单项选择题Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2008 R2. All client computers run Windows 7. You discover that users can use Encrypting File System (EFS) when the smart cards on their computers are removed.You need to prevent the users from accessing EFS-encrypted files when their smart cards are removed.From the EFS properties, you click Require a smart card for EFS.What should you do next?()

A. Set the Elliptic Curve Cryptography to Allow.
B. Set the Elliptic Curve Cryptography to Require.
C. Disable the Allow delegating saved credentials setting.
D. Disable the Create caching-capable user key from smart card option.


您可能感兴趣的试卷

你可能感兴趣的试题

3.单项选择题Your network contains a server that runs Windows Server 2008 R2.You need to enable access-based enumeration (ABE) on a shared folder.Which console should you use?()

A. Disk Management
B. File Server Resource Manager
C. Share and Storage Management
D. Storage Explorer

6.单项选择题your company uses DHCP to lease IPv4 addresses to computers at the main office. A WAN link connects the main office to a branch office. All computers in the branch office are configured with static ip addresses. The branch office does not use DHCP and uses a different subnet. You need to ensure that the portable computers can connect to network resources at the main office and the branch office. How should you configure each portable computer?()

A.Use a static IPv4 address in the range used at the branch office.
B.Use a alternate configuration that contains a static IP address in the range used at the main office.
C.Use the address that was assigned by DHCP as a static IP address.
D.Use an altermate configuration that contains a static IP address in the range used at the branch office.

8.单项选择题your company has a server named FS1. FS1 hosts the domain-based DFS namespace named \\contoso.com\dfs all domain users store their data in subfolders within the DFS namespace. You need to prevent all users except administrators, from creating new folders or new files at the root of the \\contoso.com\dfs share. what should you do?()

A.Run the dnscmd.exe \\FS1\dfs /restore command on FS1.
B.Configure the NTFS permissions for the C:\DFSroots\dfs folder on FS1. Set the create folders/append data special permission to deny for the authentjicated users group. Set the full control permission to allow for the administrators group.
C.Start the delegate management permissions wizard for the dfs namespace named \\contoso.com\dfs remove all groups that have permission type explicit except the administrators group.
D.Configure the \\fs1\dfs shared folder permissions. set the permissions for the authenticated users group to reader. Set the permissions for the administrations group to co-ower.

10.单项选择题our network contains a Network Policy Server (NPS) named Server1.You need to configure a network policy for a VLAN.Which RADIUS attributes should you add?()

A. ¡¤Logi-LAT-Service   ˆLogin-LAT-Node  ˆLogin-LAT-Group  ˆNAS-Identifier
B. ¡¤Tunne-Assignment-ID  ˆTunnel-Preference  ˆTunnel-Client-Auth-ID   ˆNAS-Port-Id
C. ¡¤Tunne-Client-Endpt   ˆTunnel-Server-Endpt   ˆNAS-Port-Type   ˆTunnel-Password
D. ¡¤Tunne-Medium-Type  ˆTunnel-Pvt-Group-ID  ˆTunnel-Type  ˆTunnel-Tag

最新试题

Your company has an Active Directory domain that has two domain controllers named DC1 and DC2.You prepare both servers to support event subscriptions. On DC1, you create a new default subscription for DC2. You need to review system events for DC2.Which event log should you select?()

题型:单项选择题

You perform a security audit on a server named Server1. You install the Microsoft Network Monitor 3.0 application on Server1.  You find that only some of the captured frames display host mnemonic names in the Source column and the Destination column. All other frames display IP addresses. You need to display mnemonic host names instead of IP addresses for all the frames.What should you do?()

题型:单项选择题

You perform a security audit of a server named DC1. You install the Microsoft Network Monitor 3.0 application on DC1.You plan to capture all the LDAP traffic that comes to and goes from the server between 20:00 and 07:00 the next day and save it to the E:\data.cap file. You create a scheduled task. You add a new Start a program action to the task.You need to add the application name and the application arguments to the new action.What should you do?()

题型:单项选择题

Your companys corporate network uses Network Access Protection (NAP). Users are able to connect to the corporate network remotely. You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do()?  

题型:单项选择题

Your company has a server named DC1 that runs Windows Server 2008 R2. Server1 has the DHCPServer server role installed.You find that a desktop computer named Computer1 is unable to obtain an IP configuration from the DHCP server.You install the Microsoft Network Monitor 3.0 application on Server1. You enable P-mode in the Network Monitor application configuration. You plan to capture only the DHCP server-related traffic between Server1 and Computer1.The network interface configuration for the two computers is shown in the following table.Server1  Computer1IP address  192.168.2.1  169.254.15.84MAC address  00-0A-5E-1C-7F-67  00-17-31-D5-5E-FFYou need to build a filter in the Network Monitor application to capture the DHCP traffic between Server1and Computer1.Which filter should you use?()

题型:单项选择题

You deploy Windows Server 2008 VPN server behind a firewall. Remote users connect to the VPN by using portable computers that run Windows Vista with the latest service pack. The firewall is configured to allow only secured web communications. You need to enable remote users to connect as securely as possible. you must achieve this goal without opening any additional ports on the firewall. What should you do ()?  

题型:单项选择题

Your company ahs an active direcotyr domain. The company also has a server named Server1 that runs Windows Server 2008. You install the file server role on Server1. you create a shared folder named AcctgShare on Server1 The permissions for the shared folder are configured as shown in the following table. ( missing again!) You need to ensure members of the Managers group can only view and open files in the shared folder. What should you do()?  

题型:单项选择题

Your company has a server named SRV1 that runs Windows Server 2008 R2. The default Print Services server role is installed on SRV1. The company wants to centralize printing on SRV1 for both UNIX and Windows users. You need to provide support to the UNIX users who print on SRV1.What are two possible ways to achieve this goal? ()

题型:多项选择题

Your company has a network that has 100 servers. A server named Server1 is configured as a file server. Server1 is connected to a SAN and has 15 logical drives. You want to automatically run a data archiving script if the free space on any of the logical drives is below 30 percent. You need to automate the script execution.You create a new Data Collector Set. What should you do next?()

题型:单项选择题

Your company runs Windows Server Update Services (WSUS) on a server named Server1. Server1runs Windows Server 2008 R2. Server1 is located on the company intranet. You configure the WSUS Web site to use SSL.You need to configure a Group Policy object (GPO) to specify the intranet update locations.Which URLs should you use?()

题型:单项选择题