Your company uses Network Access Protection (NAP) to enforce policies on client computers that connect to the network. Client computers run Windows 7. A Group Policy is used to configure client computers to obtain updates from Windows Server Update Services (WSUS).Company policy requires that updates labeled Important and Critical must be applied before client computers can access network resources.You need to ensure that client computers meet the company policy requirement. What should you do?()A、Enable automatic updates on each client.B、Enable the Security Center on each client.C、Quarantine clients that do not have all available security updates installed.D、Disconnect the connection until the required updates are installed.

Your company uses Network Access Protection (NAP) to enforce policies on client computers that connect to the network. Client computers run Windows 7. A Group Policy is used to configure client computers to obtain updates from Windows Server Update Services (WSUS).Company policy requires that updates labeled Important and Critical must be applied before client computers can access network resources.You need to ensure that client computers meet the company policy requirement. What should you do?()

  • A、Enable automatic updates on each client.
  • B、Enable the Security Center on each client.
  • C、Quarantine clients that do not have all available security updates installed.
  • D、Disconnect the connection until the required updates are installed.

相关考题:

Your Web site uses custom Themes. Your Web site must support additional Themes based on the user‘s company name. The company name is set when a user logs on to the Web site. The company‘s Theme name is stored in a variable named ThemeName. You need to use this variable to dynamically set the Web site‘s Theme.What should you do?()A.B.C.D.

You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()A.AB.BC.CD.D

You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet.Which PIN architecture is applicable in those environments?()A.CampusB.TeleworkerC.BranchD.Data center

A brand new network application is required for the Acme Company, and they are considering the use of a connectionless service. What are the characteristics of a connectionless service?() A. It uses a Reliable transport mechanism.B. It uses a Non-reliable transport mechanismC. It is less bandwidth-intensive than connection oriented servicesD. it uses handshaking

A brand new network application is required for the Acme Company, and they are considering the use of a connectionless service. What are the characteristics of a connectionless service?()A、It uses a Reliable transport mechanism.B、It uses a Non-reliable transport mechanismC、It is less bandwidth-intensive than connection oriented servicesD、it uses handshaking

Company uses layer 3 switches in the Core of their network. Which method of Layer 3 switching  uses a forwarding information base (FIB)?()A、Topology-based switchingB、Demand-based switchingC、Route cachingD、Flow-based switchingE、None of the other alternatives apply

A user in your company has a laptop, which he uses both, on and off the network. You want to change the users profile to roaming but when you attempt to change the setting, the Roaming profile option is grayed out. How can you change the laptop users profile to roaming?()A、In Control Panel, System, User Profiles Tab, change profile to roaming.B、Have him log back into the network.C、Change the Profile to a Mandatory User Profile.D、Change the profile to a Mandatory Roaming Profile.

You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()A、CampusB、TeleworkerC、BranchD、Data center

You work as a network technician at Company. Your boss, Mrs.   , is interested in   GLBP. In particular, she wants to know the multicast address that this protocol uses.  What should  you tell her? ()A、 224.0.0.100B、 224.0.0.1C、 224.0.0.102D、 224.0.0.10E、 224.0.0.101F、 None of the other alternatives apply

A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()A、The network uses MAC filteringB、The network uses WEPC、The network uses SSID broadcastD、The network uses WPA

Your network consists of a single Active Directory domain. The network is located on the 172.16.0.0/23  subnet.   The company hires temporary employees. You provide user accounts and computers to the temporaryem ployees. The temporary employees receive computers that are outside the Active Directory domain.   The temporary employees use their computers to connect to the network by using wired connections andwireless connections. The company’s security policy specifies that the computers connected to the network must have the latest updates for the operating system.   You need to plan the network’s security so that it complies with the company 's security policy. What should you include in your plan?()A、Implement a Network Access Protection (NAP) strategy for the 172.16.0.0/23 subnet.B、Create an extranet domain within the same forest. Migrate the temporary employees user accounts to the extranet domain. Install the necessary domain resources on the 172.16.0.0/23 subnet.C、Move the temporary employees user accounts to a new organizational unit (OU). Create a new Group Policy object (GPO) that uses an intranet Microsoft Update server. Link the new GPO tothe new OU.D、Create a new subnet in a perimeter network. Relocate the wireless access point to the perimeter network. Require authentication through a VPN server before allowing access to the internal resources.

Your company's corporate network uses Network Access Protection (NAP).Users are able to connect to the corporate network remotely.You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do?()A、Apply an IPsec NAP policy.B、Configure a NAP policy for 802.1X wireless connections.C、Configure VPN connections to use MS-CHAP v2 authentication.D、Restrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP.

Your company uses network access protection (NAP) to enforce policies on client computers that connect to the network. Client computers run windows vista. A group Policy is used to configure client computers to obtain updates from WSUS. Company policy requires that updates labeled important and critical must be applied before client computers can access network resources. You need to ensure that client computes meet the company policy requirement. What should you do?()A、Enable automatic updates on each client.B、Enable the security center on each client.C、Quarantine clients that do not have all available security updates installed.D、Disconnect the remote connection until the required updates are installed.

All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()A、Configure the Network authentication (Shared mode) setting.B、Apply a Wireless Network Policy to set the network type to WPA-PSK.C、Apply a Wireless Network Policy to automatically connect to the company wireless network.D、Apply a Wireless Network Policy to set the company wireless network as the preferred network.

.You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.the Company.com network contains a client access server named - ex05.during routine monitoring you discover that -ex05 has failed.you receive an instruction from the cio to install a new member server named -ex05 on the network as well as to recovering the client access server role on -ex05.What should you do?()A、Your best option would be to run Setup /RecoverCMS from the Exchange Server installation source files.B、your best option would be to have the inetpub folder as well as the system state restored from -ex05.C、Your best option would be to run Setup /M:RecoverServer from the Exchange Server installation source files.D、your best option would be to have the inetsrv folder as well as the system state restored from - ex05.

You are the network administrator for Company.Company has just upgraded its network switches from 10 Mbps to 100 Mbps. After the upgrade, you findthat the 100 Windows 2000 Professional computers on the network are still communicating at only 10Mbps. Company uses NWLink as the only network protocol.You want to enable the computers to communicate at 100 Mbps.What should you do?()A、Replace the network adapters with 10/100 Mbps network adapters. B、Enable TCP/IP on all of the computers on the network.C、Configure the NWLink frame type of the network adapters to be Ethernet II. D、Configure the NWLink frame type of the network adapters to be Ethernet 802.3.

You work as the Exchange administrator at Company.com.The Company.com network contains an Exchange Server 2010 Organization.You are responsible for managing the Exchange network for Company.com.The network contains numerous Mailbox servers.During the course of the week you receive an instruction from the CIO to determine the message latency between the Mailbox servers in the organization.What should you do?()A、Your best option would be to increase the MSExchangeMailSubmission diagnostic logging level to Expert.B、Your best option would be to run the Test-Mailflow cmdlet.C、Your best option would be to increase the MSExchangeTransport diagnostic logging level to Expert.D、Your best option would be to run the Test-OutlookConnectivity cmdlet.

You want to connect to your company network from your Windows 2000 Professional computer at home. You have an ISDN line that is used for internet connectivity. You create a VPN connection and are able to connect successfully to the company network. While connected to the company network, you are unable to access the Internet.   What must you do so that you can access the Internet?()A、Configure the ISDN connection to use SLIP instead of PPP.B、Select the Enable Internet Connection Sharing for this connection check box in the ISDN connection properties.C、Clear the Use default gateway on remote network check box.D、Install and configure the SAP Agent service.

多选题Your company is researching a new application that runs over IPv6, but part of it must still have IPv4 support. Your company uses a traditional IPv4 network. Your plan is not to run IPv6 over the whole network, but to segment parts of the network or even to operate simultaneously with IPv6 and IPv4. You must make a brief presentation about IPv6 technology to the board of technical directors. Which three of these items could be part of your presentation? ()ATunnel IPv6 over IPv4 to connect far-end IPv6 networksBExplain why configuring IPv4 and IPv6 at the same time over the same LAN interface is not possibleCExplain why configuring IPv4 and IPv6 at the same time over the same LAN interface is possibleDWhat is the meaning of EUI-64 and how does it work?ETunnel IPv4 over IPv6 to connect far-end IPv4 networks.

单选题Your company has just upgraded its CATAGORY 5 Ethernet network from 10Mbps to 100Mbps. After the upgrade, the 20 Windows 2000 Professional computers in the marketing department can no longer connect to the network. The remaining 80 Windows 2000 computers in the company can connect, however. Your company uses NWLink as the only network protocol.You need to connect the computers in the marketing department to the network. What must you do? ()AConfigure the NWLink frame type of the network adapters to be ethernet 802.3.BConfigure the NWLink frame type of the network adapters to be ethernet II.CReplace the network adapters with 10/100 BNC adapters.DReplace the network adapters with 10/100 UTP network adapters.

单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server as their messaging solution.During the course of the business week you receive instruction from Company.com to perform an automated installation of Microsoft Exchange Server 2010.What should you do?()AYou should consider having the msiexec.eex command included in your script.BYou should consider having the Ipsetupui.exe command included in your script.CYou should consider having the setup.exe command included in your script.DYou should consider having the setup.com command included in your script.

单选题You work as a network technician at Company. Your boss, Mrs.   , is interested in   GLBP. In particular, she wants to know the multicast address that this protocol uses.  What should  you tell her? ()A 224.0.0.100B 224.0.0.1C 224.0.0.102D 224.0.0.10E 224.0.0.101F None of the other alternatives apply

多选题You are the administrator of Company.com’s Windows 2000 Network.  Your routed TCP/IP network consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. All computers are in the Company.com domain. Your network uses TCP/IP as the only network protocol. You are installing 10 new Windows 2000 Professional computers. You want to enable the new computers to use host names to connect to shared resources on the network. You configure a TCP/IP address, a gateway address and a subnet mask on each new computer.   You want to complete the configuration to allow the computers to communicate on the network.  What should you do?()AConfigure a HOSTS file.BConfigure a LMHOSTS file.CConfigure a WINS server database.DConfigure a DHCP server address.EConfigure at least one DNS address.

单选题Your company’s network has client computers that run Windows 7.   A software vendor releases version 2 of an application that your company uses.  Your company currently uses version 1.  Version 1 and version 2 are not compatible. You plan to deploy version 2 of the application.   You have the following requirements:Users must be able to run both versions of the application on their computers.   Version 2 must be available when a client computer is not connected to the network.  You need to plan a software deployment process that meets the requirements.   What should you do?()A Deploy version 2 of the application by using Microsoft Application Virtualization (App-V). B Deploy version 2 of the application as a Remote Desktop Services RemoteApp.C Deploy version 2 of the application by using a Group Policy Software Installation policy.D Deploy version 2 of the application by using a Microsoft System Center Configuration Manager package.

单选题You are the administrator of Company’s network.  Your Windows 2000 Professional computer has a removable disk device installed. The device can use storage modules of varying sizes. You use these storage modules to transfer graphics files between your location and a printing company. The printing company uses Windows 98. You insert a new 1 GB disk device into your computer and format the new disk device as NTFS with the default options. You then place large graphics files on the disk device and deliver it to the printing company. The printing company reports that they are unable to access the files.  You want the printing company to be able to access the graphics files on the new disk device.   What should you do? ()AFormat the new disk device as FAT16 with a 128 KB cluster size.BFormat the new disk device as FAT32 with a 4 KB cluster size.CFormat the new disk device as NTFS with a 4 KB cluster size.DFormat the new disk device as NTFS with a 8 KB cluster size.

单选题Company uses layer 3 switches in the Core of their network. Which method of Layer 3 switching  uses a forwarding information base (FIB)?()ATopology-based switchingBDemand-based switchingCRoute cachingDFlow-based switchingENone of the other alternatives apply

多选题A brand new network application is required for the Acme Company, and they are considering the use of a connectionless service. What are the characteristics of a connectionless service?()AIt uses a Reliable transport mechanism.BIt uses a Non-reliable transport mechanismCIt is less bandwidth-intensive than connection oriented servicesDit uses handshaking