itgle.com

Your network contains an internal network and a perimeter network that are separated by a firewall. The perimeter network contains an Exchange Server 2010 Edge Transport server.  You plan to deploy an internal Exchange Server 2010 organization that meets

题目

Your network contains an internal network and a perimeter network that are separated by a firewall. The perimeter network contains an Exchange Server 2010 Edge Transport server.  You plan to deploy an internal Exchange Server 2010 organization that meets the following requirements:.Support EdgeSync synchronization .Support encrypted delivery of outbound e-mail messages to the Edge Transport server .Minimize the attack surface of the internal network  Which TCP ports should you allow from the internal network to the perimeter network?()

  • A、3389 and 25
  • B、3389 and 636
  • C、50636 and 25
  • D、50636 and 135

相似考题
更多“Your network contains”相关问题
  • 第1题:

    Your network contains a single Active Directory domain named contoso.com.The domain contains a DNS server named Server1 that hosts the contoso.com zone.The network is connected to the network of a partner company. The partner companys network contains a DNS server that hosts a zone named nwtraders.com.You need to ensure that computers in contoso.com can resolve the names of computers in nwtraders.com.The solution must not require any changes to the zone configuration of nwtraders.com.What should you configure on Server1?()

    • A、a conditional forwarder
    • B、a GlobalNames zone
    • C、a secondary zone
    • D、a zone delegation

    正确答案:A

  • 第2题:

    Your network contains an Active Directory forest. The forest schema contains a custom attribute for  user objects.   You need to modify the custom attribute value of 500 user accounts.   Which tool should you use()

    • A、Csvde
    • B、Dsmod
    • C、Dsrm
    • D、Ldifde

    正确答案:D

  • 第3题:

    Your network contains a Network Policy Server (NPS) named Server1.NPS1 provides authentication for all of the VPN servers on the network.You need to track the usage information of all VPN connections.Which RADIUS attribute should you log?()

    • A、Acct-Session-Id
    • B、Acct-Status-Type
    • C、Class
    • D、NAS-Identifier

    正确答案:C

  • 第4题:

    Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest. The forest contains a single domain.  You plan to deploy 10 Edge Transport servers on the perimeter network.  You need to recommend a solution for the Edge Transport server deployment. The solution must meet the following requirements: .Allow administrators to apply a single security policy to all Edge Transport servers .Reduce the administrative overhead that is required to manage servers .Minimize the attack surface of the internal network  What should you recommend?()

    • A、Implement Network Policy and Access Services (NPAS).
    • B、Implement Active Directory Federation Services (AD FS).
    • C、Create a new Active Directory domain in the internal forest, and then join all EdgeTransport servers to the new domain.
    • D、Create an Active Directory forest in the perimeter network, and then join all Edge Transport servers to the new domain.

    正确答案:D

  • 第5题:

    单选题
    Your network consists of a single Active Directory domain. The network contains 20 file servers that run Windows Server 2008 R2. Each file server contains two volumes. One volume contains the operating system. The other volume contains all data files.    You need to plan a recovery strategy that meets the following requirements: èAllows the operating system to be restored èAllows the data files to be restored èEnsures business continuity   èMinimizes the amount of time to restore the server What should you include in your plan?()
    A

    Windows Deployment Services (WDS)

    B

    Windows Automated Installation Kit (Windows AIK) and folder redirection

    C

    the Multipath I/O feature and Volume Shadow Copies

    D

    the Windows Server Backup feature and System Image Recovery


    正确答案: A
    解析: 暂无解析

  • 第6题:

    单选题
    Your network contains an internal network and a perimeter network that are separated by a firewall. The perimeter network contains an Exchange Server 2010 Edge Transport server.  You plan to deploy an internal Exchange Server 2010 organization that meets the following requirements:.Support EdgeSync synchronization .Support encrypted delivery of outbound e-mail messages to the Edge Transport server .Minimize the attack surface of the internal network  Which TCP ports should you allow from the internal network to the perimeter network?()
    A

    3389 and 25

    B

    3389 and 636

    C

    50636 and 25

    D

    50636 and 135


    正确答案: D
    解析: 暂无解析

  • 第7题:

    单选题
    You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()
    A

    Use Windows Explorer to receive the offline files

    B

    Using the Windows Explorer, disable the cache for the reports on the network share

    C

    Use the Windows NT explorer to grant the special access for the reports on the network  share

    D

    Use the synchronization manager to configure synchronization not to occur when users are  connected to the LAN connection. 


    正确答案: A
    解析: 暂无解析

  • 第8题:

    单选题
    Your network contains a single Active Directory domain named contoso.com.The domain contains a DNS server named Server1 that hosts the contoso.com zone.The network is connected to the network of a partner company. The partner companys network contains a DNS server that hosts a zone named nwtraders.com.You need to ensure that computers in contoso.com can resolve the names of computers in nwtraders.com.The solution must not require any changes to the zone configuration of nwtraders.com.What should you configure on Server1?()
    A

    a conditional forwarder

    B

    a GlobalNames zone

    C

    a secondary zone

    D

    a zone delegation


    正确答案: C
    解析: 暂无解析

  • 第9题:

    Your network contains an Active Directory domain that has two sites.    You need to identify whether logon scripts are replicated to all domain controllers.   Which folder should you verify()

    • A、GroupPolicy
    • B、NTDS
    • C、SoftwareDistribution
    • D、SYSVOL

    正确答案:D

  • 第10题:

    You are the network administrator for ExamSheet.net.  You install Windows 2000 Professional on your portable computer. You use a docking station for your portable computer when you are in the office. You install a ISA-based network adapter in your docking station. You insert your computer into the docking station and start the computer. The network adapter is not detected during the startup process. You obtain a disk that contains the supported driver from the network adapter manufacturer. You want to allow Windows 2000 Professional to use the network adapter. What should you do?()

    • A、Restart the computer in the docking station.
    • B、Run the Add/Remove Hardware wizard.
    • C、Use Device Manager to scan for hardware changes.
    • D、Copy the network adapter driver to the Winnt/Driver Cache/i386 folder.
    • E、Install the new network adapter driver.

    正确答案:B,E

  • 第11题:

    You work as the Exchange administrator at Company.com.The Company.com network contains an Exchange Server 2010 Organization.You are responsible for managing the Exchange network for Company.com.The network contains numerous Mailbox servers.During the course of the week you receive an instruction from the CIO to determine the message latency between the Mailbox servers in the organization.What should you do?()

    • A、Your best option would be to increase the MSExchangeMailSubmission diagnostic logging level to Expert.
    • B、Your best option would be to run the Test-Mailflow cmdlet.
    • C、Your best option would be to increase the MSExchangeTransport diagnostic logging level to Expert.
    • D、Your best option would be to run the Test-OutlookConnectivity cmdlet.

    正确答案:B

  • 第12题:

    Your network contains two Hyper-V hosts that run Windows Server 2012 R2. The Hyper-V hosts contains several virtual machines that run Windows Server 2012 R2. You install the Network Load Balancing feature on the virtual machines. You need to configure the virtual machines to support Network Load Balancing (NLB). Which virtual machine settings should you configure?()

    • A、Port mirroring
    • B、DHCP guard
    • C、Router guard
    • D、MAC address

    正确答案:D

  • 第13题:

    单选题
    Your network contains an Active Directory forest. The forest contains a single domain. You want  to access resources in a domain that is located in another forest.     You need to configure a trust between the domain in your forest and the domain in the other  forest.     What should you create()
    A

    an incoming external trust

    B

    an incoming realm trust

    C

    an outgoing external trust

    D

    an outgoing realm trust


    正确答案: D
    解析: 暂无解析

  • 第14题:

    单选题
    Your network contains a Network Policy Server (NPS) named Server1.NPS1 provides authentication for all of the VPN servers on the network.You need to track the usage information of all VPN connections.Which RADIUS attribute should you log?()
    A

    Acct-Session-Id

    B

    Acct-Status-Type

    C

    Class

    D

    NAS-Identifier


    正确答案: C
    解析: 暂无解析

  • 第15题:

    单选题
    Your network contains a server that has the SNMP Service installed.You need to configure the SNMP security settings on the server.Which tool should you use?()
    A

    Local Security Policy

    B

    Scw

    C

    Secedit

    D

    Services console


    正确答案: C
    解析: 暂无解析

  • 第16题:

    单选题
    Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. You create a new inbound rule by using Windows Firewall with Advanced Security. You need to configure the rule to allow Server1 to accept unsolicited inbound packets that are received through a network address translation (NAT) device on the network. Which setting in the rule should you configure?()
    A

    Edge traversal

    B

    Authorized computers

    C

    Interface types

    D

    Remote IP address


    正确答案: A
    解析: 暂无解析