Ensuring secure presentations
Augmenting an existing network
Providing a temporary network need
Having freedom of movement within a network range
第1题:
第2题:
What are three project goals of a Technical Decision Maker? ()
第3题:
A consulting firm is locating 30 consultants at a client site for a nine-month project. What need does the firm have that can be met by a wireless solution? ()
第4题:
You are designing a remote administration solution that meets business requirements. You need to specify client or server software that will be required. What should you do?()
第5题:
You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory forest that contains two domains and one site. The funcitional level of the forest is set at Windows Server 2003. TestKing.com has a headquarters and two offices that are connected to each other via a WAN link. Furthermore, all these three offices have a direct link to the Internet. The domain controllers are configured as global catalog servers and runs Windows Server 2003 R2. All these three offices contain two global catalog servers. During the course of the day you receive aninstruction to install Mailbox, Client Access and Hub Transport Exchange Server 2010 servers in all these offices. One local server will be utilized at every office to send e-mail to the Internet. To ensure productivity you need to propose the necessary modifications to the Active Directory environment in order to supprt the installation. What should you do?()
第6题:
You have an Exchange Server 2010 organization. All users connect to their mailboxes by using Microsoft Office Outlook 2007 Service Pack 2 (SP2) andWindows 7. Your companys security administrators deploy Outlook Protection Rules. You need to recommend a client connection solution for the organization to ensure that Outlook ProtectionRules can be used. What should you recommend?()
第7题:
You need to recommend a strategy for delegating administration to the consulting firm.What should you recommend?()
第8题:
access-based enumeration (ABE)
folder redirection
the Active Directory site link cost
universal group membership caching
第9题:
Modify the Exchange virtual directory on the Client Access server in Site1.
Modify the Exchange virtual directory on the Client Access server in Site2.
Modify the OWA virtual directory on the Client Access server in Site1.
Modify the OWA virtual directory on the Client Access server in Site2.
第10题:
Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access point
Configure IEEE 802.1x authentication with smart cards
Configure the wireless network to use Wired Equivalent Privacy (WEP)
Install and configure an Internet Authentication Service (IAS) server
第11题:
Providing a temporary network need
Ensuring secure presentations
Having freedom of movement within a network range
Augmenting an existing network
第12题:
Ensure that all client computers have a graphical Telnet client installed
Ensure that all client computers have the Remote Desktop Connection client software installed
Ensure that all server computers have RCONSOLE installed and that it is configured to start automatically
Ensure that all server computers have Remote Administration (HTML) installed
第13题:
第14题:
A consulting firm is locating 30 consultants at a client site for a nine-month project. What need does the firm have that can be met by a wireless solution?()
第15题:
What will serve as a RADIUS Client to the Infranet Controller for 802.1x authentication? ()
第16题:
You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()
第17题:
You have a public computer that runs Windows XP Professional. All users log on to the computer by using the same user account. You log on to the computer by using the local administrator account and attempt to access a secure Web site. You discover that you have automatically logged on to the secure Web site by using the credential of another user. You need to connect to the secure Web site by using your own credentials. What should you do?()
第18题:
You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()
第19题:
Upgrade all client computers to Outlook 2010.
Instruct all users to connect to Outlook Web App (OWA).
Instruct all users to install the Rights Management Service (RMS) client.
Instruct all users to install the Secure/Multipurpose Internet Mail Extensions (S/MIME) control.
第20题:
Run ipconfig /flushdns at the command prompt.
Reset the password for the local administrator user account.
From the Internet Options in Internet Explorer, clear the AutoComplete history.
From the Internet Options in Internet Explorer, delete the Temporary Internet Files.
第21题:
This can be accomplished by ensuring that the site link building for the forest is disabled.
This can be accomplished by ensuring that the cost values for the default IP site link are changed.
This can be accomplished by ensuring that an Active Directory subnet as well as a site object iscreated for every office.
This can be accomplished by ensuring that one global catalog server in every office is upgraded to Windows Server 2008.
第22题:
the Client Access servers in Site1
the Client Access servers in Site2
the Hub Transport servers in Site1
the Hub Transport servers in Site2
第23题:
Create local user accounts.
Create domain user accounts.
Create IIS Manager user accounts.
Implement Active Directory Lightweight Directory Services (AD LDS).
第24题:
As soon as possible after a firm order
Immediately after the Pre-sale review
As near as possible to the scheduled ship date
After all the items in the site preparation are complete