections to ad-hoc networks option.D、 Use the Group Policy Management Console to access the wireless group policy settings, and disable the Prevent connections to infrastructure networks option.

考题 Your portable computer has a Virtual Private Network (VPN) connection configured. You need to connect to the VPN.  What should you do?()A、Use the Mobile PC program.B、Use the Ease of Access program.C、Use the System and Maintenance program.D、Use the Network and Sharing Center program.

考题 Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when traveling.  You need to configure the network adapter profile settings to ensure that other systems are allowed to discover your computer only when you are at home.  What are two possible ways to achieve this goal?()A、When you configure access to the wired network at home, set the wired network adapter location type to Private.B、When you configure access to the wired network at home, set the wired network adapter location type to Public.C、When you configure access to the public wireless access points, set the wireless network adapter location type to Private.D、When you configure access to the public wireless access points, set the wireless network adapter location type to Public.

考题 Your network contains a Network Policy Server (NPS) named NPS1. NPS1 is configured for remote access account lockout.A domain user named User1 has been locked out by NPS1.You need to unlock the User1 user account on NPS1.What should you use?()A、the Netsh toolB、the Network Policy Server consoleC、the Registry EditorD、the Routing and Remote Access console

考题 Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  What should you do?()A、Configure all access points as RADIUS clients to the Remediation Servers.B、Configure all access points as RADIUS clients to the Network Policy Server (NPS).C、Create a Network Policy that defines Remote Access Server as a network connection method.D、Create a Network Policy that specifies EAP-TLS as the only available authentication method.

考题 Your network contains a single Active Directory domain. All domain controllers run Windows Server   2008 R2. There are 1,000 client computers that run Windows 7 and that are connected to managedswitches.   You need to recommend a strategy for network access that meets the following requirements:   èUsers are unable to bypass network access restrictions.   èOnly client computers that have up-to-date service packs installed can access the network.   èOnly client computers that have up-to-date anti-malware software installed can access the network.   What should you recommend?()A、Implement Network Access Protection (NAP) that uses DHCP enforcement.B、Implement Network Access Protection (NAP) that uses 802.1x enforcement.C、Implement a Network Policy Server (NPS), and enable IPsec on the domain controllers.D、Implement a Network Policy Server (NPS), and enable Remote Authentication Dial-In User Service  (RADIUS) authentication on the managed switches.

考题 Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  what should you do()? A、Configure all access points as RADIUS clients to the Remediation ServersB、Configure all access points as RADIUS clients to the Network Policy Server (NPS)C、Create a Network Policy that defines Remote Access Server as a network connection methodD、Create a Network Policy that specifies EAP-TLS as the only availible authentication method.

考题 多选题Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when you are traveling.  You need to configure the network adapter profile settings to ensure that the computer discovers other network devices only when you are at home.  Which two actions should you perform?()AWhen you configure access to the wired network at home, set the wired network adapter location type to Public.BWhen you configure access to the wired network at home, set the wired network adapter location type to Private.CWhen you configure access to the public wireless access points, set the wireless network adapter location type to Public.DWhen you configure access to the public wireless access points, set the wireless network adapter location type to Private.

考题 单选题As a network engineer at Certpaper.com, you are responsible for Certpaper network. Which will benecessarily taken into consideration when implementing Syslogging in your network?()A Enable the highest level of Syslogging available to ensure you log all possible event messagesB Use SSH to access your Syslog informationC Log all messages to the system buffer so that they can be displayed when accessing the routerD Syncronize clocks on the network with a protocol such as Network Time Protocol

考题 单选题Your network contains a Network Policy Server (NPS) named NPS1. NPS1 is configured for remote access account lockout.A domain user named User1 has been locked out by NPS1.You need to unlock the User1 user account on NPS1.What should you use?()A the Netsh toolB the Network Policy Server consoleC the Registry EditorD the Routing and Remote Access console

考题 单选题Your computer connects to both an ad hoc wireless network and a wired network. You need to allow other wireless clients to access the wired network.  What should you do? ()A Set the security type to the No authentication (Open) option.B Configure the wired and wireless network adapters as a network bridge.C Modify the wireless network profile type to the Use all-user profiles only (recommended) option.D On each wireless client, set the Service Set Identifier (SSID) for a new wireless network to the name of your wired network adapter.

考题 单选题You are able to access a Web server from your computer by using the IP address of the Web server. You fail to access the Web server when you use its fully qualified domain name. Other users on your network can access the Web server by using both the IP address and the fully  qualified domain name. You need to access the Web server by using the fully qualified domain name.  What should you do? ()A Use the Diagnose and repair feature in the Network and Sharing Center.B At the command prompt, type ipconfig /allcompartments.C Disable the NetBIOS feature on your network adapter.D Configure the correct default gateway on the Alternate Configuration tab of your network connection properties dialog box.

考题 单选题Your company has an IPv6 Ethernet network. A router named R1 connects your segment to the internet. A router named R2 joins your subnet with a segment named Private1. The Private1 segment has a network address of 10.128.4.0/26. Your computer named WKS2 required access to servers on the Private1 network. The WKS1 computer configuration in shown in the following table. (again table missing). The routers are configured as shown in the following table. (missing too)WKS1 is unable to connect to the Private1 network by using the current configuration. You need to add a persistent route for the Private1 network to the routing table on WKS1.()A Rout add -p 10.128.4.0/22 10.128.4.1B Route add Cp 10.128.4.0/26 10.128.64.10C Route add Cp 10.128.4.0 mask 255.255.255.192 10.12.64.1D Route add Cp 10.128.64.10 mask 255.255.255.192 10.128.4.0

考题 单选题Your company has active directory certificate services (AD CS) and network access protection (NAP) deployed on the network. You need to configure the wireless network to accept smart cards. What should you do?()A Configure the wireless network to use WPA2, PEAP and MSCHAP v2.B Configure the wireless network to use WPA2, 802.1X authentication and EAP-TLS.C Configure the wireless network to use WEP, 802.1X authentication, PEAP, and MSCHAP v2.D Configure the wireless network to use WEP,PEAP, and MSCHAP v2 and also require strong user passwords.

考题 单选题You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()A Use Windows Explorer to receive the offline filesB Using the Windows Explorer, disable the cache for the reports on the network shareC Use the Windows NT explorer to grant the special access for the reports on the network  shareD Use the synchronization manager to configure synchronization not to occur when users are  connected to the LAN connection. 

考题 单选题Your company has active directory certificate services (AD CS) and network access protection (NAP) deployed on the network. You need to ensure that NAP policies are enforced on portable computers that use a wireless connection to access the network. What should you do?()A Configure all access points to use 802.1x authentication.B Configure all protable computers to use MS-CHAP v2 authentication.C Use the group policy management console to access the wireless group policy settings, and enable the prevent connections to ad-hoc network option.D Use the group policy management console to access the wireless group policy settings, and disable the prevent connections to infrastructure networks option.

考题 单选题Your network contains a server that runs Windows Server 2008. The server has the Network Policy Server (NPS) service role installed. You need to allow only members of a global group named Group1 VPN access to the network. What should you do?()A Add Group1 to the RAS and IAS Servers GroupB Add Group1 to the Network Configuration Operators groupC Create a new network policy and define a group-based connection for Group1. Set the access permission of the policy to Access granted. Set the processing order of the policy to 1D Create a new network policy and define a group-based condition for Group1. Set the access permission of the policy to Access Granted. Set the processing of the policy to 3.

考题 单选题You are the administrator of your company’s network. Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers. Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled.   A user named John leaves the company. You move all of the files from John’s home folder to his manager’s folder. When the manager attempts to open any of the files, she receives the following error message. “Access denied.”   You want the manager to be able to access the files. What should you do?()A Grant the manager NTFS Full Control permission to the files.B Grant the manager NTFS Take Ownership permission to the files.C Log on to the network as a recovery Agent.  Decrypt the files for the manager.D Log on to the network as a member of the Backup Operators group. Decrypt the files for the manager.

考题 单选题Your network contains a server that runs Windows Server 2008. The server has the Network Policy and Access Services server role installed.You need to allow only members of a global group named Group1 VPN access to the network. What should you do? ()A Add Group1 to the RAS and IAS Servers group.B Add Group1 to the Network Configuration Operators group.C Create a new network policy and define a group-based condition for Group1. Set the access permission of the policy to Access granted. Set the processing order of the policy to 1.D Create a new network policy and define a group-based condition for Group1. Set the access permission of the policy to Access granted. Set the processing order of the policy to 3.

考题 单选题You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter. Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.  You need to configure the wireless connection to allow your computer to discover other computers.  What should you do?()A Configure the network category of your wireless network connection to Private.B Configure the network category of your wireless network connection to Public.C Configure the TCP/IP packet filtering on the wireless network connection.D Configure the wireless network connection with the appropriate authentication to the router.