单选题You need to design a Security strategy for the wireless network at all resort locations.What should you do?()A Connect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Requi

题目
单选题
You need to design a Security strategy for the wireless network at all resort locations.What should you do?()
A

Connect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Require company users to establish a VPN to access company resources

B

Install Internet Authentication Service (IAS) on a domain controller.Configure the wireless access points to require IEEE 802.1x authentication

C

Establish IPSec policies on all company servers to request encryption from all computers that connect from the wireless IP networks

D

Configure all wireless access points to require the Wired Equivalent Privacy (WEP) protocol for all connections. Use a Group Policy object (GPO) to distribute the WEP keys to all computers in the domain


相似考题
参考答案和解析
正确答案: C
解析: 暂无解析
更多“You need to design a Security strategy for the wireless netw”相关问题
  • 第1题:

    Your company’s network includes client computers that run Windows 7. You design a wireless network to use Extensible Authentication Protocol-Transport Level Security (EAP-TLS).   The Network Policy Server has a certificate installed.   Client computers are unable to connect to the wireless access points.    You need to enable client computers to connect to the wireless network.   What should you do?()

    • A、Configure client computers to use Protected Extensible Authentication Protocol-Microsoft Challenge Handshake Authentication Protocol version 2 (PEAP-MS-CHAP v2).
    • B、Configure client computers to use Protected Extensible Authentication Protocol-Transport Layer Security (PEAP-TLS).
    • C、Install a certificate in the Trusted Root Certification Authorities certificate store.
    • D、Install a certificate in the Third-Party Root Certification Authorities certificate store.

    正确答案:C

  • 第2题:

    You need to design an audit strategy for Southbridge Video. Your solution must meet business requirements.What should you do?()

    • A、Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPO
    • B、Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPO
    • C、Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPO
    • D、Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPO

    正确答案:D

  • 第3题:

    You need to recommend a Group Policy strategy for the Remote Desktop servers. What should you include in the recommendation?()

    • A、block inheritance
    • B、loopback processing
    • C、security filtering
    • D、WMI filtering

    正确答案:B

  • 第4题:

    You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()

    • A、Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access point
    • B、Configure IEEE 802.1x authentication with smart cards
    • C、Configure the wireless network to use Wired Equivalent Privacy (WEP)
    • D、Install and configure an Internet Authentication Service (IAS) server

    正确答案:C

  • 第5题:

    Your computer uses both wired and wireless network connections. The networks are not connected to each other.  You disallow incoming connections in Microsoft Windows Firewall. You create a shared folder. Users on the wireless network cannot access the shared folder.  You need to allow access to the shared folder from the wireless network. You also need to maintain the security of the wired network.  What should you do?()

    • A、Turn off the Windows Firewall feature.
    • B、Disable the Block all incoming connections option.
    • C、Turn off the Spyware and other malware protection option.
    • D、Enable the File and Printer Sharing exception in the firewall settings of the wireless network adapter.

    正确答案:D

  • 第6题:

    You need to design an access control and permission strategy for user objects in Active Directory.What should you do?()

    • A、Make the members of the AdvancedSupport security group members of the Domain Admins security group
    • B、Give each desktop support technician permission to reset passwords for the top-level OU that contains user accounts at their own location
    • C、Delegate full control over all OUs that contain user accounts to all AllSupport  security group
    • D、Change the permissions on the domain object and its child objects so that the BasicSupport security group is denied permissions. Then, add a permission to each OU that contains user accounts that allows AllSupport security group members to reset passwords in that OU

    正确答案:B

  • 第7题:

    You need to design a strategy to ensure that all servers are in compliance with the business requirements for maintaining security patches. What should you do?()

    • A、Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the domain
    • B、Log on to each server and run Security Configuration and Analysis to analyze the security settings by using a custom security template
    • C、Create a logon script to run the secedit command to analyze all servers in the domain
    • D、Run the Microsoft Baseline Security Analyzer (MBSA) on a server to scan for Windows vulnerabilities on all servers in the domain

    正确答案:D

  • 第8题:

    多选题
    You need to design a strategy to increase security for the client computers in the finance department. Which two actions should you perform?()
    A

    Enable automatic certificate enrollment

    B

    Enforce smart card logons

    C

    Enable Encrypting File System (EFS) for offline files

    D

    Enable a screen saver password


    正确答案: A,D
    解析: 暂无解析

  • 第9题:

    单选题
    You need to design a patch management strategy for Southbridge Video. Your solution must meet business requirements. What should you do?()
    A

    Configure all client computers to use Automatic Updates to obtain security patches from the Windows Update Web site. Test and install all patches

    B

    Configure a batch file to download security patches daily. Distribute the security patches by using a.zap file and the Default Domain Policy Group Policy object (GPO)

    C

    Deploy a Software Update Services (SUS) server. Test all security patches and then approve them. Configure all client computers to automatically obtain updates from the server

    D

    Configure a batch file to download security patches daily. Manually install the security patches on all computers


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    You need to design the consolidation strategy for the Promotions and Partners databases. You want to choose a strategy that results in the best database performance while maintaining the permissions of end users in each database.What consolidation strategy should you choose?()
    A

    Place each database in a separate instance running on SQL2.

    B

    Place each database in a separate instance running on SQL3.

    C

    Place both databases in a single instance running on SQL2.

    D

    Place both databases in a single instance running on SQL3.


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    You need to design a group membership strategy for the EditorialAdmins group. What should you do?()
    A

    Move the EditorialAdmins group to the Servers OU in the editorial department

    B

    Move the members of the EditorialAdmins group to the Editorial OU

    C

    Move the members of the EditorialAdmins group to the New York OU

    D

    Move the EditorialAdmins group to the New York OU


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    You need to design a method to monitor the security configuration of the IIS server to meet the requirements in the written security policy. What should you do?()
    A

    Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the IIS server computer account

    B

    Run the Microsoft Baseline Security Analyzer (MBSA) on the IIS server and scan for vulnerabilities in Windows and IIS checks

    C

    Run Security Configuration and Analysis to analyze the IIS server’s security settings by using a custom security template

    D

    On the IIS server, run the gpresult command from a command prompt and analyze the output


    正确答案: A
    解析: 暂无解析

  • 第13题:

    You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains 50 application servers that run Windows Server 2003.   The security configuration of the application servers is not uniform. The application servers were deployed by local administrators who configured the settings for each of the application servers differently based on their knowledge and skills. The application servers are configured with different authentication methods, audit settings, and account policy settings.   The security team recently completed a new network security design. The design includes a baseline configuration for security settings on all servers. The baseline security settings use the Hisecws.inf predefined security template. The design also requires modified settings for servers in an application role. These settings include system service startup requirements, renaming the administrator account, and more stringent account lockout policies. The security team created a security template named Application.inf that contains the modified settings.   You need to plan the deployment of the new security design. You need to ensure that all security settings for the application servers are standardized, and that after the deployment, the security settings on all application servers meet the design requirements.   What should you do? ()

    • A、 Apply the Setup security.inf template first, the Hisecws.inf template next, and then the Application.inf template.
    • B、 Apply the Application.inf template and then the Hisecws.inf template.
    • C、 Apply the Application.inf template first, the Setup security.inf template next, and then the Hisecws.inf template.
    • D、 Apply the Setup security.inf template and then the Application.inf template.

    正确答案:A

  • 第14题:

    You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()

    • A、Require client computers to connect to the marketing application by using a VPN connection
    • B、Use IPSec to encrypt communications between the servers in the New York and Atlanta offices
    • C、Require the high security setting on Terminal Services connections to the marketing application
    • D、Configure all marketing application Web pages to require SSL

    正确答案:D

  • 第15题:

    You need to design a security strategy for the DHCP servers in the Seattle office. Which two actions should you perform?()

    • A、Disable all unnecessary services on each DHCP server
    • B、Modify the discretionary access control lists (DACLs) in Active Directory so that only members of the Enterprise Admins security group can authorize additional DHCP servers
    • C、Use an IPSec policy that allows only the packets necessary for DHCP and domain membership for each DHCP server
    • D、Install a digital certificate for SSL on each DHCP server

    正确答案:A,C

  • 第16题:

    You need to design a Security strategy for the wireless network at all resort locations.What should you do?()

    • A、Connect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Require company users to establish a VPN to access company resources
    • B、Install Internet Authentication Service (IAS) on a domain controller.Configure the wireless access points to require IEEE 802.1x authentication
    • C、Establish IPSec policies on all company servers to request encryption from all computers that connect from the wireless IP networks
    • D、Configure all wireless access points to require the Wired Equivalent Privacy (WEP) protocol for all connections. Use a Group Policy object (GPO) to distribute the WEP keys to all computers in the domain

    正确答案:A

  • 第17题:

    You need to design an administrative control strategy for Denver administrators. What should you do?()

    • A、Create a security group named HelpDesk. Add the HelpDesk group to the Enterprise Admins group in both domains
    • B、Create a security group named HelpDesk. Add the HelpDesk group to the Domain Admins groups in both domains
    • C、Add the Domain Admins group in the litwareinc.com domain to the Domain Admins group in the contoso.com domain. Delegate full control of the litwareinc.com domain to the Domain Admins group in the contoso.com domain
    • D、Create a security group named HelpDesk for each office. Delegate administrative tasks to their respective OU or domain.Delegate full control of the contoso.com domain to the Domain Admins group from the litwareinc.com domain

    正确答案:D

  • 第18题:

    You need to recommend a security strategy for WebApp2 that meets the company’s applicaton  requirements.What should you include in the recommendation?()

    • A、Basic authentication and connection security rules
    • B、Basic authentication and SSL
    • C、Digest authentication and connection security rules
    • D、Digest authentication and SSL

    正确答案:B

  • 第19题:

    单选题
    You need to design a security strategy for a remote e-mail access. What should you do?()
    A

    Require remote users to access e-mails by using Outlook Mobile Access

    B

    Require Outlook Web Access users to install the secure MIME ActiveX-Control and to encrypt all messages

    C

    On Outlook Web Access servers that accept connections from the Internet configure IIS to require SSL for all connections

    D

    On Outlook Web Access servers that accept connections from the Internet configure IIS to require Integrated Windows Authentication


    正确答案: A
    解析: 暂无解析

  • 第20题:

    单选题
    Your computer connects to both an ad hoc wireless network and a wired network. You need to allow other wireless clients to access the wired network.  What should you do? ()
    A

    Set the security type to the No authentication (Open) option.

    B

    Configure the wired and wireless network adapters as a network bridge.

    C

    Modify the wireless network profile type to the Use all-user profiles only (recommended) option.

    D

    On each wireless client, set the Service Set Identifier (SSID) for a new wireless network to the name of your wired network adapter.


    正确答案: C
    解析: 暂无解析

  • 第21题:

    单选题
    You have a wireless access point that is configured to use Advanced Encryption Standard (AES) security. Apre-shared key is not configured on the wireless access point. You need to connect a computer that runsWindows 7 to the wireless access point.  Which security setting should you select for the wirelessconnection?()
    A

    802.1x

    B

    WPA-Personal

    C

    WPA2-Enterprise

    D

    WPA2-Personal


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains 50 application servers that run Windows Server 2003.   The security configuration of the application servers is not uniform. The application servers were deployed by local administrators who configured the settings for each of the application servers differently based on their knowledge and skills. The application servers are configured with different authentication methods, audit settings, and account policy settings.   The security team recently completed a new network security design. The design includes a baseline configuration for security settings on all servers. The baseline security settings use the Hisecws.inf predefined security template. The design also requires modified settings for servers in an application role. These settings include system service startup requirements, renaming the administrator account, and more stringent account lockout policies. The security team created a security template named Application.inf that contains the modified settings.   You need to plan the deployment of the new security design. You need to ensure that all security settings for the application servers are standardized, and that after the deployment, the security settings on all application servers meet the design requirements.   What should you do? ()
    A

     Apply the Setup security.inf template first, the Hisecws.inf template next, and then the Application.inf template.

    B

     Apply the Application.inf template and then the Hisecws.inf template.

    C

     Apply the Application.inf template first, the Setup security.inf template next, and then the Hisecws.inf template.

    D

     Apply the Setup security.inf template and then the Application.inf template.


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    You need to design a monitoring strategy to meet business requirements for data on servers in the production department. What should you do?()
    A

    Use the Microsoft Baseline Security Analyzer (MBSA) to scan for Windows vulnerabilities on all servers in the production department

    B

    Run Security and Configuration Analysis to analyze the security settings of all servers in the production department

    C

    Enable auditing for data on each server in the production department. Run System Monitor on all servers in the production department to create a counter log that tracks activity for the Objects performance object

    D

    Create a Group Policy Object (GPO) that enables auditing for object access and link it to the product department’s Servers OU. Enable auditing for data on each server in the production department


    正确答案: D
    解析: 暂无解析

  • 第24题:

    单选题
    You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()
    A

    Configure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addresses

    B

    Configure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points use

    C

    Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networks

    D

    Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks


    正确答案: D
    解析: 暂无解析