A. Create an IPsec Enforcement Network policy.
B. Create an 802.1X Enforcement Network policy.
C. Create a Wired Network (IEEE 802.3) Group policy.
D. Create an Extensible Authentication Protocol (EAP) Enforcement Network policy.
您可能感兴趣的试卷
你可能感兴趣的试题
A. Add Group1 to the RAS and IAS Servers group.
B. Add Group1 to the Network Configuration Operators group.
C. Create a new network policy and define a group-based condition for Group1. Set the access permission of the policy to Access granted. Set the processing order of the policy to 1.
D. Create a new network policy and define a group-based condition for Group1. Set the access permission of the policy to Access granted. Set the processing order of the policy to 3.
A. Create an IPsec tunnel.
B. Create an SSTP VPN connection.
C. Create a PPTP VPN connection.
D. Create an L2TP VPN connection.
A.ConfiguretheIPv6addressasfd00::2b0:d0ff:fee9:4143/8
B.ConfiguretheIPv6addressasfe80::2b0:d0ff:fee9:4143/64
C.ConfiguretheIPv6addressasff80::2b0:d0ff:fee9:4143/64
D.ConfiguretheIPv6addressas0000::2b0:d0ff:fee9:4143/64
A. Challenge Handshake Authentication Protocol (CHAP)
B. Extensible Authentication Protocol (EAP)
C. Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2)
D. Password Authentication Protocol (PAP)
A.Create an Ipsec enforcement network policy.
B.Create an 802.1xenforcemen tnetwork policy.
C.Createa wired network(IEEE802.3)Group policy.
D.Create an extensible authentication protocol(EAP)enforcement network policy.
A.Run the netsh interfac eipv4 add dnsserve r“LAN”static 192.168.0.254index=1command.
B.Run the netsh interfac eipv4 set dnsserver“LAN”static 192.168.0.254192.168.0.1bothcommand.
C.Run the nets hinterfac eipv4 set dnsserver“LAN”static 192.168.0.254primary command and the netsh interface ipv4 set dnsserver “LAN” static 192.168.0.1both command.
D.Run the netsh interface ipv4 set dnssserver“LAN”static 192.168.0.254 primary command and the netsh interface ipv4 add dnssserver “LAN” static 192.168.0.1index=1command.
A.Add the event trace data collector
B.Add the performance counte ralert
C.Add the performance counte rdata collector
D.Add the system configuration datacollector.
A. Install the Network Policy Server (NPS) server role on RAS1.
B. Create a remote access policy that requires users to authenticate by using SPAP.
C. Create a remote access policy that requires users to authenticate by using EAP-TLS.
D. Create a remote access policy that requires users to authenticate by using MS-CHAP v2.
A. Configure an IPsec connection to use tunnel mode and preshared key authentication.
B. Configure a PPTP connection to use version 2 of the MS-CHAP v2 authentication.
C. Configure a L2TP/IPsec connection to use the EAP-TLS authentication.
D. Configure a L2TP/IPsec connection to use version 2 of the MS-CHAP v2 authentication.
A.Change the IP address to192.168.46.129
B.Change the IPaddress to192.168.46.200
C.Change thes ubnet mask to a 24-bitmask
D.Change the subnet mask to a 27-bitmask.
最新试题
Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP. what should you do()?
Your company has a server named DC1 that runs Windows Server 2008. DC1 has the DHCP server role installed. You find taht a desktop computer named SALES4 is unable to obtain an IP configuration from the DHCP server. You install the Microsoft Network Monitor 3.0 application on DC1. You enable P-mode in the Network Monitor application configuration. You plan to capture only the DHCP server-related traffic between DC1 and SALES4 The network interface configuration for the two computers is shown in the following table. (missing again wow). You need to build a filter int he Network Monitor application to capture the DHCP traffic between DC1 and SALES4 Which filter should you use()?
Your company has a network that has 100 servers. A server named Server1 is configured as a file server. Server1 is connected to a SAN and has 15 logical drives. You want to automatically run a data archiving script if the free space on any of the logical drives is below 30 percent. You need to automate the script execution.You create a new Data Collector Set. What should you do next?()
Your company has a server named Printer1 that runs Windows Server 2008 R2. Printer1 has the Print and Document Services server role installed.You need to reduce the number of events registered in the system log on Printer1. What should you do?()
Your company has a network that has 100 servers. You install a new server that runs Windows Server 2008 R2. The server has the Web Server (IIS) server role installed. After a week, you discover that the Reliability Monitor has no data, and that the Systems Stability chart has never been updated.You need to configure the server to collect the Reliability Monitor data.What should you do?()
Your company has a network that has 100 servers. You install a new server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. You discover that the Reliability Monitor has no data, and that the system stablitiy chare has never been updated. You nede to configure the server to collect the reliability monitor data. What should you do()?
Your company has a network that has an Active Directory domain. The domain has two servers named DC1 and DC2. You plan to collect events from DC2 and transfer them to DC1. You configure the required subscriptions by selecting the Normal option for the Event delivery optimization setting and by using the HTTP protocol.You discover that none of the subscriptions work.You need to ensure that the servers support the event collectors.Which three actions should you perform?()
You perform a security audit of a server named CRM1. You want to build a list of all DNS requests that are initiated by the server. You install the Microsoft Network Monitor 3.0 application on CRM1. You capture all local traffic on CRM1 for 24 hours. You save the capture file as data.cap. You find that the size of the file is more than 1 GB. You need to create a file named DNSdata.cap from the existing capture file that contains only DNS-related data.What should you do? ()
Your company has users who connect remotely to the main office though a Windows Server 2008 VPN server. You need to ensure that users cannot access the VPN server remotely from 22:00 to 05:00. What should you do()?
You deploy Windows Server 2008 VPN server behind a firewall. Remote users connect to the VPN by using portable computers that run Windows Vista with the latest service pack. The firewall is configured to allow only secured web communications. You need to enable remote users to connect as securely as possible. you must achieve this goal without opening any additional ports on the firewall. What should you do ()?