A. From the Windows Firewall with Advanced Security console, create an inbound rule on Server1.
B. From the Windows Firewall with Advanced Security console, create an outbound rule on Server1.
C. From a Group Policy object (GPO), enable the Client (Respond Only) IPSec policy on all client computers.
D. From a Group Policy object (GPO), configure the Network Security: LDAP client signing requirements policy setting for all client computers.
您可能感兴趣的试卷
你可能感兴趣的试题
A.Run the ipconfig /renew command on WKS1.
B.Run the netsh add helper command on WKS1.
C.Add the DHCP reservation for WKS1 to the second DHCP server.
D.Add the DHCP servers to the RAS and IAS servers group in the active directory domain.
A.Set the security layer for each server to the RDP security layer.
B.Configure the firewall on each server to block port 3389.
C.Acquire user certificates from the internal certificate authority.
D.Configure each server to allow connections only to remote desktop client computers that use network level authentication.
A.Configure NAT1 to forward port 389 to RDP1.
B.Configure NAT1 to forward port 1432 to RDP1.
C.Configure NAT1 to forward port 3339 to RDP1.
D.Configure NAT1 to forward port 3389 to RDP1.
A.Install the routing and remote access role.
B.Run the netsh ras ip set access ALL command.
C.Run the netsh interface ipv4 enable command.
D.Enable the IPV4 router routing and remote access option.
A.Deactivate all LM and NTLM authentication methods on the FSS1 server.
B.Use IIS to publish the confidentials files. Activate SSL on the ISS server, and then open the files as a web folder.
C.Use IPSec encryption between the FSS 1 server and the computers of the users who need to access the confidential files.
D.Use the server messager block (SMB) signing between the FSS1 server and the computers of the users who want to access the confidential files.
E.Activate offline files for the confidential files that are stored on the FSS1 server. In the folder advanced properties dialog box, select the encrypt contents to secure data option.
A.Install the internet printing server role on SRV1.
B.Install the line printer daemon (LPD) services role service on SRV1.
C.Configure the printers on SRV1 to use line printer remote printing.
D.Install the file server role on SRV1 and activate the services for the NFS Role service option.
A. From the Local Security Policy console, configure the Security Options.
B. From the Local Security Policy console, configure the Application Control Policies.
C. From the Windows Firewall with Advanced Security console, create an inbound rule.
D. From the Windows Firewall with Advanced Security console, create a connection security rule.
A. At the Command Prompt, run netsh.exe firewall dump.
B. At the Command Prompt, run netsh.exe firewall show > firewall.txt.
C. From the Windows Firewall with Advanced Security console, click Export policy.
D. From the Windows Firewall with Advanced Security console, click the Connection Security Rules node, and then click Export List.
A. File and Printer Sharing (Echo Request ICMPv4-In)
B. File and Printer Sharing (SMB-In)
C. Remote Desktop (TCP-In)
D. Remote Service Management (RPC)
A.Disable the notify feature for the contoso.com zone.
B.Disable the allow-read permission for the everyone group on the contoso.com DNS domain.
C.Configure the all domain controllers in the domain zone replication option on ad.contoso.com.
D.Configure the allow zone transfers only to servers listed on the named servers option on contoso.com.
最新试题
Your company has a server named SRV1 that runs Windows Server 2008 R2. The default Print Services server role is installed on SRV1. The company wants to centralize printing on SRV1 for both UNIX and Windows users. You need to provide support to the UNIX users who print on SRV1.What are two possible ways to achieve this goal? ()
Your network consists of a single Active Directory domain. All servers run Windows Server 2008 R2.You have a server named Server1 that hosts shared documents. Users report extremely slow response times when they try to open the shared documents on Server1.You log on to Server1 and observe real-time data indicating that the processor is operating at 100 percent of capacity.You need to gather additional data to diagnose the cause of the problem.What should you do?()
You have a server that runs Windows Server 2008. You need to configure the server as a VPN server. What should you installed on the server()?
You have a server that runs Windows Server 2008 R2.You create a new quota template. You apply quotas to 100 folders by using the quota template.You need to modify the quota settings for all 100 folders. You must achieve this goal by using the minimum amount of administrative effort.What should you do?()
Your company has a network that has 100 servers. A server named Server1 is configured as a file server. Server1 is connected to a SAN and has 15 logical drives. You want to automatically run a data archiving script if the free space on any of the logical drives is below 30 percent. You need to automate the script execution.You create a new Data Collector Set. What should you do next?()
Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP. what should you do()?
Your company has a main office and a branch office. The branch office has three servers that run a Server Core installation of Windows Server 2008 R2. The servers are named Server1, Server2, and Server3. You want to configure the Event Logs subscription on Server1 to collect events from Server2 and Server3. You discover that you cannot create a subscription on Server1 from another computer. You need to configure a subscription on Server1.Which two actions should you perform?()
Your company has a network that has an Active Directory domain. The domain has two servers named DC1 and DC2. You plan to collect events from DC2 and transfer them to DC1. You configure the required subscriptions by selecting the Normal option for the Event delivery optimization setting and by using the HTTP protocol.You discover that none of the subscriptions work.You need to ensure that the servers support the event collectors.Which three actions should you perform?()
You install WSUS on a server that runs Windows Server 2008. You need to ensure that the traffic between the WSUS administrative web site and the server administrators computer is encrypted What should you do()?
Your company has a network that has 100 servers. You install a new server that runs Windows Server 2008 R2. The server has the Web Server (IIS) server role installed. After a week, you discover that the Reliability Monitor has no data, and that the Systems Stability chart has never been updated.You need to configure the server to collect the Reliability Monitor data.What should you do?()