Configure a VPN server in Sydney.
Configure a VPN server in each branch office.
Configure a dial-up server in Sydney
Configure a dial-up server in each branch office.
第1题:
You are designing a remote access strategy to meet the business & technical requirements. Which authentication mechanism should you use?()
第2题:
You are designing a security strategy for the public Web server. You solution must address the chief security officer’s concerns. What should you do?()
第3题:
You are designing a strategy for configuring a newly installed Windows Server 2003 computer to meet the Active Directory DNS requirements. How should you configure the computer?()
第4题:
As a caching-only DNS servers
As the primary DNS server for the fourthcoffee.com DNS zone
With a stub zone for the fourthcoffee.com DNS zone hosted by the ISP
As a secondary DNS server for the fourthcoffee.com DNS zone hosted by the ISP
第5题:
Configure a demand-dial router.
Create multiple Active Directory site links.
Configure a VPN connection between each branch office.
Install an Internet Authentication Service (IAS) server in each branch office.
第6题:
One
Two
Three
Four
第7题:
ad
woodgrovead
woodgrovebank
woodgrovebank.com
第8题:
EAP-TLS authentication
MS-CHAP v2 authentication
a stand-alone certification server
an enterprise certification server
MPPE 56-bit encryption
第9题:
Sub Zones
Standard Primary Zones
Secondary Zones
Active DirectoryIntegrated Zones
第10题:
Place all infrastructure servers in subnets that cannot exchange information with the Internet
Establish a custom security template that contains unique required settings for each combination of services that run on the infrastructure servers
Use Group Policy objects (GPOs) to apply the custom security template or templates to the Infrastructure servers
Edit the local policy settings to configure each individual server
第11题:
You are designing a VPN strategy to meet the business and technical requirements. Based on the current infrastructure, what is the maximum number of VPN connections that can be supported? ()
第12题:
You are designing the security for dial-up remote access to meet the business and technical requirements. Which two mechanisms should you use? ()
第13题:
Your environment includes multiple Windows Server 2008 R2 Hyper-V servers. You are designing an administrative strategy for virtual machines (VMs). You need to ensure that members of the Security Compliance Active Directory Domain Services (AD DS) security group can monitor failed logon events on the VMs. What should you do?()
第14题:
MS-CHAP v2.
Internet Authentication service (IAS).
Multilink & Bandwidth Allocation Protocol (BAP).
Remote access policies on all servers running Routing & Remote Access.
第15题:
25
35
70
128
256
第16题:
Configure a demand-dial router.
Create multiple Active Directory site links.
Configure a VPN connection between each branch office.
Install an Internet Authentication Service (IAS) server in each branch office.
第17题:
Add the Security Compliance group to the local administrators group of each VM
Add the Security Compliance group to the local administrators group of each Hyper-V server
In the InitialStore.xml file of each VM, define an access policy for the Security Compliance group
in the InitialStore.xml file of each Hyper-V server, define an access policy for the Security Compliance group
第18题:
Sub Zones
Standard Primary Zones
Secondary Zones
Active DirectoryIntegrated Zones
第19题:
east
west
quebec
newyork
northamerica
wideworldimporters
第20题:
ad
woodgrovead
woodgrovebank
woodgrovebank.com