You need to design a remote access strategy for portable com

题目
单选题
You need to design a remote access strategy for portable computers. Your solution must meet business requirements. What should you do?()
A

Issue a computer certificate to P_RAS1. Reconfigure the remote access policy on P_RAS1 to accept only EAP-MD5 authentication. Then, specify that P_RAS1’s computer certificate is to be used for authentication

B

Issue a user certificate to the Administrator account on P_RAS1. Reconfigure the remote access policy to accept only EAP-MD5 authentication. Then, specify that the Administrator account’s user certificate is to be used for authentication

C

Issue a computer certificate to P_RAS1. Reconfigure the remote access policy to accept only EAP-TLS authentication. Then, specify the P_RAS1’s computer certificate is to be used for authentication

D

Issue a user certificate to the Administrator account on P_RAS1. Reconfigure the remote access policy to accept only EAP-TLS authentication. Then, specify that the Administrator account’s user certificate is to be used for authentication

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You need to design a remote access solution for the mobile sales users in the litwareinc.com domain. Which two actions should you perform?()

  • A、Configure autoenrollment for user certificates and computer certificates
  • B、Configure Web enrollment for user certificates and computer certificates
  • C、Configure a Certificate Services hierarchy in the litwareinc.com domain
  • D、Configure qualified subordination between the litwareinc.com and the contoso.com domains
  • E、Configure PEAP authentication on the remote access servers

正确答案:A,C

第2题:

You need to design an e-mail access strategy for remote users. What should you do? () 

  • A、 Instruct remote users to connect to their e-mail by using RPC
  • B、 Instruct remote users to connect to Outlook Web Access by using only HTTPS
  • C、 Instruct remote users to connect to the company network by using PPTP connections
  • D、 Instruct remote users to connectd to their e-mail by using RPC over HTTP Configure the HTTP servers to require encryption.

正确答案:D

第3题:

You have a desktop computer and a portable computer. Both the computers are configured to allow remote desktop connections. You connect to the desktop computer from the portable computer. You need to save files from within the remote session to the C: drive of the portable computer.What should you do?()

A.A

B.B

C.C

D.D


参考答案:C

第4题:

You are designing a security strategy for users who need remote access to the corporate network. What should you do?()

  • A、Configure Internet Authentication Service (IAS) for accounting.
  • B、Configure the server running Routing and Remote Access to support L2TP.
  • C、Configure the server running Routing and Remote Access to restrict dial-in traffic to the NewApp servers only.
  • D、Create a separate account for remote access users. Configure these accounts to access the NewApp server only.

正确答案:C

第5题:

You are designing a remote access strategy to meet the business & technical requirements. Which authentication mechanism should you use?()

  • A、MS-CHAP v2.
  • B、Internet Authentication service (IAS).
  • C、Multilink & Bandwidth Allocation Protocol (BAP).
  • D、Remote access policies on all servers running Routing & Remote Access.

正确答案:B

第6题:

You need to design a remote access strategy for the customer support users when they work from home. Your solution must meet security requirements. What should you do?()

  • A、Deploy an L2TP/IPsec VPN server in each call center. Configure the portable computers as L2TP VPN clients
  • B、Create IPSec tunnel mode connections between the customer support users home and the company’s Internet-facing routers
  • C、Create IP packet filters on the company’s Internet-facing routers to allow the Remote Desktop Protocol (RDP).Create IPSec filters on the terminal servers to allow only connections that use RDP
  • D、Create IP packet filters on the company’s Internet-facing routers to allow the IPSec protocols. Assign the Secure Server (Require Security) IPSec policy to the terminal servers. Assign the Client (Respond only) IPSec policy to the portable computers

正确答案:A

第7题:

You are designing a remote access strategy to meet the business and technical Requirement.  What should you do?()

  • A、 Configure each server running Routing and Remote Access as a RADIUS Client.
  • B、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.
  • C、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.
  • D、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.

正确答案:A

第8题:

You need to design a security strategy for VPN2. Your solution must meet business requirements. What should you do?()

  • A、Create and configure a new security template. Import the template into the Default Domain Policy Group Policy object (GPO)
  • B、Install Internet Authentication Service (IAS) on RAS1. Configure VPN2 to be the RADIUS client of RAS1. Configure the remote access policy on VPN2
  • C、Create and configure a new security template. Import the template into the local policy on VPN2
  • D、Move VPN2 into the VPN Servers OU. Configure the remote access policy on VPN2

正确答案:D

第9题:

You need to design a strategy for remote client computer access that meets all business and technical requirements. What should you do?()

  • A、Configure the HTTP virtual server on the Exchange front-end server to require a secure connection. Instruct the sales personnel to use Microsoft Outlook Web Access to connect to the Exchange front-end server
  • B、Configure the back-end Exchange servers to use static ports for RPC connections. Open the required ports on the firewall. Install Microsoft Outlook 2003 on the portable computers and configure it to connect to the Exchange back-end server using a MAPI connection
  • C、Configure the Exchange front-end server to require secure connections from IMAP4 client computers. Install Microsoft Outlook 2003 on the portable computers and configure it to use a secure IMAP4 connection
  • D、Configure the Exchange servers to support RPC over HTTPS. Install Microsoft outlook 2003 on the portable computers and configure it to use RPC over HTTPS

正确答案:D

第10题:

You are designing a Windows 7 virtual desktop infrastructure.You have the following requirements:   Provide access to Remote Desktop Services RemoteApp sources from multiple remote desktop servers.  Support network load balancing.  Support reconnection to existing sessions on virtual desktops.    You need to specify a design that meets the requirements.   What should you include in your design?()

  • A、Remote Desktop Gateway
  • B、Remote Desktop Connection Broker
  • C、Windows Deployment Services
  • D、Windows Virtual PC and Windows XP Mode

正确答案:B

更多相关问题