单选题You are designing a strategy to meet the security and financial requirements related to the Manifest application.  What should you do? ()AConfigure a VPN server in Sydney.BConfigure a VPN server in each branch office.CConfigure a dial-up server in Sydn

题目
单选题
You are designing a strategy to meet the security and financial requirements related to the Manifest application.  What should you do? ()
A

 Configure a VPN server in Sydney.

B

 Configure a VPN server in each branch office.

C

 Configure a dial-up server in Sydney

D

 Configure a dial-up server in each branch office.


相似考题
更多“You are designing a strategy to meet the security and financ”相关问题
  • 第1题:

    You are designing a remote access strategy to meet the business & technical requirements. Which authentication mechanism should you use?()

    • A、MS-CHAP v2.
    • B、Internet Authentication service (IAS).
    • C、Multilink & Bandwidth Allocation Protocol (BAP).
    • D、Remote access policies on all servers running Routing & Remote Access.

    正确答案:B

  • 第2题:

    You are designing a security strategy for the public Web server. You solution must address the chief security officer’s concerns. What should you do?()

    • A、Install  a Web server certificate on WEB1
    • B、Enable Internet Connection Firewalll (ICF) on WEB1
    • C、Configure IIS on WEB1 to operate in IIS 5.0 isolation mode
    • D、Install and configure the URLScan ISAPI filer on WEB1

    正确答案:D

  • 第3题:

    You are designing a strategy for configuring a newly installed Windows Server 2003 computer to meet the Active Directory DNS requirements.  How should you configure the computer?()

    • A、 As a caching-only DNS servers
    • B、 As the primary DNS server for the fourthcoffee.com DNS zone
    • C、 With a stub zone for the fourthcoffee.com DNS zone hosted by the ISP
    • D、 As a secondary DNS server for the fourthcoffee.com DNS zone hosted by the ISP

    正确答案:B

  • 第4题:

    单选题
    You are designing a strategy for configuring a newly installed Windows Server 2003 computer to meet the Active Directory DNS requirements.  How should you configure the computer?()
    A

     As a caching-only DNS servers

    B

     As the primary DNS server for the fourthcoffee.com DNS zone

    C

     With a stub zone for the fourthcoffee.com DNS zone hosted by the ISP

    D

     As a secondary DNS server for the fourthcoffee.com DNS zone hosted by the ISP


    正确答案: B
    解析: 暂无解析

  • 第5题:

    单选题
    You are designing a WAN implementation strategy to meet the business and technical requirements. What should you do?()
    A

    Configure a demand-dial router.

    B

    Create multiple Active Directory site links.

    C

    Configure a VPN connection between each branch office.

    D

    Install an Internet Authentication Service (IAS) server in each branch office.


    正确答案: C
    解析: 暂无解析

  • 第6题:

    单选题
    You are designing a forest structure to meet the business and technical requirements. How many forests should you create?()
    A

    One

    B

    Two

    C

    Three

    D

    Four


    正确答案: B
    解析: 暂无解析

  • 第7题:

    单选题
    You are designing a new NETBIOS naming strategy for the corporate environment.  Which domain name should you use?()
    A

     ad

    B

     woodgrovead

    C

     woodgrovebank

    D

     woodgrovebank.com


    正确答案: A
    解析: 暂无解析

  • 第8题:

    多选题
    You are designing the security for dial-up remote access to meet the business and technical requirements.   Which two mechanisms should you use? ()
    A

    EAP-TLS authentication

    B

    MS-CHAP v2 authentication

    C

    a stand-alone certification server

    D

    an enterprise certification server

    E

    MPPE 56-bit encryption


    正确答案: A,D
    解析: 暂无解析

  • 第9题:

    单选题
    You are designing a DNS implementing strategy to meet the business and technical requirement. Which type of zone should you use?()
    A

    Sub Zones

    B

    Standard Primary Zones

    C

    Secondary Zones

    D

    Active DirectoryIntegrated Zones 


    正确答案: B
    解析: 暂无解析

  • 第10题:

    多选题
    You are designing a security strategy for the infrastructure servers at the resorts.Which two actions should you perform?(Each correct answer presents part of the solution. Choose two)()
    A

    Place all infrastructure servers in subnets that cannot exchange information with the Internet

    B

    Establish a custom security template that contains unique required settings for each combination of services that run on the infrastructure servers

    C

    Use Group Policy objects (GPOs) to apply the custom security template or templates to the Infrastructure servers

    D

    Edit the local policy settings to configure each individual server


    正确答案: A,B
    解析: 暂无解析

  • 第11题:

    You are designing a VPN strategy to meet the business and technical requirements. Based on the current infrastructure,  what is the maximum number of VPN connections that can be supported? ()

    • A、 25
    • B、 35
    • C、 70
    • D、 128
    • E、 256

    正确答案:B

  • 第12题:

    You are designing the security for dial-up remote access to meet the business and technical requirements.   Which two mechanisms should you use? ()

    • A、 EAP-TLS authentication
    • B、 MS-CHAP v2 authentication
    • C、 a stand-alone certification server
    • D、 an enterprise certification server
    • E、 MPPE 56-bit encryption

    正确答案:A,D

  • 第13题:

    Your environment includes multiple Windows Server 2008 R2 Hyper-V servers. You are designing an administrative strategy for virtual machines (VMs). You need to ensure that members of the Security Compliance Active Directory Domain Services (AD DS) security group can monitor failed logon events on the VMs. What should you do?()

    • A、Add the Security Compliance group to the local administrators group of each VM
    • B、Add the Security Compliance group to the local administrators group of each Hyper-V server
    • C、In the InitialStore.xml file of each VM, define an access policy for the Security Compliance group
    • D、in the InitialStore.xml file of each Hyper-V server, define an access policy for the Security Compliance group

    正确答案:A

  • 第14题:

    单选题
    You are designing a remote access strategy to meet the business & technical requirements.  Which authentication mechanism should you use?()
    A

     MS-CHAP v2.

    B

     Internet Authentication service (IAS).

    C

     Multilink & Bandwidth Allocation Protocol (BAP).

    D

     Remote access policies on all servers running Routing & Remote Access.


    正确答案: C
    解析: 暂无解析

  • 第15题:

    单选题
    You are designing a VPN strategy to meet the business and technical requirements. Based on the current infrastructure,  what is the maximum number of VPN connections that can be supported? ()
    A

     25

    B

     35

    C

     70

    D

     128

    E

     256


    正确答案: C
    解析: 暂无解析

  • 第16题:

    单选题
    You are designing a WAN implementation strategy to meet the business and technical requirements.  What should you do? ()
    A

     Configure a demand-dial router.

    B

     Create multiple Active Directory site links.

    C

     Configure a VPN connection between each branch office.

    D

     Install an Internet Authentication Service (IAS) server in each branch office.


    正确答案: B
    解析: 暂无解析

  • 第17题:

    单选题
    Your environment includes multiple Windows Server 2008 R2 Hyper-V servers. You are designing an administrative strategy for virtual machines (VMs). You need to ensure that members of the Security Compliance Active Directory Domain Services (AD DS) security group can monitor failed logon events on the VMs. What should you do?()
    A

    Add the Security Compliance group to the local administrators group of each VM

    B

    Add the Security Compliance group to the local administrators group of each Hyper-V server

    C

    In the InitialStore.xml file of each VM, define an access policy for the Security Compliance group

    D

    in the InitialStore.xml file of each Hyper-V server, define an access policy for the Security Compliance group


    正确答案: B
    解析: 暂无解析

  • 第18题:

    单选题
    You are designing a DNS implementing strategy to meet the business and technical requirement.  Which type of zone should you use?()
    A

     Sub Zones

    B

     Standard Primary Zones

    C

     Secondary Zones

    D

     Active DirectoryIntegrated Zones


    正确答案: D
    解析: 暂无解析

  • 第19题:

    多选题
    You are designing the NetBIOS domain naming strategy for the company. Which NetBIOS domain name or names should you use?()
    A

    east

    B

    west

    C

    quebec

    D

    newyork

    E

    northamerica

    F

    wideworldimporters


    正确答案: E,C
    解析: 暂无解析

  • 第20题:

    单选题
    You are designing a new NETBIOS naming strategy for the corporate environment. Which domain name should you use?()
    A

    ad

    B

    woodgrovead

    C

    woodgrovebank

    D

    woodgrovebank.com


    正确答案: B
    解析: 暂无解析