A.ip route 0.0.0.0 0.0.0.0 s0/0/0
B.ip route 0.0.0.0 0.0.0.0 209.165.200.226
C.ip route 209.165.200.0 255.255.255.0 192.168.1.250
D.ip route 192.168.1.0 255.255.255.0 209.165.100.250
第1题:
What must be configured on the network in order for users on the Internet to view web pages located on Web Server 2?()
第2题:
Your network consists of a single Active Directory domain. All network servers run Windows Server2003 Service Pack 2 (SP2).Your organization has a storage area network (SAN). All shared folders on file servers are stored on theSAN.The Change permission for all shared folders is assigned to Domain Users. Different NTFS permissionsare also applied to the shared folders.You perform a daily full backup of all the files stored in the shared folders.A file server fails and requires several hours to repair.You need to provide users access to the shared folders that were on the failed file server as quickly aspossible. Existing permissions must be retained for all files.What should you do? ()
第3题:
Your company has a main office and a branch office. Your network contains a single Active Directory domain. The functional level of the domain is Windows Server 2008 R2. An Active Directory site exists for each office. All servers run Windows Server 2008 R2. You plan to deploy file servers in each office. You need to design a file sharing strategy to meet the following requirements: èUsers in bothoffices must be able to access the same files. èUsers in both offices must use the same Universal Naming Convention (UNC) path to access files. èThe design must reduce the amount of bandwidth used to access files. èUsers must be able to access files even if a server fails. What should you include in your design?()
第4题:
Your company has two branch offices that connect by using a WAN link. Each office contains a server that runs Windows Server 2008 R2 and that functions as a file server. Users in each office store data on the local file server. Users have access to data from the other office. You need to plan a data access solution that meets the following requirements: èFolders that are stored on the file servers must be available to users in both offices. èNetwork bandwidth usage between offices must be minimized. èUsers must be able to access all files in the event that a WAN link fails. What should you include in your plan?()
第5题:
Restore the files to their original location and select the Replace existing files option.
Restore the files to their original location and select the Replace existing files if they are older than the backup files option.
Restore the files to an alternate location. Copy the files to the shared folder and choose to overwrite the files with duplicate file names.
Restore the files to an alternate location. Copy the files to the shared folder and choose not to overwrite thefiles with duplicate file names.
第6题:
Enable access-based enumeration (ABE) on the share.
Assign the Read NTFS permission to the Domain Users group.
From the Network and Sharing Center, enable public folder sharing.
From the File Sharing Wizard, configure the Read permission level for the Domain Users group.
第7题:
Create a file screen exception.
Modify the Audio and Video file group.
Implement an active file screen on C:/Data/Sales.
Implement a passive file screen on C:/Data/Sales.
第8题:
On router R2, configure a default static route to the 192.168.1.0 network.
On router R2, configure DNS to resolve the URL assigned to Web Server 2 to the 192.168.1.10 address.
On router R1, configure NAT to translate an address on the 209.165.100.0/24 network to 192.168.1.10.
On router R1, configure DHCP to assign a registered IP address on the 209.165.100.0/24 network to Web Server 2.
第9题:
Modify the NTFS permissions
Modify the Share permissions
Enable access-based enumeration
Configure Dynamic Access Control
第10题:
Deactivate all LM and NTLM authentication methods on FSS1 server
Use IIS to publish the confidential files, activate SSL on the IIS server, and then open the files as a web folder
Use IPsec encryption between the FSS1 server and the computers of the users who need to access the confidential files.
Use the Server Message Block (SMB) signing between the FSS1 server and the computers of the users who want to access the confidential files.
Activate offline files for the confidential files that are stored on the FSS1 server. In the Folder avanced Properties box, select the Encrypt contents to secure data optiion
第11题:
Configure the system event log to Do not overwrite.
In IAS, in Remote Access Logging, enable the Authentication requests setting.
Configure the Remote Access server to Log all events.
Create a custom remote access policy and configure it for Authentication-Type.
第12题:
You are the network administrator for The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. All confidential company files are stored on a file server named TestKing1. The written company security states that all confidential data must be stored and transmitted in a secure manner. To comply with the security policy, you enable Encrypting File System (EFS) on the confidential files. You also add EFS certificates to the data decryption field (DDF) of the confidential files for the users who need to access them. While performing network monitoring, you notice that the confidential files that are stored on TestKing1 are being transmitted over the network without encryption. You must ensure that encryption is always used when the confidential files on TestKing1 are stored and transmitted over the network. What are two possible ways to accomplish this goal? ()(Each correct answer presents a complete solution. Choose two)
第13题:
Your company has a single active directory domain. All servers run windows server 2008. The company network has 10 servers that perform as web servers. All confidential files are located on a server named FSS1. The company security policy states that all confidential data must be transmitted in the most secure manner. When you monitor the network, you notice that the confidential files are stored on FSS1 server are being transmitted over the network without encryption. You need to ensure that encryption is always used when the confidential files on the FSS1 server are transmitted over the network. What are two possible ways to achieve this goal? ()
第14题:
Your network contains a Windows Server 2008 R2 server that functions as a file server. All users have laptop computers that run Windows 7. The network is not connected to the Internet. Users save files to a shared folder on the server. You need to design a data provisioning solution that meets the following requirements: èUsers who are not connected to the corporate network must be able to access the files and the folders in the corporate network. èUnauthorized users must not have access to the cached files and folders. What should you do?()
第15题:
Deactivate all LM and NTLM authentication methods on the FSS1 server
Use IIS to publish the confidentials files. activate SSL on the ISS server, and then open the files as a web folder.
Use IPSec encryption between the FSS1 server and the computers of the users who need to access the confidential files
Use the Server Message Block (SMB) signing between the FSS1 server and the computers of the users who want to access the confidential files.
Activate offline files for the confidential files that are stored on the FSS1 server. In the Folder Advanced.Properties dialog box, select the Encrypt contents to secure data option.
第16题:
On both servers, implement DFS Replication.
On both servers, install and configure File Server Resource Manager (FSRM) and File Replication service (FRS).
On one server, install and configure File Server Resource Manager (FSRM). On the other server,install and configure File Replication Service (FRS).
On one server, install and configure Distributed File System (DFS). On the other server, install and configure the Background Intelligent Transfer Service (BITS).
第17题:
Use Task Manager to review network utilization of the VPN adapter.
Use the Performance console to create a log of network utilization outside of business hours.
Use System Monitor to review network utilization of the VPN connection.
Use Task Manager to select Bytes Sent as the Network Adapter History setting.
第18题:
Deactivate all LM and NTLM authentication methods on FSS1 server.
Use IIS to publish the confidential files, activate SSL on the IIS server, and then open the files as a web folder.
Use IPsec encryption between the FSS1 server and the computers of the users who need to access the confidential files.
Use the server message block (SMB) signing between the FSS1 serve and the computers of the users who want to access the confidential files.
Activate offline files for the confidential files that are stored on the FSS1 server. In the folder advanced properties box, select the encrypt contents to secure data option.
第19题:
Configure a static IP address.
Configure the default gateway.
Configure the DNS server address.
Add the domain to the DNS suffix on the network interface.
第20题:
Configure a static IP address
Configure the default gateway
Configure the DNS server address
Add the domain to the DNS suffix on the network interface
第21题:
Deploy one Microsoft SharePoint Foundation 2010 site. Require users to access the SharePoint site by using a Secure Socket Transmission Protocol (SSTP) connection.
Deploy two Microsoft SharePoint Foundation 2010 sites.Configure one site for internal users. Configure the other site for remote users. Publish the SharePoint sites by using HTTPS.
Configure a Network Policy and Access Services (NPAS) server to act as a VPN server. Require remote users to access the files by using an IPsec connection to the VPN server.
Store all sensitive files in folders that are encrypted by using Encrypting File System (EFS). Require remote users to access the files by using Secure Socket Transmission Protocol (SSTP).