A. On NPS1, configure remediation server groups.
B. On NPS1, configure connection request policies.
C. On VPN1, modify the DNS suffix search order.
D. On VPN1, modify the IKEv2 Client connection controls.
您可能感兴趣的试卷
你可能感兴趣的试题
A. ¡¤Logi-LAT-Service ˆLogin-LAT-Node ˆLogin-LAT-Group ˆNAS-Identifier
B. ¡¤Tunne-Assignment-ID ˆTunnel-Preference ˆTunnel-Client-Auth-ID ˆNAS-Port-Id
C. ¡¤Tunne-Client-Endpt ˆTunnel-Server-Endpt ˆNAS-Port-Type ˆTunnel-Password
D. ¡¤Tunne-Medium-Type ˆTunnel-Pvt-Group-ID ˆTunnel-Type ˆTunnel-Tag
A.Configure a static IP address.
B.Configure the default gateway.
C.Configure the DNS server address.
D.Add the domain to the DNS suffix on the network interface.
A.Create a group policy object (GPO) that enabled security center and link the policy to the domain.
B.Create a group policy object (GPO) that enabled security center and link the policy to the domain controllers organizational unit (OU).
C.Create a group policy object (GPO) and set the require trusted path for credential entry option to enabled. Link the policy to the domain.
D.Create a group policy object (GPO) and set the require trusted path for credential entry option to Enabled. Link the policy to the domain controllers organizational unit (OU).
A.Create a stub zone for partner.com on each DNS server in contoso.com.
B.Configure the zone replication scope for partner.com to replicate to all DNS servers In the forest.
C.Configure an application directory partition in the contoso.com forest. Enlist all DNS servers in the contoso.com forest in the partition.
D.Configure an application directory partition in the partner forest. Enlist all DNS servers in the partner forest in the partition.
A. In the contoso.com domain, add Server1 to the RAS and IAS Servers group.
B. In the contoso.com domain, add Server1 to the Windows Authorization Access group.
C. In the eu.contoso.com domain, add Server1 to the RAS and IAS Servers group.
D. In the eu.contoso.com domain, add Server1 to the Windows Authorization Access group.
A. Create a new ODBC data source.
B. Run netsh.exe nps reset config.
C. Manually configure the SQL logging settings.
D. Restart the Network Policy Server (NPS) role service.
A.Deactivate all LM and NTLM authentication methods on FSS1 server.
B.Use IIS to publish the confidential files, activate SSL on the IIS server, and then open the files as a web folder.
C.Use IPsec encryption between the FSS1 server and the computers of the users who need to access the confidential files.
D.Use the server message block (SMB) signing between the FSS1 serve and the computers of the users who want to access the confidential files.
E.Activate offline files for the confidential files that are stored on the FSS1 server. In the folder advanced properties box, select the encrypt contents to secure data option.
A. Acct-Session-Id
B. Acct-Status-Type
C. Class
D. NAS-Identifier
A.Install service pack 4 on all windows 2000 professional computers.
B.Upgrade the windows 2000 professional computers to windows XP SP2.
C.Run the IPv6.exe tool on the windows 2000 professional and windows XP computers.
D.Install active directory client extenticon. (DSClient.exe) on the windows 2000 professional and windows XP computers.
A.Configure the windows update settings on each server by using control panel.
B.Run the wuauclt.exe /detectnow command on each server.
C.Run the wuauclt.exe /reauthorization command on each server.
D.Configure the windows update settings on each server by using local group policy.
最新试题
Your network consists of a single Active Directory domain. All servers run Windows Server 2008 R2.You have a server named Server1 that hosts shared documents. Users report extremely slow response times when they try to open the shared documents on Server1.You log on to Server1 and observe real-time data indicating that the processor is operating at 100 percent of capacity.You need to gather additional data to diagnose the cause of the problem.What should you do?()
Your company has a network that has an active directory domain. The domain has two servers named DC1 and DC2. You plan to collect events from DC2 and transfer them to DC1. You configure the required subscriptions by selecting the normal option for the event delivery optimiation setting and using the HTTP protocol. you discovere that none of the subscritpions work. You need to ensure that the servers support event collectiors. which three actions should you perform()?
You perform a security audit on a server named Server1. You install the Microsoft Network Monitor 3.0 application on Server1. You find that only some of the captured frames display host mnemonic names in the Source column and the Destination column. All other frames display IP addresses. You need to display mnemonic host names instead of IP addresses for all the frames.What should you do?()
You have a file server that runs Windows Server 2008. A user restores a large file by using the Previous Versions tab. You need to view the progress of the file restoration what should you do()?
Your company has a network that has 100 servers. A server named Server1 is configured as a file server. Server1 is connected to a SAN and has 15 logical drives. You want to automatically run a data archiving script if the free space on any of the logical drives is below 30 percent. You need to automate the script execution.You create a new Data Collector Set. What should you do next?()
Your company has a server named FS1. FS1 hosts the domain-based DFS namespace named \\contoso. com\dfs all domain users store their data in subfolders within the DFS namespace. You need to prevent all users except administrators, from creating new folders or new files at the root of the \\contoso.com\dfs share. What should you do()?
Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP. what should you do()?
You have 10 standalone servers that run Windows Server 2008 R2.You install the Windows Server Update Services (WSUS) server role on a server named Server1.You need to configure all of the servers to receive updates from Server1.What should you do?()
You perform a security audit of a server named CRM1. You want to build a list of all DNS requests that are initiated by the server. You install the Microsoft Network Monitor 3.0 application on CRM1. You capture all local traffic on CRM1 for 24 hours. You save the capture file as data.cap. You find that the size of the file is more than 1 GB. You need to create a file named DNSdata.cap from the existing capture file that contains only DNS-related data.What should you do? ()
You perform a security audit of a server named DC1. You install the Microsoft Network Monitor 3.0 application on DC1.You plan to capture all the LDAP traffic that comes to and goes from the server between 20:00 and 07:00 the next day and save it to the E:\data.cap file. You create a scheduled task. You add a new Start a program action to the task.You need to add the application name and the application arguments to the new action.What should you do?()