单选题Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  What should you do?()AConfigure all access points as RADIUS clients to the Remediation Servers.BConfigure all access points as RADIUS clients to the Network Policy Server (NPS).CCreate a Network Policy that defines Remote Access Server as a network connection method.DCreate a Network Policy that specifies EAP-TLS as the only available authentication method.

单选题
Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  What should you do?()
A

Configure all access points as RADIUS clients to the Remediation Servers.

B

Configure all access points as RADIUS clients to the Network Policy Server (NPS).

C

Create a Network Policy that defines Remote Access Server as a network connection method.

D

Create a Network Policy that specifies EAP-TLS as the only available authentication method.


参考解析

解析: 暂无解析

相关考题:

Network Access Protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The company policy required confidentiality of data when the data is in transmit between the portable computers and the servers. You need to ensure taht users can access network resources only from computers that comply with the company policy. What should you do? ()A、 Create an IPsec Enforcement Network policyB、 Create an 802.1X enforcement network policyC、 Create a wired network (IEEE 802.3) Group PolicyD、 Create an Extensible Authentication Portocol (EAP) Enforcement Network Policy

Your company has Active Directory Certificate Services (AD CS) and Network Access Protection (NAP)  deployed on the network. You need to ensure that NAP policies are enforced on portable computers taht  use a wireless connection to access the network. What should you do?()A、 Configure all access points to use 802.1X authenticationB、 Configure all protable computers to use MS-CHAP v2 authenticationC、 Use the Group Policy Management Console to access the wireless group policy settings, and enable the Prevent connections to ad-hoc networks option.D、 Use the Group Policy Management Console to access the wireless group policy settings, and disable the Prevent connections to infrastructure networks option.

Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point.You need to ensure that all client computers that access the network are evaluated by NAP. What should you do?()A、Configure all access points as RADIUS clients to the Remediation Servers.B、Configure all access points as RADIUS clients to the Network Policy Server (NPS).C、Create a Network Policy that defines Remote Access Server as a network connection method.D、Create a Network Policy that specifies EAP-TLS as the only available authentication method.

Your company's corporate network uses Network Access Protection (NAP).Users are able to connect to the corporate network remotely.You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do?()A、Apply an IPsec NAP policy.B、Configure a NAP policy for 802.1X wireless connections.C、Configure VPN connections to use MS-CHAP v2 authentication.D、Restrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP.

Your company has active directory certificate services (AD CS) and network access protection (NAP) deployed on the network. You need to configure the wireless network to accept smart cards. What should you do?()A、Configure the wireless network to use WPA2, PEAP and MSCHAP v2.B、Configure the wireless network to use WPA2, 802.1X authentication and EAP-TLS.C、Configure the wireless network to use WEP, 802.1X authentication, PEAP, and MSCHAP v2.D、Configure the wireless network to use WEP,PEAP, and MSCHAP v2 and also require strong user passwords.

Network Access Protection (NAP) is configured for the corporate network.Users connect to the corporate network by using portable computers.The company policy requires confidentiality of data when the data is in transit between the portable computers and the servers.You need to ensure that users can access network resources only from computers that comply with the company policy.What should you do?()A、Create an IPsec Enforcement Network policy.B、Create an 802.1X Enforcement Network policy.C、Create a Wired Network (IEEE 802.3) Group policy.D、Create an Extensible Authentication Protocol (EAP) Enforcement Network policy.

You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()A、Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access pointB、Configure IEEE 802.1x authentication with smart cardsC、Configure the wireless network to use Wired Equivalent Privacy (WEP)D、Install and configure an Internet Authentication Service (IAS) server

Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  What should you do?()A、Configure all access points as RADIUS clients to the Remediation Servers.B、Configure all access points as RADIUS clients to the Network Policy Server (NPS).C、Create a Network Policy that defines Remote Access Server as a network connection method.D、Create a Network Policy that specifies EAP-TLS as the only available authentication method.

You need to design a Security strategy for the wireless network at all resort locations.What should you do?()A、Connect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Require company users to establish a VPN to access company resourcesB、Install Internet Authentication Service (IAS) on a domain controller.Configure the wireless access points to require IEEE 802.1x authenticationC、Establish IPSec policies on all company servers to request encryption from all computers that connect from the wireless IP networksD、Configure all wireless access points to require the Wired Equivalent Privacy (WEP) protocol for all connections. Use a Group Policy object (GPO) to distribute the WEP keys to all computers in the domain

Your companys corporate network uses network access protection (NAP). Users are able to connect to the corporate network remotely. You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do?()A、Apply an IPsec NAP policy.B、Configure a NAP Policy for 802.1x Wireless connections.C、Configure VPN connections to use MS-CHAP v2 authentication.D、Restrict dynamic host configuration protocol (DHCP) clients by using NAP.

Your company has Active Directory Certificate Services (AD CS) and Network Access Protection (NAP) deployed on the network.You need to ensure that NAP policies are enforced on portable computers that use a wireless connection to access the network.  What should you do?()A、Configure all access points to use 802.1X authentication.B、Configure all portable computers to use MS-CHAP v2 authentication.C、Use the Group Policy Management Console to access the wireless Group Policy settings, and enable the Prevent connections to ad-hoc networks option.D、Use the Group Policy Management Console to access the wireless Group Policy settings, and disable the Prevent connections to infrastructure networks option.

Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  what should you do()? A、Configure all access points as RADIUS clients to the Remediation ServersB、Configure all access points as RADIUS clients to the Network Policy Server (NPS)C、Create a Network Policy that defines Remote Access Server as a network connection methodD、Create a Network Policy that specifies EAP-TLS as the only availible authentication method.

Your companys corporate network uses Network Access Protection (NAP). Users are able to connect to the corporate network remotely. You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible.  What should you do()?  A、Apply an IPsec NAP policy.B、Configure a NAP Policy for 802.1x Wireless connectionsC、Configure VPN connections to use MS-CHAP v2 authenticationD、Restrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP

Your company has active directory certificate services (AD CS) and network access protection (NAP) deployed on the network. You need to ensure that NAP policies are enforced on portable computers that use a wireless connection to access the network. What should you do?()A、Configure all access points to use 802.1x authentication.B、Configure all protable computers to use MS-CHAP v2 authentication.C、Use the group policy management console to access the wireless group policy settings, and enable the prevent connections to ad-hoc network option.D、Use the group policy management console to access the wireless group policy settings, and disable the prevent connections to infrastructure networks option.

单选题Your company has Active Directory Certificate Services (AD CS) and Network Access Protection (NAP)  deployed on the network. You need to ensure that NAP policies are enforced on portable computers taht  use a wireless connection to access the network. What should you do?()A Configure all access points to use 802.1X authenticationB Configure all protable computers to use MS-CHAP v2 authenticationC Use the Group Policy Management Console to access the wireless group policy settings, and enable the Prevent connections to ad-hoc networks option.D Use the Group Policy Management Console to access the wireless group policy settings, and disable the Prevent connections to infrastructure networks option.

单选题Your company’s corporate network uses Network Access Protection (NAP). Users are able to connect to the corporate network remotely.You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do? ()AApply an IPsec NAP policy.BConfigure a NAP policy for 802.1X wireless connections.CConfigure VPN connections to use MS-CHAP v2 authentication.DRestrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP

单选题Your companys corporate network uses Network Access Protection (NAP). Users are able to connect to the corporate network remotely. You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible.  What should you do()?AApply an IPsec NAP policy.BConfigure a NAP Policy for 802.1x Wireless connectionsCConfigure VPN connections to use MS-CHAP v2 authenticationDRestrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP

单选题Network Access Protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The company policy required confidentiality of data when the data is in transmit between the portable computers and the servers. You need to ensure taht users can access network resources only from computers that comply with the company policy. What should you do? ()A Create an IPsec Enforcement Network policyB Create an 802.1X enforcement network policyC Create a wired network (IEEE 802.3) Group PolicyD Create an Extensible Authentication Portocol (EAP) Enforcement Network Policy

单选题Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  what should you do()?AConfigure all access points as RADIUS clients to the Remediation ServersBConfigure all access points as RADIUS clients to the Network Policy Server (NPS)CCreate a Network Policy that defines Remote Access Server as a network connection methodDCreate a Network Policy that specifies EAP-TLS as the only availible authentication method.

单选题Your company has Active Directory Certificate Services (AD CS) and Network Access Protection (NAP) deployed on the network.You need to ensure that NAP policies are enforced on portable computers that use a wireless connection to access the network.  What should you do?()AConfigure all access points to use 802.1X authentication.BConfigure all portable computers to use MS-CHAP v2 authentication.CUse the Group Policy Management Console to access the wireless Group Policy settings, and enable the Prevent connections to ad-hoc networks option.DUse the Group Policy Management Console to access the wireless Group Policy settings, and disable the Prevent connections to infrastructure networks option.

单选题You need to design a Security strategy for the wireless network at all resort locations.What should you do?()AConnect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Require company users to establish a VPN to access company resourcesBInstall Internet Authentication Service (IAS) on a domain controller.Configure the wireless access points to require IEEE 802.1x authenticationCEstablish IPSec policies on all company servers to request encryption from all computers that connect from the wireless IP networksDConfigure all wireless access points to require the Wired Equivalent Privacy (WEP) protocol for all connections. Use a Group Policy object (GPO) to distribute the WEP keys to all computers in the domain

单选题Your company has active directory certificate services (AD CS) and network access protection (NAP) deployed on the network. You need to ensure that NAP policies are enforced on portable computers that use a wireless connection to access the network. What should you do?()AConfigure all access points to use 802.1x authentication.BConfigure all protable computers to use MS-CHAP v2 authentication.CUse the group policy management console to access the wireless group policy settings, and enable the prevent connections to ad-hoc network option.DUse the group policy management console to access the wireless group policy settings, and disable the prevent connections to infrastructure networks option.

单选题Your company has active directory certificate services (AD CS) and network access protection (NAP) deployed on the network. You need to configure the wireless network to accept smart cards. What should you do?()AConfigure the wireless network to use WPA2, PEAP and MSCHAP v2.BConfigure the wireless network to use WPA2, 802.1X authentication and EAP-TLS.CConfigure the wireless network to use WEP, 802.1X authentication, PEAP, and MSCHAP v2.DConfigure the wireless network to use WEP,PEAP, and MSCHAP v2 and also require strong user passwords.

单选题Your companys corporate network uses network access protection (NAP). Users are able to connect to the corporate network remotely. You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do?()AApply an IPsec NAP policy.BConfigure a NAP Policy for 802.1x Wireless connections.CConfigure VPN connections to use MS-CHAP v2 authentication.DRestrict dynamic host configuration protocol (DHCP) clients by using NAP.

单选题Your company uses network access protection (NAP) to enforce policies on client computers that connect to the network. Client computers run windows vista. A group Policy is used to configure client computers to obtain updates from WSUS. Company policy requires that updates labeled important and critical must be applied before client computers can access network resources. You need to ensure that client computes meet the company policy requirement. What should you do?()AEnable automatic updates on each client.BEnable the security center on each client.CQuarantine clients that do not have all available security updates installed.DDisconnect the remote connection until the required updates are installed.

单选题Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point.You need to ensure that all client computers that access the network are evaluated by NAP.What should you do?()AConfigure all access points as RADIUS clients to the Remediation Servers.BConfigure all access points as RADIUS clients to the Network Policy Server (NPS).CCreate a Network Policy that defines Remote Access Server as a network connection method.DCreate a Network Policy that specifies EAP-TLS as the only available authentication method.

单选题Network Access Protection (NAP) is configured for the corporate network.Users connect to the corporate network by using portable computers.The company policy requires confidentiality of data when the data is in transit between the portable computers and the servers.You need to ensure that users can access network resources only from computers that comply with the company policy.What should you do?()ACreate an IPsec Enforcement Network policy.BCreate an 802.1X Enforcement Network policy.CCreate a Wired Network (IEEE 802.3) Group policy.DCreate an Extensible Authentication Protocol (EAP) Enforcement Network policy.