多选题You need to design the network to support the company’s VPN requirements for mobile users who connect to the network in Seattle. Which two actions should you perform?()AUse a password generator application to create a preshared key, and distribute it to all mobile usersBUse computer autoenrollment to create digital certificates that can be used to authenticate to a VPN serverCAcquire a digital certificate that can be used for SSL from a commercial CA for each computer that established a VPN connectionDConfigure IPSec policies on all Routing and Remote Access servers to require the use of digital certificates

多选题
You need to design the network to support the company’s VPN requirements for mobile users who connect to the network in Seattle. Which two actions should you perform?()
A

Use a password generator application to create a preshared key, and distribute it to all mobile users

B

Use computer autoenrollment to create digital certificates that can be used to authenticate to a VPN server

C

Acquire a digital certificate that can be used for SSL from a commercial CA for each computer that established a VPN connection

D

Configure IPSec policies on all Routing and Remote Access servers to require the use of digital certificates


参考解析

解析: 暂无解析

相关考题:

Your company is designing its network. The network will use an IPv6 prefix of 2001:DB8:BBCC:0000::/53.You need to identify an IPv6 addressing scheme that will support 2000 subnets.Which network mask should you use?()A. /61B. /62C. /63D. /64

You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()A.AB.BC.CD.D

You have a computer that runs Windows Vista.You connect to your company’s network by using a virtual private network (VPN) connection. You notice that when you establish the VPN connection, you are unable to access Internet Web sites. When you disconnect the VPN connection, you can access Internet Web sites.You need to access Internet Web sites while you are connected to the VPN connection.What should you do?()A.AB.BC.CD.D

You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet.Which PIN architecture is applicable in those environments?()A.CampusB.TeleworkerC.BranchD.Data center

You need to design router redundancy on the Company network.  Which three protocols could be  chosen for IP routing redundancy to protect against first-hop router failure?()A、 GLBPB、 ICMPC、 MSTPD、 HSRPE、 VRRPF、 NHRP

You need to recommend which role services must be deployed to support the company’s planned changes.   Which two role services should you recommend?()A、Health Registration Authority (HRA)B、Host Credential Authorization Protocol (HCAP)C、Network Policy Server (NPS)D、Routing and Remote Access service (RRAS)

You need to recommend a NAP enforcement method that meets the companyˉs security requirements. Which method should you recommend?()A、802.1XB、DHCPC、IPSecD、VPN

Your company has a single active directory domain. The company network is protected by a firewall. Remote users connect to your network through a VPN server by using PPTP. When the users try to connect to the VPN server, they receive the following error message: Error 721: The remote computer is not responding. You need to ensure that users can establish a VPN connection. What should you do? ()A、Open port 1423 on the firewallB、Open port 1723 on the firewallC、Open port 3389 on the firewallD、Open port 6000 on the firewall

You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()A、CampusB、TeleworkerC、BranchD、Data center

You need to design a remote access strategy for the customer support users when they work from home. Your solution must meet security requirements. What should you do?()A、Deploy an L2TP/IPsec VPN server in each call center. Configure the portable computers as L2TP VPN clientsB、Create IPSec tunnel mode connections between the customer support users home and the company’s Internet-facing routersC、Create IP packet filters on the company’s Internet-facing routers to allow the Remote Desktop Protocol (RDP).Create IPSec filters on the terminal servers to allow only connections that use RDPD、Create IP packet filters on the company’s Internet-facing routers to allow the IPSec protocols. Assign the Secure Server (Require Security) IPSec policy to the terminal servers. Assign the Client (Respond only) IPSec policy to the portable computers

You need to design a Security strategy for the wireless network at all resort locations.What should you do?()A、Connect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Require company users to establish a VPN to access company resourcesB、Install Internet Authentication Service (IAS) on a domain controller.Configure the wireless access points to require IEEE 802.1x authenticationC、Establish IPSec policies on all company servers to request encryption from all computers that connect from the wireless IP networksD、Configure all wireless access points to require the Wired Equivalent Privacy (WEP) protocol for all connections. Use a Group Policy object (GPO) to distribute the WEP keys to all computers in the domain

You deploy a Hyper-V host and you convert the Web servers to VMs. You discover that when users transfer large data files from the Web servers, the CPU utilization of the host exceeds acceptable limits. You need to recommend a solution to reduce the CPU utilization associated to network traffic. The solution must meet the company’s business requirements. What should you recommend implementing?()A、Two network cards that support network adapter teamingB、A network card that supports Virtual Machine ChimneyC、An additional Hyper-V host and Network Load Balancing (NLB)D、An additional Hyper-V host and Failover Clustering

You need to recommend a strategy for delegating administrative rights to Admin1. The strategy must support the company’s planned changes.What should you include in the recommendation?()A、the Authorization Manager snap-in on Node1 and Node2B、the Authorization Manager snap-in on the VMsC、the Network Configuration Operators local group on each VMD、the Network Configuration Operators local group on Node1 and Node2

Your company has a single Active Directory domain. The company network is protected by a firewall.Remote users connect to your network through a VPN server by using PPTP.When the users try to connect to the VPN server, they receive the following error message :Error 721:The remote computer is not responding.You need to ensure that users can establish a VPN connection.What should you do?()A、Open port 1423 on the firewall.B、Open port 1723 on the firewall.C、Open port 3389 on the firewall.D、Open port 6000 on the firewall.

You need to design a hosting service option for customers who want to access their databases by using their own Active Directory domain accounts. What should you do?()A、Design a hosting service option that duplicates each customer’s domain user account as SQL Serverlogin account.B、Design a hosting service option that provides VPN-based connectivity from each customer’s network tothe SQL Server computer that hosts that customer’s daabase or databases.C、Design a hosting service option that provides a dedicated server to each customer.Join that server to that customer’s Active Directory domainD、Design a hosting service option that configures a unique instance of SQL Server 2005 for each customer.Configure that instance to use Integrated Windows authentication.

You are the network administrator for Company.You need to connect to Company’s network from your Windows 2000 Professional computer at home.You have a DSL line that is used for Internet connectivity. You create an L2TP virtual private network(VPN) connection and are able to connect successfully to Company’s network. While connected toCompany’s network, you are unable to access the Internet.You want to be able to access the Internet while connected to Company’s network.How should you configure the connection properties?()A、Configure the DSL connection to use PPTP instead of L2TP. B、Enable Internet Connection Sharing for the DSL connection properties. C、CLEAR THE Use default gateway on remote network check box. D、Clear the Require data encryption check box.

单选题You need to recommend a strategy for delegating administrative rights to Admin1. The strategy must support the company’s planned changes.What should you include in the recommendation?()Athe Authorization Manager snap-in on Node1 and Node2Bthe Authorization Manager snap-in on the VMsCthe Network Configuration Operators local group on each VMDthe Network Configuration Operators local group on Node1 and Node2

单选题You are the network administrator for your company. All network servers run Windows Server 2003. Business hours are 8 A.M. to 5 P.M. You provide network assistance during business hours only. A server named Server1 stores personal files for all network users. Mobile users access Server1 by using the company's VPN. They must have 24-hour access to the files on Server1. You need to be able to identify the source of the recurring slowdowns in VPN access. First, you log on to Server1. What should you do next?()AUse Task Manager to review network utilization of the VPN adapter.BUse the Performance console to create a log of network utilization outside of business hours.CUse System Monitor to review network utilization of the VPN connection.DUse Task Manager to select Bytes Sent as the Network Adapter History setting.

单选题All client computers on your company network run Windows XP and are members of an Active Directory Domain Services domain. You plan to migrate all computers to Windows 7. You also plan to deploy a new VPN server to support remote network access for the computers. You need to ensure that all computers will be supported for remote access during the migration to Windows 7. What should you do?()ASet the VPN server to Layer 2 Tunneling Protocol.BSet the VPN server to Secure Socket Tunneling Protocol.CSet the VPN server to Internet Key Exchange version 2.DConfigure the Direct Access feature on the VPN server.

单选题You are designing a Windows 7 virtual desktop infrastructure.You have the following requirements:   Provide access to Remote Desktop Services RemoteApp sources from multiple remote desktop servers.  Support network load balancing.  Support reconnection to existing sessions on virtual desktops.    You need to specify a design that meets the requirements.   What should you include in your design?()ARemote Desktop GatewayBRemote Desktop Connection BrokerCWindows Deployment ServicesDWindows Virtual PC and Windows XP Mode

单选题You need to recommend a VPN solution for the new sales office. The solution must support the  company's planned changs.   What should you include in the recommendation?()AInternet Key Exchange version 2 (IKEv2)BLayer 2 Tunneling Protocol (L2TP)CPoint-to-Point Tunneling Protocol (PPTP)DSecure Socket Tunneling Protocol (SSTP)

多选题You need to design router redundancy on the Company network.  Which three protocols could be  chosen for IP routing redundancy to protect against first-hop router failure?()AGLBPBICMPCMSTPDHSRPEVRRPFNHRP

单选题Your company is designing its network. The network will use an IPv6 prefix of 2001:DB8:BBCC:0000::/53.You need to identify an IPv6 addressing scheme that will support 2000 subnets. Which network mask should you use?()A/61B/62C/63D/64

单选题You need to recommend a tool to manage the SANs. The tool must support the company’s planned changes and technical requirements. Which tool should you recommend?()ADisk ManagementBShare and Storage ManagementCStorage ExplorerDStorage Manager for SANs

单选题You have a computer that runs Windows 7. You connect to your company s network by using a VPNconnection. You discover that when you establish the VPN connection, you are unable to access InternetWeb sites. When you disconnect the VPN connection, you can access Internet Web sites. You need toaccess Internet Web sites while you are connected to the VPN.  What should you do?()AConfigure the VPN connection to use only PPTP.BConfigure the VPN connection to use only L2TP/IPSec.CFrom the Internet Protocol Version 4 (TCP/IPv4) properties of the local area connection, disable theAutomatic metric setting.DFrom the Internet Protocol Version 4 (TCP/IPv4) properties of the VPN connection, disable the Usedefault gateway on remote network setting.

单选题You use a Windows 2000 Professional computer at home. You need to access shared files on a server named server1. This server is on your company’s network and is not accessible from the internet. Your company’s network also includes a third party VPN server that is accessible from the internet. You dial in to your internet service provider and then create a VPN connection to your company’s VPN server. After the connection is successfully established, you run the net view//server1 command and receive the following error ‘the server is inaccessible or could not be found’. You need to access the shared files on server 1. What should you do? ()AStop and then start the TCP/IP NetBIOS helper service on your computer.BStop and then start the DNS client service on your computer.CAdd a HOSTS entry for server1 to your computer.DAdd a LMHOSTS entry for server1 to your computer.

单选题You are a network administrator for your company. The company has a main office and one branch office. The network consists of a single Active Directory domain. All servers run Windows Server 2003.   The company needs to connect the main office network and the branch office network by using Routing and Remote Access servers at each office. The networks will be connected by a VPN connection over the Internet.   The company’s written security policy includes the following requirements for VPN connections over the Internet:  All data must be encrypted with end-to-end encryption.  VPN connection authentication must be at the computer level.   Credential information must not be transmitted over the Internet as part of the authentication process.   You need to configure security for VPN connection between the main office and the branch office. You need to comply with the written security policy.   What should you do?  ()A Use a PPTP connection with EAP-TLS authentication.B Use a PPTP connection with MS-CHAP v2 authentication.C Use an L2TP connection with EAP-TLS authentication.D Use an L2TP connection with MS-CHAP v2 authentication.