A.Challenge Handshake Authentication Protocol (CHAP)
B.Extensible Authentication Protocol (EAP)
C.Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2)
D.Password Authentication Protocol (PAP)
您可能感兴趣的试卷
你可能感兴趣的试题
A. Apply the display filter !DNS and save the displayed frames as a DNSdata.cap file.
B. Apply the capture filter DNS and save the displayed frames as a DNSdata.cap file.
C. Add a new alias named DNS to the aliases table and save the file as DNSdata.cap.
D. Run the nmcap.exe /inputcapture data.cap /capture DNS /file DNSdata.cap command.
A.Add Group1 to the RAS and IAS Servers Group
B.Add Group1 to the Network Configuration Operators group
C.Create a new network policy and define a group-based connection for Group1. Set the access permission of the policy to Access granted. Set the processing order of the policy to 1
D.Create a new network policy and define a group-based condition for Group1. Set the access permission of the policy to Access Granted. Set the processing of the policy to 3.
A. Run the wecutil cs subscription.xml command on Server1.
B. Run the wevtutil im subscription.xml command on Server1.
C. Create an event collector subscription configuration file. Name the file subscription.xml.
D. Create a custom view on Server1 by using Event Viewer. Export the custom view to a file named subscription.xml.
A.Create a multicast scope
B.Assign a Static IP address to Server2
C.Create an exclusion range in the DHCP scope
D.Create a DHCP reservation in the DHCP scope.
A. Run the wecutil qc command on DC1.
B. Run the wecutil qc command on DC2.
C. Run the winrm quickconfig command on DC1.
D. Run the winrm quickconfig command on DC2.
E. Add the DC2 account to the Administrators group on DC1.
F. Add the DC1 account to the Administrators group on DC2.
A.Configure all access points to use 802.1x authentication.
B.Configure all protable computers to use MS-CHAP v2 authentication.
C.Use the group policy management console to access the wireless group policy settings, and enable the prevent connections to ad-hoc network option.
D.Use the group policy management console to access the wireless group policy settings, and disable the prevent connections to infrastructure networks option.
A.Use a static IPv4 address in the range used at the branch office.
B.Use an alternate configureation that contains a static IP address in the range used at the main office
C.Use the address that was assigned by DHCP as a static IP address
D.Use an alternate configuration that contains a static Ip address in the range used at the branch office.
A. system log on DC1
B. application log on DC2
C. Forwarded Events log on DC1
D. Forwarded Events log on DC2
A.Configure a static IP address
B.Configure the default gateway
C.Configure the DNS server address
D.Add the domain to the DNS suffix on the network interface
A.Stop and restart the DNS service on server1.
B.Enable DNS scavenging on the na.contoso.com zone.
C.Run the dnscmd server1 /ageallrecords command on server1/.
D.Run the dnscmd server1 /startscavenging command on server1.
最新试题
Your company has a network that has 100 servers. A server named Server1 is configured as a file server. Server1 is connected to a SAN and has 15 logical drives. You want to automatically run a data archiving script if the free space on any of the logical drives is below 30 percent. You need to automate the script execution.You create a new Data Collector Set. What should you do next?()
Your company has a network that has 100 servers. You install a new server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. You discover that the Reliability Monitor has no data, and that the system stablitiy chare has never been updated. You nede to configure the server to collect the reliability monitor data. What should you do()?
You perform a security audit of a server named DC1. You install the Microsoft Network Monitor 3.0 application on DC1.You plan to capture all the LDAP traffic that comes to and goes from the server between 20:00 and 07:00 the next day and save it to the E:\data.cap file. You create a scheduled task. You add a new Start a program action to the task.You need to add the application name and the application arguments to the new action.What should you do?()
You have 10 stand alone servers taht run Windows Server 2008. You install WSUS on a server named Server1. You need to configure all of the servers to receive updates from Server1 What should you do()?
You have a file server that runs Windows Server 2008. The server has a shared folder. You need to receive a notifcation when a user stores more than 500MB of data int he shared folder. You must allow users to store more than 500MB of data in the shared folder. What should you do()?
You have a server that runs Windows Server 2008. You need to configure the server as a VPN server. What should you installed on the server()?
Your company runs Windows Server Update Services (WSUS) on a server named Server1. Server1runs Windows Server 2008 R2. Server1 is located on the company intranet. You configure the WSUS Web site to use SSL.You need to configure a Group Policy object (GPO) to specify the intranet update locations.Which URLs should you use?()
Your company has a server named Printer1 that runs Windows Server 2008 R2. Printer1 has the Print and Document Services server role installed.You need to reduce the number of events registered in the system log on Printer1. What should you do?()
You perform a security audit of a server named CRM1. You want to build a list of all DNS requests that are initiated by the server. You install the Microsoft Network Monitor 3.0 application on CRM1. You capture all local traffic on CRM1 for 24 hours. You save the capture file as data.cap. You find that the size of the file is more than 1 GB. You need to create a file named DNSdata.cap from the existing capture file that contains only DNS-related data.What should you do? ()
You install WSUS on a server that runs Windows Server 2008. You need to ensure that the traffic between the WSUS administrative web site and the server administrators computer is encrypted What should you do()?