单选题Your network contains the servers configured as shown in the following table. Name Server role Private IP address Public IP address Server1Routing and Remote Access server192.168.1.1 131.107.0.1 Web1 Web server 192.168.1.2 ? Your company is assigned the public IP addresses from 131.107.0.1 to 131.107.0.31.You need to ensure that Web1 is accessible from the Internet by using https://131.107.0.2.What should you do from the Routing and Remote Access console?()AFrom the Static Routes node, configure a static route.BFrom the server properties, configure SSL Certificate Binding.CFrom the NAT interface, add an address pool and a reservation.DFrom the NAT interface, configure the Secure Web Server (HTTPS) service.

单选题
Your network contains the servers configured as shown in the following table. Name Server role Private IP address Public IP address Server1Routing and Remote Access server192.168.1.1 131.107.0.1 Web1 Web server 192.168.1.2 ? Your company is assigned the public IP addresses from 131.107.0.1 to 131.107.0.31.You need to ensure that Web1 is accessible from the Internet by using https://131.107.0.2.What should you do from the Routing and Remote Access console?()
A

From the Static Routes node, configure a static route.

B

From the server properties, configure SSL Certificate Binding.

C

From the NAT interface, add an address pool and a reservation.

D

From the NAT interface, configure the Secure Web Server (HTTPS) service.


参考解析

解析: 暂无解析

相关考题:

Your network contains a domain-based Distributed File System (DFS) namespace named \\contoso.com\DFS1. You have two servers named Server1 and Server2 that are configured as namespace servers for \\contoso.com\DFS1. You need to verify that the DFS namespace replicates successfully between Server1 and Server2.Which tool should you use?()A. DfscmdB. DfsdiagC. DfsrdiagD. Dfsutil

You are the administrator of your company's network. The network is configured as shown in the exhibit.You want to install Windows 2000 Professional on 10 non-PXE-compliant computers that are on the marketing segment of your network. You start one of the computers by using a RIS boot disk. However, you cannot connect to the RIS server.You verify that the existing client computers on the network can connect to network servers, including the RIS server. The network router does not support BOOTP, so existing client computers use manually configured TCP/IP addresses. You want to enable the computers to connect to the RIS server.What should you do?A.Add a computer running DHCP Relay Agent to the marketing segment.B.Add a computer running the network monitor driver to the marketing segment.C.Move the Windows 2000 Server computer running WINS to the marketing segment.D.Move the Windows 2000 Server computer running Active Directory to the marketing segment.

Your company has two data centers.  Each data center contains a perimeter network.  Your network contains an Exchange Server 2010 organization.  You plan to deploy Exchange Server 2010 Edge Transport servers in the perimeter networks.  You need to recommend a solution for the Edge Transport servers that meets the following requirements:.Distribute inbound e-mail messages across all Edge Transport servers  .Ensure that users receive inbound e-mail messages if an Edge Transport server fails  .Ensure that users receive inbound e-mail messages if a single data center network becomes unavailable .Minimize costs  What should you recommend?()A、In each perimeter network, deploy one Edge Transport server. Implement failover clustering.B、In each perimeter network, deploy two Edge Transport servers. Implement failover clustering.C、In each perimeter network, deploy one Edge Transport server. Configure a mail exchange (MX) record for each server.D、In each perimeter network, deploy two Edge Transport servers. Configure a mail exchange (MX) record for each server.

You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. You are responsible for managing the Exchange network for TestKing.com The organization contains three Exchange Server 2010 Edge Transport Servers and seven ExchangeServer 2010 Hub Transport servers. The Edge Transport server is used to transfer e-mail from your organization to the Internet. During the course of day you receive an instruction form the CIO to ensure that all clients is able to send encrypted messages to other organizations over the Internet as well asensuring that communications between the Hub Transport servers and the Edge Transport servers isencrypted. What should you do?()A、Your best option would be to deploy SMTP over SSL.B、Your best option would be to implement Security/Multipurpose Internet Mail Extensions (S/MINE).C、Your best option would be to deploy IPsec.D、Your best option would be to implement Domain Securtiy.

Your network contains a DNS server named Server1 that runs Windows Server 2008 R2.Root hints for Server1 are configured as shown in the exhibit. (Click the Exhibit button.)You need to add root hints to Server1.What should you do first?()A、Disable recursion.B、Delete the . (root) zone.C、Restart the DNS Server service.D、Remove all conditional forwarders.

Your network contains 100 servers that run Windows Server 2008 R2.A server named Server1 is deployed on the network. Server1 will be used to collect events from the Security event logs of the other servers on the network.You need to define the Custom Event Delivery Optimization settings on Server1.Which tool should you use?()A、Event ViewerB、Task SchedulerC、WecutilD、Wevtutil

Your Network contains a single AD Site.You install 10 new Exchange Server 2010 CAS.All servers are configured to use a wildcard certificate.Users connect to their Mailboxes by using Windows Mobile 6.5 devices.All devices are configured to connect to cas.contoso.com.You need to ensure that users can connect to their Mailboxes by using mail.contoso.com. Which cmdlet should you run?()A、set-activesyncdeviceaccessruleB、set-activesyncmailboxpolicyC、set-activesyncorganizationsettingD、set-activesyncvirtualdirectory

You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains 50 application servers that run Windows Server 2003.   The security configuration of the application servers is not uniform. The application servers were deployed by local administrators who configured the settings for each of the application servers differently based on their knowledge and skills. The application servers are configured with different authentication methods, audit settings, and account policy settings.   The security team recently completed a new network security design. The design includes a baseline configuration for security settings on all servers. The baseline security settings use the Hisecws.inf predefined security template. The design also requires modified settings for servers in an application role. These settings include system service startup requirements, renaming the administrator account, and more stringent account lockout policies. The security team created a security template named Application.inf that contains the modified settings.   You need to plan the deployment of the new security design. You need to ensure that all security settings for the application servers are standardized, and that after the deployment, the security settings on all application servers meet the design requirements.   What should you do? ()A、 Apply the Setup security.inf template first, the Hisecws.inf template next, and then the Application.inf template.B、 Apply the Application.inf template and then the Hisecws.inf template.C、 Apply the Application.inf template first, the Setup security.inf template next, and then the Hisecws.inf template.D、 Apply the Setup security.inf template and then the Application.inf template.

Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest. The forest contains a single domain.  You plan to deploy 10 Edge Transport servers on the perimeter network.  You need to recommend a solution for the Edge Transport server deployment. The solution must meet the following requirements: .Allow administrators to apply a single security policy to all Edge Transport servers .Reduce the administrative overhead that is required to manage servers .Minimize the attack surface of the internal network What should you recommend?()A、Implement Network Policy and Access Services (NPAS).B、Implement Active Directory Federation Services (AD FS).C、Create a new Active Directory domain in the internal forest, and then join all Edge Transport servers to the new domain.D、Create an Active Directory forest in the perimeter network, and then join all Edge Transport servers to the new domain.

You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster.   The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template.   You need to implement protective measures against the cluster’s most significant security vulnerability.   What should you do?  ()A、 Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.B、 Use packet filtering on all inbound traffic to the cluster.C、 Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.D、 Use intrusion detection on the perimeter network.

You are a network administrator for your company. The network consists of a single Active Directory domain. The domain contains three Windows Server 2003 domain controllers, 20 Windows Server 2003 member servers, and 750 Windows XP Professional computers. The domain is configured to use only Kerberos authentication for all server connections.A user reports that she receives an "Access denied" error message when she attempts to connect to one of the member servers. You want to test the functionality of Kerberos authentication on the user’s client computer.  Which command should you run from the command prompt on the user’s computer?()A、netshB、netdiagC、ktpassD、ksetup

Your network contains a Network Policy Server (NPS) named Server1.NPS1 provides authentication for all of the VPN servers on the network.You need to track the usage information of all VPN connections.Which RADIUS attribute should you log?()A、Acct-Session-IdB、Acct-Status-TypeC、ClassD、NAS-Identifier

You work as the Exchange administrator at Company.com.The Company.com network contains an Exchange Server 2010 Organization.You are responsible for managing the Exchange network for Company.com.The network contains numerous Mailbox servers.During the course of the week you receive an instruction from the CIO to determine the message latency between the Mailbox servers in the organization.What should you do?()A、Your best option would be to increase the MSExchangeMailSubmission diagnostic logging level to Expert.B、Your best option would be to run the Test-Mailflow cmdlet.C、Your best option would be to increase the MSExchangeTransport diagnostic logging level to Expert.D、Your best option would be to run the Test-OutlookConnectivity cmdlet.

Your network contains a domain-based Distributed File System (DFS) namespace named //contoso.com/DFS1. You have two servers named Server1 and Server2 that are configured as namespace servers for //contoso.com/DFS1. You need to verify that the DFS namespace replicates successfully between Server1 and Server2. Which tool should you use?()A、DfscmdB、DfsdiagC、DfsrdiagD、Dfsutil

Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest. The forest contains a single domain.  You plan to deploy 10 Edge Transport servers on the perimeter network.  You need to recommend a solution for the Edge Transport server deployment. The solution must meet the following requirements: .Allow administrators to apply a single security policy to all Edge Transport servers .Reduce the administrative overhead that is required to manage servers .Minimize the attack surface of the internal network  What should you recommend?()A、Implement Network Policy and Access Services (NPAS).B、Implement Active Directory Federation Services (AD FS).C、Create a new Active Directory domain in the internal forest, and then join all EdgeTransport servers to the new domain.D、Create an Active Directory forest in the perimeter network, and then join all Edge Transport servers to the new domain.

Your network is configured as shown in the following diagram.     Each office contains a server that has the File Services server role installed. The servers have a shared folder named Resources.   You need to plan the data availability of the Resources folder. Your plan must meet the following  requirements:   èIf a WAN link fails,the files in the Resources folder must be available in all of the offices.   èIf a single server fails, the files in the Resources folder must be available in each of the branch offices,and the users must be able to use existing drive mappings.   èYour plan must minimize network traffic over the WAN links. What should you include in your plan?()A、a stand-alone DFS namespace that uses DFS Replication in a full mesh topologyB、a domain-based DFS namespace that uses DFS Replication in a full mesh topologyC、a stand-alone DFS namespace that uses DFS Replication in a hub and spoke topologyD、a domain-based DFS namespace that uses DFS Replication in a hub and spoke topology

Your network contains 200 servers that run Windows Server 2008 R2. You need to archive the Security log for each server on a daily basis. Which tool should you use?()A、NetshB、SeceditC、WecutilD、Wevtutil

单选题Your network consists of a single Active Directory domain named nwtraders.com. All network servers run Windows Server 2003 Service Pack 2 (SP2).The relevant IP configuration for the network is configured as shown in the following table. DC1 contains an Active Directory-integrated zone for nwtraders.com.From Server2, you run the Ping 172.26.26.11 command and receive a request timed out error message. From Server2, you run the Ping 172.16.16.129 command and receive a reply. You need to ensure that you can join Server2 to the nwtraders.com domain.  What should you do?()ASet the IP address to 172.16.16.2.BSet the subnet mask to 255.255.255.128.CSet the default gateway address to 172.16.16.129.DSet the preferred DNS server address to 172.16.16.130.

单选题Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). The network contains two servers named Server1 and Server2. Server1 is configured as a DHCP server and has a scope that contains addresses 192.168.2.51 to 192.168.2.125.You have a reservation for a print device named Printer1. The reservation assigns the IP address of 192.168.2.100.You install DHCP on Server2 and create a scope that contains addresses 192.168.2.126 to 192.168.2.200.You need to ensure that Printer1’s IP address always remains the same.  What should you create on Server2?()Aan exclusion range Ba reservation Ca superscope Da user class

单选题You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster.   The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template.   You need to implement protective measures against the cluster’s most significant security vulnerability.   What should you do?  ()A Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.B Use packet filtering on all inbound traffic to the cluster.C Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.D Use intrusion detection on the perimeter network.

单选题Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). The network contains two servers named Server1 and Server2. Server1 is configured as a DHCP server and has a scope that contains addresses 192.168.2.51 to 192.168.2.125. You have a reservation for a print device named Printer1. The reservation assigns the IP address of 192.168.2.100. You install DHCP on Server2 and create a scope that contains addresses 192.168.2.126 to 192.168.2.200. You need to ensure that Printer1s IP address always remains the same. What should you create on Server2?()Aan exclusion rangeBa reservationCa superscopeDa user class

单选题Your company has an IPv6 Ethernet network. A router named R1 connects your segment to the internet. A router named R2 joins your subnet with a segment named Private1. The Private1 segment has a network address of 10.128.4.0/26. Your computer named WKS2 required access to servers on the Private1 network. The WKS1 computer configuration in shown in the following table. (again table missing). The routers are configured as shown in the following table. (missing too)WKS1 is unable to connect to the Private1 network by using the current configuration. You need to add a persistent route for the Private1 network to the routing table on WKS1.()ARout add -p 10.128.4.0/22 10.128.4.1BRoute add Cp 10.128.4.0/26 10.128.64.10CRoute add Cp 10.128.4.0 mask 255.255.255.192 10.12.64.1DRoute add Cp 10.128.64.10 mask 255.255.255.192 10.128.4.0

单选题Your network contains a Network Policy Server (NPS) named Server1.NPS1 provides authentication for all of the VPN servers on the network.You need to track the usage information of all VPN connections.Which RADIUS attribute should you log?()AAcct-Session-IdBAcct-Status-TypeCClassDNAS-Identifier

单选题Your company has two data centers.  Each data center contains a perimeter network.  Your network contains an Exchange Server 2010 organization.  You plan to deploy Exchange Server 2010 Edge Transport servers in the perimeter networks.  You need to recommend a solution for the Edge Transport servers that meets the following requirements:.Distribute inbound e-mail messages across all Edge Transport servers  .Ensure that users receive inbound e-mail messages if an Edge Transport server fails  .Ensure that users receive inbound e-mail messages if a single data center network becomes unavailable.Minimize costs  What should you recommend?()AIn each perimeter network, deploy one Edge Transport server. Implement failover clustering.BIn each perimeter network, deploy two Edge Transport servers. Implement failover clustering.CIn each perimeter network, deploy one Edge Transport server. Configure a mail exchange (MX) record for each server.DIn each perimeter network, deploy two Edge Transport servers. Configure a mail exchange (MX) record for each server.

单选题Your network contains a DNS server named DNS1 that runs Windows Server 2008 R2. DNS1 is configured as the DNS server for contoso.com. All client computers are configured to use DNS1 for name resolution.From a client computer, you run the Ping tool as shown in the exhibit. (Click the Exhibit button.) You need to ensure that users can use the Ping tool to resolve the IP addresses of internal servers to fully qualified domain names (FQDNs).What should you do?()ACreate a GlobalNames zone.BCreate a reverse lookup zone.CCreate a forward lookup zone.DEnable zone transfers on the contoso.com zone.

单选题Your Network contains a single AD Site.You install 10 new Exchange Server 2010 CAS.All servers are configured to use a wildcard certificate.Users connect to their Mailboxes by using Windows Mobile 6.5 devices.All devices are configured to connect to cas.contoso.com.You need to ensure that users can connect to their Mailboxes by using mail.contoso.com. Which cmdlet should you run?()Aset-activesyncdeviceaccessruleBset-activesyncmailboxpolicyCset-activesyncorganizationsettingDset-activesyncvirtualdirectory