网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
You are designing a strategy to meet the security and financial requirements related to the Manifest application. What should you do? ()
A
Configure a VPN server in Sydney.
B
Configure a VPN server in each branch office.
C
Configure a dial-up server in Sydney
D
Configure a dial-up server in each branch office.
参考答案
参考解析
解析:
暂无解析
更多 “单选题You are designing a strategy to meet the security and financial requirements related to the Manifest application. What should you do? ()A Configure a VPN server in Sydney.B Configure a VPN server in each branch office.C Configure a dial-up server in SydneyD Configure a dial-up server in each branch office.” 相关考题
考题
You are designing a strategy to ensure that all employees have Internet access. For each branch office, what should you do?()A、 Configure a DNS server to function as caching-only serversB、 Configure Internet Connection sharing on terminal servers.C、 Install and configure an Internet Security and Acceleration (ISA) Server ComputerD、 Install and configure a server running Routing and Remote Acess to function as a VPN server
考题
You are designing the NetBIOS domain naming strategy for the company. Which NetBIOS domain name or names should you use?()A、eastB、westC、quebecD、newyorkE、northamericaF、wideworldimporters
考题
You are designing a strategy to meet the security and financial requirements related to the Manifest application. What should you do? ()A、 Configure a VPN server in Sydney.B、 Configure a VPN server in each branch office.C、 Configure a dial-up server in SydneyD、 Configure a dial-up server in each branch office.
考题
You are designing a strategy for configuring a newly installed Windows Server 2003 computer to meet the Active Directory DNS requirements. How should you configure the computer?()A、As a caching-only DNS servers B、As the primary DNS server for the fourthcoffee.com DNS zoneC、With a stub zone for the fourthcoffee.com DNS zone hosted by the ISP D、As a secondary DNS server for the fourthcoffee.com DNS zone hosted by the ISP
考题
You are designing a remote access strategy to meet the business technical requirements. Which authentication mechanism should you use?()A、MS-CHAP v2.B、Internet Authentication service (IAS).C、Multilink Bandwidth Allocation Protocol (BAP).D、Remote access policies on all servers running Routing Remote Access.
考题
You are designing a VPN strategy to meet the business and technical requirements. Based on the current infrastructure, what is the maximum number of VPN connections that can be supported? ()A、 25B、 35C、 70D、 128E、 256
考题
You are designing a security strategy for the public Web server. You solution must address the chief security officer’s concerns. What should you do?()A、Install a Web server certificate on WEB1B、Enable Internet Connection Firewalll (ICF) on WEB1C、Configure IIS on WEB1 to operate in IIS 5.0 isolation modeD、Install and configure the URLScan ISAPI filer on WEB1
考题
You are designing the security for dial-up remote access to meet the business and technical requirements. Which two mechanisms should you use? ()A、 EAP-TLS authenticationB、 MS-CHAP v2 authenticationC、 a stand-alone certification serverD、 an enterprise certification serverE、 MPPE 56-bit encryption
考题
You are designing a strategy for configuring a newly installed Windows Server 2003 computer to meet the Active Directory DNS requirements. How should you configure the computer?()A、 As a caching-only DNS serversB、 As the primary DNS server for the fourthcoffee.com DNS zoneC、 With a stub zone for the fourthcoffee.com DNS zone hosted by the ISPD、 As a secondary DNS server for the fourthcoffee.com DNS zone hosted by the ISP
考题
Your environment includes multiple Windows Server 2008 R2 Hyper-V servers. You are designing an administrative strategy for virtual machines (VMs). You need to ensure that members of the Security Compliance Active Directory Domain Services (AD DS) security group can monitor failed logon events on the VMs. What should you do?()A、Add the Security Compliance group to the local administrators group of each VMB、Add the Security Compliance group to the local administrators group of each Hyper-V serverC、In the InitialStore.xml file of each VM, define an access policy for the Security Compliance groupD、in the InitialStore.xml file of each Hyper-V server, define an access policy for the Security Compliance group
考题
单选题You are designing a strategy for configuring a newly installed Windows Server 2003 computer to meet the Active Directory DNS requirements. How should you configure the computer?()A
As a caching-only DNS serversB
As the primary DNS server for the fourthcoffee.com DNS zoneC
With a stub zone for the fourthcoffee.com DNS zone hosted by the ISPD
As a secondary DNS server for the fourthcoffee.com DNS zone hosted by the ISP
考题
单选题You are designing a strategy to meet the security and financial requirements related to the Manifest application. What should you do? ()A
Configure a VPN server in Sydney.B
Configure a VPN server in each branch office.C
Configure a dial-up server in SydneyD
Configure a dial-up server in each branch office.
考题
单选题You are designing a remote access strategy to meet the business technical requirements. Which authentication mechanism should you use?()A
MS-CHAP v2.B
Internet Authentication service (IAS).C
Multilink Bandwidth Allocation Protocol (BAP).D
Remote access policies on all servers running Routing Remote Access.
考题
单选题You are designing a WAN implementation strategy to meet the business and technical requirements. What should you do?()A
Configure a demand-dial router.B
Create multiple Active Directory site links.C
Configure a VPN connection between each branch office.D
Install an Internet Authentication Service (IAS) server in each branch office.
考题
单选题You are designing a VPN strategy to meet the business and technical requirements. Based on the current infrastructure, what is the maximum number of VPN connections that can be supported? ()A
25B
35C
70D
128E
256
考题
单选题You are designing a forest structure to meet the business and technical requirements. How many forests should you create?()A
OneB
TwoC
ThreeD
Four
考题
单选题You are designing a WAN implementation strategy to meet the business and technical requirements. What should you do? ()A
Configure a demand-dial router.B
Create multiple Active Directory site links.C
Configure a VPN connection between each branch office.D
Install an Internet Authentication Service (IAS) server in each branch office.
考题
单选题You are designing a new NETBIOS naming strategy for the corporate environment. Which domain name should you use?()A
adB
woodgroveadC
woodgrovebankD
woodgrovebank.com
考题
单选题Your environment includes multiple Windows Server 2008 R2 Hyper-V servers. You are designing an administrative strategy for virtual machines (VMs). You need to ensure that members of the Security Compliance Active Directory Domain Services (AD DS) security group can monitor failed logon events on the VMs. What should you do?()A
Add the Security Compliance group to the local administrators group of each VMB
Add the Security Compliance group to the local administrators group of each Hyper-V serverC
In the InitialStore.xml file of each VM, define an access policy for the Security Compliance groupD
in the InitialStore.xml file of each Hyper-V server, define an access policy for the Security Compliance group
考题
多选题You are designing the security for dial-up remote access to meet the business and technical requirements. Which two mechanisms should you use? ()AEAP-TLS authenticationBMS-CHAP v2 authenticationCa stand-alone certification serverDan enterprise certification serverEMPPE 56-bit encryption
考题
单选题You are designing a DNS implementing strategy to meet the business and technical requirement. Which type of zone should you use?()A
Sub ZonesB
Standard Primary ZonesC
Secondary ZonesD
Active DirectoryIntegrated Zones
考题
单选题You are designing a DNS implementing strategy to meet the business and technical requirement. Which type of zone should you use?()A
Sub ZonesB
Standard Primary ZonesC
Secondary ZonesD
Active DirectoryIntegrated Zones
考题
多选题You are designing the NetBIOS domain naming strategy for the company. Which NetBIOS domain name or names should you use?()AeastBwestCquebecDnewyorkEnorthamericaFwideworldimporters
考题
多选题You are designing a security strategy for the infrastructure servers at the resorts.Which two actions should you perform?(Each correct answer presents part of the solution. Choose two)()APlace all infrastructure servers in subnets that cannot exchange information with the InternetBEstablish a custom security template that contains unique required settings for each combination of services that run on the infrastructure serversCUse Group Policy objects (GPOs) to apply the custom security template or templates to the Infrastructure serversDEdit the local policy settings to configure each individual server
考题
单选题You are designing a new NETBIOS naming strategy for the corporate environment. Which domain name should you use?()A
adB
woodgroveadC
woodgrovebankD
woodgrovebank.com
热门标签
最新试卷