Connect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Require company users to establish a VPN to access company resources
Install Internet Authentication Service (IAS) on a domain controller.Configure the wireless access points to require IEEE 802.1x authentication
Establish IPSec policies on all company servers to request encryption from all computers that connect from the wireless IP networks
Configure all wireless access points to require the Wired Equivalent Privacy (WEP) protocol for all connections. Use a Group Policy object (GPO) to distribute the WEP keys to all computers in the domain
第1题:
Your company’s network includes client computers that run Windows 7. You design a wireless network to use Extensible Authentication Protocol-Transport Level Security (EAP-TLS). The Network Policy Server has a certificate installed. Client computers are unable to connect to the wireless access points. You need to enable client computers to connect to the wireless network. What should you do?()
第2题:
You need to design an audit strategy for Southbridge Video. Your solution must meet business requirements.What should you do?()
第3题:
You need to recommend a Group Policy strategy for the Remote Desktop servers. What should you include in the recommendation?()
第4题:
You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()
第5题:
Your computer uses both wired and wireless network connections. The networks are not connected to each other. You disallow incoming connections in Microsoft Windows Firewall. You create a shared folder. Users on the wireless network cannot access the shared folder. You need to allow access to the shared folder from the wireless network. You also need to maintain the security of the wired network. What should you do?()
第6题:
You need to design an access control and permission strategy for user objects in Active Directory.What should you do?()
第7题:
You need to design a strategy to ensure that all servers are in compliance with the business requirements for maintaining security patches. What should you do?()
第8题:
Enable automatic certificate enrollment
Enforce smart card logons
Enable Encrypting File System (EFS) for offline files
Enable a screen saver password
第9题:
Configure all client computers to use Automatic Updates to obtain security patches from the Windows Update Web site. Test and install all patches
Configure a batch file to download security patches daily. Distribute the security patches by using a.zap file and the Default Domain Policy Group Policy object (GPO)
Deploy a Software Update Services (SUS) server. Test all security patches and then approve them. Configure all client computers to automatically obtain updates from the server
Configure a batch file to download security patches daily. Manually install the security patches on all computers
第10题:
Place each database in a separate instance running on SQL2.
Place each database in a separate instance running on SQL3.
Place both databases in a single instance running on SQL2.
Place both databases in a single instance running on SQL3.
第11题:
Move the EditorialAdmins group to the Servers OU in the editorial department
Move the members of the EditorialAdmins group to the Editorial OU
Move the members of the EditorialAdmins group to the New York OU
Move the EditorialAdmins group to the New York OU
第12题:
Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the IIS server computer account
Run the Microsoft Baseline Security Analyzer (MBSA) on the IIS server and scan for vulnerabilities in Windows and IIS checks
Run Security Configuration and Analysis to analyze the IIS server’s security settings by using a custom security template
On the IIS server, run the gpresult command from a command prompt and analyze the output
第13题:
You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains 50 application servers that run Windows Server 2003. The security configuration of the application servers is not uniform. The application servers were deployed by local administrators who configured the settings for each of the application servers differently based on their knowledge and skills. The application servers are configured with different authentication methods, audit settings, and account policy settings. The security team recently completed a new network security design. The design includes a baseline configuration for security settings on all servers. The baseline security settings use the Hisecws.inf predefined security template. The design also requires modified settings for servers in an application role. These settings include system service startup requirements, renaming the administrator account, and more stringent account lockout policies. The security team created a security template named Application.inf that contains the modified settings. You need to plan the deployment of the new security design. You need to ensure that all security settings for the application servers are standardized, and that after the deployment, the security settings on all application servers meet the design requirements. What should you do? ()
第14题:
You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()
第15题:
You need to design a security strategy for the DHCP servers in the Seattle office. Which two actions should you perform?()
第16题:
You need to design a Security strategy for the wireless network at all resort locations.What should you do?()
第17题:
You need to design an administrative control strategy for Denver administrators. What should you do?()
第18题:
You need to recommend a security strategy for WebApp2 that meets the company’s applicaton requirements.What should you include in the recommendation?()
第19题:
Require remote users to access e-mails by using Outlook Mobile Access
Require Outlook Web Access users to install the secure MIME ActiveX-Control and to encrypt all messages
On Outlook Web Access servers that accept connections from the Internet configure IIS to require SSL for all connections
On Outlook Web Access servers that accept connections from the Internet configure IIS to require Integrated Windows Authentication
第20题:
Set the security type to the No authentication (Open) option.
Configure the wired and wireless network adapters as a network bridge.
Modify the wireless network profile type to the Use all-user profiles only (recommended) option.
On each wireless client, set the Service Set Identifier (SSID) for a new wireless network to the name of your wired network adapter.
第21题:
802.1x
WPA-Personal
WPA2-Enterprise
WPA2-Personal
第22题:
Apply the Setup security.inf template first, the Hisecws.inf template next, and then the Application.inf template.
Apply the Application.inf template and then the Hisecws.inf template.
Apply the Application.inf template first, the Setup security.inf template next, and then the Hisecws.inf template.
Apply the Setup security.inf template and then the Application.inf template.
第23题:
Use the Microsoft Baseline Security Analyzer (MBSA) to scan for Windows vulnerabilities on all servers in the production department
Run Security and Configuration Analysis to analyze the security settings of all servers in the production department
Enable auditing for data on each server in the production department. Run System Monitor on all servers in the production department to create a counter log that tracks activity for the Objects performance object
Create a Group Policy Object (GPO) that enables auditing for object access and link it to the product department’s Servers OU. Enable auditing for data on each server in the production department
第24题:
Configure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addresses
Configure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points use
Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networks
Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks