In which tunnel-less VPN topology do group members register with a key server in order to receive the security association necessary to communicate with the group?()A、Easy VPNB、GRE tunnelingC、Virtual Tunnel InterfacesD、DynamicMultipoint VPNE、Group Encrypted Transport VPN

In which tunnel-less VPN topology do group members register with a key server in order to receive the security association necessary to communicate with the group?()

  • A、Easy VPN
  • B、GRE tunneling
  • C、Virtual Tunnel Interfaces
  • D、DynamicMultipoint VPN
  • E、Group Encrypted Transport VPN

相关考题:

Your network contains a server that runs Windows Server 2008 R2. The server has the Network Policy and Access Services server role installed. You need to allow only members of a global group named Group1 VPN access to the network.What should you do? ()A. Add Group1 to the RAS and IAS Servers group.B. Add Group1 to the Network Configuration Operators group.C. Create a new network policy and define a group-based condition for Group1. Set the access permission of the policy to Access granted. Set the processing order of the policy to 1.D. Create a new network policy and define a group-based condition for Group1. Set the access permission of the policy to Access granted. Set the processing order of the policy to 3.

In which tunnel-less VPN topology do group members register with a key server in order to receive the security association necessary to communicate with the group?() A. Easy VPNB. GRE tunnelingC. Virtual Tunnel InterfacesD. DynamicMultipoint VPNE. Group Encrypted Transport VPN

Which site-to-site VPN solution allows Cisco routers, PIX Firewalls, and Cisco hardware clients to act as remote VPN clients in order to receive predefined security policies and configuration parameters from the VPN headend at the central site?()A. Easy VPNB. GRE tunnelingC. Virtual Tunnel InterfacesD. DynamicMultipoint VPNE. Group Encrypted Transport VPN

In which tunnel-less VPN topology do group members register with a key server in order to receivethe security association necessary to communicate with the group?()A、 Easy VPNB、 GRE tunnelingC、 Virtual Tunnel InterfacesD、 Dynamic Multipoint VPNE、 Group Encrypted Transport VPN

Which site-to-site VPN solution allows Cisco routers, PIX Firewalls, and Cisco hardware clients to act as remote VPN clients in order to receive predefined security policies and configuration parameters from the VPN headend at the central site?()A、Easy VPNB、GRE tunnelingC、Virtual Tunnel InterfacesD、DynamicMultipoint VPNE、Group Encrypted Transport VPN

Which site-to-site VPN solution allows Cisco routers, PIX Firewalls, and Cisco hardware clients to act as remote VPN clients in order to receive predefined security policies and configuration parameters from the VPN headend at the central site?()A、Easy VPNB、GRE tunnelingC、Virtual Tunnel InterfacesD、Dynamic Multipoint VPNE、Group Encrypted Transport VPN

You are the network consultant from Cisco.com.Your customer has eight sites and will add in thefuture. Branch site to branch site traffic is approaching 30 percent. The customer’s goals are to make iteasier to add branch sites in the future and to reduce traffic through the hub. Which VPN topology should you recommend?()A、 Easy VPNB、 IPsec GRE tunnelingC、 Virtual Tunnel InterfacesD、 Dynamic Multipoint VPN

Which three IP multicast group concepts are true? (Choose three.) ()A、 If a packet is sent to a multicast group address, all members of the multicast group will receive itB、 If a packet is sent to a multicast group address, the multicast frame contains the source multicast  addressC、 A router does not have to be a member of a multicast group to receive multicast data.D、 A router does not have to be a member of a multicast group to send to the group.E、 A router must be a member of a multicast group to receive multicast data.F、 A router must be a member of a multicast group to send to the group.

You have an Exchange Server 2010 organization.You create a distribution group for all users in your company.You need to ensure that new users can add their mailboxes to the distribution group.What should you do?()A、Modify the group scope of the distribution group.B、Modify the approval mode of the distribution group.C、Modify the security settings of the distribution group.D、Modify the authentication settings of the ECP virtual directory.

You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain. The domain contains a Windows Server 2003 computer named Server1. You are planning a public key infrastructure (PKI) for the company. You want to deploy a certification authority (CA) on Server1. You create a new global security group named Cert Administrators. You need to delegate the tasks to issue, approve, and revoke certificates to members of the Cert Administrators group.  What should you do?()A、 Add the Cert Administrators group to the Cert Publishers group in the domain.B、 Configure the Certificates Templates container in the Active Directory configuration naming context to assign the Cert Administrators group the Allow - Write permission.C、 Configure the CertSrv virtual directory on Server1 to assign the Cert Administrators group the Allow - Modify permission.D、 Assign the Certificate Managers role to the Cert Administrators group.

You manage Hyper-V host servers and virtual machines (VMs) by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. Developers are members of an AD security group named  Development. You need to ensure that on a specific host server, members of the Development group can perform only the Create,Modify,and Remove VM management tasks. What should you do?()A、Create a Self-Service user role and add the Development group to this role.B、Create a Delegated Administrator user role and add the Development group to this role.C、In Authorization Manager, create a role on the client computer of each member of the Development group, and add the Development group to this role.D、Install Hyper-V Manager on the client computer of each member of the Development group,and grant the Development group administrative privileges on the specific server.

You manage Hyper-V host servers and virtual machines (VMs) by using Microsoft System Center  Virtual Machine Manager (VMM) 2008 R2. Testers are members of an AD security group named Test. You need to ensure that members of the Test group can create VMs on a specific host server by using the VMM Self-Service Portal. What should you do?()A、In VMM, specify a template for new VMs created by members of the Test group.B、In VMM, create a Delegated Administrator user role and add the Test group to this role.C、In VMM, assign the Test group the Local Administrator permission for the specific host server.D、Install Hyper-V Manager on the client computer of each member of the Test group, and grant the Test group administrative privileges on the specific host server.

our network contains a server that runs window server 2008. The serve has the network policy server(NPS) service role installed. You need to allow only members of a global group named group1 VPN access to the network. What should you do?()A、Add group1 to the RAS and IAS servers group.B、Add group1 to the network configuration operators group..C、Create a new network policy and define a group-based connection for group1. Set the access permission of the policy to access granted. Set the processing order of the policy to 1.D、Create a new network policy and define a group-based condition for group1. Set the access permission of the policy to acces granted. Set the processing of the policy to 3.

Your network contains a server that runs Windows Server 2008 R2. The server has the Network Policy and Access Services server role installed. You need to allow only members of a global group named Group1 VPN access to the network. What should you do? ()A、Add Group1 to the RAS and IAS Servers group.B、Add Group1 to the Network Configuration Operators group.C、Create a new network policy and define a group-based condition for Group1. Set the access permission of the policy to Access granted. Set the processing order of the policy to 1.D、Create a new network policy and define a group-based condition for Group1. Set the access permission of the policy to Access granted. Set the processing order of the policy to 3.

Your company has an Active Directory Domain Services (AD DS) domain that includes an AD security group named Monitoring. You are configuring a Windows Server 2008 R2 Hyper-V server that hosts several virtual machines (VMs). You need to ensure that members of the Monitoring group can only stop and start VMs on the host server. What should you do?()A、Add the Monitoring group to the Server Operators AD security group.B、In Authorization Manager, add the Monitoring group to the Administrator role in the default scope.C、In Authorization Manager, create a task that includes the Stop Virtual Machine and Start Virtual Machine operations. Add the task to the Administrator role.D、In Authorization Manager, create a role in the default scope. Add the Stop Virtual Machine and Start Virtual Machine operations to the role. Assign the Monitoring group to the role.

You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003.   The network contains servers that have Terminal Server enabled. The terminal servers host legacy applications that currently require users to be members of the Power Users group.   A new requirement in the company’s written security policy states that the Power Users group must be empty on all resource servers.   You need to maintain the ability to run the legacy applications on the terminal servers when the new security requirement is implemented.   What should you do?  ()A、 Add the Domain Users global group to the Remote Desktop Users built-in group in the domain.  B、 Add the Domain Users global group to the Remote Desktop Users local group on each terminal server.C、 Modify the Compatws.inf security template settings to allow members of the local Users group to run the applications. Import the security template into the Default Domain Controllers Policy Group Policy object (GPO).D、 Modify the Compatws.inf security template settings to allow members of the local Users group to run the applications. Apply the modified template to each terminal server.

Your environment includes multiple Windows Server 2008 R2 Hyper-V servers. You are designing an administrative strategy for virtual machines (VMs). You need to ensure that members of the Security Compliance Active Directory Domain Services (AD DS) security group can monitor failed logon events on the VMs. What should you do?()A、Add the Security Compliance group to the local administrators group of each VMB、Add the Security Compliance group to the local administrators group of each Hyper-V serverC、In the InitialStore.xml file of each VM, define an access policy for the Security Compliance groupD、in the InitialStore.xml file of each Hyper-V server, define an access policy for the Security Compliance group

You are designing a group management strategy for users in the finance department. You need to  identify the appropriate changes that need to be made to the current group management strategy. You want to accomplish this goal by using the minimum number of groups.  What should you do?()A、 Add the finance users to the financeData group to which the necessary permissions have been assigned.B、 Add the finance users to the financeGG group to which the necessary permissions have been assigned.C、 Add the finance users to the financeGG group. Then add the financeGG group to the financeData group to which the necessary permissions have been assigned.D、 Add the finance users to the financeGG group. Add the financeGG group to the financeUG group to the financeDat group to which the necessary permissions have been assigned.

Your network contains a server that runs Windows Server 2008. The server has the Network Policy Server (NPS) service role installed. You need to allow only members of a global group named Group1 VPN access to the network. What should you do?()A、Add Group1 to the RAS and IAS Servers GroupB、Add Group1 to the Network Configuration Operators groupC、Create a new network policy and define a group-based connection for Group1. Set the access permission of the policy to Access granted. Set the processing order of the policy to 1D、Create a new network policy and define a group-based condition for Group1. Set the access permission of the policy to Access Granted. Set the processing of the policy to 3.

单选题Which site-to-site VPN solution allows Cisco routers, PIX Firewalls, and Cisco hardware clients toact as remote VPN clients in order to receive predefined security policies and configuration parameters from the VPN headend at the central site?()A Easy VPNB GRE tunnelingC Virtual Tunnel InterfacesD Dynamic Multipoint VPNE Group Encrypted Transport VPN

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain. The domain contains a Windows Server 2003 computer named Server1. You are planning a public key infrastructure (PKI) for the company. You want to deploy a certification authority (CA) on Server1. You create a new global security group named Cert Administrators. You need to delegate the tasks to issue, approve, and revoke certificates to members of the Cert Administrators group.  What should you do?()A Add the Cert Administrators group to the Cert Publishers group in the domain.B Configure the Certificates Templates container in the Active Directory configuration naming context to assign the Cert Administrators group the Allow - Write permission.C Configure the CertSrv virtual directory on Server1 to assign the Cert Administrators group the Allow - Modify permission.D Assign the Certificate Managers role to the Cert Administrators group.

单选题You are the network consultant from Cisco.com.Your customer has eight sites and will add in thefuture. Branch site to branch site traffic is approaching 30 percent. The customer’s goals are to make iteasier to add branch sites in the future and to reduce traffic through the hub. Which VPN topology should you recommend?()A Easy VPNB IPsec GRE tunnelingC Virtual Tunnel InterfacesD Dynamic Multipoint VPN

单选题In which tunnel-less VPN topology do group members register with a key server in order to receive the security association necessary to communicate with the group?()AEasy VPNBGRE tunnelingCVirtual Tunnel InterfacesDDynamicMultipoint VPNEGroup Encrypted Transport VPN

单选题You manage Hyper-V host servers and virtual machines (VMs) by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. Developers are members of an AD security group named  Development. You need to ensure that on a specific host server, members of the Development group can perform only the Create,Modify,and Remove VM management tasks. What should you do?()ACreate a Self-Service user role and add the Development group to this role.BCreate a Delegated Administrator user role and add the Development group to this role.CIn Authorization Manager, create a role on the client computer of each member of the Development group, and add the Development group to this role.DInstall Hyper-V Manager on the client computer of each member of the Development group,and grant the Development group administrative privileges on the specific server.

多选题Which three IP multicast group concepts are true? (Choose three.) ()AIf a packet is sent to a multicast group address, all members of the multicast group will receive itBIf a packet is sent to a multicast group address, the multicast frame contains the source multicast  addressCA router does not have to be a member of a multicast group to receive multicast data.DA router does not have to be a member of a multicast group to send to the group.EA router must be a member of a multicast group to receive multicast data.FA router must be a member of a multicast group to send to the group.

单选题In which tunnel-less VPN topology do group members register with a key server in order to receivethe security association necessary to communicate with the group?()A Easy VPNB GRE tunnelingC Virtual Tunnel InterfacesD Dynamic Multipoint VPNE Group Encrypted Transport VPN

单选题Your environment includes multiple Windows Server 2008 R2 Hyper-V servers. You are designing an administrative strategy for virtual machines (VMs). You need to ensure that members of the Security Compliance Active Directory Domain Services (AD DS) security group can monitor failed logon events on the VMs. What should you do?()AAdd the Security Compliance group to the local administrators group of each VMBAdd the Security Compliance group to the local administrators group of each Hyper-V serverCIn the InitialStore.xml file of each VM, define an access policy for the Security Compliance groupDin the InitialStore.xml file of each Hyper-V server, define an access policy for the Security Compliance group