单选题You are designing a strategy to allow users to have remote access to internal resources.   Which service or services should you allow on the public interface of the NAT Server?()A HTTPB LDAPC POP3D SMTPE VPN Gateway

单选题
You are designing a strategy to allow users to have remote access to internal resources.   Which service or services should you allow on the public interface of the NAT Server?()
A

 HTTP

B

 LDAP

C

 POP3

D

 SMTP

E

 VPN Gateway


参考解析

解析: 暂无解析

相关考题:

You are designing a strategy to ensure that all employees have Internet access. For each branch office,  what should you do?()A、 Configure a DNS server to function as caching-only serversB、 Configure Internet Connection sharing on terminal servers.C、 Install and configure an Internet Security and Acceleration (ISA) Server ComputerD、 Install and configure a server running Routing and Remote Acess to function as a VPN server

You are designing a strategy to allow users to have remote access to internal resources. Which service or services should you allow on the public interface of the NAT Server?()A、HTTPB、LDAPC、POP3D、SMTPE、VPN Gateway

You are designing a strategy of enforce the corporate security policy. Which action or actions should you perform?()A、Configure a password policy that requires strong passwords  B、Configure a password policy that requires all users to change their passwords once a month.  C、Allow users in the branch offices to log on between the hours of 8:00 AM and 5:00 PM, Monday through Friday.  D、Allow users in the retail outlets to log on between the hours of 6:00 AM and 11:00 PM, daily. E、Enable a policy that forces users to log off when their logon hours expire.

Your company runs Remote Desktop Services. You have a Remote Desktop Session Host (RD Session Host) server. You need to ensure that remote desktop users can print only to the printers that are installed on the RD Session Host server. What should you do?()A、Enable the Do not allow client printer redirection Group Policy setting.B、Disable the Do not allow client printer redirection Group Policy setting.C、Enable the Do not set default client printer to be default printer in a session Group Policy setting.D、Disable the Do not set default client printer to be default printer in a session Group Policy setting.

You are designing the IP address assignment strategy for the VPN users. Which two actions should you perform.()A、 Configure VPN1 as a DHCP Relay Agent.B、 Configure VPN1 to assign IP Address by using DHCP server.C、 Configure VPN1 to have a static pool of IP Address from the network address of 131.107.1.0/24.D、 Configure VPN1 to have a static pool of IP Address from the network address of 192.168.1.0/24.E、 Configure the perimeter firewall to allow inbound DHCP traffic to be passed to VPN1.F、 Configure the interval firewall to allow DHCP broadcasts to be forwarded from the external network to the internal network.

You are designing a strategy for installing Windows server 2003 on the new domain controllers. Which method should you use?()A、Unattended installationB、Remote Installation Services (RIS)C、Automated Deployment Services (ADS)D、Microsoft Systems Management Server (SMS)

You are designing a remote administration solution that meets business requirements. You need to specify client or server software that will be required. What should you do?()A、Ensure that all client computers have a graphical Telnet client installedB、Ensure that all client computers have the Remote Desktop Connection client software installedC、Ensure that all server computers have RCONSOLE installed and that it is configured to start automaticallyD、Ensure that all server computers have Remote Administration (HTML) installed

You need to design an e-mail access strategy for remote users. What should you do? () A、 Instruct remote users to connect to their e-mail by using RPCB、 Instruct remote users to connect to Outlook Web Access by using only HTTPSC、 Instruct remote users to connect to the company network by using PPTP connectionsD、 Instruct remote users to connectd to their e-mail by using RPC over HTTP Configure the HTTP servers to require encryption.

You are designing a strategy to allow internal users in Dallas to resolve domain names.  What are three possible ways to achieve the goal?()A、 Configure the internal DNS server to have a root zone.B、 Configure the Dallas DNS server to use the default root hints.C、 Configure the Dallas DNS server to forward all request for the external namespace to the external DNS server.D、 Create a caching-only DNS server on the perimeter network.E、 Create a stub zone for the external namespace on the Dallas DNS server.

You are designing a strategy to allow users to gain VPN access to the internal network.  What should you do?()A、 Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.B、 Allow all inbound VPN traffic to pass through the perimeter firewall only.C、 Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.D、 Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.

You are designing a remote access strategy to meet the business  technical requirements. Which authentication mechanism should you use?()A、MS-CHAP v2.B、Internet Authentication service (IAS).C、Multilink  Bandwidth Allocation Protocol (BAP).D、Remote access policies on all servers running Routing  Remote Access.

You are designing a strategy to perform inplace upgrade of domain controller in Boston and San Diego. Which method should you use?()A、adprepB、sysprepC、Answer FileD、Remote Installtion Services (RIS)

You are designing a strategy for synchronizing a SQL Azure database and multiple remote Microsoft SQL Server 2008 databases.  The SQL Azure database contains many tables that have circular foreign key relationships.  You need to recommend an approach for ensuring that all changes in the remote databases synchronize with the SQL Azure database.  What should you recommend?()A、 Use SQLAzure Data Sync Service.B、 Use SQL Server replication.C、 Use SQL Server backup and restore.D、 Use SQL Server database snapshots.

You are designing a security strategy for users who need remote access to the corporate network. What should you do?()A、Configure Internet Authentication Service (IAS) for accounting.B、Configure the server running Routing and Remote Access to support L2TP.C、Configure the server running Routing and Remote Access to restrict dial-in traffic to the NewApp servers only.D、Create a separate account for remote access users. Configure these accounts to access the NewApp server only.

You are designing a strategy to provide Internet access to all users.  What should you do?()A、 Configure Internet Connection Sharing on all client computers.B、 Configure Automatic Private IP Addressing (APIPA) on all client computers.C、 Configure one server as a Routing and Remote Access VPN server.D、 Configure one server as a Routing and Remote Access NAT router.

You are designing a DNS name resolution strategy to allow all users access to internal and external web sites.  What should you do?()A、 Allow zone transfers to any DNS server.B、 Create a new stub zone for the DNS zone on the DNS server.C、 Configure the DNS server to forward all unanswered queries to a DNS server located at the ISPD、 Add the DNS server located at the ISP to the list of name servers for the fourthcoffee.com DNS zone

单选题You are designing a security strategy for users who need remote access to the corporate network.  What should you do?()A Configure Internet Authentication Service (IAS) for accounting.B Configure the server running Routing and Remote Access to support L2TP.C Configure the server running Routing and Remote Access to restrict dial-in traffic to the NewApp servers only.D Create a separate account for remote access users. Configure these accounts to access the NewApp server only.

单选题You are designing a strategy to provide Internet access to all users.  What should you do?()A Configure Internet Connection Sharing on all client computers.B Configure Automatic Private IP Addressing (APIPA) on all client computers.C Configure one server as a Routing and Remote Access VPN server.D Configure one server as a Routing and Remote Access NAT router.

单选题You are designing a remote access strategy to meet the business  technical requirements.  Which authentication mechanism should you use?()A MS-CHAP v2.B Internet Authentication service (IAS).C Multilink  Bandwidth Allocation Protocol (BAP).D Remote access policies on all servers running Routing  Remote Access.

单选题You are designing a group management strategy for users in the finance department. You need to  identify the appropriate changes that need to be made to the current group management strategy. You want to accomplish this goal by using the minimum number of groups.  What should you do?()A Add the finance users to the financeData group to which the necessary permissions have been assigned.B Add the finance users to the financeGG group to which the necessary permissions have been assigned.C Add the finance users to the financeGG group. Then add the financeGG group to the financeData group to which the necessary permissions have been assigned.D Add the finance users to the financeGG group. Add the financeGG group to the financeUG group to the financeDat group to which the necessary permissions have been assigned.

单选题You are designing a strategy to allow users to have remote access to internal resources. Which service or services should you allow on the public interface of the NAT Server?()AHTTPBLDAPCPOP3DSMTPEVPN Gateway

单选题You are designing a DNS name resolution strategy to allow all users access to internal and external web sites.  What should you do?()A Allow zone transfers to any DNS server.B Create a new stub zone for the DNS zone on the DNS server.C Configure the DNS server to forward all unanswered queries to a DNS server located at the ISPD Add the DNS server located at the ISP to the list of name servers for the fourthcoffee.com DNS zone

单选题You are designing a Windows Azure application that will allow for the processing of image files. Images will be processed in batches by remote applications running on multiple servers.  The application must meet the following requirements:   - Remain operational during batch-processing operations. - Allow users to roll back each image to previous versions.    Each remote application must have exclusive access to an image while processing it. You need to recommend an approach for storing the images.  What should you recommend?()A Store the images in a Windows Azure Queue.B Store theimages in Windows Azure Blob storage.C Store the images in Windows Azure Table storage.D Store images in a single Windows Azure Drive attached to the web role.

单选题You are designing a remote access strategy to meet the business  technical requirements. Which authentication mechanism should you use?()AMS-CHAP v2.BInternet Authentication service (IAS).CMultilink  Bandwidth Allocation Protocol (BAP).DRemote access policies on all servers running Routing  Remote Access.

单选题You are designing a strategy to perform inplace upgrade of domain controller in Boston and San Diego.  Which method should you use?()A adprepB sysprepC Answer FileD Remote Installtion Services (RIS)

单选题You are designing a strategy to ensure that all employees have Internet access. For each branch office,  what should you do?()A Configure a DNS server to function as caching-only serversB Configure Internet Connection sharing on terminal servers.C Install and configure an Internet Security and Acceleration (ISA) Server ComputerD Install and configure a server running Routing and Remote Acess to function as a VPN server

单选题You are designing a strategy to allow users to gain VPN access to the internal network.  What should you do?()A Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.B Allow all inbound VPN traffic to pass through the perimeter firewall only.C Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.D Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.