An organization hires a contractor who only needs access to email and a group calendar. They do not need administrator access to the computer. Which VPN model is the most appropriate?() A. Thin ModelB. Thick ClientC. Port ForwardingD. Clientless AccessE. Layer 3 Network Access

An organization hires a contractor who only needs access to email and a group calendar. They do not need administrator access to the computer. Which VPN model is the most appropriate?()

A. Thin Model

B. Thick Client

C. Port Forwarding

D. Clientless Access

E. Layer 3 Network Access


相关考题:

Your network contains a server that runs Windows Server 2008 R2. The server has the Network Policy and Access Services server role installed. You need to allow only members of a global group named Group1 VPN access to the network.What should you do? ()A. Add Group1 to the RAS and IAS Servers group.B. Add Group1 to the Network Configuration Operators group.C. Create a new network policy and define a group-based condition for Group1. Set the access permission of the policy to Access granted. Set the processing order of the policy to 1.D. Create a new network policy and define a group-based condition for Group1. Set the access permission of the policy to Access granted. Set the processing order of the policy to 3.

An enterprise has plans to start adding IPv6 support. The initial deployment requires support from some IPv6 - only device s that need to access servers that support only IPv4.Which of the following tools would be most appropriate?()A. Native IPv6B. Point - to -point tunnelsC. Multipoint tunnelsD. NAT - PT

An organization hires a contractor who only needs access to email and a group calendar. They donot need administrator access to the computer. Which VPN model is the most appropriate?()A、 Thin ModelB、 Thick ClientC、 Port ForwardingD、 Clientless AccessE、 Layer 3 Network Access

An organization hires a contractor who only needs access to email and a group calendar. They do not need administrator access to the computer. Which VPN model is the most appropriate?()A、Thin ModelB、Thick ClientC、Port ForwardingD、Clientless AccessE、Layer 3 Network Access

An SSL VPN can be used in conjunction with IBM Tivoli Access Manager for Enterprise Single Sign-On to provide remote access to business critical information. Which statement is true about the Mobile ActiveCode (MAC) when it is used with a VPN Solution for remote access?()A、The MAC can only be delivered to a mobile phone and is good for a single use only.B、The MAC can be delivered by mobile phone, e-mail, or fax, and it is good for one time authentication only.C、The MAC can only be delivered to a mobile phone and it is good until the expiration time is reached, as set by an administrator.D、The MAC can be delivered by mobile phone, email, or fax, and it is good until the expiration time is reached, as set by an administrator.

You have a computer that runs Windows 7. Multiple users log on to your computer. You enable auditing ona folder stored on your computer. You need to ensure that each access to the folder is logged.  What should you do?()A、Start the Problem Steps Recorder.B、From Event Viewer, modify the properties of the Security log.C、From the local Group Policy, configure the Audit object access setting.D、From the local Group Policy, configure the Audit directory service Access setting.

You are the administrator of your company’s network. A user named Paul in the service department has a Windows 2000 Professional computer.  Paul needs to access the files that are in a shared folder on his computer. A local group named Sales has permissions to access the data. Paul is a member of the Sales local group but he cannot access the file he needs.  What should you do? ()A、Grant Paul NTFS permission so that he can access any parent folder to files in the shared   folder.B、Share the Sales folder and grant Paul shared folder permission to access the shared Sales   folder.C、Remove Paul from any other group that has been explicitly denied access to the Sales folder. D、Delete the Sales local group and recreate it. Add individual user accounts from the Sales   Department back into Sales local group.

our network contains a server that runs window server 2008. The serve has the network policy server(NPS) service role installed. You need to allow only members of a global group named group1 VPN access to the network. What should you do?()A、Add group1 to the RAS and IAS servers group.B、Add group1 to the network configuration operators group..C、Create a new network policy and define a group-based connection for group1. Set the access permission of the policy to access granted. Set the processing order of the policy to 1.D、Create a new network policy and define a group-based condition for group1. Set the access permission of the policy to acces granted. Set the processing of the policy to 3.

Which of the following is the new permissions model in Microsoft Exchange Server 2010, which enables you to continuous levels, what administrators and end-users can do?()A、Role Based Access ControlB、Access Control ListC、Dynamic distribution groupD、Universal distribution group

单选题A company finished upgrading the wireless encryption to WPA2 Enterprise. The administrator receives a call from a user who is unable to connect to the company wireless. Which of the following is MOST likely causing the connection problem?()AThe laptop is missing the software supplicantBThe access point SSID is hidden.CThe laptop only supports TKIP and AES encryption,DThe access point is on the wrong channel.

单选题A user requests access to a new file share.The administrator adds the user to the group with the appropriate access.The user is still unable to access the share.Which of the following actions should the administrator do to resolve the permissions issue?()ARequest the user to logoff and log back on.BAdd the user as an administrator on their local machine.CAdd the user as an administrator on the server.DRun an ipconfig /renew on the user’s machine.

单选题An organization hires a contractor who only needs access to email and a group calendar. They donot need administrator access to the computer. Which VPN model is the most appropriate?()A Thin ModelB Thick ClientC Port ForwardingD Clientless AccessE Layer 3 Network Access

单选题Your company consists of a single Active Directory domain that is configured in Windows 2000 native mode. All servers run Windows Server 2003 Service Pack 2 (SP2). You deploy a Routing and Remote Access server to provide VPN access to the network.You need to ensure that only members of a group named Sales can access the network through the VPN. The solution must minimize the administrative effort required to manage remote access.  What should you do?()AAllow dial-in access for the user accounts of all Sales group members. BDeny dial-in access for the user accounts of all users except the Sales group members. CCreate a remote access policy and assign the Allow - Remote Access permission. Add the Windows-Groups condition and specify the Sales group. DCreate a remote access policy and assign the Deny - Remote Access permission. Add the Windows-Groups condition and specify all Active Directory groups except for Sales.

单选题Your company has a mix of employees and contractors. Contractor usernames always begin with"con-"; employee usernames never begin with "con-". You need to give employees access to allresources and give contractors access to a limited set of resources. Employee and contractor roles have been created with the appropriate access privileges, and the realm is set to merge settings for all assigned roles. Which role mapping ruleset would result in the correct access privileges being assigned?()Ausername=* - Employee-role Stop username=con-* - Contractor-roleBusername=* - Employee-role username=con-* - Contractor-role StopCusername=con-* - Contractor-role Stop username=* - Employee-roleDusername=con-* - Contractor-role username=* - Employee-role Stop

单选题You are a Windows Server 2008 systems administrator responsible for configuring FTP Publishing Servicefor use by members of your organization’s engineering department. The name of the server is FTPServer01. Several users have reported that they are able to access most files through the FTP site,but they cannot access the contents of the Drawings folder. You have verified that these users. Windowsaccounts have the correct file system permissions for this folder. You want to minimize the permissionsgranted to all the users. Which of the following changes should you make to enable users to access thisfolder?()AChange the permissions for the IUSR_FTPServer01 account on the Drawings folder.BCreate new TCP/IP Address Restrictions entries for the users who cannot access the Drawings folder.CDisable the Allow Only Anonymous Connections option.DAdd the users to the local Administrators group on FTPServer02.

单选题An enterprise has plans to start adding IPv6 support. The initial deployment requires support from some IPv6 - only device s that need to access servers that support only IPv4. Which of the following tools would be most appropriate?()ANative IPv6BPoint - to -point tunnelsCMultipoint tunnelsDNAT - PT

单选题Your network contains a server that runs Windows Server 2008. The server has the Network Policy Server (NPS) service role installed. You need to allow only members of a global group named Group1 VPN access to the network. What should you do?()AAdd Group1 to the RAS and IAS Servers GroupBAdd Group1 to the Network Configuration Operators groupCCreate a new network policy and define a group-based connection for Group1. Set the access permission of the policy to Access granted. Set the processing order of the policy to 1DCreate a new network policy and define a group-based condition for Group1. Set the access permission of the policy to Access Granted. Set the processing of the policy to 3.

单选题Your company hires 10 new employees. You want the new employees to connect to the main office through a VPN connection. You create new user accounts and grant the new employees the Allow Read and Allow Execute permissions to shared resources in the main office. The new employees are unable to access shared resources in the main office. You need to ensure that users are able to establish a VPN connection to the main office What should you do()AGrant the new employees the Allow Full control permission.BGrant the new employees the Allow Access Dial-in permission.CAdd the new employees to the Remote Desktop Users security group.DAdd the new employees to the Windows Authorization Access security group.

单选题Saul needs access to files that are in the Accounting folder on his computer. A local group named accounting is granted full control permission to the accounting folder and the files within it. Saul is a member of the accounting local group but he cannot access the files that he needs.  What should you do?()AGrant Saul NTFS permission so that he can access any parent folder or files in the shared sales folder.BShare the Sales folder and grant Saul shared folder permission to access the shared sales folder.CRemove Saul from any other groups that have been explicitly denied access to the accounting folder.DDelete the Sales local group and recreate, add individual user accounts from the sales department back into sales local group.

单选题Your network contains a server that runs Windows Server 2008. The server has the Network Policy and Access Services server role installed.You need to allow only members of a global group named Group1 VPN access to the network. What should you do? ()AAdd Group1 to the RAS and IAS Servers group.BAdd Group1 to the Network Configuration Operators group.CCreate a new network policy and define a group-based condition for Group1. Set the access permission of the policy to Access granted. Set the processing order of the policy to 1.DCreate a new network policy and define a group-based condition for Group1. Set the access permission of the policy to Access granted. Set the processing order of the policy to 3.

单选题You are a security administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. The network contains three member servers named Server1,Server2,and Server3.    The three member servers are connected to the Internet. You plan to implement remote access to the company network for users that work from home. You configure and enable Routing and Remote Access on Server1 and Server2. An assistant,who is an administrator on all member servers, configures and enables Routing and Remote Access on Server3. Users from the domain can successfully establish VPN connections from the lnternet to Server1 and Server2. However,users cannot establish a VPN connection to Server3. You discover that Server3 can only authenticate Internet VPN connections from local user accounts.    You need to ensure that users from the domain can successfully establish a VPN connection to Server3.  What should you do?()A Enable the Server3 computer account in Active Directory as trusted for delegation.B Assign the Authenticated Users group the Allow - Allowed to Authenticate permission for the Server3 computer accC Assign the Server3 computer account the Allow. Read permission on the RAS and IAS Servers access Check contD Add the Server3 computer account to the RAS and IAS Servers security group.E Add the Server3 computer account to the Windows Authorization Access Group security group.

单选题An organization hires a contractor who only needs access to email and a group calendar. They do not need administrator access to the computer. Which VPN model is the most appropriate?()AThin ModelBThick ClientCPort ForwardingDClientless AccessELayer 3 Network Access