A.From Windows Firewall, add an exception.
B.From Windows Firewall, enable the Block all incoming connections option.
C.From the Windows Firewall with Advanced Security snap-in, create an inbound rule.
D.From the Windows Firewall with Advanced Security snap-in, create an outbound rule.
您可能感兴趣的试卷
你可能感兴趣的试题
A. Create an IPsec Enforcement Network policy
B. Create an 802.1X enforcement network policy
C. Create a wired network (IEEE 802.3) Group Policy
D. Create an Extensible Authentication Portocol (EAP) Enforcement Network Policy
A.From the Services snap-in,disable the IP Helper.
B.From the Services snap-in,disable the Netlogon service.
C.From Windows Firewall,enable the Block all connections option on the Public Profile.
D.From Windows Firewall enable the Block all connections option on the Domain Profile.
A.Configure all access points to use 802.1X authentication.
B.Configure all portable computers to use MS-CHAP v2 authentication.
C.Use the Group Policy Management Console to access the wireless Group Policy settings, and enable the Prevent connections to ad-hoc networks option.
D.Use the Group Policy Management Console to access the wireless Group Policy settings, and disable the Prevent connections to infrastructure networks option.
A. Install the Network Policy Server (NPS) on the RAS1 server
B. Create a remote access policy that requires users to authenticate by using SPAP
C. Create a remote access policy that requires users to authenticate by using EAP-TLS
D. Create a remote access policy that requires users to authenticate by using MS-CHAP v2
A. Set the priority value of the Server2 Mail Exchanger (MX) record to 20. Create a new Mail Exchanger(MX) record for Server3. Set the priority value to 5.
B. Set the priority value of the Server2 Mail Exchanger (MX) record to 5. Create a new Mail Exchanger(MX) record for Server3. Set the priority value to 20.
C. Create a new Service Location (SRV) record in the domain for Server3. Set the port number value to 25. Configure the priority setting to 20.
D. Create a new Service Location (SRV) record in the domain for Server3. Set the port number value to 110. Configure the priority setting to 5.
A. Configure an IPsec connection to use tunnel mode and preshared key authentication.
B. Configure a PPTP connection to use version 2 of the MS-CHAP v2 authentication.
C. Configure a L2TP/IPsec connection to use the EAP-TLS authentication
D. Configure a L2TP/IPsec connection to use version 2 of the MS-CHAP v2 authentication.
A. Create a new display filter and apply the filter to the capture
B. Create a new capture filter and apply the filter to the capture
C. Populate the Aliases table and apply the aliases to the capture
D. Configure the Network Monitor Application to enable the Enable Converstations optionrecapture the data to a new file.
A. Create a Signature (SIG) record for the domain controller.
B. Modify the Name Server (NS) record for the domain controller.
C. Modify the Service Location (SRV) record for the domain controller.
D. Modify the Start of Authority (SOA) record on the domain controller.
A. Add nmcap.exe as the application name. Add the /networks * /capture LDAP /file e:\data.cap / stopwhen /timeafter 11hours line as arguments
B. Add netmon.exe as the application name. Add the /networks */capture LDA /file e:\data.cap /stopwhen / T.imeafter 11hours line as arguments
C. Add nmcap.exe as the application name. Add the /networks * /capture !LDAP /file e:\data.cap /stopwhen /timeafter 11hours line as arguments
D. Add nmconfig.exe as the application name. Add the /networks */capture &LDAP /file e:\data.cap / stopwhen /timeafter 11hours line as arguments
A. Configure SSL encryption on the WSUS server website.
B. Run the netdom trust /SecurePasswordPrompt command on the WSUS server
C. Configure the NTFS permissions on the content directory to Deny Full Controll permission to the Everyone group
D. Configure the WSUS server to require Integrated Windows Authentication (IWA) when users connect to the WSUS server.
最新试题
You deploy Windows Server 2008 VPN server behind a firewall. Remote users connect to the VPN by using portable computers that run Windows Vista with the latest service pack. The firewall is configured to allow only secured web communications. You need to enable remote users to connect as securely as possible. you must achieve this goal without opening any additional ports on the firewall. What should you do ()?
Your company has a server named DC1 that runs Windows Server 2008. DC1 has the DHCP server role installed. You find taht a desktop computer named SALES4 is unable to obtain an IP configuration from the DHCP server. You install the Microsoft Network Monitor 3.0 application on DC1. You enable P-mode in the Network Monitor application configuration. You plan to capture only the DHCP server-related traffic between DC1 and SALES4 The network interface configuration for the two computers is shown in the following table. (missing again wow). You need to build a filter int he Network Monitor application to capture the DHCP traffic between DC1 and SALES4 Which filter should you use()?
Your company has a main office and one branch office. The main office has a print server named Printer1. The branch office has a print server named Printer2. Printer1 manages 15 printers and Printer2 manages seven printers. You add Printer2 to the Print Management console on Printer1. You need to send an automatic notification when a printer is not available. What should you do?()
Your company has an Active Directory domain that has two domain controllers named DC1 and DC2.You prepare both servers to support event subscriptions. On DC1, you create a new default subscription for DC2. You need to review system events for DC2.Which event log should you select?()
Your company has a network that has an Active Directory domain. The domain has two servers named DC1 and DC2. You plan to collect events from DC2 and transfer them to DC1. You configure the required subscriptions by selecting the Normal option for the Event delivery optimization setting and by using the HTTP protocol.You discover that none of the subscriptions work.You need to ensure that the servers support the event collectors.Which three actions should you perform?()
You perform a security audit on a server named Server1. You install the Microsoft Network Monitor 3.0 application on Server1. You find that only some of the captured frames display host mnemonic names in the Source column and the Destination column. All other frames display IP addresses. You need to display mnemonic host names instead of IP addresses for all the frames.What should you do?()
You manage a server that runs Windows Server 2008. The windows backup and restore utility is installed ont he server. You nede to create a full backup of all system state data to the DVD drive (R: drive) on the server. Which command should you run on the server()?
Your company has a server named Printer1 that runs Windows Server 2008 R2. Printer1 has the Print and Document Services server role installed.You need to reduce the number of events registered in the system log on Printer1. What should you do?()
Your company has a network that has an active directory domain. The domain has two servers named DC1 and DC2. You plan to collect events from DC2 and transfer them to DC1. You configure the required subscriptions by selecting the normal option for the event delivery optimiation setting and using the HTTP protocol. you discovere that none of the subscritpions work. You need to ensure that the servers support event collectiors. which three actions should you perform()?
Your network consists of a single Active Directory domain. All servers run Windows Server 2008 R2.You have a server named Server1 that hosts shared documents. Users report extremely slow response times when they try to open the shared documents on Server1.You log on to Server1 and observe real-time data indicating that the processor is operating at 100 percent of capacity.You need to gather additional data to diagnose the cause of the problem.What should you do?()