Enroll each administrative account for a smart card authentication certificate.
Configure autoenrollment for computer authentication certificates.
Install a smart card reader on each server computer.
Install a smart card reader on each network administrator’s computer.
Configure each administrative account to require a smart card for interactive logon.
Configure the Default Domain Policy GPO to require smart cards for interactive login.
第1题:
You are designing an authentication strategy for the accounting department. Your solution must meet business requirements. What should you do?()
第2题:
You have an Exchange 2010 organization. Your companys security policy states that all connections to Outlook Web App (OWA) must use smartcard authentication. You need to recommend a solution to meet the security policy requirements. Which two possible ways to achieve this goal should you recommend?()
第3题:
You are designing an access control strategy for WEB2. Your solution must meet business requirements. What should you do?()
第4题:
MS-CHAP v2.
Internet Authentication service (IAS).
Multilink & Bandwidth Allocation Protocol (BAP).
Remote access policies on all servers running Routing & Remote Access.
第5题:
One
Two
Three
Four
第6题:
Increase the default lease time on all DHCP servers.
Split all address ranges across multiple DHCP servers.
Configure duplicate scopes on at least two DHCP servers.
Force client computers to obtain an IP address from Automatic Private IP Addressing (APIPA).
第7题:
a list of applications currently in use in the network
IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats
detailed security device specifications
results from pilot network testing
第8题:
Increase the default lease time on all DHCP servers.
Split all address ranges across multiple DHCP servers.
Configure duplicate scopes on at least two DHCP servers.
Force client computers to obtain an IP address from Automatic Private IP Addressing (APIPA).
第9题:
You are designing a remote access strategy to meet the business & technical requirements. Which authentication mechanism should you use?()
第10题:
You are designing the Active Directory infrastructure to meet the business and technical requirements. You run ADSizer, and find that it provides a solution that contains only one domain controller for Amsterdam. What should you do?()
第11题:
Los Angeles
Paris
Sydney
Lisbon
Barcelona
第12题:
Configure a demand-dial router.
Create multiple Active Directory site links.
Configure a VPN connection between each branch office.
Install an Internet Authentication Service (IAS) server in each branch office.
第13题:
One
Two
Three
Four
第14题:
Configure a demand-dial router.
Create multiple Active Directory site links.
Configure a VPN connection between each branch office.
Install an Internet Authentication Service (IAS) server in each branch office.
第15题:
Sub Zones
Standard Primary Zones
Secondary Zones
Active DirectoryIntegrated Zones