单选题You need to design access to e-mail by Internet users. What should you do?()AConfigure front-end servers to use HTTP to communicate with back-end serversBConfigure the internal firewall to allow IPSec traffic between front-end and back-end Exchange serversCRequire all users to encrypt all outbound e-mail messagesDIssue digital certificates to all remote users. Require the certificates to be used when authenticating to Outlook Web Access

单选题
You need to design access to e-mail by Internet users. What should you do?()
A

Configure front-end servers to use HTTP to communicate with back-end servers

B

Configure the internal firewall to allow IPSec traffic between front-end and back-end Exchange servers

C

Require all users to encrypt all outbound e-mail messages

D

Issue digital certificates to all remote users. Require the certificates to be used when authenticating to Outlook Web Access


参考解析

解析: 暂无解析

相关考题:

You have a computer that runs Windows Vista.You connect to your company’s network by using a virtual private network (VPN) connection. You notice that when you establish the VPN connection, you are unable to access Internet Web sites. When you disconnect the VPN connection, you can access Internet Web sites.You need to access Internet Web sites while you are connected to the VPN connection.What should you do?()A.AB.BC.CD.D

Your computer is unable to access external names or IP addresses. You need to connect to external Internet resources.What should you do first?() A.AB.BC.CD.D

You have an Exchange Server 2010 organization.You acquire a new Internet domain name.Users report that they cannot receive e-mail sent to the new domain name.You verify that all users have the new domain name configured as an e-mail address suffix.You need to ensure that users can receive e-mail sent from the Internet to the new domain name. What should you create?()A、an Authoritative Accepted DomainB、an External Relay Accepted DomainC、a new Receive connectorD、a remote domain

You share your computer with other users.  You install a new Microsoft Windows Internet Explorer add-on to view videos on the computer. You discover that this add-on conflicts with existing add-ons that other users frequently require. You need to ensure that you are able to view videos without affecting other users.  What should you do?()A、Uninstall the new Windows Internet Explorer add-on.B、Log on as an administrator and disable the new Windows Internet Explorer add-on.C、Direct other users to log on and disable the new Windows Internet Explorer add-on.D、Select the Turn off Automatic Website Checking option for the Phishing filter.

You need to design a solution so that users in the retail outlets can access their e-mail on the Exchange 2003 servers. What should you do?()A、Install an Exchange 2003 server infrastructure that will support POP3 connections from the Internet. Install a user certificate on each client computer at the retail outlets. Instruct the users to sign and encrypt all outbound e-mail messagesB、Install an Exchange 2003 server infrastructure that will support encrypted POP3 connections from the Internet. Configure the client computer in the retail outlets to use an encrypted connection to the POP3 serverC、Install an Exchange 2003 server infrastructure that will support encrypted Microsoft Outlook Web Access connections from the Internet. Instruct all users at the retail outlets to access their e-mail by using Microsoft Internet Explorer 5.5 or later to connect to the secure Microsoft Outlook Web Access serverD、Install an Exchange 2003 server infrastructure that will support encrypted IMAP4 connections from the Internet. Configure the client computers in the retail outlets to use an encrypted connection to the IMAP4 server

You have an Exchange Server 2010 organization and an Active Directory Rights Management Services(AD RMS) server.  All users access their mailboxes by using Outlook Web App (OWA).  You need to plan a security solution for the organization to meet the following requirements:.Secure messages by using administrator-defined templates  .Ensure that e-mail messages sent by users can be stored in an encrypted format  What should you include in the plan?()A、a legal holdB、Domain SecurityC、Outlook Protection RulesD、Secure/Multipurpose Internet Mail Extensions (S/MIME)

You need to design a certificate management process for internal users. What should you do?()A、Establish a Web enrollment service for internal users to request access to resourcesB、Grant Enrollment Agent rights to usersC、Establish enrollment stations and store user certificates in a smart cardD、Create Connection Manager scripts to identify the client computer operating system, and configure Web proxy settings to specify the appropriate Web enrollment service

You need to design an e-mail access strategy for remote users. What should you do? () A、 Instruct remote users to connect to their e-mail by using RPCB、 Instruct remote users to connect to Outlook Web Access by using only HTTPSC、 Instruct remote users to connect to the company network by using PPTP connectionsD、 Instruct remote users to connectd to their e-mail by using RPC over HTTP Configure the HTTP servers to require encryption.

You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()A、Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access pointB、Configure IEEE 802.1x authentication with smart cardsC、Configure the wireless network to use Wired Equivalent Privacy (WEP)D、Install and configure an Internet Authentication Service (IAS) server

You need to design a Security strategy for the wireless network at all resort locations.What should you do?()A、Connect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Require company users to establish a VPN to access company resourcesB、Install Internet Authentication Service (IAS) on a domain controller.Configure the wireless access points to require IEEE 802.1x authenticationC、Establish IPSec policies on all company servers to request encryption from all computers that connect from the wireless IP networksD、Configure all wireless access points to require the Wired Equivalent Privacy (WEP) protocol for all connections. Use a Group Policy object (GPO) to distribute the WEP keys to all computers in the domain

Your network contains an Exchange Server 2010 server.  You need to plan a mailbox sharing solution for the organization to meets the following requirements: .Ensure that assistants can read and modify the e-mail messages of their managers .Ensure that assistants can impersonate their managers when they send e-mail messages  What should you include in the plan?()A、Full Access and Send As permissionsB、Full Access and send on behalf of permissionsC、Role Based Access Control (RBAC) assignments and Send As permissionsD、Role Based Access Control (RBAC) assignments and send on behalf of permissions

You need to design a strategy for providing e-mail access to the subsidiary users. What should you do?()A、Deploy POP3 and IMAP4 services on Exchange front-end servers. Make the front-end servers accessible from the Internet by means of POP3, IMAP4, and SMTP onlyB、Deploy Microsoft Outlook Web Access on Exchange mailbox servers. Make the mailbox servers accessible from the Internet by means of HTTPS and SMTP onlyC、Deploy Microsoft Outlook Web Access on Exchange front-end servers. Make the front-end servers accessible from the Internet by means of HTTPS onlyD、Deploy an additional Exchange mailbox server that contains all subsidiary mailboxes. Deploy Microsoft Outlook Web Access on the server. Make the server accessible from the Internet by means of HTTPS only

You have an Exchange Server 2010 organization.Users on the network use HTTPS to connect to Outlook Web App (OWA).The Client Access server uses a certificate issued by an internal certification authority (CA).You plan to deploy an e-mail encryption solution for all users. You need to ensure that users can send and receive encrypted e-mail messages by using S/MIME from OWA.What should you do?()A、Issue a certificate to each userB、Instruct all OWA users to import a root CA certificateC、Modify the authentication settings of the OWA virtual directoryD、Configure the Client Access Server to use a certificate issued by a third-party CA

You are designing a security strategy for users who need remote access to the corporate network. What should you do?()A、Configure Internet Authentication Service (IAS) for accounting.B、Configure the server running Routing and Remote Access to support L2TP.C、Configure the server running Routing and Remote Access to restrict dial-in traffic to the NewApp servers only.D、Create a separate account for remote access users. Configure these accounts to access the NewApp server only.

You are designing a strategy to provide Internet access to all users.  What should you do?()A、 Configure Internet Connection Sharing on all client computers.B、 Configure Automatic Private IP Addressing (APIPA) on all client computers.C、 Configure one server as a Routing and Remote Access VPN server.D、 Configure one server as a Routing and Remote Access NAT router.

单选题You are designing a security strategy for users who need remote access to the corporate network.  What should you do?()A Configure Internet Authentication Service (IAS) for accounting.B Configure the server running Routing and Remote Access to support L2TP.C Configure the server running Routing and Remote Access to restrict dial-in traffic to the NewApp servers only.D Create a separate account for remote access users. Configure these accounts to access the NewApp server only.

单选题You need to design a security strategy for a remote e-mail access. What should you do?()ARequire remote users to access e-mails by using Outlook Mobile AccessBRequire Outlook Web Access users to install the secure MIME ActiveX-Control and to encrypt all messagesCOn Outlook Web Access servers that accept connections from the Internet configure IIS to require SSL for all connectionsDOn Outlook Web Access servers that accept connections from the Internet configure IIS to require Integrated Windows Authentication

单选题You are designing a strategy to provide Internet access to all users.  What should you do?()A Configure Internet Connection Sharing on all client computers.B Configure Automatic Private IP Addressing (APIPA) on all client computers.C Configure one server as a Routing and Remote Access VPN server.D Configure one server as a Routing and Remote Access NAT router.

单选题You have an Exchange Server 2010 organization.You acquire a new Internet domain name.Users report that they cannot receive e-mail sent to the new domain name.You verify that all users have the new domain name configured as an e-mail address suffix.You need to ensure that users can receive e-mail sent from the Internet to the new domain name. What should you create?()Aan Authoritative Accepted DomainBan External Relay Accepted DomainCa new Receive connectorDa remote domain

单选题You deploy your companys Internet Web site. You need to deny anonymous access to the Web site, allowing only authenticated users. Which code segment should you use?()Aauthorization allow users=?/ /authorizationBauthorization deny users=?/ /authorizationCauthorization deny users=*//authorizationDauthorization allow users=*/ /authorization

单选题You need to design a remote access authentication strategy that will allow users in the IT department to remotely connect to the network. Your solution must meet security requirements. What should you do?()AInstall Internet Authentication Services (IAS) on a server in the den.corp.woodgrovebank.com domain. Configure the VPN servers as RADIUS clientsBInstall Internet Authentication Services (IAS) on a stand-alone server in the Denver extranet. Create local user accounts for the IT personnel on the IAS server. Configure the VPN servers as RADIUS clientsCCreate a remote access policy on each of the VPN servers. Configure the policy to use the den.corp.woodgrovebank.com to authenticate remote access users. Configure the policy to require L2TP to establish a connectionDCreate a remote access policy on each of the VPN servers. Create local user accounts for the IT personnel on the VPN servers. Configure the policy to use the VPN servers’ local accounts database to authenticate users. Configure the policy to require L2TP to establish a connection

单选题You need to design the deployment of antivirus software. What should you do?()AInstall the antivirus software on each mailbox storage serverBInstall the antivirus software on each Outlook Web Access serverCInstall the antivirus software on one Outlook Web Access server at each officeDInstall the antivirus software on a back-end server that contains no mailboxes

单选题You need to design access to e-mail by Internet users. What should you do?()AConfigure front-end servers to use HTTP to communicate with back-end serversBConfigure the internal firewall to allow IPSec traffic between front-end and back-end Exchange serversCRequire all users to encrypt all outbound e-mail messagesDIssue digital certificates to all remote users. Require the certificates to be used when authenticating to Outlook Web Access