单选题You are designing a remote access strategy to meet the business  technical requirements. Which authentication mechanism should you use?()AMS-CHAP v2.BInternet Authentication service (IAS).CMultilink  Bandwidth Allocation Protocol (BAP).DRemote access policies on all servers running Routing  Remote Access.

单选题
You are designing a remote access strategy to meet the business & technical requirements. Which authentication mechanism should you use?()
A

MS-CHAP v2.

B

Internet Authentication service (IAS).

C

Multilink & Bandwidth Allocation Protocol (BAP).

D

Remote access policies on all servers running Routing & Remote Access.


参考解析

解析: 暂无解析

相关考题:

You are designing a strategy to ensure that all employees have Internet access. For each branch office,  what should you do?()A、 Configure a DNS server to function as caching-only serversB、 Configure Internet Connection sharing on terminal servers.C、 Install and configure an Internet Security and Acceleration (ISA) Server ComputerD、 Install and configure a server running Routing and Remote Acess to function as a VPN server

You are designing a strategy to allow users to have remote access to internal resources. Which service or services should you allow on the public interface of the NAT Server?()A、HTTPB、LDAPC、POP3D、SMTPE、VPN Gateway

You are designing a strategy to ensure that VPN users are able to access all internal resources.  What should you do?()A、 Specify a static routing table entry on VPN1 for the Dallas network.B、 Specify a static routing table entry on VPN1 for the Seattle network.C、 Implement Internet Authentication Service (IAS) on VPN1.D、 Define a User Class option for Routing  Remote Access Clients on the DHCP Server.

You are designing a strategy for installing Windows server 2003 on the new domain controllers. Which method should you use?()A、Unattended installationB、Remote Installation Services (RIS)C、Automated Deployment Services (ADS)D、Microsoft Systems Management Server (SMS)

You need to design an e-mail access strategy for remote users. What should you do? () A、 Instruct remote users to connect to their e-mail by using RPCB、 Instruct remote users to connect to Outlook Web Access by using only HTTPSC、 Instruct remote users to connect to the company network by using PPTP connectionsD、 Instruct remote users to connectd to their e-mail by using RPC over HTTP Configure the HTTP servers to require encryption.

You are designing a remote access strategy to meet the business and technical Requirement.  What should you do?()A、 Configure each server running Routing and Remote Access as a RADIUS Client.B、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.C、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.D、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.

You are designing a remote access strategy to meet the business  technical requirements. Which authentication mechanism should you use?()A、MS-CHAP v2.B、Internet Authentication service (IAS).C、Multilink  Bandwidth Allocation Protocol (BAP).D、Remote access policies on all servers running Routing  Remote Access.

You are designing a strategy to perform inplace upgrade of domain controller in Boston and San Diego. Which method should you use?()A、adprepB、sysprepC、Answer FileD、Remote Installtion Services (RIS)

You need to recommend a solution for managing all of the servers. The solution must meet the  company’s technical requirements.What should you include in the recommendation?()A、Remote Server Administration Tools (RSAT)B、the Administration Tools Pack (adminpak.msi)C、the Remote Desktop Gateway (RD Gateway) role serviceD、the Remote Desktop Web Access (RD Web Access) role service

You are designing a security strategy for users who need remote access to the corporate network. What should you do?()A、Configure Internet Authentication Service (IAS) for accounting.B、Configure the server running Routing and Remote Access to support L2TP.C、Configure the server running Routing and Remote Access to restrict dial-in traffic to the NewApp servers only.D、Create a separate account for remote access users. Configure these accounts to access the NewApp server only.

You are designing a strategy to provide Internet access to all users.  What should you do?()A、 Configure Internet Connection Sharing on all client computers.B、 Configure Automatic Private IP Addressing (APIPA) on all client computers.C、 Configure one server as a Routing and Remote Access VPN server.D、 Configure one server as a Routing and Remote Access NAT router.

You are designing an access control strategy for WEB2. Your solution must meet business requirements. What should you do?()A、Install the Terminal Services Advanced Client Web client on WEB2B、Modify the Winreg registry key on WEB2C、Install the RPC over HTTP service on WEB2D、Modify the RestrictAnonymous registry key on WEB2

You are designing the security for dial-up remote access to meet the business and technical requirements.   Which two mechanisms should you use? ()A、 EAP-TLS authenticationB、 MS-CHAP v2 authenticationC、 a stand-alone certification serverD、 an enterprise certification serverE、 MPPE 56-bit encryption

单选题You are designing a security strategy for users who need remote access to the corporate network.  What should you do?()A Configure Internet Authentication Service (IAS) for accounting.B Configure the server running Routing and Remote Access to support L2TP.C Configure the server running Routing and Remote Access to restrict dial-in traffic to the NewApp servers only.D Create a separate account for remote access users. Configure these accounts to access the NewApp server only.

单选题You are designing a remote access strategy to meet the business and technical Requirement.  What should you do?()A Configure each server running Routing and Remote Access as a RADIUS Client.B Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.C Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.D Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.

单选题You are designing a strategy to provide Internet access to all users.  What should you do?()A Configure Internet Connection Sharing on all client computers.B Configure Automatic Private IP Addressing (APIPA) on all client computers.C Configure one server as a Routing and Remote Access VPN server.D Configure one server as a Routing and Remote Access NAT router.

单选题You are designing a remote access strategy to meet the business  technical requirements.  Which authentication mechanism should you use?()A MS-CHAP v2.B Internet Authentication service (IAS).C Multilink  Bandwidth Allocation Protocol (BAP).D Remote access policies on all servers running Routing  Remote Access.

单选题You are designing a strategy to ensure that all employees have Internet access. For each branch office, what should you do?()AConfigure a DNS server to function as caching-only servers.BConfigure Internet Connection sharing on terminal servers.CInstall and configure an Internet Security and Acceleration (ISA) Server Computer.DInstall and configure a server running Routing and Remote Acess to function as a VPN server.

单选题You are designing a strategy to allow users to have remote access to internal resources. Which service or services should you allow on the public interface of the NAT Server?()AHTTPBLDAPCPOP3DSMTPEVPN Gateway

单选题You are designing a strategy to allow users to have remote access to internal resources.   Which service or services should you allow on the public interface of the NAT Server?()A HTTPB LDAPC POP3D SMTPE VPN Gateway

多选题You are designing the security for dial-up remote access to meet the business and technical requirements.   Which two mechanisms should you use? ()AEAP-TLS authenticationBMS-CHAP v2 authenticationCa stand-alone certification serverDan enterprise certification serverEMPPE 56-bit encryption

单选题You are designing a DNS implementing strategy to meet the business and technical requirement.  Which type of zone should you use?()A Sub ZonesB Standard Primary ZonesC Secondary ZonesD Active DirectoryIntegrated Zones

单选题You are designing a DNS implementing strategy to meet the business and technical requirement. Which type of zone should you use?()ASub ZonesBStandard Primary ZonesCSecondary ZonesDActive DirectoryIntegrated Zones

单选题You are designing a remote access strategy to meet the business  technical requirements. Which authentication mechanism should you use?()AMS-CHAP v2.BInternet Authentication service (IAS).CMultilink  Bandwidth Allocation Protocol (BAP).DRemote access policies on all servers running Routing  Remote Access.

单选题You are designing a strategy for implementing Internet Authentication Service (IAS) to meet the business  and technical requirements. What should you do?()AInstall IAS on VPN1, VPN2, and VPN3.BInstall IAS on VPN1, Configure VPN2 and VPN3 as RADIUS clients.CInstall IAS on VPN1, Configure VPN1, VPN2, and VPN3 as RADIUS clients.DInstall IAS on DC1, Configure VPN2 and VPN3 as RADIUS clients. Create all remote access policies on VPN1.EInstall IAS on DC2, Configure VPN2 and VPN3 as RADIUS clients. Configure remote access logging on VPN1.

单选题You are designing a strategy to perform inplace upgrade of domain controller in Boston and San Diego.  Which method should you use?()A adprepB sysprepC Answer FileD Remote Installtion Services (RIS)

单选题You are designing a strategy to ensure that all employees have Internet access. For each branch office,  what should you do?()A Configure a DNS server to function as caching-only serversB Configure Internet Connection sharing on terminal servers.C Install and configure an Internet Security and Acceleration (ISA) Server ComputerD Install and configure a server running Routing and Remote Acess to function as a VPN server