单选题You are designing a strategy to allow users to gain VPN access to the internal network.  What should you do?()A Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.B Allow all inbound VPN traffic to pass through the perimeter firewall only.C Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.D Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.

单选题
You are designing a strategy to allow users to gain VPN access to the internal network.  What should you do?()
A

 Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.

B

 Allow all inbound VPN traffic to pass through the perimeter firewall only.

C

 Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.

D

 Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.


参考解析

解析: 暂无解析

相关考题:

You are designing a strategy to allow users to have remote access to internal resources. Which service or services should you allow on the public interface of the NAT Server?()A、HTTPB、LDAPC、POP3D、SMTPE、VPN Gateway

You are designing a strategy of enforce the corporate security policy. Which action or actions should you perform?()A、Configure a password policy that requires strong passwords  B、Configure a password policy that requires all users to change their passwords once a month.  C、Allow users in the branch offices to log on between the hours of 8:00 AM and 5:00 PM, Monday through Friday.  D、Allow users in the retail outlets to log on between the hours of 6:00 AM and 11:00 PM, daily. E、Enable a policy that forces users to log off when their logon hours expire.

You are designing a strategy to ensure that VPN users are able to access all internal resources.  What should you do?()A、 Specify a static routing table entry on VPN1 for the Dallas network.B、 Specify a static routing table entry on VPN1 for the Seattle network.C、 Implement Internet Authentication Service (IAS) on VPN1.D、 Define a User Class option for Routing  Remote Access Clients on the DHCP Server.

You are designing the IP address assignment strategy for the VPN users. Which two actions should you perform.()A、 Configure VPN1 as a DHCP Relay Agent.B、 Configure VPN1 to assign IP Address by using DHCP server.C、 Configure VPN1 to have a static pool of IP Address from the network address of 131.107.1.0/24.D、 Configure VPN1 to have a static pool of IP Address from the network address of 192.168.1.0/24.E、 Configure the perimeter firewall to allow inbound DHCP traffic to be passed to VPN1.F、 Configure the interval firewall to allow DHCP broadcasts to be forwarded from the external network to the internal network.

You are designing a VPN Server strategy to meet the business and technical requirement.  What should you do? ()A、 Configure all client computers to point to a VPN server in Amsterdam.B、 Configure all client computers to use Multilink Bandwidth Allocation Protocol (BAP).C、 Create a network Load Balancing cluster of VPN servers.D、 Create a shutdown script for the VPN servers to delete the host(A) resource record of the VPN sever from the DNS database when the VPN server are shutdown.

You need to design a remote access strategy for the customer support users when they work from home. Your solution must meet security requirements. What should you do?()A、Deploy an L2TP/IPsec VPN server in each call center. Configure the portable computers as L2TP VPN clientsB、Create IPSec tunnel mode connections between the customer support users home and the company’s Internet-facing routersC、Create IP packet filters on the company’s Internet-facing routers to allow the Remote Desktop Protocol (RDP).Create IPSec filters on the terminal servers to allow only connections that use RDPD、Create IP packet filters on the company’s Internet-facing routers to allow the IPSec protocols. Assign the Secure Server (Require Security) IPSec policy to the terminal servers. Assign the Client (Respond only) IPSec policy to the portable computers

You are designing an IP addressing strategy for your VPN solution. How many public addresses should you use?()A、1B、25C、50D、255

You are designing a strategy to meet the security and financial requirements related to the Manifest application.  What should you do? ()A、 Configure a VPN server in Sydney.B、 Configure a VPN server in each branch office.C、 Configure a dial-up server in SydneyD、 Configure a dial-up server in each branch office.

You are designing a strategy to allow users to gain VPN access to the internal network.  What should you do?()A、 Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.B、 Allow all inbound VPN traffic to pass through the perimeter firewall only.C、 Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.D、 Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.

You are designing a VPN strategy to meet the business and technical requirements. Based on the current infrastructure,  what is the maximum number of VPN connections that can be supported? ()A、 25B、 35C、 70D、 128E、 256

You are designing a strategy to provide Internet access to all users.  What should you do?()A、 Configure Internet Connection Sharing on all client computers.B、 Configure Automatic Private IP Addressing (APIPA) on all client computers.C、 Configure one server as a Routing and Remote Access VPN server.D、 Configure one server as a Routing and Remote Access NAT router.

You are designing a DNS name resolution strategy to allow all users access to internal and external web sites.  What should you do?()A、 Allow zone transfers to any DNS server.B、 Create a new stub zone for the DNS zone on the DNS server.C、 Configure the DNS server to forward all unanswered queries to a DNS server located at the ISPD、 Add the DNS server located at the ISP to the list of name servers for the fourthcoffee.com DNS zone

You are designing a strategy for migrating to the new environment.  Which two factions from your current environment will affect your migration strategy?()A、 Trusts between domainsB、 Number of BDC s in each domainC、 Users and resources in each domainD、 Current hardware for domain controllersE、 Current amount of replication traffic over WAN links

单选题You are designing an IP addressing strategy for your VPN solution.  How many public addresses should you use?()A 1B 25C 50D 255

单选题You are designing a strategy to allow users to gain VPN access to the internal network. What should you do?()AAllow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.BAllow all inbound VPN traffic to pass through the perimeter firewall only.  CAllow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.DAllow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.

单选题You are designing a strategy to provide Internet access to all users.  What should you do?()A Configure Internet Connection Sharing on all client computers.B Configure Automatic Private IP Addressing (APIPA) on all client computers.C Configure one server as a Routing and Remote Access VPN server.D Configure one server as a Routing and Remote Access NAT router.

单选题You are designing a strategy to meet the security and financial requirements related to the Manifest application.  What should you do? ()A Configure a VPN server in Sydney.B Configure a VPN server in each branch office.C Configure a dial-up server in SydneyD Configure a dial-up server in each branch office.

单选题You are designing a VPN strategy to meet the business and technical requirements. Based on the current infrastructure,  what is the maximum number of VPN connections that can be supported? ()A 25B 35C 70D 128E 256

单选题You are designing a strategy to allow users to have remote access to internal resources. Which service or services should you allow on the public interface of the NAT Server?()AHTTPBLDAPCPOP3DSMTPEVPN Gateway

单选题You are designing a DNS name resolution strategy to allow all users access to internal and external web sites.  What should you do?()A Allow zone transfers to any DNS server.B Create a new stub zone for the DNS zone on the DNS server.C Configure the DNS server to forward all unanswered queries to a DNS server located at the ISPD Add the DNS server located at the ISP to the list of name servers for the fourthcoffee.com DNS zone

单选题You deploy Windows Server 2008 VPN server behind a firewall. Remote users connect to the VPN by using portable computers that run Windows Vista with the latest service pack. The firewall is configured to allow only secured web communications. You need to enable remote users to connect as securely as possible. you must achieve this goal without opening any additional ports on the firewall.  What should you do ( )?ACreate an IPsec tunnelBCreate an SSTP VPN connectionCCreate a PPTP VPN connectionDCreate an L2TP VPN connection

单选题You deploy a Windows Server 2008 VPN server behind a firewall. Remote users connect to the VPN by using portable computers that run Windows Vista with the latest service pack.  The firewall is configured to allow only secured Web communications. You need to enable remote users to connect as securely as possible. You must achieve this goal without opening any additional ports on the firewall.What should you do?()ACreate an IPsec tunnel.BCreate an SSTP VPN connection.CCreate a PPTP VPN connection.DCreate an L2TP VPN connection.

单选题You are designing a strategy to allow users to have remote access to internal resources.   Which service or services should you allow on the public interface of the NAT Server?()A HTTPB LDAPC POP3D SMTPE VPN Gateway

单选题You are designing an IP addressing strategy for your VPN solution. How many public addresses should you use?()A1B25C50D255

单选题You are designing a VPN Server strategy to meet the business and technical requirement.  What should you do? ()A Configure all client computers to point to a VPN server in Amsterdam.B Configure all client computers to use Multilink Bandwidth Allocation Protocol (BAP).C Create a network Load Balancing cluster of VPN servers.D Create a shutdown script for the VPN servers to delete the host(A) resource record of the VPN sever from the DNS database when the VPN server are shutdown.