From the Static Routes node, configure a static route.
From the server properties, configure SSL Certificate Binding.
From the NAT interface, add an address pool and a reservation.
From the NAT interface, configure the Secure Web Server (HTTPS) service.
第1题:
Your network contains a DNS server named Server1 that runs Windows Server 2008 R2.Root hints for Server1 are configured as shown in the exhibit. (Click the Exhibit button.)You need to add root hints to Server1.What should you do first?()
第2题:
Your Network contains a single AD Site.You install 10 new Exchange Server 2010 CAS.All servers are configured to use a wildcard certificate.Users connect to their Mailboxes by using Windows Mobile 6.5 devices.All devices are configured to connect to cas.contoso.com.You need to ensure that users can connect to their Mailboxes by using mail.contoso.com. Which cmdlet should you run?()
第3题:
Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest. The forest contains a single domain. You plan to deploy 10 Edge Transport servers on the perimeter network. You need to recommend a solution for the Edge Transport server deployment. The solution must meet the following requirements: .Allow administrators to apply a single security policy to all Edge Transport servers .Reduce the administrative overhead that is required to manage servers .Minimize the attack surface of the internal network What should you recommend?()
第4题:
You are a network administrator for your company. The network consists of a single Active Directory domain. The domain contains three Windows Server 2003 domain controllers, 20 Windows Server 2003 member servers, and 750 Windows XP Professional computers. The domain is configured to use only Kerberos authentication for all server connections.A user reports that she receives an "Access denied" error message when she attempts to connect to one of the member servers. You want to test the functionality of Kerberos authentication on the user’s client computer. Which command should you run from the command prompt on the user’s computer?()
第5题:
You work as the Exchange administrator at Company.com.The Company.com network contains an Exchange Server 2010 Organization.You are responsible for managing the Exchange network for Company.com.The network contains numerous Mailbox servers.During the course of the week you receive an instruction from the CIO to determine the message latency between the Mailbox servers in the organization.What should you do?()
第6题:
Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest. The forest contains a single domain. You plan to deploy 10 Edge Transport servers on the perimeter network. You need to recommend a solution for the Edge Transport server deployment. The solution must meet the following requirements: .Allow administrators to apply a single security policy to all Edge Transport servers .Reduce the administrative overhead that is required to manage servers .Minimize the attack surface of the internal network What should you recommend?()
第7题:
Your network contains 200 servers that run Windows Server 2008 R2. You need to archive the Security log for each server on a daily basis. Which tool should you use?()
第8题:
an exclusion range
a reservation
a superscope
a user class
第9题:
an exclusion range
a reservation
a superscope
a user class
第10题:
Acct-Session-Id
Acct-Status-Type
Class
NAS-Identifier
第11题:
Create a GlobalNames zone.
Create a reverse lookup zone.
Create a forward lookup zone.
Enable zone transfers on the contoso.com zone.
第12题:
Your network contains 100 servers that run Windows Server 2008 R2.A server named Server1 is deployed on the network. Server1 will be used to collect events from the Security event logs of the other servers on the network.You need to define the Custom Event Delivery Optimization settings on Server1.Which tool should you use?()
第13题:
You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains 50 application servers that run Windows Server 2003. The security configuration of the application servers is not uniform. The application servers were deployed by local administrators who configured the settings for each of the application servers differently based on their knowledge and skills. The application servers are configured with different authentication methods, audit settings, and account policy settings. The security team recently completed a new network security design. The design includes a baseline configuration for security settings on all servers. The baseline security settings use the Hisecws.inf predefined security template. The design also requires modified settings for servers in an application role. These settings include system service startup requirements, renaming the administrator account, and more stringent account lockout policies. The security team created a security template named Application.inf that contains the modified settings. You need to plan the deployment of the new security design. You need to ensure that all security settings for the application servers are standardized, and that after the deployment, the security settings on all application servers meet the design requirements. What should you do? ()
第14题:
You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster. The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template. You need to implement protective measures against the cluster’s most significant security vulnerability. What should you do? ()
第15题:
Your network contains a Network Policy Server (NPS) named Server1.NPS1 provides authentication for all of the VPN servers on the network.You need to track the usage information of all VPN connections.Which RADIUS attribute should you log?()
第16题:
Your network contains a domain-based Distributed File System (DFS) namespace named //contoso.com/DFS1. You have two servers named Server1 and Server2 that are configured as namespace servers for //contoso.com/DFS1. You need to verify that the DFS namespace replicates successfully between Server1 and Server2. Which tool should you use?()
第17题:
Your network is configured as shown in the following diagram. Each office contains a server that has the File Services server role installed. The servers have a shared folder named Resources. You need to plan the data availability of the Resources folder. Your plan must meet the following requirements: èIf a WAN link fails,the files in the Resources folder must be available in all of the offices. èIf a single server fails, the files in the Resources folder must be available in each of the branch offices,and the users must be able to use existing drive mappings. èYour plan must minimize network traffic over the WAN links. What should you include in your plan?()
第18题:
Set the IP address to 172.16.16.2.
Set the subnet mask to 255.255.255.128.
Set the default gateway address to 172.16.16.129.
Set the preferred DNS server address to 172.16.16.130.
第19题:
Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.
Use packet filtering on all inbound traffic to the cluster.
Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.
Use intrusion detection on the perimeter network.
第20题:
Rout add -p 10.128.4.0/22 10.128.4.1
Route add Cp 10.128.4.0/26 10.128.64.10
Route add Cp 10.128.4.0 mask 255.255.255.192 10.12.64.1
Route add Cp 10.128.64.10 mask 255.255.255.192 10.128.4.0
第21题:
In each perimeter network, deploy one Edge Transport server. Implement failover clustering.
In each perimeter network, deploy two Edge Transport servers. Implement failover clustering.
In each perimeter network, deploy one Edge Transport server. Configure a mail exchange (MX) record for each server.
In each perimeter network, deploy two Edge Transport servers. Configure a mail exchange (MX) record for each server.
第22题:
set-activesyncdeviceaccessrule
set-activesyncmailboxpolicy
set-activesyncorganizationsetting
set-activesyncvirtualdirectory