You need to ensure that the system health policy is applied to all client computers that attempt VPN connections.What should you do?()
A. Reconfigure NPS1 as a radius client
B. Reconfigure VPN1 as a radius client
C. Add the NAP role to a domain controller
D. Add the NAP role to an Enterrpise Certificate server.
您可能感兴趣的试卷
你可能感兴趣的试题
A. Pointer (PTR)
B. Host Info (HINFO)
C. Service Location (SRV)
D. Canonical Name (CNAME)
A.From the command prompt,run shadow.exe /v.
B.From the command prompt,run vssadmin.exe query reverts.
C.From Computer Management,click on the Shared Folders node and then click on Sessions.
D.From Computer Management,click on the Shared Folders node and then click on Open Files.
A.Enable the Optimize for scalability option.
B.Enable the Optimize for consistency option.
C.Set the Ordering method option to Lowest cost.
D.Set the Ordering method option to Random order.
A. Host Info (HINFO)
B. Service Location (SRV)
C. Canonical Name (CNAME)
D. Well-Known Service (WKS)
A.Run the dfscmd.exe \\FS1\dfs /restore command on FS1.
B.Configure the NTFS permissions for the C:\DFSroots\dfs folder on FS1. Set the Create folders/append data special permission to Deny for the Authenticated Users group. Set the Full Control permission to Allow for the Administrators group.
C.Start the Delegate Management Permissions Wizard for the DFS namespace named \\contoso.com\dfs. Remove all groups that have the permission type Explicit except the Administrators group.
D.Configure the \\FS1\dfs shared folder permissions. Set the permissions for the Authenticated Users group to Reader. Set the permissions for the Administrators group to Co-owner.
A.From Windows Firewall, add an exception.
B.From Windows Firewall, enable the Block all incoming connections option.
C.From the Windows Firewall with Advanced Security snap-in, create an inbound rule.
D.From the Windows Firewall with Advanced Security snap-in, create an outbound rule.
A. Create an IPsec Enforcement Network policy
B. Create an 802.1X enforcement network policy
C. Create a wired network (IEEE 802.3) Group Policy
D. Create an Extensible Authentication Portocol (EAP) Enforcement Network Policy
A.From the Services snap-in,disable the IP Helper.
B.From the Services snap-in,disable the Netlogon service.
C.From Windows Firewall,enable the Block all connections option on the Public Profile.
D.From Windows Firewall enable the Block all connections option on the Domain Profile.
A.Configure all access points to use 802.1X authentication.
B.Configure all portable computers to use MS-CHAP v2 authentication.
C.Use the Group Policy Management Console to access the wireless Group Policy settings, and enable the Prevent connections to ad-hoc networks option.
D.Use the Group Policy Management Console to access the wireless Group Policy settings, and disable the Prevent connections to infrastructure networks option.
A. Install the Network Policy Server (NPS) on the RAS1 server
B. Create a remote access policy that requires users to authenticate by using SPAP
C. Create a remote access policy that requires users to authenticate by using EAP-TLS
D. Create a remote access policy that requires users to authenticate by using MS-CHAP v2
最新试题
Your company has a network that has 100 servers. A server named Server1 is configured as a file server. Server1 is connected to a SAN and has 15 logical drives. You want to automatically run a data archiving script if the free space on any of the logical drives is below 30 percent. You need to automate the script execution.You create a new Data Collector Set. What should you do next?()
Your company has a network that has an active directory domain. The domain has two servers named DC1 and DC2. You plan to collect events from DC2 and transfer them to DC1. You configure the required subscriptions by selecting the normal option for the event delivery optimiation setting and using the HTTP protocol. you discovere that none of the subscritpions work. You need to ensure that the servers support event collectiors. which three actions should you perform()?
Your company ahs an active direcotyr domain. The company also has a server named Server1 that runs Windows Server 2008. You install the file server role on Server1. you create a shared folder named AcctgShare on Server1 The permissions for the shared folder are configured as shown in the following table. ( missing again!) You need to ensure members of the Managers group can only view and open files in the shared folder. What should you do()?
Your company has a network that has an Active Directory domain. The domain has two servers named DC1 and DC2. You plan to collect events from DC2 and transfer them to DC1. You configure the required subscriptions by selecting the Normal option for the Event delivery optimization setting and by using the HTTP protocol.You discover that none of the subscriptions work.You need to ensure that the servers support the event collectors.Which three actions should you perform?()
Your company has a network that has 100 servers. You install a new server that runs Windows Server 2008 R2. The server has the Web Server (IIS) server role installed. After a week, you discover that the Reliability Monitor has no data, and that the Systems Stability chart has never been updated.You need to configure the server to collect the Reliability Monitor data.What should you do?()
You have a file server that runs Windows Server 2008. A user restores a large file by using the Previous Versions tab. You need to view the progress of the file restoration what should you do()?
Your company has users who connect remotely to the main office though a Windows Server 2008 VPN server. You need to ensure that users cannot access the VPN server remotely from 22:00 to 05:00. What should you do()?
Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP. what should you do()?
Your company has a server named DC1 that runs Windows Server 2008. DC1 has the DHCP server role installed. You find taht a desktop computer named SALES4 is unable to obtain an IP configuration from the DHCP server. You install the Microsoft Network Monitor 3.0 application on DC1. You enable P-mode in the Network Monitor application configuration. You plan to capture only the DHCP server-related traffic between DC1 and SALES4 The network interface configuration for the two computers is shown in the following table. (missing again wow). You need to build a filter int he Network Monitor application to capture the DHCP traffic between DC1 and SALES4 Which filter should you use()?
You have a file server that runs Windows Server 2008. The server has a shared folder. You need to receive a notifcation when a user stores more than 500MB of data int he shared folder. You must allow users to store more than 500MB of data in the shared folder. What should you do()?