Your companys corporate network uses Network Access Protection (NAP). Users are able to connect to the corporate network remotely. You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible.
What should you do()?
A.Apply an IPsec NAP policy.
B.Configure a NAP Policy for 802.1x Wireless connections
C.Configure VPN connections to use MS-CHAP v2 authentication
D.Restrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP
您可能感兴趣的试卷
你可能感兴趣的试题
Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.
what should you do()?
A.Configure all access points as RADIUS clients to the Remediation Servers
B.Configure all access points as RADIUS clients to the Network Policy Server (NPS)
C.Create a Network Policy that defines Remote Access Server as a network connection method
D.Create a Network Policy that specifies EAP-TLS as the only availible authentication method.
You have a server that runs Windows Server 2008. You need to configure the server as a VPN server. What should you installed on the server()?
A.Windows Deployment Serivces role and Deployment Server role service
B.Windows Deployment Services role and Deployment Transport Role Service
C.Network Policy and Access Services role and Routing and Remote Access Services role service.
D.Network Policy and Access Services role and Routing and Host Credential Authorization Protocolr ole service.
Your company has users who connect remotely to the main office though a Windows Server 2008 VPN server. You need to ensure that users cannot access the VPN server remotely from 22:00 to 05:00.
What should you do()?
A.Create a network policy for VPN connections. modify the Day and time restrictions.
B.Create a network policy for VPN connections. apply an ip filter to deny access to the corporate network.
C.Modify the Logon hours for all users objects to specify only the VPN server otn he computer restrictions option
D.Modify the Logon hours for the default domain policy to enable the Force logoff when logon hours expire option.
You deploy Windows Server 2008 VPN server behind a firewall. Remote users connect to the VPN by using portable computers that run Windows Vista with the latest service pack. The firewall is configured to allow only secured web communications. You need to enable remote users to connect as securely as possible. you must achieve this goal without opening any additional ports on the firewall.
What should you do ()?
A.Create an IPsec tunnel
B.Create an SSTP VPN connection
C.Create a PPTP VPN connection
D.Create an L2TP VPN connection
You perform a security audit of a server named DC1. You install the Microsoft Network Monitor 3.0 application on DC1.You plan to capture all the LDAP traffic that comes to and goes from the server between 20:00 and 07:00 the next day and save it to the E:\data.cap file. You create a scheduled task. You add a new Start a program action to the task.You need to add the application name and the application arguments to the new action.
What should you do?()
A. Add nmcap.exe as the application name. Add the /networks * /capture LDAP /file e:\data.cap /stopwhen /timeafter 11hours line as arguments.
B. Add netmon.exe as the application name. Add the /networks */capture LDAP /file e:\data.cap /stopwhen /timeafter 11hours line as arguments.
C. Add nmcap.exe as the application name. Add the /networks * /capture !LDAP /file e:\data.cap /stopwhen /timeafter 11hours line as arguments.
D. Add nmconfig.exe as the application name. Add the /networks * /capture &LDAP /file e:\data.cap /stopwhen /timeafter 11hours line as arguments.
You perform a security audit on a server named Server1. You install the Microsoft Network Monitor 3.0 application on Server1. You find that only some of the captured frames display host mnemonic names in the Source column and the Destination column. All other frames display IP addresses. You need to display mnemonic host names instead of IP addresses for all the frames.
What should you do?()
A. Create a new display filter and apply the filter to the capture.
B. Create a new capture filter and apply the filter to the capture.
C. Populate the Aliases table and apply the aliases to the capture.
D. Configure the Network Monitor application to enable the Enable Conversations option. Recapture the data to a new file.
You perform a security audit of a server named CRM1. You want to build a list of all DNS requests that are initiated by the server. You install the Microsoft Network Monitor 3.0 application on CRM1. You capture all local traffic on CRM1 for 24 hours. You save the capture file as data.cap. You find that the size of the file is more than 1 GB. You need to create a file named DNSdata.cap from the existing capture file that contains only DNS-related data.
What should you do? ()
A. Apply the display filter !DNS and save the displayed frames as a DNSdata.cap file.
B. Apply the capture filter DNS and save the displayed frames as a DNSdata.cap file.
C. Add a new alias named DNS to the aliases table and save the file as DNSdata.cap.
D. Run the nmcap.exe /inputcapture data.cap /capture DNS /file DNSdata.cap command.
Your company has a server named DC1 that runs Windows Server 2008 R2. Server1 has the DHCP
Server server role installed.You find that a desktop computer named Computer1 is unable to obtain an IP configuration from the DHCP server.You install the Microsoft Network Monitor 3.0 application on Server1. You enable P-mode in the Network Monitor application configuration. You plan to capture only the DHCP server-related traffic between Server1 and Computer1.The network interface configuration for the two computers is shown in the following table.
Server1 Computer1
IP address 192.168.2.1 169.254.15.84
MAC address 00-0A-5E-1C-7F-67 00-17-31-D5-5E-FF
You need to build a filter in the Network Monitor application to capture the DHCP traffic between Server1
and Computer1.
Which filter should you use?()
A. IPv4.Address == 169.254.15.84 && DHCP
B. IPv4.Address == 192.168.2.1 && DHCP
C. Ethernet.Address == 0x000A5E1C7F67 && DHCP
D. Ethernet.Address == 0x001731D55EFF && DHCP
Your company has a main office and a branch office. The branch office has three servers that run a Server Core installation of Windows Server 2008 R2. The servers are named Server1, Server2, and Server3.
You want to configure the Event Logs subscription on Server1 to collect events from Server2 and Server3.
You discover that you cannot create a subscription on Server1 from another computer.
You need to configure a subscription on Server1.
Which two actions should you perform?()
A. Run the wecutil cs subscription.xml command on Server1.
B. Run the wevtutil im subscription.xml command on Server1.
C. Create an event collector subscription configuration file. Name the file subscription.xml.
D. Create a custom view on Server1 by using Event Viewer. Export the custom view to a file named subscription . xml.
Your company has a network that has an Active Directory domain. The domain has two servers named DC1 and DC2. You plan to collect events from DC2 and transfer them to DC1. You configure the required subscriptions by selecting the Normal option for the Event delivery optimization setting and by using the HTTP protocol.
You discover that none of the subscriptions work.
You need to ensure that the servers support the event collectors.
Which three actions should you perform?()
A. Run the wecutil qc command on DC1.
B. Run the wecutil qc command on DC2.
C. Run the winrm quickconfig command on DC1.
D. Run the winrm quickconfig command on DC2.
E. Add the DC2 account to the Administrators group on DC1.
F. Add the DC1 account to the Administrators group on DC2.
最新试题
You have a file server that runs Windows Server 2008. A user restores a large file by using the Previous Versions tab. You need to view the progress of the file restoration what should you do()?
Your company has a network that has 100 servers. A server named Server1 is configured as a file server. Server1 is connected to a SAN and has 15 logical drives. You want to automatically run a data archiving script if the free space on any of the logical drives is below 30 percent. You need to automate the script execution.You create a new Data Collector Set. What should you do next?()
You manage a server that runs Windows Server 2008. The windows backup and restore utility is installed ont he server. You nede to create a full backup of all system state data to the DVD drive (R: drive) on the server. Which command should you run on the server()?
Your company has a main office and one branch office. The main office has a print server named Printer1. The branch office has a print server named Printer2. Printer1 manages 15 pritners and Printer2 manages seven pritners. You add Printer2 the Print Management console on Printer1. you need to send automatic notification when a printer is not availible. What should you do()?
You deploy Windows Server 2008 VPN server behind a firewall. Remote users connect to the VPN by using portable computers that run Windows Vista with the latest service pack. The firewall is configured to allow only secured web communications. You need to enable remote users to connect as securely as possible. you must achieve this goal without opening any additional ports on the firewall. What should you do ()?
Your company has a server named Printer1 that runs Windows Server 2008 R2. Printer1 has the Print and Document Services server role installed.You need to reduce the number of events registered in the system log on Printer1. What should you do?()
Your company has a network that has 100 servers. You install a new server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. You discover that the Reliability Monitor has no data, and that the system stablitiy chare has never been updated. You nede to configure the server to collect the reliability monitor data. What should you do()?
You have a file server that runs Windows Server 2008. The server has a shared folder. You need to receive a notifcation when a user stores more than 500MB of data int he shared folder. You must allow users to store more than 500MB of data in the shared folder. What should you do()?
You install WSUS on a server that runs Windows Server 2008. You need to ensure that the traffic between the WSUS administrative web site and the server administrators computer is encrypted What should you do()?
Your company has a network that has 100 servers. You install a new server that runs Windows Server 2008 R2. The server has the Web Server (IIS) server role installed. After a week, you discover that the Reliability Monitor has no data, and that the Systems Stability chart has never been updated.You need to configure the server to collect the Reliability Monitor data.What should you do?()