单选题You are designing an authentication strategy for the accounting department. Your solution must meet business requirements. What should you do?()AInstall wireless network cards on all accounting department computers. Select PEAP authenticationBInstall user certificates on all accounting department computers. Configure these computers to respond to requests for IPSec encryptionCIssue smart cards and smart card readers to all accounting department users and computers. Require NTLMv2 authenticationDIssue smart cards and smart card readers to all accounting department users and computers. Configure the domain to require smart cards for the accounting department users during logon

单选题
You are designing an authentication strategy for the accounting department. Your solution must meet business requirements. What should you do?()
A

Install wireless network cards on all accounting department computers. Select PEAP authentication

B

Install user certificates on all accounting department computers. Configure these computers to respond to requests for IPSec encryption

C

Issue smart cards and smart card readers to all accounting department users and computers. Require NTLMv2 authentication

D

Issue smart cards and smart card readers to all accounting department users and computers. Configure the domain to require smart cards for the accounting department users during logon


参考解析

解析: 暂无解析

相关考题:

You are designing the NetBIOS domain naming strategy for the company. Which NetBIOS domain name or names should you use?()A、eastB、westC、quebecD、newyorkE、northamericaF、wideworldimporters

You are designing a strategy to ensure that VPN users are able to access all internal resources.  What should you do?()A、 Specify a static routing table entry on VPN1 for the Dallas network.B、 Specify a static routing table entry on VPN1 for the Seattle network.C、 Implement Internet Authentication Service (IAS) on VPN1.D、 Define a User Class option for Routing  Remote Access Clients on the DHCP Server.

You are designing an IP addressing strategy for your VPN solution. How many public addresses should you use?()A、1B、25C、50D、255

You are designing an authentication solution to meet the security needs of the network administrators. You install an enterprise certification authority (CA). Which three additional actions should you take?()A、Enroll each administrative account for a smart card authentication certificate.B、Configure autoenrollment for computer authentication certificates. C、Install a smart card reader on each server computer.  D、Install a smart card reader on each network administrator’s computer.  E、Configure each administrative account to require a smart card for interactive logon.F、Configure the Default Domain Policy GPO to require smart cards for interactive login.

You are designing a remote access strategy to meet the business  technical requirements. Which authentication mechanism should you use?()A、MS-CHAP v2.B、Internet Authentication service (IAS).C、Multilink  Bandwidth Allocation Protocol (BAP).D、Remote access policies on all servers running Routing  Remote Access.

You are designing a strategy to perform inplace upgrade of domain controller in Boston and San Diego. Which method should you use?()A、adprepB、sysprepC、Answer FileD、Remote Installtion Services (RIS)

You are designing a security strategy for users who need remote access to the corporate network. What should you do?()A、Configure Internet Authentication Service (IAS) for accounting.B、Configure the server running Routing and Remote Access to support L2TP.C、Configure the server running Routing and Remote Access to restrict dial-in traffic to the NewApp servers only.D、Create a separate account for remote access users. Configure these accounts to access the NewApp server only.

You need to recommend a strategy to ensure that the administration of AD LDS is encrypted.  What should you include in the recommendation?()A、a server authentication certificateB、client authentication certificatesC、Digest authenticationD、Windows Integrated authentication

You need to recommend a security strategy for WebApp2 that meets the company’s applicaton  requirements.What should you include in the recommendation?()A、Basic authentication and connection security rulesB、Basic authentication and SSLC、Digest authentication and connection security rulesD、Digest authentication and SSL

单选题You are designing a security strategy for users who need remote access to the corporate network.  What should you do?()A Configure Internet Authentication Service (IAS) for accounting.B Configure the server running Routing and Remote Access to support L2TP.C Configure the server running Routing and Remote Access to restrict dial-in traffic to the NewApp servers only.D Create a separate account for remote access users. Configure these accounts to access the NewApp server only.

单选题You are designing a remote access strategy to meet the business  technical requirements.  Which authentication mechanism should you use?()A MS-CHAP v2.B Internet Authentication service (IAS).C Multilink  Bandwidth Allocation Protocol (BAP).D Remote access policies on all servers running Routing  Remote Access.

单选题You are designing a WAN implementation strategy to meet the business and technical requirements. What should you do?()AConfigure a demand-dial router.BCreate multiple Active Directory site links.CConfigure a VPN connection between each branch office.DInstall an Internet Authentication Service (IAS) server in each branch office.

单选题You need to design a remote access strategy for portable computers. Your solution must meet business requirements. What should you do?()AIssue a computer certificate to P_RAS1. Reconfigure the remote access policy on P_RAS1 to accept only EAP-MD5 authentication. Then, specify that P_RAS1’s computer certificate is to be used for authenticationBIssue a user certificate to the Administrator account on P_RAS1. Reconfigure the remote access policy to accept only EAP-MD5 authentication. Then, specify that the Administrator account’s user certificate is to be used for authenticationCIssue a computer certificate to P_RAS1. Reconfigure the remote access policy to accept only EAP-TLS authentication. Then, specify the P_RAS1’s computer certificate is to be used for authenticationDIssue a user certificate to the Administrator account on P_RAS1. Reconfigure the remote access policy to accept only EAP-TLS authentication. Then, specify that the Administrator account’s user certificate is to be used for authentication

单选题You need to recommend a strategy to ensure that the administration of AD LDS is encrypted.  What should you include in the recommendation?()Aa server authentication certificateBclient authentication certificatesCDigest authenticationDWindows Integrated authentication

单选题You are designing a WAN implementation strategy to meet the business and technical requirements.  What should you do? ()A Configure a demand-dial router.B Create multiple Active Directory site links.C Configure a VPN connection between each branch office.D Install an Internet Authentication Service (IAS) server in each branch office.

单选题You are designing a new NETBIOS naming strategy for the corporate environment.  Which domain name should you use?()A adB woodgroveadC woodgrovebankD woodgrovebank.com

多选题You are designing the NetBIOS domain naming strategy for the company. Which NetBIOS domain name or names should you use?()AeastBwestCquebecDnewyorkEnorthamericaFwideworldimporters

单选题You are designing an IP addressing strategy for your VPN solution. How many public addresses should you use?()A1B25C50D255

单选题You are designing a new NETBIOS naming strategy for the corporate environment. Which domain name should you use?()AadBwoodgroveadCwoodgrovebankDwoodgrovebank.com