考题
Your computer has a wireless network adapter installed. However, the computer fails to connect to the wireless network. You need to ensure that the computer is able to connect to the wireless network.What should you do?()A.AB.BC.CD.D
考题
You are designing the wireless networks for the three warehouses. Your design must support the inventory and shipping management solution, and it must meet security requirements. What should you do?()A、Ensure that all wireless networking equipment fully supports the IEE 802.11a, IEEE 802.11b, and IEEE 802.11g wireless networking protocolsB、Assign a random service set identifier (SSID) to each wireless access point. Disable broadcasting of SSIDs on all wireless access pointsC、Create a firewall to block traffic to any IP address that did not originate from the company’s DHCP servers. Ensure that all wireless access points connect behind this new firewallD、Configure a server to use Internet Authentication Service (IAS). Configure the wireless networking equipment to use the IEEE 802.1x protocol and the IAS server
考题
You need to design a method to standardize and deploy a baseline security configuration for servers. You solution must meet business requirements. What should you do?()A、Create a script that installs the Hisecdc.inf security templateB、Use a GPO to distribute and apply the Hisec.inf security templateC、Use the System Policy Editor to configure each server’s security settingsD、Use a GPO to distribute and apply a custom security template
考题
Your company has Active Directory Certificate Services (AD CS) and Network Access Protection (NAP) deployed on the network. You need to ensure that NAP policies are enforced on portable computers taht use a wireless connection to access the network. What should you do?()A、 Configure all access points to use 802.1X authenticationB、 Configure all protable computers to use MS-CHAP v2 authenticationC、 Use the Group Policy Management Console to access the wireless group policy settings, and enable the Prevent connections to ad-hoc networks option.D、 Use the Group Policy Management Console to access the wireless group policy settings, and disable the Prevent connections to infrastructure networks option.
考题
You need to design a method for junior IT administrators to perform more IT support tasks. Your solution must meet business and security requirements. What should you do?()A、Delegate appropriate Active Directory permissions to the junior IT administratorsB、Add the junior IT administrators’ user accounts to the Domain Admins user groupC、Create a custom Microsoft Management Console (MMC) that uses taskpad views to enable the appropriate tasks for the junior IT administratorsD、Make the junior IT administrators’ domain user accounts member of the local Administrators group on all client computersE、Create new domain user accounts for each junior IT administrator. Make the new accounts members of the Domain Admins group and instruct junior IT administrators to use the new accounts only for appropriate administrative tasks
考题
You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()A、Configure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addressesB、Configure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points useC、Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networksD、Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks
考题
You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()A、Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access pointB、Configure IEEE 802.1x authentication with smart cardsC、Configure the wireless network to use Wired Equivalent Privacy (WEP)D、Install and configure an Internet Authentication Service (IAS) server
考题
You are designing an authentication strategy for the accounting department. Your solution must meet business requirements. What should you do?()A、Install wireless network cards on all accounting department computers. Select PEAP authenticationB、Install user certificates on all accounting department computers. Configure these computers to respond to requests for IPSec encryptionC、Issue smart cards and smart card readers to all accounting department users and computers. Require NTLMv2 authenticationD、Issue smart cards and smart card readers to all accounting department users and computers. Configure the domain to require smart cards for the accounting department users during logon
考题
You need to design a security patch management strategy. Your solution must meet business and security requirements, and it must accommodate the company’s resource restrictions. What should you do?()A、Test and manually deploy updatesB、Deploy a Software Update Services (SUS) server. Test all updates and then approve them. Configure all client computers to automatically obtain updates from the serverC、Test all updates and then use a third-party utility to repackage updates in a Windows Installer file. Deploy the -.msi files by using Group PolicyD、Configure all client computers to use Automatic Updates to obtain security updates from the Windows Update Web site. Test all updates posted to the Windows Update Web site
考题
You need to design a method to ensure that research intellectual property remains confidential. You solution must meet security requirements. What should you do?()A、Require client computers to connect to research intellectual property through a SSL VPNB、Place SFSQL1 and ATLSQL1 on a separate virtual LAN from the internal network. Grant access to these virtual LAN segments to only the client computers that are used by authorized usersC、Require that communications between SFSQL1, SFFP1, ATLSQL1, and ATLFP1 use IPSecD、Create a separate subnet for all servers that contain research intellectual property
考题
You need to design a remote administration solution for servers on the internal network. Your solution must meet business and security requirements. What should you do?()A、Permit administrators to use an HTTP interface to manage servers remotelyB、Permit only administrators to connect to the servers’ Telnet serviceC、Permit administrators to manage the servers by using Microsoft NetMeetingD、Require administrators to use Remote Desktop for Administration connections to manage the servers
考题
You need to recommend an administrative solution for the local support technicians in the satellite offices. The solution must meet the companys security requirements.What should you include in the recommendation?()A、Active Directory delegationB、Administrator Role SeparationC、managed service accountsD、Restricted Groups
考题
You are designing an access control strategy for WEB2. Your solution must meet business requirements. What should you do?()A、Install the Terminal Services Advanced Client Web client on WEB2B、Modify the Winreg registry key on WEB2C、Install the RPC over HTTP service on WEB2D、Modify the RestrictAnonymous registry key on WEB2
考题
You need to design a patch management strategy for Southbridge Video. Your solution must meet business requirements. What should you do?()A、Configure all client computers to use Automatic Updates to obtain security patches from the Windows Update Web site. Test and install all patchesB、Configure a batch file to download security patches daily. Distribute the security patches by using a.zap file and the Default Domain Policy Group Policy object (GPO)C、Deploy a Software Update Services (SUS) server. Test all security patches and then approve them. Configure all client computers to automatically obtain updates from the serverD、Configure a batch file to download security patches daily. Manually install the security patches on all computers
考题
You need to design an authentication strategy for users of portable computers. Your solution must meet business requirements. What should you do?()A、Issue smart cards and smart card readers to all portable computer users. Configure the domain to require smart cards for login and to log off users who remote their smart cardsB、Configure the portable computers to connect to only wireless networks that use Wired Equivalent Privacy (WEP). Install digital certificates on all portable computersC、Install computer certificates on all portable computers. Configure all portable computers to respond to requests for IPSec encryptionD、Install biometric authentication devices on all portable computers. Configure the Default Domain Policy GPO to require complex passwords for all users
考题
单选题You need to design a method to standardize and deploy a baseline security configuration for servers. You solution must meet business requirements. What should you do?()A
Create a script that installs the Hisecdc.inf security templateB
Use a GPO to distribute and apply the Hisec.inf security templateC
Use the System Policy Editor to configure each server’s security settingsD
Use a GPO to distribute and apply a custom security template
考题
单选题You need to design a remote administration solution for servers on the internal network. Your solution must meet business and security requirements. What should you do?()A
Permit administrators to use an HTTP interface to manage servers remotelyB
Permit only administrators to connect to the servers’ Telnet serviceC
Permit administrators to manage the servers by using Microsoft NetMeetingD
Require administrators to use Remote Desktop for Administration connections to manage the servers
考题
单选题You are designing an access control strategy for WEB2. Your solution must meet business requirements. What should you do?()A
Install the Terminal Services Advanced Client Web client on WEB2B
Modify the Winreg registry key on WEB2C
Install the RPC over HTTP service on WEB2D
Modify the RestrictAnonymous registry key on WEB2
考题
单选题You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()A
Configure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addressesB
Configure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points useC
Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networksD
Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks
考题
单选题You need to design a security patch management strategy. Your solution must meet business and security requirements, and it must accommodate the company’s resource restrictions. What should you do?()A
Test and manually deploy updatesB
Deploy a Software Update Services (SUS) server. Test all updates and then approve them. Configure all client computers to automatically obtain updates from the serverC
Test all updates and then use a third-party utility to repackage updates in a Windows Installer file. Deploy the -.msi files by using Group PolicyD
Configure all client computers to use Automatic Updates to obtain security updates from the Windows Update Web site. Test all updates posted to the Windows Update Web site
考题
单选题You are designing an authentication strategy for the accounting department. Your solution must meet business requirements. What should you do?()A
Install wireless network cards on all accounting department computers. Select PEAP authenticationB
Install user certificates on all accounting department computers. Configure these computers to respond to requests for IPSec encryptionC
Issue smart cards and smart card readers to all accounting department users and computers. Require NTLMv2 authenticationD
Issue smart cards and smart card readers to all accounting department users and computers. Configure the domain to require smart cards for the accounting department users during logon
考题
单选题You need to recommend an administrative solution for the local support technicians in the satellite offices. The solution must meet the companys security requirements.What should you include in the recommendation?()A
Active Directory delegationB
Administrator Role SeparationC
managed service accountsD
Restricted Groups
考题
单选题You need to design an authentication strategy for users of portable computers. Your solution must meet business requirements. What should you do?()A
Issue smart cards and smart card readers to all portable computer users. Configure the domain to require smart cards for login and to log off users who remote their smart cardsB
Configure the portable computers to connect to only wireless networks that use Wired Equivalent Privacy (WEP). Install digital certificates on all portable computersC
Install computer certificates on all portable computers. Configure all portable computers to respond to requests for IPSec encryptionD
Install biometric authentication devices on all portable computers. Configure the Default Domain Policy GPO to require complex passwords for all users
考题
单选题You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()A
Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access pointB
Configure IEEE 802.1x authentication with smart cardsC
Configure the wireless network to use Wired Equivalent Privacy (WEP)D
Install and configure an Internet Authentication Service (IAS) server
考题
单选题You need to design a method to ensure that research intellectual property remains confidential. You solution must meet security requirements. What should you do?()A
Require client computers to connect to research intellectual property through a SSL VPNB
Place SFSQL1 and ATLSQL1 on a separate virtual LAN from the internal network. Grant access to these virtual LAN segments to only the client computers that are used by authorized usersC
Require that communications between SFSQL1, SFFP1, ATLSQL1, and ATLFP1 use IPSecD
Create a separate subnet for all servers that contain research intellectual property
考题
单选题You need to design a patch management strategy for Southbridge Video. Your solution must meet business requirements. What should you do?()A
Configure all client computers to use Automatic Updates to obtain security patches from the Windows Update Web site. Test and install all patchesB
Configure a batch file to download security patches daily. Distribute the security patches by using a.zap file and the Default Domain Policy Group Policy object (GPO)C
Deploy a Software Update Services (SUS) server. Test all security patches and then approve them. Configure all client computers to automatically obtain updates from the serverD
Configure a batch file to download security patches daily. Manually install the security patches on all computers
考题
单选题You are designing the wireless networks for the three warehouses. Your design must support the inventory and shipping management solution, and it must meet security requirements. What should you do?()A
Ensure that all wireless networking equipment fully supports the IEE 802.11a, IEEE 802.11b, and IEEE 802.11g wireless networking protocolsB
Assign a random service set identifier (SSID) to each wireless access point. Disable broadcasting of SSIDs on all wireless access pointsC
Create a firewall to block traffic to any IP address that did not originate from the company’s DHCP servers. Ensure that all wireless access points connect behind this new firewallD
Configure a server to use Internet Authentication Service (IAS). Configure the wireless networking equipment to use the IEEE 802.1x protocol and the IAS server
考题
单选题You need to design a method for junior IT administrators to perform more IT support tasks. Your solution must meet business and security requirements. What should you do?()A
Delegate appropriate Active Directory permissions to the junior IT administratorsB
Add the junior IT administrators’ user accounts to the Domain Admins user groupC
Create a custom Microsoft Management Console (MMC) that uses taskpad views to enable the appropriate tasks for the junior IT administratorsD
Make the junior IT administrators’ domain user accounts member of the local Administrators group on all client computersE
Create new domain user accounts for each junior IT administrator. Make the new accounts members of the Domain Admins group and instruct junior IT administrators to use the new accounts only for appropriate administrative tasks