You are configuring an LDAP authentication server, and you want to configure role-mapping rules based on group membership. When you attempt to search for groups in the server catalog, no groups appear.Assuming the LDAP server is reachable and functioning properly, in the admin GUI. Which two parts of the configuration should you verify are correct?()A、Finding user entriesB、Authentication requiredC、LDAP Server TypeD、Determining group membership
You are configuring an LDAP authentication server, and you want to configure role-mapping rules based on group membership. When you attempt to search for groups in the server catalog, no groups appear.Assuming the LDAP server is reachable and functioning properly, in the admin GUI. Which two parts of the configuration should you verify are correct?()
- A、Finding user entries
- B、Authentication required
- C、LDAP Server Type
- D、Determining group membership
相关考题:
You are configuring an LDAP authentication server, and you want to configure role-mapping rules based on group membership. When you attempt to search for groups in the server catalog, no groups appear.Assuming the LDAP server is reachable and functioning properly, in the admin GUI. Which two parts of the configuration should you verify are correct?()A. Finding user entriesB. Authentication requiredC. LDAP Server TypeD. Determining group membership
Using an LDAP authentication server, what do you configure to validate certificate attributes?()A、Use the "is exactly" or "contains" operators.B、Create a user filter matching thedn of the certificate.C、Verify that the certificate is issued by a publicly trusted cs.D、Match the certificate type and value with an attribute from theldap server.
You are a network administrator for your company. The network consists of a single Active Directory domain and contains 10 Windows Server 2003 computers. You install a new service on a server named Server1. The new service requires that you restart Server1. When you attempt to restart Server1, the logon screen does not appear. You turn off and then turn on the power for Server1. The logon screen does not appear. You attempt to recover the failed server by using the Last Known Good Configuration startup option. It is unsuccessful. You attempt to recover Server1 by using the Safe Mode startup options. All Safe Mode options are unsuccessful. You restore Server1. Server1 restarts successfully. You discover that Server1 failed because the new service is not compatible with a security patch. You want to configure all servers so that you can recover from this type of failure by using the minimum amount of time and by minimizing data loss. You need to ensure that in the future, other services that fail do not result in the same type of failure. What should you do? ()A、 Use Add or Remove Programs.B、 Install and use the Recovery Console.C、 Use Automated System Recovery (ASR).D、 Use Device Driver Roll Back.
You work as a network administrator at, You have been asked to configure 802.1x port-based authentication. You notice that the client workstation is not compatible with 802.1x port-based authentication. What supported authentication server should be chosen?()A、TACACS with LEAP extensionsB、RADIUS with EAP extensionsC、TACACS+D、LDAP
You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003. All client computers run Windows XP Professional. You install Software Update Services (SUS) on a network server named Testking1. When you attempt to synchronize Testking1 with the Windows Update servers, you receive an error message. You suspect that your proxy server requires authentication. You open Internet Explorer and verify that you can communicate with an external Web site by using the proxy server. You need to ensure that Testking1 can communicate with the Windows Update servers. What should you do on Testking1?()A、Restart the IIS administration tool.B、Configure the Internet Explorer settings to bypass the proxy server.C、In the SUS options, configure authentication to the proxy server.D、Install the Microsoft Firewall Client.
You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.You install Windows Server Update Services (WSUS) on a network server named Server1. When you attempt to synchronize Server1 with the Windows Update servers, you receive an error message. You open Internet Explorer and verify that you can communicate with an external Web site by using the proxy server. You need to ensure that Server1 can communicate with the Windows Update servers. What should you do on Server1?()A、Restart the IIS administration tool.B、Configure the Internet Explorer settings to bypass the proxy server.C、In the WSUS options, configure authentication to the proxy server.D、Install the ISA Firewall Client.
You are the network administrator for your company. Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2003. You add eight servers for a new application. You create an organizational unit (OU) named Application to hold the servers and other resources for the application. Users and groups in the domain will need varied permissions on the application servers. The members of a global group named Server Access Team need to be able to grant access to the servers. The Server Access Team group does not need to be able to perform any other tasks on the servers. You need to allow the Server Access Team group to grant permissions for the application servers without granting the Server Access Team group unnecessary permissions. What should you do?()A、 Create a Group Policy object (GPO) for restricted groups. Configure the GPO to make the Server Access Team group a member of the Power Users group on each application server. Link the GPO to the Application OU.B、 Grant the Server Access Team group permissions to modify computer objects in the Application OU.C、 Move the Server Access Team group object into the Application OU.D、 Create domain local groups that grant access to the application servers. Grant the Server Access Team group permissions to modify the membership of the domain local groups.
You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers. You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized. You need to configure Server1 to log the details of access attempts by VPN users. What should you do? ()A、 Configure the system event log to Do not overwrite.B、 In IAS, in Remote Access Logging, enable the Authentication requests setting.C、 Configure the Remote Access server to Log all events.D、 Create a custom remote access policy and configure it for Authentication-Type.
You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The server hasthe Web Server (IIS) server role installed. The server contains a Web site that is configured to use onlyWindows Authentication. You have a security group named Group1 that contains several user accounts.Now you receive an order from the company management. According to the company requirement, youhave to prevent the members of Group1 from accessing a Web site. But you are not allowed prevent otherusers from accessing the Web site. Which Web site feature should you configure?()A、You should configure SSL SettingsB、You should configure AuthenticationC、You should configure Authorization RulesD、You should configure IIS Manager Permissions
You manage a server named Server2 that runs Windows Server 2008. You install and test the Terminal Services role on Server2. You publish an application by using Terminal Services. All users must connect to the Terminal Services application by using the Remote Desktop Protocol. You install and configure the Terminal Services Gateway (TS Gateway) role service on Server2. You configure a default domain policy to enable the Enable Connection through TS Gateway setting. Users report that they cannot connect to the Terminal Services application. You need to ensure that users can access the Terminal Services application on the intranet and from the Internet. What should you do?()A、Configure the Enable Connection through TS Gateway Group Policy setting to Disabled.B、Configure the Set TS Gateway server address Group Policy and configure the IP address of the TSGateway server. Link the GPO to the domain.C、Configure Server Authentication on the Remote Desktop Connection client to Always connect, even if server authentication fails for all users.D、Enable the Set TS Gateway server authentication method Group Policy to the Ask for credential, use NTLM protocol setting. Link the GPO to the domain.
You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.You install and configure a single server to run Windows Server Update Services (WSUS). You configure the appropriate Group Policy settings to specify separate WSUS target groups for client and server computers. You need to ensure that computers automatically assign themselves to the correct computer group. What should you do?()A、In the WSUS console, configure Computer Options so that Use group policy or registry settings on computers is selected.B、In the WSUS console, configure Computer Options so that Use the Move Computers Task in Windows Server Update Services is selected.C、In the WSUS console, create the appropriate computer groups.D、Create organizational units (OUs) for each group.
You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2 installed.ABC.com has a server, named ABC-SR15, which is configured as a file server. You have received instructions to make sure that a user, named Mia Hamm, has the ability to generate a complete backup of ABC-SR15 via Windows Server Backup. Which of the following actions should you take?()A、You should consider making use of Computer Management to configure the local groups.B、You should consider making use of Computer Management to configure the domain local groups.C、You should consider making use of Computer Management to configure the global groups.D、You should consider making use of Computer Management to configure the administrator groups.
You have two servers that run Windows Server 2008 named Server1 and Server2. You install WSUS on both servers. You need to configure WSUS on Server1 to receive updates from Server2. What should you do on Server1? ()A、 Configure a proxy serverB、 Configure a upstream serverC、 Create a new replica groupD、 Create a new computer group
You are a network administrator for your company. You install Windows Server 2003 on two servers named Server1 and Server2. You configure Server1 and Server2 as a two-node cluster. You configure a custom application on the cluster by using the Generic Application resource, and you put all resources in the Application group. You test the cluster and verify that it fails over properly and that you can move the Applications group from one node to the other and back again. The application and the cluster run successfully for several weeks. Users then report that they cannot access the application. You investigate and discover that Server1 and Server2 are running but the Application group is in a failed state. You restart the Cluster service and attempt to bring the Application group online on Server1. The Application group fails. You discover that Server1 fails, restarts automatically, and fails again soon after restarting. Server1 continues to fail and restart until the Application group reports that it is in a failed state and stops attempting to bring itself back online. You need to configure the Application group to remain on Server2 while you research the problem on Server1. What should you do? ()A、 On Server2, configure the failover threshold to 0.B、 On Server2, configure the failover period to 0.C、 Remove Server1 from the Possible owners list.D、 Remove Server1 from the Preferred owners list.
You have two servers that run windows server 2008 named server1 and server2. You install WSUS on both servers. You need to configure WSUS on server1 to receive updates from server2. What should you do on server1?()A、Configure a proxy server.B、Configure a upstream server.C、Create a new replica group.D、Create a new computer group.
You have two servers that run Windows Server 2008 named Server1 and Server2. You install Windows Server Update Services (WSUS) on both servers.You need to configure WSUS on Server1 to receive updates from Server2. What should you do on Server1?()A、Configure a proxy server.B、Configure an upstream server.C、Create a new replica group.D、Create a new computer group.
Your network contains an Active Directory domain. All client computers run Windows XP Service Pack 3 (SP3). The domain contains a member server named Server1 that runs Windows Server 2008 R2. On Server1, you create a connection security rule that requires authentication for inbound and outbound connections. You configure the connection security rule to use Kerberos authentication. You need to ensure that the client computers can connect to Server1. The solution must ensure that all connections to Server1 are encrypted. What should you do?()A、From the Windows Firewall with Advanced Security console, create an inbound rule on Server1.B、From the Windows Firewall with Advanced Security console, create an outbound rule on Server1.C、From a Group Policy object (GPO), enable the Client (Respond Only) IPSec policy on all client computers.D、From a Group Policy object (GPO), configure the Network Security: LDAP client signing requirements policy setting for all client computers.
You have a server that runs Windows Server 2008. The server has the Web Server (IIS) server role installed. The server contains a Web site that is configured to use only Windows Authentication. You have a security group named Group1 that contains several user accounts. You need to prevent the members of Group1 from accessing a Web site. You must not prevent other users from accessing the Web site. Which Web site feature should you configure?()A、AuthenticationB、Authorization RulesC、IIS Manager PermissionsD、SSL Settings
You install WSUS on a server that runs Windows Server 2008. You need to ensure taht the traffic between the WSUS administrative website and the server administrators computer is encrypted. What should you do? ()A、 Configure SSL encryption on the WSUS server website.B、 Run the netdom trust /SecurePasswordPrompt command on the WSUS serverC、 Configure the NTFS permissions on the content directory to Deny Full Controll permission to the Everyone groupD、 Configure the WSUS server to require Integrated Windows Authentication (IWA) when users connect to the WSUS server.
You are a security administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows 2000 Professional. You manage a Windows Server 2003 computer named Server1 that is a domain member server. You use IIS on Server1 to host an Internet Web site. Approximately 4,000 employees of your company connect over the lnternet to access company confidential data on Server1. You control access to data on Server1 by using NTFS file permissions assigned to groups. Different groups are assigned access to different files. Employees must have access only to files that they are assigned access to based on their membership in a group. You enable SSL on Server1 to protect confidential data while it is in transit. You issue each employee an Authenticated Session certificate and store a copy of that certificate with their user account in the Active Directory domain. You need to ensure that Server1 authenticates users based on possession of their certificate. What should you do?()A、 Request a Web server certificate from a commercial certification authority (CA).B、 Configure access restrictions based on employee ip address.C、 Enable Digest authentication for Windows domain servers.D、 Configure client certificate mapping.
You need to design the configuration of the Windows Server 2003 Routing and Remote Access server in the Seattle office to meet business requirements. What should you do?()A、Configure a remote access policy on the Routing and Remote Access server to require MS-CHAP v2 for all connectionsB、Use a Group Policy object (GPO) to configure a Restricted Groups policy that applies to the Routing and Remote Access server. Use this Restricted Groups policy to remove all accounts form the local Users group, and then add authorized computer accountsC、Configure the Routing and Remote Access server to use only PPTP connectionsD、Configure the Routing and Remote Access server to use only IPSec over L2TP connections.Configure IPSec to use certificates
You install the FTP role service on a server that runs Windows Server 2008. Users receive an errormessage when they attempt to upload files to the FTP site. You need to allow authenticated users to upload files to the FTP site. What should you do?()A、Run the ftp Ca 192.168.1.200 command on the server that runs Windows Server 2008.B、Run the appcmd unlock config command on the server that runs Windows Server 2008.C、Configure Write permissions on the FTP site. Configure the NTFS permissions on the FTP destination folder for the Authenticated Users group to Allow - Modify.D、Configure Write permissions on the FTP site. Configure the NTFS permissions on the FTP destination folder for the Authenticated Users group to Allow C Write attributes.
单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.You install Windows Server Update Services (WSUS) on a network server named Server1. When you attempt to synchronize Server1 with the Windows Update servers, you receive an error message. You open Internet Explorer and verify that you can communicate with an external Web site by using the proxy server. You need to ensure that Server1 can communicate with the Windows Update servers. What should you do on Server1?()ARestart the IIS administration tool.BConfigure the Internet Explorer settings to bypass the proxy server.CIn the WSUS options, configure authentication to the proxy server.DInstall the ISA Firewall Client.
单选题You need to design the configuration of the Windows Server 2003 Routing and Remote Access server in the Seattle office to meet business requirements. What should you do?()AConfigure a remote access policy on the Routing and Remote Access server to require MS-CHAP v2 for all connectionsBUse a Group Policy object (GPO) to configure a Restricted Groups policy that applies to the Routing and Remote Access server. Use this Restricted Groups policy to remove all accounts form the local Users group, and then add authorized computer accountsCConfigure the Routing and Remote Access server to use only PPTP connectionsDConfigure the Routing and Remote Access server to use only IPSec over L2TP connections.Configure IPSec to use certificates
单选题You manage a server named Server2 that runs Windows Server 2008. You install and test the Terminal Services role on Server2. You publish an application by using Terminal Services. All users must connect to the Terminal Services application by using the Remote Desktop Protocol. You install and configure the Terminal Services Gateway (TS Gateway) role service on Server2. You configure a default domain policy to enable the Enable Connection through TS Gateway setting. Users report that they cannot connect to the Terminal Services application. You need to ensure that users can access the Terminal Services application on the intranet and from the Internet. What should you do?()AConfigure the Enable Connection through TS Gateway Group Policy setting to Disabled.BConfigure the Set TS Gateway server address Group Policy and configure the IP address of the TSGateway server. Link the GPO to the domain.CConfigure Server Authentication on the Remote Desktop Connection client to Always connect, even if server authentication fails for all users.DEnable the Set TS Gateway server authentication method Group Policy to the Ask for credential, use NTLM protocol setting. Link the GPO to the domain.
多选题You are configuring an LDAP authentication server, and you want to configure role-mapping rules based on group membership. When you attempt to search for groups in the server catalog, no groups appear.Assuming the LDAP server is reachable and functioning properly, in the admin GUI. Which two parts of the configuration should you verify are correct?()AFinding user entriesBAuthentication requiredCLDAP Server TypeDDetermining group membership
单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The server hasthe Web Server (IIS) server role installed. The server contains a Web site that is configured to use onlyWindows Authentication. You have a security group named Group1 that contains several user accounts.Now you receive an order from the company management. According to the company requirement, youhave to prevent the members of Group1 from accessing a Web site. But you are not allowed prevent otherusers from accessing the Web site. Which Web site feature should you configure?()AYou should configure SSL SettingsBYou should configure AuthenticationCYou should configure Authorization RulesDYou should configure IIS Manager Permissions