单选题You are designing a security strategy for users who need remote access to the corporate network. What should you do?()AConfigure Internet Authentication Service (IAS) for accounting.BConfigure the server running Routing and Remote Access to support L2TP.CConfigure the server running Routing and Remote Access to restrict dial-in traffic to the NewApp servers only.DCreate a separate account for remote access users. Configure these accounts to access the NewApp server only.

单选题
You are designing a security strategy for users who need remote access to the corporate network. What should you do?()
A

Configure Internet Authentication Service (IAS) for accounting.

B

Configure the server running Routing and Remote Access to support L2TP.

C

Configure the server running Routing and Remote Access to restrict dial-in traffic to the NewApp servers only.

D

Create a separate account for remote access users. Configure these accounts to access the NewApp server only.


参考解析

解析: 暂无解析

相关考题:

You are designing a strategy to ensure that all employees have Internet access. For each branch office,  what should you do?()A、 Configure a DNS server to function as caching-only serversB、 Configure Internet Connection sharing on terminal servers.C、 Install and configure an Internet Security and Acceleration (ISA) Server ComputerD、 Install and configure a server running Routing and Remote Acess to function as a VPN server

You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers.   You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized.  You need to configure Server1 to log the details of access attempts by VPN users.   What should you do?  ()A、 Configure the system event log to Do not overwrite.B、 In IAS, in Remote Access Logging, enable the Authentication requests setting.C、 Configure the Remote Access server to Log all events.D、 Create a custom remote access policy and configure it for Authentication-Type.

You have a server that runs Windows Server 2003 Service Pack 2 (SP2). Routing and Remote Access is enabled and the server is configured as a remote access server.  You need to configure the server to support only the MS-CHAP v2 authentication protocol for remote access authentication. What should you do from the Routing and Remote Access snap-in?()A、Configure the port properties.B、Create and configure a new demand-dial interface.C、From the server’s properties, modify the security options.D、From the Connections to Microsoft Routing and Remote Access Server policy, add a new condition.

You are designing a remote access strategy to meet the business and technical Requirement.  What should you do?()A、 Configure each server running Routing and Remote Access as a RADIUS Client.B、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.C、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.D、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.

You are designing a strategy to ensure that all employees have Internet access. For each branch office, what should you do?()A、Configure a DNS server to function as caching-only servers.B、Configure Internet Connection sharing on terminal servers.C、Install and configure an Internet Security and Acceleration (ISA) Server Computer.D、Install and configure a server running Routing and Remote Acess to function as a VPN server.

You are designing a remote access strategy to meet the business  technical requirements. Which authentication mechanism should you use?()A、MS-CHAP v2.B、Internet Authentication service (IAS).C、Multilink  Bandwidth Allocation Protocol (BAP).D、Remote access policies on all servers running Routing  Remote Access.

You are designing a security strategy for users who need remote access to the corporate network.  What should you do?()A、 Configure Internet Authentication Service (IAS) for accounting.B、 Configure the server running Routing and Remote Access to support L2TP.C、 Configure the server running Routing and Remote Access to restrict dial-in traffic to the NewApp servers only.D、 Create a separate account for remote access users. Configure these accounts to access the NewApp server only.

You need to design a security strategy for a remote e-mail access. What should you do?()A、Require remote users to access e-mails by using Outlook Mobile AccessB、Require Outlook Web Access users to install the secure MIME ActiveX-Control and to encrypt all messagesC、On Outlook Web Access servers that accept connections from the Internet configure IIS to require SSL for all connectionsD、On Outlook Web Access servers that accept connections from the Internet configure IIS to require Integrated Windows Authentication

You are designing a strategy to provide Internet access to all users.  What should you do?()A、 Configure Internet Connection Sharing on all client computers.B、 Configure Automatic Private IP Addressing (APIPA) on all client computers.C、 Configure one server as a Routing and Remote Access VPN server.D、 Configure one server as a Routing and Remote Access NAT router.

You need to design a remote access authentication strategy that will allow users in the IT department to remotely connect to the network. Your solution must meet security requirements. What should you do?()A、Install Internet Authentication Services (IAS) on a server in the den.corp.woodgrovebank.com domain. Configure the VPN servers as RADIUS clientsB、Install Internet Authentication Services (IAS) on a stand-alone server in the Denver extranet. Create local user accounts for the IT personnel on the IAS server. Configure the VPN servers as RADIUS clientsC、Create a remote access policy on each of the VPN servers. Configure the policy to use the den.corp.woodgrovebank.com to authenticate remote access users. Configure the policy to require L2TP to establish a connectionD、Create a remote access policy on each of the VPN servers. Create local user accounts for the IT personnel on the VPN servers. Configure the policy to use the VPN servers’ local accounts database to authenticate users. Configure the policy to require L2TP to establish a connection

ou have a server that runs Windows Server 2003 Service Pack 2 (SP2). Routing and Remote Access is enabled and the server is configured as a remote access server.You need to configure the server to support only the MS-CHAP v2 authentication protocol for remote access authentication.What should you do from the Routing and Remote Access snap-in?()A、Configure the port properties. B、Create and configure a new demand-dial interface. C、From the server’s properties, modify the security options. D、From the Connections to Microsoft Routing and Remote Access Server policy, add a new condition.

You have a server that runs Windows Server 2003 Service Pack 2 (SP2). Routing and Remote Access is enabled and the server is configured as a remote access server. You need to configure the server to support only the MS-CHAP v2 authentication protocol for remote access authentication. What should you do from the Routing and Remote Access snap-in? () A、Configure the port properties.  B、Create and configure a new demand-dial interface.  C、From the servers properties, modify the security options.  D、From the Connections to Microsoft Routing and Remote Access Server policy, add a new condition.

单选题You are designing a security strategy for users who need remote access to the corporate network.  What should you do?()A Configure Internet Authentication Service (IAS) for accounting.B Configure the server running Routing and Remote Access to support L2TP.C Configure the server running Routing and Remote Access to restrict dial-in traffic to the NewApp servers only.D Create a separate account for remote access users. Configure these accounts to access the NewApp server only.

单选题You have a server that runs Windows Server 2003 Service Pack 2 (SP2). Routing and Remote Access is enabled and the server is configured as a remote access server. You need to configure the server to support only the MS-CHAP v2 authentication protocol for remote access authentication. What should you do from the Routing and Remote Access snap-in? ()AConfigure the port properties.  BCreate and configure a new demand-dial interface.  CFrom the servers properties, modify the security options.  DFrom the Connections to Microsoft Routing and Remote Access Server policy, add a new condition.

单选题You need to design a security strategy for a remote e-mail access. What should you do?()ARequire remote users to access e-mails by using Outlook Mobile AccessBRequire Outlook Web Access users to install the secure MIME ActiveX-Control and to encrypt all messagesCOn Outlook Web Access servers that accept connections from the Internet configure IIS to require SSL for all connectionsDOn Outlook Web Access servers that accept connections from the Internet configure IIS to require Integrated Windows Authentication

单选题You are designing a remote access strategy to meet the business and technical Requirement.  What should you do?()A Configure each server running Routing and Remote Access as a RADIUS Client.B Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.C Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.D Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.

单选题You have a server that runs Windows Server 2003 Service Pack 2 (SP2). Routing and Remote Access is enabled and the server is configured as a remote access server.  You need to configure the server to support only the MS-CHAP v2 authentication protocol for remote access authentication. What should you do from the Routing and Remote Access snap-in?()AConfigure the port properties.BCreate and configure a new demand-dial interface.CFrom the server’s properties, modify the security options.DFrom the Connections to Microsoft Routing and Remote Access Server policy, add a new condition.

单选题ou have a server that runs Windows Server 2003 Service Pack 2 (SP2). Routing and Remote Access is enabled and the server is configured as a remote access server.You need to configure the server to support only the MS-CHAP v2 authentication protocol for remote access authentication.What should you do from the Routing and Remote Access snap-in?()AConfigure the port properties. BCreate and configure a new demand-dial interface. CFrom the server’s properties, modify the security options. DFrom the Connections to Microsoft Routing and Remote Access Server policy, add a new condition.

单选题You need to design a remote access authentication strategy that will allow users in the IT department to remotely connect to the network. Your solution must meet security requirements. What should you do?()AInstall Internet Authentication Services (IAS) on a server in the den.corp.woodgrovebank.com domain. Configure the VPN servers as RADIUS clientsBInstall Internet Authentication Services (IAS) on a stand-alone server in the Denver extranet. Create local user accounts for the IT personnel on the IAS server. Configure the VPN servers as RADIUS clientsCCreate a remote access policy on each of the VPN servers. Configure the policy to use the den.corp.woodgrovebank.com to authenticate remote access users. Configure the policy to require L2TP to establish a connectionDCreate a remote access policy on each of the VPN servers. Create local user accounts for the IT personnel on the VPN servers. Configure the policy to use the VPN servers’ local accounts database to authenticate users. Configure the policy to require L2TP to establish a connection

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers.   You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized.  You need to configure Server1 to log the details of access attempts by VPN users.   What should you do?  ()A Configure the system event log to Do not overwrite.B In IAS, in Remote Access Logging, enable the Authentication requests setting.C Configure the Remote Access server to Log all events.D Create a custom remote access policy and configure it for Authentication-Type.

单选题You are designing a strategy to provide Internet access to all users.  What should you do?()A Configure Internet Connection Sharing on all client computers.B Configure Automatic Private IP Addressing (APIPA) on all client computers.C Configure one server as a Routing and Remote Access VPN server.D Configure one server as a Routing and Remote Access NAT router.

单选题You are designing a remote access strategy to meet the business  technical requirements.  Which authentication mechanism should you use?()A MS-CHAP v2.B Internet Authentication service (IAS).C Multilink  Bandwidth Allocation Protocol (BAP).D Remote access policies on all servers running Routing  Remote Access.

单选题You are designing a remote access strategy to meet the business  technical requirements. Which authentication mechanism should you use?()AMS-CHAP v2.BInternet Authentication service (IAS).CMultilink  Bandwidth Allocation Protocol (BAP).DRemote access policies on all servers running Routing  Remote Access.

单选题You are designing a remote access strategy to meet the business and technical Requirement. What should you do?()AConfigure each server running Routing and Remote Access as a RADIUS Client.  BAdd a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.  CAdd a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.  DAdd a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.

单选题You are designing a strategy to ensure that all employees have Internet access. For each branch office,  what should you do?()A Configure a DNS server to function as caching-only serversB Configure Internet Connection sharing on terminal servers.C Install and configure an Internet Security and Acceleration (ISA) Server ComputerD Install and configure a server running Routing and Remote Acess to function as a VPN server

单选题You are designing a strategy to ensure that all employees have Internet access. For each branch office, what should you do?()AConfigure a DNS server to function as caching-only servers.BConfigure Internet Connection sharing on terminal servers.CInstall and configure an Internet Security and Acceleration (ISA) Server Computer.DInstall and configure a server running Routing and Remote Acess to function as a VPN server.

单选题You are designing a strategy to ensure that VPN users are able to access all internal resources.  What should you do?()A Specify a static routing table entry on VPN1 for the Dallas network.B Specify a static routing table entry on VPN1 for the Seattle network.C Implement Internet Authentication Service (IAS) on VPN1.D Define a User Class option for Routing  Remote Access Clients on the DHCP Server.