单选题You are designing a strategy for implementing Internet Authentication Service (IAS) to meet the business  and technical requirements. What should you do?()AInstall IAS on VPN1, VPN2, and VPN3.BInstall IAS on VPN1, Configure VPN2 and VPN3 as RADIUS clients.CInstall IAS on VPN1, Configure VPN1, VPN2, and VPN3 as RADIUS clients.DInstall IAS on DC1, Configure VPN2 and VPN3 as RADIUS clients. Create all remote access policies on VPN1.EInstall IAS on DC2, Configure VPN2 and VPN3 as RADIUS clients. Configure remote access logging on VPN1.

单选题
You are designing a strategy for implementing Internet Authentication Service (IAS) to meet the business  and technical requirements. What should you do?()
A

Install IAS on VPN1, VPN2, and VPN3.

B

Install IAS on VPN1, Configure VPN2 and VPN3 as RADIUS clients.

C

Install IAS on VPN1, Configure VPN1, VPN2, and VPN3 as RADIUS clients.

D

Install IAS on DC1, Configure VPN2 and VPN3 as RADIUS clients. Create all remote access policies on VPN1.

E

Install IAS on DC2, Configure VPN2 and VPN3 as RADIUS clients. Configure remote access logging on VPN1.


参考解析

解析: 暂无解析

相关考题:

You are designing a strategy to ensure that all employees have Internet access. For each branch office,  what should you do?()A、 Configure a DNS server to function as caching-only serversB、 Configure Internet Connection sharing on terminal servers.C、 Install and configure an Internet Security and Acceleration (ISA) Server ComputerD、 Install and configure a server running Routing and Remote Acess to function as a VPN server

You are the enterprise administrator for an Exchange Server 2010 organization. All users run Microsoft Office Outlook 2010.  You are designing a sharing solution for your organization and a partner organization. The partner organization also uses Exchange Server 2010.  You need to recommend a strategy for sharing information with the partner organization to meet thefollowing requirements: .Provide cross-organizational access to user contacts  .Provide cross-organizational access to free/busy information  What should you recommend?()A、Creating cross-forest trustsB、Implementing Federated SharingC、Implementing Microsoft Identify Lifecycle Manager (ILM) 2007D、Running the Microsoft Exchange Inter-Organization Replication tool

You are designing the NetBIOS domain naming strategy for the company. Which NetBIOS domain name or names should you use?()A、eastB、westC、quebecD、newyorkE、northamericaF、wideworldimporters

You are designing an IP addressing strategy for your VPN solution. How many public addresses should you use?()A、1B、25C、50D、255

You are the enterprise administrator for an Exchange Server 2010 organization. All users run Microsoft Office Outlook 2010.  You are designing a sharing solution for your organization and a partner organization. The partner organization also uses Exchange Server 2010.  You need to recommend a strategy for sharing information with the partner organization to meet thefollowing requirements: .Provide cross-organizational access to user contacts  .Provide cross-organizational access to free/busy information What should you recommend?()A、Creating cross-forest trustsB、Implementing Federated SharingC、Implementing Microsoft Identify Lifecycle Manager (ILM) 2007D、Running the Microsoft Exchange Inter-Organization Replication tool

You are designing a remote access strategy to meet the business  technical requirements. Which authentication mechanism should you use?()A、MS-CHAP v2.B、Internet Authentication service (IAS).C、Multilink  Bandwidth Allocation Protocol (BAP).D、Remote access policies on all servers running Routing  Remote Access.

You are designing a strategy to perform inplace upgrade of domain controller in Boston and San Diego. Which method should you use?()A、adprepB、sysprepC、Answer FileD、Remote Installtion Services (RIS)

You are designing a DNS implementation strategy for the network.  Which two zone types should you use?()A、Reverse lookup zonesB、Standard primary zonesC、Standard secondary zonesD、Active Directory-integrated zones

You are designing a strategy to provide Internet access to all users.  What should you do?()A、 Configure Internet Connection Sharing on all client computers.B、 Configure Automatic Private IP Addressing (APIPA) on all client computers.C、 Configure one server as a Routing and Remote Access VPN server.D、 Configure one server as a Routing and Remote Access NAT router.

You are designing a security strategy for the public Web server. You solution must address the chief security officer’s concerns. What should you do?()A、Install  a Web server certificate on WEB1B、Enable Internet Connection Firewalll (ICF) on WEB1C、Configure IIS on WEB1 to operate in IIS 5.0 isolation modeD、Install and configure the URLScan ISAPI filer on WEB1

单选题You are designing a strategy to provide Internet access to all users.  What should you do?()A Configure Internet Connection Sharing on all client computers.B Configure Automatic Private IP Addressing (APIPA) on all client computers.C Configure one server as a Routing and Remote Access VPN server.D Configure one server as a Routing and Remote Access NAT router.

单选题You are designing a remote access strategy to meet the business  technical requirements.  Which authentication mechanism should you use?()A MS-CHAP v2.B Internet Authentication service (IAS).C Multilink  Bandwidth Allocation Protocol (BAP).D Remote access policies on all servers running Routing  Remote Access.

单选题You are designing a strategy to ensure that all employees have Internet access. For each branch office, what should you do?()AConfigure a DNS server to function as caching-only servers.BConfigure Internet Connection sharing on terminal servers.CInstall and configure an Internet Security and Acceleration (ISA) Server Computer.DInstall and configure a server running Routing and Remote Acess to function as a VPN server.

单选题You are designing a WAN implementation strategy to meet the business and technical requirements. What should you do?()AConfigure a demand-dial router.BCreate multiple Active Directory site links.CConfigure a VPN connection between each branch office.DInstall an Internet Authentication Service (IAS) server in each branch office.

单选题You are designing a WAN implementation strategy to meet the business and technical requirements.  What should you do? ()A Configure a demand-dial router.B Create multiple Active Directory site links.C Configure a VPN connection between each branch office.D Install an Internet Authentication Service (IAS) server in each branch office.

单选题You are designing a new NETBIOS naming strategy for the corporate environment.  Which domain name should you use?()A adB woodgroveadC woodgrovebankD woodgrovebank.com

单选题You are designing a DNS implementing strategy to meet the business and technical requirement.  Which type of zone should you use?()A Sub ZonesB Standard Primary ZonesC Secondary ZonesD Active DirectoryIntegrated Zones

单选题You are designing a DNS implementing strategy to meet the business and technical requirement. Which type of zone should you use?()ASub ZonesBStandard Primary ZonesCSecondary ZonesDActive DirectoryIntegrated Zones

多选题You are designing the NetBIOS domain naming strategy for the company. Which NetBIOS domain name or names should you use?()AeastBwestCquebecDnewyorkEnorthamericaFwideworldimporters

单选题You are designing an IP addressing strategy for your VPN solution. How many public addresses should you use?()A1B25C50D255

单选题You are designing a new NETBIOS naming strategy for the corporate environment. Which domain name should you use?()AadBwoodgroveadCwoodgrovebankDwoodgrovebank.com

单选题You are designing a strategy to ensure that all employees have Internet access. For each branch office,  what should you do?()A Configure a DNS server to function as caching-only serversB Configure Internet Connection sharing on terminal servers.C Install and configure an Internet Security and Acceleration (ISA) Server ComputerD Install and configure a server running Routing and Remote Acess to function as a VPN server