Hostnames
IP Addresses
Machine Group Tag
Active Directory Groups
第1题:
Which of the following requires an update to the baseline after installing new software on a machine?()
第2题:
Machine policy templates can be assigned based on certain attributes of a machine. A customer organizes their machines based on the following requirements: The machines are all placed in specific Organizational Units in the Active Directory. The customer has Citrix Servers, and they have a specific naming convention meant only for their Citrix Servers. The customer has DHCP enabled for all the client machines. The customer has made it clear that they should not need to change anything in the existing infrastructure. Given these requirements, which single assignment attribute would be chosen for assigning machine policy templates?()
第3题:
Your network contains a Virtualization environment that includes the following: - 10 hosts that run VMware ESX Server 4.0 - Microsoft System Center Virtual Machine Manager - 50 Hyper-V hosts that run Windows Server 2008 R2 Each Virtualization host contains a minimum of 15 virtual machines (VMs). You need to recommend a solution to ensure that users can create and deploy VMs to any of the virtualization hosts. The VMs must be based on templates created by an administrator. What should you include in the recommendation?()
第4题:
You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()
第5题:
A bank runs 50 workstations and would like to decrease its electricity costs, while not sacrificing functionality. All of the workstations are high-end performance units that are intended to be used for CAD-like applications. Analysts benefit from the added performance, but tellers and associates could use more minimalist systems. Which of the following methods would decrease the banks electricity and hardware costs?()
第6题:
Swap all teller and associate machines with servers.
Swap all teller and associate machines with thin clients.
Swap all teller and associate machines with low-profile high-end workstations.
Swap all teller and associate machines with laptops.
第7题:
Configure a directory service access audit policy. Increase the maximum size of the security log.
Configure a directory service access audit policy. Set the system log to overwrite events older than 7 days.
Configure an object access audit policy for the directory. Increase the maximum size of the system log.
Configure an object access audit policy for the directory. Set the security log to overwrite events older than 7 days.
第8题:
Use the Security Configuration and Analysis snap-in.
Use the Resultant Set of Policy snap-in.
Run the Secedit /analyze command.
Run the Secedit /validate command.
第9题:
Signature-based NIPS
Signature-based NIDS
Honeypot
Behavior-based HIDS
第10题:
A route-based VPN generally uses less resources than a policy-based VPN.
A route-based VPN cannot have a deny action in a policy; a policy-based VPN can have a deny action.
A route-based VPN is better suited for dialup or remote access compared to a policy-based VPN.
A route-based VPN uses a policy referencing the IPsec VPN; a policy-based VPN policy does not use apolicy referencing the IPsec VPN
第11题:
you should consider using role based access control (rbac) and having a new management scope created.
you should consider using role based access control (rbac) and having the default management scope modified.
you should consider having a new direct role assignment created.
you should consider having a new management role assignment policy created.
第12题:
implementing the safety and environmental protection policy of the Company
preparing procedures to respond to emergency situations
verifying that specified requirements are observed
reviewing the SMS and reporting its deficiencies to the shore based management
第13题:
Which of the following technologies can provide geographically based load balancing with high availability between two web servers with static content?()
第14题:
Regarding a route-based versus policy-based IPsec VPN, which statement is true?()
第15题:
Your company has a single Active Directory directory service domain that includes a main office and two branch offices. Each branch office has its own Active Directory site. All user accounts are placed into organizational units (OUs) based on department. Multiple Group Policy objects (GPOs) are linked at the domain, the site, and the OU levels. A user in Atlanta transfers to a different branch office and joins a different department. You move her user account into the corresponding OU. After logging on to her new client computer, the user notices that the desktop settings are different from the settings she had in her previous location. You need to find out the effect of all GPOs on the user. What should you do?()
第16题:
You work as a network exchange administrator at company.com.thecompany.com network currently consists of a single active directory forest containing a single domain named company.com.the company.com organization makes use of microsoft exchange server 2010 as their messaging solution.in each of the organizational units in the company.com forest, a user has been identified to manage recipients in their specific organizational units.During the course of the business week you receive instruction from company.com to ensure that these chosen users will indeed have the ability to manage recipients in a specific organizational unit (ou).what should you do?()
第17题:
Your company has a server named Server1 that runs Windows Server 2008 and Microsoft Hyper-V. Server1 hosts three virtual machines. Company policy states that the virtual machines must not connect to the company network. You need to configure all of the virtual machines to connect to each other. You must meet the company policy. Which two actions should you perform?()
第18题:
Enable the Enable virtual LAN identification option for each virtual machine
Enable the Enable virtual LAN identification option for each virtual machine and then set the connection to Host for the network interface card
Set the Connection to None for the network interface card
Select the Not connected option for each virtual machine.
第19题:
Configure roles based on departments and assign access based on source IP address.
Configure roles based on the user's manager and assign access based on the user's MAC address
Configure roles based on group memberships and assign a specific VLAN to the role.
Configure roles based on RADIUS request attribute and assign a specific VLAN to the role.
第20题:
IDP policy templates are automatically installed as the active IDP policy.
IDP policy templates are enabled using a commit script.
IDP policy templates can be downloaded without an IDP license.
IDP policy templates are included in the factory-default configuration.
第21题:
Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computers
Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computers
Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computers
Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers
第22题:
Multicast
Active/passive cluster
Active/active cluster
DNS round robin
第23题:
Select the Not connected option for each virtual machine.
Enable the Enable virtual LAN identification option for each virtual machine.
Set the Connection to Host for the network interface card.
Set the Connection to None for the network interface card.