多选题You are designing an authentication solution to meet the security needs of the network administrators. You install an enterprise certification authority (CA). Which three additional actions should you take?()AEnroll each administrative account for a smart card authentication certificate.BConfigure autoenrollment for computer authentication certificates.CInstall a smart card reader on each server computer.DInstall a smart card reader on each network administrator’s computer.EConfigure each administrative account to require a smart card for interactive logon.FConfigure the Default Domain Policy GPO to require smart cards for interactive login.

多选题
You are designing an authentication solution to meet the security needs of the network administrators. You install an enterprise certification authority (CA). Which three additional actions should you take?()
A

Enroll each administrative account for a smart card authentication certificate.

B

Configure autoenrollment for computer authentication certificates.

C

Install a smart card reader on each server computer.

D

Install a smart card reader on each network administrator’s computer.

E

Configure each administrative account to require a smart card for interactive logon.

F

Configure the Default Domain Policy GPO to require smart cards for interactive login.


参考解析

解析: 暂无解析

相关考题:

You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()A、IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsB、a list of the customer requirementsC、detailed security device specificationsD、results from pilot network testing

You are designing the placement of the PDC emulator role to meet the business and technical requirements. In which location should you place the PDC emulator role?()A、Los AngelesB、ParisC、SydneyD、LisbonE、Barcelona

You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()A、Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access pointB、Configure IEEE 802.1x authentication with smart cardsC、Configure the wireless network to use Wired Equivalent Privacy (WEP)D、Install and configure an Internet Authentication Service (IAS) server

You are designing an authentication solution to meet the security needs of the network administrators. You install an enterprise certification authority (CA). Which three additional actions should you take?()A、Enroll each administrative account for a smart card authentication certificate.B、Configure autoenrollment for computer authentication certificates. C、Install a smart card reader on each server computer.  D、Install a smart card reader on each network administrator’s computer.  E、Configure each administrative account to require a smart card for interactive logon.F、Configure the Default Domain Policy GPO to require smart cards for interactive login.

You are designing an authentication strategy for the accounting department. Your solution must meet business requirements. What should you do?()A、Install wireless network cards on all accounting department computers. Select PEAP authenticationB、Install user certificates on all accounting department computers. Configure these computers to respond to requests for IPSec encryptionC、Issue smart cards and smart card readers to all accounting department users and computers. Require NTLMv2 authenticationD、Issue smart cards and smart card readers to all accounting department users and computers. Configure the domain to require smart cards for the accounting department users during logon

You are designing a remote access strategy to meet the business  technical requirements. Which authentication mechanism should you use?()A、MS-CHAP v2.B、Internet Authentication service (IAS).C、Multilink  Bandwidth Allocation Protocol (BAP).D、Remote access policies on all servers running Routing  Remote Access.

You have an Exchange 2010 organization.  Your companys security policy states that all connections to Outlook Web App (OWA) must use smartcard authentication.  You need to recommend a solution to meet the security policy requirements.  Which two possible ways to achieve this goal should you recommend?()A、Require certificate-based authentication for all Internet-facing Client Access servers.B、Require Windows Integrated Authentication for all Internet-facing Client Access servers.C、Deploy an Edge Transport server, and then disable Windows Integrated Authentication.D、Deploy a server that runs Microsoft Internet Security and Acceleration (ISA) Server,and then  enableKerberos constrained delegation.

You are designing the Active Directory infrastructure to meet the business and technical requirements. You run ADSizer, and find that it provides a solution that contains only one domain controller for Amsterdam.  What should you do?()A、 Place at least two domain controllers in Amsterdam.B、 Configure the domain controller as a bridgehead server.C、 Configure the domain controller as a global catalog server.D、 Distribute the users among sites in ADSizer and recalculate the number of domain controllers.

You are designing an access control strategy for WEB2. Your solution must meet business requirements. What should you do?()A、Install the Terminal Services Advanced Client Web client on WEB2B、Modify the Winreg registry key on WEB2C、Install the RPC over HTTP service on WEB2D、Modify the RestrictAnonymous registry key on WEB2

单选题You are designing the placement of the PDC emulator role to meet the business and technical requirements. In which location should you place the PDC emulator role?()ALos AngelesBParisCSydneyDLisbonEBarcelona

单选题You are designing a remote access strategy to meet the business  technical requirements.  Which authentication mechanism should you use?()A MS-CHAP v2.B Internet Authentication service (IAS).C Multilink  Bandwidth Allocation Protocol (BAP).D Remote access policies on all servers running Routing  Remote Access.

单选题You are designing a WAN implementation strategy to meet the business and technical requirements. What should you do?()AConfigure a demand-dial router.BCreate multiple Active Directory site links.CConfigure a VPN connection between each branch office.DInstall an Internet Authentication Service (IAS) server in each branch office.

单选题You are designing a forest structure to meet the business and technical requirements.  How many forests should you create?()A OneB TwoC ThreeD Four

单选题You are designing a forest structure to meet the business and technical requirements. How many forests should you create?()AOneBTwoCThreeDFour

单选题You are designing a DHCP solution to meet the business and technical requirements. What should you do?()AIncrease the default lease time on all DHCP servers.BSplit all address ranges across multiple DHCP servers.CConfigure duplicate scopes on at least two DHCP servers.  DForce client computers to obtain an IP address from Automatic Private IP Addressing (APIPA).

单选题You are designing a WAN implementation strategy to meet the business and technical requirements.  What should you do? ()A Configure a demand-dial router.B Create multiple Active Directory site links.C Configure a VPN connection between each branch office.D Install an Internet Authentication Service (IAS) server in each branch office.

单选题You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()Aa list of applications currently in use in the networkBIP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsCdetailed security device specificationsDresults from pilot network testing

单选题You are designing a DNS implementing strategy to meet the business and technical requirement. Which type of zone should you use?()ASub ZonesBStandard Primary ZonesCSecondary ZonesDActive DirectoryIntegrated Zones

单选题You are designing a DHCP solution to meet the business and technical requirements.  What should you do?()A Increase the default lease time on all DHCP servers.B Split all address ranges across multiple DHCP servers.C Configure duplicate scopes on at least two DHCP servers.D Force client computers to obtain an IP address from Automatic Private IP Addressing (APIPA).