单选题You need to design a remote access strategy for the customer support users when they work from home. Your solution must meet security requirements. What should you do?()A Deploy an L2TP/IPsec VPN server in each call center. Configure the portable compu

题目
单选题
You need to design a remote access strategy for the customer support users when they work from home. Your solution must meet security requirements. What should you do?()
A

Deploy an L2TP/IPsec VPN server in each call center. Configure the portable computers as L2TP VPN clients

B

Create IPSec tunnel mode connections between the customer support users home and the company’s Internet-facing routers

C

Create IP packet filters on the company’s Internet-facing routers to allow the Remote Desktop Protocol (RDP).Create IPSec filters on the terminal servers to allow only connections that use RDP

D

Create IP packet filters on the company’s Internet-facing routers to allow the IPSec protocols. Assign the Secure Server (Require Security) IPSec policy to the terminal servers. Assign the Client (Respond only) IPSec policy to the portable computers


相似考题
更多“You need to design a remote access strategy for the customer”相关问题
  • 第1题:

    You are designing a remote access strategy to meet the business and technical Requirement.  What should you do?()

    • A、 Configure each server running Routing and Remote Access as a RADIUS Client.
    • B、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.
    • C、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.
    • D、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.

    正确答案:A

  • 第2题:

    You are designing a security strategy for users who need remote access to the corporate network. What should you do?()

    • A、Configure Internet Authentication Service (IAS) for accounting.
    • B、Configure the server running Routing and Remote Access to support L2TP.
    • C、Configure the server running Routing and Remote Access to restrict dial-in traffic to the NewApp servers only.
    • D、Create a separate account for remote access users. Configure these accounts to access the NewApp server only.

    正确答案:C

  • 第3题:

    You need to design a hosting service option for customers who want to access their databases by using their own Active Directory domain accounts. What should you do?()

    • A、Design a hosting service option that duplicates each customer’s domain user account as SQL Serverlogin account.
    • B、Design a hosting service option that provides VPN-based connectivity from each customer’s network tothe SQL Server computer that hosts that customer’s daabase or databases.
    • C、Design a hosting service option that provides a dedicated server to each customer.Join that server to that customer’s Active Directory domain
    • D、Design a hosting service option that configures a unique instance of SQL Server 2005 for each customer.Configure that instance to use Integrated Windows authentication.

    正确答案:C

  • 第4题:

    You need to recommend an IP addressing strategy for the client computers in the new sales office. What should you recommend implementing in the new sales office?()

    • A、DHCP server roles
    • B、the DirectAccess feature
    • C、the Network Policy Server (NPS) role service
    • D、the Remote Access Service role service

    正确答案:D

  • 第5题:

    单选题
    You are designing a remote access strategy to meet the business and technical Requirement.  What should you do?()
    A

     Configure each server running Routing and Remote Access as a RADIUS Client.

    B

     Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.

    C

     Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.

    D

     Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.


    正确答案: C
    解析: 暂无解析

  • 第6题:

    单选题
    You are designing a strategy to provide Internet access to all users.  What should you do?()
    A

     Configure Internet Connection Sharing on all client computers.

    B

     Configure Automatic Private IP Addressing (APIPA) on all client computers.

    C

     Configure one server as a Routing and Remote Access VPN server.

    D

     Configure one server as a Routing and Remote Access NAT router.


    正确答案: A
    解析: 暂无解析

  • 第7题:

    单选题
    You are designing a remote access strategy to meet the business & technical requirements.  Which authentication mechanism should you use?()
    A

     MS-CHAP v2.

    B

     Internet Authentication service (IAS).

    C

     Multilink & Bandwidth Allocation Protocol (BAP).

    D

     Remote access policies on all servers running Routing & Remote Access.


    正确答案: C
    解析: 暂无解析

  • 第8题:

    单选题
    You need to design an authentication solution for Terminal Services that meets the business requirements.What should you do?()
    A

    Configure the terminal server to use smart cards

    B

    Configure IPSec to permit only Remote Desktop Protocol (RDP) connections to the terminal server

    C

    Deny the Remote Desktop Users group access to the terminal server

    D

    Restrict treyresearch.com users from logging on locally to the terminal server


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    You need to design a remote access strategy for portable computers. Your solution must meet business requirements. What should you do?()
    A

    Issue a computer certificate to P_RAS1. Reconfigure the remote access policy on P_RAS1 to accept only EAP-MD5 authentication. Then, specify that P_RAS1’s computer certificate is to be used for authentication

    B

    Issue a user certificate to the Administrator account on P_RAS1. Reconfigure the remote access policy to accept only EAP-MD5 authentication. Then, specify that the Administrator account’s user certificate is to be used for authentication

    C

    Issue a computer certificate to P_RAS1. Reconfigure the remote access policy to accept only EAP-TLS authentication. Then, specify the P_RAS1’s computer certificate is to be used for authentication

    D

    Issue a user certificate to the Administrator account on P_RAS1. Reconfigure the remote access policy to accept only EAP-TLS authentication. Then, specify that the Administrator account’s user certificate is to be used for authentication


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    You are designing a remote access strategy to meet the business & technical requirements. Which authentication mechanism should you use?()
    A

    MS-CHAP v2.

    B

    Internet Authentication service (IAS).

    C

    Multilink & Bandwidth Allocation Protocol (BAP).

    D

    Remote access policies on all servers running Routing & Remote Access.


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    You need to design the configuration of the Windows Server 2003 Routing and Remote Access server in the Seattle office to meet business requirements. What should you do?()
    A

    Configure a remote access policy on the Routing and Remote Access server to require MS-CHAP v2 for all connections

    B

    Use a Group Policy object (GPO) to configure a Restricted Groups policy that applies to the Routing and Remote Access server. Use this Restricted Groups policy to remove all accounts form the local Users group, and then add authorized computer accounts

    C

    Configure the Routing and Remote Access server to use only PPTP connections

    D

    Configure the Routing and Remote Access server to use only IPSec over L2TP connections.Configure IPSec to use certificates


    正确答案: C
    解析: 暂无解析

  • 第12题:

    You are designing a remote access strategy to meet the business & technical requirements. Which authentication mechanism should you use?()

    • A、MS-CHAP v2.
    • B、Internet Authentication service (IAS).
    • C、Multilink & Bandwidth Allocation Protocol (BAP).
    • D、Remote access policies on all servers running Routing & Remote Access.

    正确答案:B

  • 第13题:

    You are designing a strategy to provide Internet access to all users.  What should you do?()

    • A、 Configure Internet Connection Sharing on all client computers.
    • B、 Configure Automatic Private IP Addressing (APIPA) on all client computers.
    • C、 Configure one server as a Routing and Remote Access VPN server.
    • D、 Configure one server as a Routing and Remote Access NAT router.

    正确答案:D

  • 第14题:

    You are designing a Windows 7 virtual desktop infrastructure.You have the following requirements:   Provide access to Remote Desktop Services RemoteApp sources from multiple remote desktop servers.  Support network load balancing.  Support reconnection to existing sessions on virtual desktops.    You need to specify a design that meets the requirements.   What should you include in your design?()

    • A、Remote Desktop Gateway
    • B、Remote Desktop Connection Broker
    • C、Windows Deployment Services
    • D、Windows Virtual PC and Windows XP Mode

    正确答案:B

  • 第15题:

    单选题
    You are designing a security strategy for users who need remote access to the corporate network.  What should you do?()
    A

     Configure Internet Authentication Service (IAS) for accounting.

    B

     Configure the server running Routing and Remote Access to support L2TP.

    C

     Configure the server running Routing and Remote Access to restrict dial-in traffic to the NewApp servers only.

    D

     Create a separate account for remote access users. Configure these accounts to access the NewApp server only.


    正确答案: A
    解析: 暂无解析

  • 第16题:

    单选题
    You need to design a security strategy for a remote e-mail access. What should you do?()
    A

    Require remote users to access e-mails by using Outlook Mobile Access

    B

    Require Outlook Web Access users to install the secure MIME ActiveX-Control and to encrypt all messages

    C

    On Outlook Web Access servers that accept connections from the Internet configure IIS to require SSL for all connections

    D

    On Outlook Web Access servers that accept connections from the Internet configure IIS to require Integrated Windows Authentication


    正确答案: A
    解析: 暂无解析

  • 第17题:

    单选题
    You need to design an access control strategy for the Payment folder for the Sales Managers group. What should you do?()
    A

    Use IPSec in transport mode

    B

    Use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV)

    C

    Use PEAP-EAP-TLS

    D

    Use Encrypting File System (EFS) remote encryption


    正确答案: C
    解析: 暂无解析

  • 第18题:

    单选题
    You need to recommend a Group Policy strategy for the Remote Desktop servers. What should you include in the recommendation?()
    A

    block inheritance

    B

    loopback processing

    C

    security filtering

    D

    WMI filtering


    正确答案: B
    解析: 暂无解析

  • 第19题:

    单选题
    You are designing a Windows 7 virtual desktop infrastructure.You have the following requirements:   Provide access to Remote Desktop Services RemoteApp sources from multiple remote desktop servers.  Support network load balancing.  Support reconnection to existing sessions on virtual desktops.    You need to specify a design that meets the requirements.   What should you include in your design?()
    A

    Remote Desktop Gateway

    B

    Remote Desktop Connection Broker

    C

    Windows Deployment Services

    D

    Windows Virtual PC and Windows XP Mode


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    You are designing a strategy to allow users to have remote access to internal resources. Which service or services should you allow on the public interface of the NAT Server?()
    A

    HTTP

    B

    LDAP

    C

    POP3

    D

    SMTP

    E

    VPN Gateway


    正确答案: A
    解析: 暂无解析

  • 第21题:

    单选题
    You need to design a remote access authentication strategy that will allow users in the IT department to remotely connect to the network. Your solution must meet security requirements. What should you do?()
    A

    Install Internet Authentication Services (IAS) on a server in the den.corp.woodgrovebank.com domain. Configure the VPN servers as RADIUS clients

    B

    Install Internet Authentication Services (IAS) on a stand-alone server in the Denver extranet. Create local user accounts for the IT personnel on the IAS server. Configure the VPN servers as RADIUS clients

    C

    Create a remote access policy on each of the VPN servers. Configure the policy to use the den.corp.woodgrovebank.com to authenticate remote access users. Configure the policy to require L2TP to establish a connection

    D

    Create a remote access policy on each of the VPN servers. Create local user accounts for the IT personnel on the VPN servers. Configure the policy to use the VPN servers’ local accounts database to authenticate users. Configure the policy to require L2TP to establish a connection


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    You need to recommend an IP addressing strategy for the client computers in the new sales office. What should you recommend implementing in the new sales office?()
    A

    DHCP server roles

    B

    the DirectAccess feature

    C

    the Network Policy Server (NPS) role service

    D

    the Remote Access Service role service


    正确答案: B
    解析: 暂无解析