A. Set the Elliptic Curve Cryptography to Allow.
B. Set the Elliptic Curve Cryptography to Require.
C. Disable the Allow delegating saved credentials setting.
D. Disable the Create caching-capable user key from smart card option.
您可能感兴趣的试卷
你可能感兴趣的试题
A. Enable access-based enumeration (ABE) on the share.
B. Assign the Read NTFS permission to the Domain Users group.
C. From the Network and Sharing Center, enable public folder sharing.
D. From the File Sharing Wizard, configure the Read permission level for the Domain Users group.
A. Add User1 to Group2.
B. Remove User1 from Group1.
C. Assign the Change share permission to Group1.
D. Assign the Change share permission to Group3.
A. Disk Management
B. File Server Resource Manager
C. Share and Storage Management
D. Storage Explorer
A. the Netsh tool
B. the Network Policy Server console
C. the Registry Editor
D. the Routing and Remote Access console
A. TCP ports 80, 443, 389 and 1645
B. TCP ports 88, 135, 139 and 1813
C. UDP ports 53, 67, 68 and 69
D. UDP ports 1812, 1813, 1645 and 1646
A.Use a static IPv4 address in the range used at the branch office.
B.Use a alternate configuration that contains a static IP address in the range used at the main office.
C.Use the address that was assigned by DHCP as a static IP address.
D.Use an altermate configuration that contains a static IP address in the range used at the branch office.
A.System log on DC1.
B.Application log on DC2.
C.Forwarded events log on DC1.
D.Forwarded events log on DC2.
A.Run the dnscmd.exe \\FS1\dfs /restore command on FS1.
B.Configure the NTFS permissions for the C:\DFSroots\dfs folder on FS1. Set the create folders/append data special permission to deny for the authentjicated users group. Set the full control permission to allow for the administrators group.
C.Start the delegate management permissions wizard for the dfs namespace named \\contoso.com\dfs remove all groups that have permission type explicit except the administrators group.
D.Configure the \\fs1\dfs shared folder permissions. set the permissions for the authenticated users group to reader. Set the permissions for the administrations group to co-ower.
A. On NPS1, configure remediation server groups.
B. On NPS1, configure connection request policies.
C. On VPN1, modify the DNS suffix search order.
D. On VPN1, modify the IKEv2 Client connection controls.
A. ¡¤Logi-LAT-Service ˆLogin-LAT-Node ˆLogin-LAT-Group ˆNAS-Identifier
B. ¡¤Tunne-Assignment-ID ˆTunnel-Preference ˆTunnel-Client-Auth-ID ˆNAS-Port-Id
C. ¡¤Tunne-Client-Endpt ˆTunnel-Server-Endpt ˆNAS-Port-Type ˆTunnel-Password
D. ¡¤Tunne-Medium-Type ˆTunnel-Pvt-Group-ID ˆTunnel-Type ˆTunnel-Tag
最新试题
Your company has an Active Directory domain that has two domain controllers named DC1 and DC2.You prepare both servers to support event subscriptions. On DC1, you create a new default subscription for DC2. You need to review system events for DC2.Which event log should you select?()
You perform a security audit on a server named Server1. You install the Microsoft Network Monitor 3.0 application on Server1. You find that only some of the captured frames display host mnemonic names in the Source column and the Destination column. All other frames display IP addresses. You need to display mnemonic host names instead of IP addresses for all the frames.What should you do?()
You perform a security audit of a server named DC1. You install the Microsoft Network Monitor 3.0 application on DC1.You plan to capture all the LDAP traffic that comes to and goes from the server between 20:00 and 07:00 the next day and save it to the E:\data.cap file. You create a scheduled task. You add a new Start a program action to the task.You need to add the application name and the application arguments to the new action.What should you do?()
Your companys corporate network uses Network Access Protection (NAP). Users are able to connect to the corporate network remotely. You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do()?
Your company has a server named DC1 that runs Windows Server 2008 R2. Server1 has the DHCPServer server role installed.You find that a desktop computer named Computer1 is unable to obtain an IP configuration from the DHCP server.You install the Microsoft Network Monitor 3.0 application on Server1. You enable P-mode in the Network Monitor application configuration. You plan to capture only the DHCP server-related traffic between Server1 and Computer1.The network interface configuration for the two computers is shown in the following table.Server1 Computer1IP address 192.168.2.1 169.254.15.84MAC address 00-0A-5E-1C-7F-67 00-17-31-D5-5E-FFYou need to build a filter in the Network Monitor application to capture the DHCP traffic between Server1and Computer1.Which filter should you use?()
You deploy Windows Server 2008 VPN server behind a firewall. Remote users connect to the VPN by using portable computers that run Windows Vista with the latest service pack. The firewall is configured to allow only secured web communications. You need to enable remote users to connect as securely as possible. you must achieve this goal without opening any additional ports on the firewall. What should you do ()?
Your company ahs an active direcotyr domain. The company also has a server named Server1 that runs Windows Server 2008. You install the file server role on Server1. you create a shared folder named AcctgShare on Server1 The permissions for the shared folder are configured as shown in the following table. ( missing again!) You need to ensure members of the Managers group can only view and open files in the shared folder. What should you do()?
Your company has a server named SRV1 that runs Windows Server 2008 R2. The default Print Services server role is installed on SRV1. The company wants to centralize printing on SRV1 for both UNIX and Windows users. You need to provide support to the UNIX users who print on SRV1.What are two possible ways to achieve this goal? ()
Your company has a network that has 100 servers. A server named Server1 is configured as a file server. Server1 is connected to a SAN and has 15 logical drives. You want to automatically run a data archiving script if the free space on any of the logical drives is below 30 percent. You need to automate the script execution.You create a new Data Collector Set. What should you do next?()
Your company runs Windows Server Update Services (WSUS) on a server named Server1. Server1runs Windows Server 2008 R2. Server1 is located on the company intranet. You configure the WSUS Web site to use SSL.You need to configure a Group Policy object (GPO) to specify the intranet update locations.Which URLs should you use?()