A. Configure all access points to use 802.1X authentication.
B. Configure all portable computers to use MS-CHAP v2 authentication.
C. Use the Group Policy Management Console to access the wireless Group Policy settings, and enable the Prevent connections to ad-hoc networks option.
D. Use the Group Policy Management Console to access the wireless Group Policy settings, and disable the Prevent connections to infrastructure networks option.
您可能感兴趣的试卷
你可能感兴趣的试题
A. Configure all access points as RADIUS clients to the Remediation Servers.
B. Configure all access points as RADIUS clients to the Network Policy Server (NPS).
C. Create a Network Policy that defines Remote Access Server as a network connection method.
D. Create a Network Policy that specifies EAP-TLS as the only available authentication method.
A. Create a Group Policy object (GPO) that enables Security Center and link the policy to the domain.
B. Create a Group Policy object (GPO) that enables Security Center and link the policy to the Domain Controllers organizational unit (OU).
C. Create a Group Policy object (GPO) and set the Require trusted path for credential entry option to Enabled. Link the policy to the domain.
D. Create a Group Policy object (GPO) and set the Require trusted path for credential entry option to Enabled. Link the policy to the Domain Controllers organizational unit (OU).
A. Enable automatic updates on each client.
B. Enable the Security Center on each client.
C. Quarantine clients that do not have all available security updates installed.
D. Disconnect the connection until the required updates are installed.
A.Configure a DHCP replay agent on a membe rserver in the main office.
B.Configure a DHCP repla yagent on a member server in the branch office.
C.Configure the broadcast addres sDHCP serve roptionto include the main offices DHCP server address.
D.Configure the resource location servers DHCP serve roption to include the main office serve ipaddresses.
A. Create an IPsec Enforcement Network policy.
B. Create an 802.1X Enforcement Network policy.
C. Create a Wired Network (IEEE 802.3) Group policy.
D. Create an Extensible Authentication Protocol (EAP) Enforcement Network policy.
A. Add Group1 to the RAS and IAS Servers group.
B. Add Group1 to the Network Configuration Operators group.
C. Create a new network policy and define a group-based condition for Group1. Set the access permission of the policy to Access granted. Set the processing order of the policy to 1.
D. Create a new network policy and define a group-based condition for Group1. Set the access permission of the policy to Access granted. Set the processing order of the policy to 3.
A. Create an IPsec tunnel.
B. Create an SSTP VPN connection.
C. Create a PPTP VPN connection.
D. Create an L2TP VPN connection.
A.ConfiguretheIPv6addressasfd00::2b0:d0ff:fee9:4143/8
B.ConfiguretheIPv6addressasfe80::2b0:d0ff:fee9:4143/64
C.ConfiguretheIPv6addressasff80::2b0:d0ff:fee9:4143/64
D.ConfiguretheIPv6addressas0000::2b0:d0ff:fee9:4143/64
A. Challenge Handshake Authentication Protocol (CHAP)
B. Extensible Authentication Protocol (EAP)
C. Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2)
D. Password Authentication Protocol (PAP)
A.Create an Ipsec enforcement network policy.
B.Create an 802.1xenforcemen tnetwork policy.
C.Createa wired network(IEEE802.3)Group policy.
D.Create an extensible authentication protocol(EAP)enforcement network policy.
最新试题
You have 10 standalone servers that run Windows Server 2008 R2.You install the Windows Server Update Services (WSUS) server role on a server named Server1.You need to configure all of the servers to receive updates from Server1.What should you do?()
Your company has a network that has an active directory domain. The domain has two servers named DC1 and DC2. You plan to collect events from DC2 and transfer them to DC1. You configure the required subscriptions by selecting the normal option for the event delivery optimiation setting and using the HTTP protocol. you discovere that none of the subscritpions work. You need to ensure that the servers support event collectiors. which three actions should you perform()?
You perform a security audit on a server named Server1. You install the Microsoft Network Monitor 3.0 application on Server1. You find that only some of the captured frames display host mnemonic names in the Source column and the Destination column. All other frames display IP addresses. You need to display mnemonic host names instead of IP addresses for all the frames.What should you do?()
Your company has a main office and a branch office. The branch office has three servers that run a Server Core installation of Windows Server 2008 R2. The servers are named Server1, Server2, and Server3. You want to configure the Event Logs subscription on Server1 to collect events from Server2 and Server3. You discover that you cannot create a subscription on Server1 from another computer. You need to configure a subscription on Server1.Which two actions should you perform?()
You have a server that runs Windows Server 2008. You need to configure the server as a VPN server. What should you installed on the server()?
You have a file server that runs Windows Server 2008 R2.You configure quotas on the server.You need to view each user¯s quota usage on a per folder basisWhat should you do?()
You have 10 stand alone servers taht run Windows Server 2008. You install WSUS on a server named Server1. You need to configure all of the servers to receive updates from Server1 What should you do()?
Your company has an Active Directory domain that has two domain controllers named DC1 and DC2.You prepare both servers to support event subscriptions. On DC1, you create a new default subscription for DC2. You need to review system events for DC2.Which event log should you select?()
Your company ahs an active direcotyr domain. The company also has a server named Server1 that runs Windows Server 2008. You install the file server role on Server1. you create a shared folder named AcctgShare on Server1 The permissions for the shared folder are configured as shown in the following table. ( missing again!) You need to ensure members of the Managers group can only view and open files in the shared folder. What should you do()?
You have a server that runs Windows Server 2008 R2.You create a new quota template. You apply quotas to 100 folders by using the quota template.You need to modify the quota settings for all 100 folders. You must achieve this goal by using the minimum amount of administrative effort.What should you do?()