单选题Network access protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The command policy required confidentiality of data when is in transmit between the portable computers and the servers. You need to ensure that users can access network resources only from computers that comply with the company policy. What should you do?()ACreate an Ipsec enforcement network policy.BCreate an 802.1xenforcemen tnetwork policy.CCreatea wired network(IEEE802.3)Group policy.DCreate an extensible authentication protocol(EAP)enforcement network policy.

单选题
Network access protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The command policy required confidentiality of data when is in transmit between the portable computers and the servers. You need to ensure that users can access network resources only from computers that comply with the company policy. What should you do?()
A

Create an Ipsec enforcement network policy.

B

Create an 802.1xenforcemen tnetwork policy.

C

Createa wired network(IEEE802.3)Group policy.

D

Create an extensible authentication protocol(EAP)enforcement network policy.


参考解析

解析: 暂无解析

相关考题:

Your network has Network Access Protection (NAP) deployed. The network contains two servers named Server1 and Server2. Server1 is a Network Policy Server (NPS). Server2 has a third-party antivirus solution installed.Server1 is configured to use a custom system health validator provided by the antivirus vendor. The system health validator uses Server2 to identify the version of the current antivirus definition.You need to ensure that NAP clients are considered noncompliant if Server1 cannot connect to Server2.Which error code resolution setting should you configure?()A. SHA not responding to NAP clientB. SHA unable to contact required servicesC. SHV not respondingD. SHV unable to contact required services

Which two actions, when taken in combination, will result in an effective network security solution?()A、 develop a policy for securing the networkB、 monitor and test network activities for vulnerabilitiesC、 implement reflexive access listsD、 implement dynamic access listsE、 select and implement a single comprehensive virus protection program

Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2.  Server1 is a DHCP server that is configured to have a scope named Scope1. Server2 is configured to obtain an IP address automatically. In Scope1, you create a reservation named Res_Server2 for Server2. A technician replaces the network adapter on Server2. You need to ensure that Server2 can obtain the same IP address.  What should you modify on Server1?()A、The Advanced settings of Res_Server2B、The MAC address of Res Server2C、The Network Access Protection Settings of Scope1D、The Name Protection settings of Scope1

Your company has Active Directory Certificate Services (AD CS) and Network Access Protection (NAP)  deployed on the network. You need to ensure that NAP policies are enforced on portable computers taht  use a wireless connection to access the network. What should you do?()A、 Configure all access points to use 802.1X authenticationB、 Configure all protable computers to use MS-CHAP v2 authenticationC、 Use the Group Policy Management Console to access the wireless group policy settings, and enable the Prevent connections to ad-hoc networks option.D、 Use the Group Policy Management Console to access the wireless group policy settings, and disable the Prevent connections to infrastructure networks option.

Your company's corporate network uses Network Access Protection (NAP).Users are able to connect to the corporate network remotely.You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do?()A、Apply an IPsec NAP policy.B、Configure a NAP policy for 802.1X wireless connections.C、Configure VPN connections to use MS-CHAP v2 authentication.D、Restrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP.

Your company uses network access protection (NAP) to enforce policies on client computers that connect to the network. Client computers run windows vista. A group Policy is used to configure client computers to obtain updates from WSUS. Company policy requires that updates labeled important and critical must be applied before client computers can access network resources. You need to ensure that client computes meet the company policy requirement. What should you do?()A、Enable automatic updates on each client.B、Enable the security center on each client.C、Quarantine clients that do not have all available security updates installed.D、Disconnect the remote connection until the required updates are installed.

Network Access Protection (NAP) is configured for the corporate network.Users connect to the corporate network by using portable computers.The company policy requires confidentiality of data when the data is in transit between the portable computers and the servers.You need to ensure that users can access network resources only from computers that comply with the company policy.What should you do?()A、Create an IPsec Enforcement Network policy.B、Create an 802.1X Enforcement Network policy.C、Create a Wired Network (IEEE 802.3) Group policy.D、Create an Extensible Authentication Protocol (EAP) Enforcement Network policy.

Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  What should you do?()A、Configure all access points as RADIUS clients to the Remediation Servers.B、Configure all access points as RADIUS clients to the Network Policy Server (NPS).C、Create a Network Policy that defines Remote Access Server as a network connection method.D、Create a Network Policy that specifies EAP-TLS as the only available authentication method.

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is an Active Directory domain in your company. Windows Server 2008 isrun by a server named S02. All client computers run Windows Vista. You perform the installation of theTerminal Services server role, TS Web Access role service, and TS Gateway role service on S02. Youhave to make sure that all client computers have compliant firewall, antivirus software,and antispyware. What should you do to make sure of this?()A、The Request clients should be enabled to send a statement of health option in the Terminal Servicesclient access policy.B、Network Access Protection (NAP) should be configured on a server in the domain.C、The Terminal Services servers should be added to the Windows Authorization Access domain localsecurity group.D、The Terminal Services client computers should be added to the Windows Authorization Access domainlocal security group.

Your company has Active Directory Certificate Services (AD CS) and Network Access Protection (NAP) deployed on the network.You need to ensure that NAP policies are enforced on portable computers that use a wireless connection to access the network.  What should you do?()A、Configure all access points to use 802.1X authentication.B、Configure all portable computers to use MS-CHAP v2 authentication.C、Use the Group Policy Management Console to access the wireless Group Policy settings, and enable the Prevent connections to ad-hoc networks option.D、Use the Group Policy Management Console to access the wireless Group Policy settings, and disable the Prevent connections to infrastructure networks option.

Your network contains a single Active Directory domain. All domain controllers run Windows Server   2008 R2. There are 1,000 client computers that run Windows 7 and that are connected to managedswitches.   You need to recommend a strategy for network access that meets the following requirements:   èUsers are unable to bypass network access restrictions.   èOnly client computers that have up-to-date service packs installed can access the network.   èOnly client computers that have up-to-date anti-malware software installed can access the network.   What should you recommend?()A、Implement Network Access Protection (NAP) that uses DHCP enforcement.B、Implement Network Access Protection (NAP) that uses 802.1x enforcement.C、Implement a Network Policy Server (NPS), and enable IPsec on the domain controllers.D、Implement a Network Policy Server (NPS), and enable Remote Authentication Dial-In User Service  (RADIUS) authentication on the managed switches.

Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  what should you do()? A、Configure all access points as RADIUS clients to the Remediation ServersB、Configure all access points as RADIUS clients to the Network Policy Server (NPS)C、Create a Network Policy that defines Remote Access Server as a network connection methodD、Create a Network Policy that specifies EAP-TLS as the only availible authentication method.

Your companys corporate network uses Network Access Protection (NAP). Users are able to connect to the corporate network remotely. You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible.  What should you do()?  A、Apply an IPsec NAP policy.B、Configure a NAP Policy for 802.1x Wireless connectionsC、Configure VPN connections to use MS-CHAP v2 authenticationD、Restrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP

多选题Which two actions, when taken in combination, will result in an effective network security solution?()Adevelop a policy for securing the networkBmonitor and test network activities for vulnerabilitiesCimplement reflexive access listsDimplement dynamic access listsEselect and implement a single comprehensive virus protection program

单选题Your network has Network Access Protection (NAP) deployed. The network contains two servers named Server1 and Server2. Server1 is a Network Policy Server (NPS). Server2 has a third-party antivirus solution installed.Server1 is configured to use a custom system health validator provided by the antivirus vendor. The system health validator uses Server2 to identify the version of the current antivirus definition.You need to ensure that NAP clients are considered noncompliant if Server1 cannot connect to Server2.Which error code resolution setting should you configure?()ASHA not responding to NAP clientBSHA unable to contact required servicesCSHV not respondingDSHV unable to contact required services

单选题Your company has active directory certificate services (AD CS) and network access protection (NAP) deployed on the network. You need to configure the wireless network to accept smart cards. What should you do?()AConfigure the wireless network to use WPA2, PEAP and MSCHAP v2.BConfigure the wireless network to use WPA2, 802.1X authentication and EAP-TLS.CConfigure the wireless network to use WEP, 802.1X authentication, PEAP, and MSCHAP v2.DConfigure the wireless network to use WEP,PEAP, and MSCHAP v2 and also require strong user passwords.

单选题Network access protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The command policy required confidentiality of data when is in transmit between the portable computers and the servers. You need to ensure that users can access network resources only from computers that comply with the company policy. What should you do?()ACreate an Ipsec enforcement network policy.BCreate an 802.1xenforcemen tnetwork policy.CCreatea wired network(IEEE802.3)Group policy.DCreate an extensible authentication protocol(EAP)enforcement network policy.

单选题Your company has active directory certificate services (AD CS) and network access protection (NAP) deployed on the network. You need to ensure that NAP policies are enforced on portable computers that use a wireless connection to access the network. What should you do?()AConfigure all access points to use 802.1x authentication.BConfigure all protable computers to use MS-CHAP v2 authentication.CUse the group policy management console to access the wireless group policy settings, and enable the prevent connections to ad-hoc network option.DUse the group policy management console to access the wireless group policy settings, and disable the prevent connections to infrastructure networks option.

单选题Network Access Protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The company policy required confidentiality of data when the data is in transmit between the portable computers and the servers. You need to ensure taht users can access network resources only from computers that comply with the company policy. What should you do? ()A Create an IPsec Enforcement Network policyB Create an 802.1X enforcement network policyC Create a wired network (IEEE 802.3) Group PolicyD Create an Extensible Authentication Portocol (EAP) Enforcement Network Policy