Configure all access points as RADIUS clients to the Remediation Servers
Configure all access points as RADIUS clients to the Network Policy Server (NPS)
Create a Network Policy that defines Remote Access Server as a network connection method
Create a Network Policy that specifies EAP-TLS as the only availible authentication method.
第1题:
Your company has active directory certificate services (AD CS) and network access protection (NAP) deployed on the network. You need to configure the wireless network to accept smart cards. What should you do?()
第2题:
You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()
第3题:
You need to design a Security strategy for the wireless network at all resort locations.What should you do?()
第4题:
Your company has Active Directory Certificate Services (AD CS) and Network Access Protection (NAP) deployed on the network.You need to ensure that NAP policies are enforced on portable computers that use a wireless connection to access the network. What should you do?()
第5题:
Your companys corporate network uses Network Access Protection (NAP). Users are able to connect to the corporate network remotely. You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do()?
第6题:
Configure all access points to use 802.1X authentication
Configure all protable computers to use MS-CHAP v2 authentication
Use the Group Policy Management Console to access the wireless group policy settings, and enable the Prevent connections to ad-hoc networks option.
Use the Group Policy Management Console to access the wireless group policy settings, and disable the Prevent connections to infrastructure networks option.
第7题:
Apply an IPsec NAP policy.
Configure a NAP Policy for 802.1x Wireless connections
Configure VPN connections to use MS-CHAP v2 authentication
Restrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP
第8题:
Configure all access points as RADIUS clients to the Remediation Servers
Configure all access points as RADIUS clients to the Network Policy Server (NPS)
Create a Network Policy that defines Remote Access Server as a network connection method
Create a Network Policy that specifies EAP-TLS as the only availible authentication method.
第9题:
Connect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Require company users to establish a VPN to access company resources
Install Internet Authentication Service (IAS) on a domain controller.Configure the wireless access points to require IEEE 802.1x authentication
Establish IPSec policies on all company servers to request encryption from all computers that connect from the wireless IP networks
Configure all wireless access points to require the Wired Equivalent Privacy (WEP) protocol for all connections. Use a Group Policy object (GPO) to distribute the WEP keys to all computers in the domain
第10题:
Configure the wireless network to use WPA2, PEAP and MSCHAP v2.
Configure the wireless network to use WPA2, 802.1X authentication and EAP-TLS.
Configure the wireless network to use WEP, 802.1X authentication, PEAP, and MSCHAP v2.
Configure the wireless network to use WEP,PEAP, and MSCHAP v2 and also require strong user passwords.
第11题:
Apply an IPsec NAP policy.
Configure a NAP Policy for 802.1x Wireless connections.
Configure VPN connections to use MS-CHAP v2 authentication.
Restrict dynamic host configuration protocol (DHCP) clients by using NAP.
第12题:
Configure all access points as RADIUS clients to the Remediation Servers.
Configure all access points as RADIUS clients to the Network Policy Server (NPS).
Create a Network Policy that defines Remote Access Server as a network connection method.
Create a Network Policy that specifies EAP-TLS as the only available authentication method.
第13题:
Network Access Protection (NAP) is configured for the corporate network.Users connect to the corporate network by using portable computers.The company policy requires confidentiality of data when the data is in transit between the portable computers and the servers.You need to ensure that users can access network resources only from computers that comply with the company policy.What should you do?()
第14题:
Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP. What should you do?()
第15题:
Your companys corporate network uses network access protection (NAP). Users are able to connect to the corporate network remotely. You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do?()
第16题:
Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP. what should you do()?
第17题:
Your company has active directory certificate services (AD CS) and network access protection (NAP) deployed on the network. You need to ensure that NAP policies are enforced on portable computers that use a wireless connection to access the network. What should you do?()
第18题:
Apply an IPsec NAP policy.
Configure a NAP policy for 802.1X wireless connections.
Configure VPN connections to use MS-CHAP v2 authentication.
Restrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP
第19题:
Create an IPsec Enforcement Network policy
Create an 802.1X enforcement network policy
Create a wired network (IEEE 802.3) Group Policy
Create an Extensible Authentication Portocol (EAP) Enforcement Network Policy
第20题:
Configure all access points to use 802.1X authentication.
Configure all portable computers to use MS-CHAP v2 authentication.
Use the Group Policy Management Console to access the wireless Group Policy settings, and enable the Prevent connections to ad-hoc networks option.
Use the Group Policy Management Console to access the wireless Group Policy settings, and disable the Prevent connections to infrastructure networks option.
第21题:
Configure all access points to use 802.1x authentication.
Configure all protable computers to use MS-CHAP v2 authentication.
Use the group policy management console to access the wireless group policy settings, and enable the prevent connections to ad-hoc network option.
Use the group policy management console to access the wireless group policy settings, and disable the prevent connections to infrastructure networks option.
第22题:
Configure all access points as RADIUS clients to the Remediation Servers.
Configure all access points as RADIUS clients to the Network Policy Server (NPS).
Create a Network Policy that defines Remote Access Server as a network connection method.
Create a Network Policy that specifies EAP-TLS as the only available authentication method.
第23题:
Enable automatic updates on each client.
Enable the security center on each client.
Quarantine clients that do not have all available security updates installed.
Disconnect the remote connection until the required updates are installed.
第24题:
Create an IPsec Enforcement Network policy.
Create an 802.1X Enforcement Network policy.
Create a Wired Network (IEEE 802.3) Group policy.
Create an Extensible Authentication Protocol (EAP) Enforcement Network policy.