When is the site-to-site remote access model appropriate? ()A、for multiple ISDN connectionsB、for modem concentrated dial-up connectionsC、for a group of users in the same vicinity sharing a connectionD、for use by mobile users
When is the site-to-site remote access model appropriate? ()
- A、for multiple ISDN connections
- B、for modem concentrated dial-up connections
- C、for a group of users in the same vicinity sharing a connection
- D、for use by mobile users
相关考题:
As they access the corporate network, mobile and remote users inadvertently can infect the network with(72) and worms acquired from unprotected public networks.A.virusesB.diseaseC.germsD.sickness
Your network contains an Active Directory domain. The domain contains a member server that runs Windows Server 2008 R2.You have a folder named Data that is located on the C drive. The folder has the default NTFS permissions configured.A support technician shares C:\Data by using the File Sharing Wizard and specifies the default settings.Users report that they cannot access the shared folder.You need to ensure that all domain users can access the share.What should you do?()A. Enable access-based enumeration (ABE) on the share.B. Assign the Read NTFS permission to the Domain Users group.C. From the Network and Sharing Center, enable public folder sharing.D. From the File Sharing Wizard, configure the Read permission level for the Domain Users group.
● Traditional Internet access methods like dial-up were so slow that host computers wereconnected to the dial-up (71) at the customer premise over slow (72) ports. PPP wasdesigned to run directly over these serial links. But with the advent of broadband Internet (73)technologies such as ADSL and cable modems there has been a considerable increase in thebandwidth delivered to the end users. This means that the host computers at the customerpremise connect to the (74) or cable "modem" over a much faster medium such as Ethernet.It also means that multiple (75) can connect to the Internet through the same connection.
● Traditional Internet access methods like dial-up were so slow that host computers were connected to the dial-up (71) at the customer premise over slow (72) ports. PPP was designed to run directly over these serial links. But with the advent of broadband Internet (73) technologies such as ADSL and cable modems there has been a considerable increase in the bandwidth delivered to the end users. This means that the host computers at the customer premise connect to the (74) or cable "modem" over a much faster medium such as Ethernet. It also means that multiple (75) can connect to the Internet through the same connection.
When is the site-to-site remote access model appropriate? () A. for multiple ISDN connectionsB. for modem concentrated dial-up connectionsC. for a group of users in the same vicinity sharing a connectionD. for use by mobile users
As they access the corporate network, mobile and remote users inadvertently can infect the network with ( )and worms acquired from unprotected public networks.A. sicknessB. diseaseC. GermsD. Viruses
Which of the following is true regarding NetWare Directory Services (NDS) configuration?()A、Remote users can access the tree through dial-in connections.B、Mobile users do not require changing the NDS name context.C、Remote users do not require a special NDS object entry.D、There are no differences between mobile users and remote users.
A group of users report that they can access local resources but cannot access the Internet. Which of the following should the administrator use to test connectivity?()A、 tracertB、 msconfigC、 routeD、 net use
What is the primary purpose of creating a Location Group Policy? ()A、to associate more than one realm with an authentication serverB、to logically group network access devices and associate them with specific sign-in policiesC、to allow or prevent users from accessing resources in specific locations on the networkD、to define the URL that users of network access devices can use to access the Infranet Controller
What are two use cases enabled by IF-MAP Federation?()A、Users authenticated to one Junos Pulse Access Control Service can transparently access resources protected by another Junos Pulse Access Control Service.B、Users authenticated to a Junos Pulse Access Control Service can transparently access resources protected by a Junos Pulse Secure Access Service.C、Remote access users authenticated to a Junos Pulse Secure Access Service can transparently access resources protected by a Junos Pulse Access Control Service.D、Remote access users authenticated to one Junos Pulse Secure Access Service can transparently access resources protected by another Junos Pulse Secure Access Service.
You are the network administrator for your company. The network consists of a single Active Directory domain. All client computers run Windows XP Professional. The company has a large number of sales representatives who need access to the company network when they travel. A Windows 2000 Server computer is configured to allow users to access the network by using a dial-up connection. Several of the sales representatives occasionally travel to rural locations that have telephone lines that use outdated technology. The sales representatives report that when they attempt to establish a dial-up connection in these locations, they receive the following error message: "The server is not responding." They cannot connect to the remote access server or to the company network. Users who travel to urban areas do not report this problem. You investigate and find out that the server is running properly, but the problem persists. The sales representatives need to be able to use the dial-up connection to access the company network. What should you do?()A、Change the flow control option in the modem properties to Xon / Xoff.B、Disable error correction in the modem's default data connection preferences.C、Adjust the modem's default connection speed to a lower rate. D、Disable the first-in, first-out (FIFO) receive and transmit buffers on the modem.
Your network contains a server named Server1. Server1 has DirectAccess deployed. A group named Group1 is enabled for DirectAccess. Users report that when they log on to their computers, the computers are not configured to use DirectAccess. You need to ensure that the users computers are configured to use DirectAccess. What should you do first?()A、On each client computer, add Group1 to the Distributed COM Users group.B、On each client computer, add Group1 to the Network Configuration Operators group.C、From Active Directory Users and Computers, add the users user accounts to Group1.D、From Active Directory Users and Computers, add the users computer accounts to Group1.
Your corporate network has a member server named RAS1 that runs Windows Server 2008 R2. You configure RAS1 to use the Routing and Remote Access Services (RRAS).The companys remote access policy allows members of the Domain Users group to dial in to RAS1. The company issues smart cards to all employees.You need to ensure that smart card users are able to connect to RAS1 by using a dial-up connection.What should you do?()A、Install the Network Policy Server (NPS) server role on RAS1.B、Create a remote access policy that requires users to authenticate by using SPAP.C、Create a remote access policy that requires users to authenticate by using EAP-TLS.D、Create a remote access policy that requires users to authenticate by using MS-CHAP v2.
Your corporate network has a member server named RAS1 that runs windows server 2008. You configure RAS1 to use the routing and remote access service (RRAS). The companys remote access policy allows members of the domain users group to dial in to RAS1. The company issues smart cards to all employees. You need to ensure that smart card users are able to connect to RAS1 by using a dial-up connection. What should you do?()A、Install the network policy server (NPS) on the RAS1 server.B、Create a remote access policy that requires users to authenticate by using SPAP.C、Create a remote access policy that requires uses to authenticate by using EAP-TLS.D、Create a remote access policy that requires uses to authenticate by using MS-CHAPv2.
Your corporate network has a member server named RAS1 that runs Windows Server 2008. You configure RAS1 to use the Routing and Remote Access Service (RRAS) The companys remote access policy allows members of the Domain Users group to dial in to RAS1. The company issues smart cards to all employees. You need to ensure that smart card users are able to connect to RAS1 by using a dial-up connection. What should you do?()A、 Install the Network Policy Server (NPS) on the RAS1 serverB、 Create a remote access policy that requires users to authenticate by using SPAPC、 Create a remote access policy that requires users to authenticate by using EAP-TLSD、 Create a remote access policy that requires users to authenticate by using MS-CHAP v2
You have a server that runs the Terminal Services Gateway (TS Gateway) role service. Users need to connect remotely through the gateway to desktop computers located in their offices. You create a security group named Remote1 for the users who need to connect to computers in their offices. You need to enable the users to connect to the TS Gateway. What should you do?()A、Add the Remote1 security group to the local remote desktop users group on the TS Gateway server.B、Create a client authorization policy. Add the Remote1 security group and enable Device redirection.C、Create a resource authorization policy. Add the Remote1 security group and enable Users to connect to any resource.D、Create a Group Policy object and enable the Set TS Gateway authentication method properties to Ask for credentials, use Basic protocol. Apply the policy to the TS Gateway server.
You need to design a remote access authentication strategy that will allow users in the IT department to remotely connect to the network. Your solution must meet security requirements. What should you do?()A、Install Internet Authentication Services (IAS) on a server in the den.corp.woodgrovebank.com domain. Configure the VPN servers as RADIUS clientsB、Install Internet Authentication Services (IAS) on a stand-alone server in the Denver extranet. Create local user accounts for the IT personnel on the IAS server. Configure the VPN servers as RADIUS clientsC、Create a remote access policy on each of the VPN servers. Configure the policy to use the den.corp.woodgrovebank.com to authenticate remote access users. Configure the policy to require L2TP to establish a connectionD、Create a remote access policy on each of the VPN servers. Create local user accounts for the IT personnel on the VPN servers. Configure the policy to use the VPN servers’ local accounts database to authenticate users. Configure the policy to require L2TP to establish a connection
You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. Your new assistant, Tess, will perform basic administrative tasks on a member server named TestKingSrvC. Tess is not a member of the local Administrators group on TestKingSrvC, but she can log on to the server console. Tess reports that she receives an error message when she tries to use Remote Desktop. The error message states: "The local policy of this system does not permit you to log on interactively". You need to ensure that Tess can use Remote Desktop to log on to TestKingSrvC. What should you do?()A、Add Tess's user account to the Remote Desktop Users domain local group.B、Add Tess's user account to the Remote Desktop Users local group on TestKingSrvc.C、On the Remote Control tab of Tess's domain account, select the Enable remote control option.D、On the Security tab of Tess's domain account, add the Remote Desktop Users domain local group. Assign the Allow - Full Control permissions to this group.
You are the network administrator for your company. The network consists of a single Active Directory domain. The company has remote users in the sales department who work from home. The remote users’ client computers run Windows XP Professional, and they are not members of the domain. The remote users’ client computers have local Internet access through an ISP. The company is deploying a Windows Server 2003 computer named Server1 that has Routing and Remote Access installed. Server1 will function as a VPN server, and the remote users will use it to connect to the company network. Confidential research data will be transmitted from the remote users’ client computers. Security is critical to the company and Server1 must protect the remote users’ data transmissions to the main office. The remote client computers will use L2TP/IPSec to connect to the VPN server. You need to choose a secure authentication method. What should you do? ()A、 Use the authentication method of the default IPSec policies.B、 Create a custom IPSec policy and use the Kerberos version 5 authentication protocol.C、 Create a custom IPSec policy and use certificate-based authentication.D、 Create a custom IPSec policy and use preshared key authentication.E、 Use the authentication method of the Routing and Remote Access custom IPSec policy for L2TP connection.
You need to design the configuration of the Windows Server 2003 Routing and Remote Access server in the Seattle office to meet business requirements. What should you do?()A、Configure a remote access policy on the Routing and Remote Access server to require MS-CHAP v2 for all connectionsB、Use a Group Policy object (GPO) to configure a Restricted Groups policy that applies to the Routing and Remote Access server. Use this Restricted Groups policy to remove all accounts form the local Users group, and then add authorized computer accountsC、Configure the Routing and Remote Access server to use only PPTP connectionsD、Configure the Routing and Remote Access server to use only IPSec over L2TP connections.Configure IPSec to use certificates
You need to design the network to support the company’s VPN requirements for mobile users who connect to the network in Seattle. Which two actions should you perform?()A、Use a password generator application to create a preshared key, and distribute it to all mobile usersB、Use computer autoenrollment to create digital certificates that can be used to authenticate to a VPN serverC、Acquire a digital certificate that can be used for SSL from a commercial CA for each computer that established a VPN connectionD、Configure IPSec policies on all Routing and Remote Access servers to require the use of digital certificates
You need to design access to e-mail by Internet users. What should you do?()A、Configure front-end servers to use HTTP to communicate with back-end serversB、Configure the internal firewall to allow IPSec traffic between front-end and back-end Exchange serversC、Require all users to encrypt all outbound e-mail messagesD、Issue digital certificates to all remote users. Require the certificates to be used when authenticating to Outlook Web Access
You need to design an authentication solution for Terminal Services that meets the business requirements.What should you do?()A、Configure the terminal server to use smart cardsB、Configure IPSec to permit only Remote Desktop Protocol (RDP) connections to the terminal serverC、Deny the Remote Desktop Users group access to the terminal serverD、Restrict treyresearch.com users from logging on locally to the terminal server
单选题When is the site-to-site remote access model appropriate? ()A for multiple ISDN connectionsB for modem concentrated dial-up connectionsC for a group of users in the same vicinity sharing a connectionD for use by mobile users
单选题You need to design the configuration of the Windows Server 2003 Routing and Remote Access server in the Seattle office to meet business requirements. What should you do?()AConfigure a remote access policy on the Routing and Remote Access server to require MS-CHAP v2 for all connectionsBUse a Group Policy object (GPO) to configure a Restricted Groups policy that applies to the Routing and Remote Access server. Use this Restricted Groups policy to remove all accounts form the local Users group, and then add authorized computer accountsCConfigure the Routing and Remote Access server to use only PPTP connectionsDConfigure the Routing and Remote Access server to use only IPSec over L2TP connections.Configure IPSec to use certificates
单选题When is the site-to-site remote access model appropriate? ()Afor multiple ISDN connectionsBfor modem concentrated dial-up connectionsCfor a group of users in the same vicinity sharing a connectionDfor use by mobile users
单选题Which of the following is true regarding NetWare Directory Services (NDS) configuration?()ARemote users can access the tree through dial-in connections.BMobile users do not require changing the NDS name context.CRemote users do not require a special NDS object entry.DThere are no differences between mobile users and remote users.