username=* -> Employee-role Stop username=con-* -> Contractor-role
username=* -> Employee-role username=con-* -> Contractor-role Stop
username=con-* -> Contractor-role Stop username=* -> Employee-role
username=con-* -> Contractor-role username=* -> Employee-role Stop
第1题:
Your company has a mix of employees and contractors. Contractor usernames always begin with"con-"; employee usernames never begin with "con-". You need to give employees access to allresources and give contractors access to a limited set of resources. Employee and contractor roles have been created with the appropriate access privileges, and the realm is set to merge settings for all assigned roles. Which role mapping ruleset would result in the correct access privileges being assigned?()
第2题:
Your company has a main office and a branch office. The network contains an Active Directory forest. All users on the network access the Internet from their computers. The company hires a temporary employee who has his own portable computer. The employee connects his portable computer to the network. When the employee attempts to join the computer to the domain, the connection fails. A help desk technician reports the following about the employee. He has a domain user account.His computer can access Internet Web sites.His computer can contact domain controllers by using the domain controllers IP addresses. You need to ensure that the employees computer can join the domain. The solution must ensure that the computer can access resources on the Internet. What should you do?()
第3题:
You are a security administrator for your company. The network consists of three Active Directory domains. All Active Directory domains are running at a Windows Server 2003 mode functionality level. Employees in the editorial department of your company need access to resources on file servers that are in each of the Active Directory domains. Each Active Directory domain in the company contains at least one editorial department employee user account. You need to create a single group named Company Editors that contains all editorial department employee user accounts and that has access to the resources on file server computers. What should you do?()
第4题:
Your company uses Remote Desktop Services (RDS). You install and configure the Remote Desktop Gateway (RD Gateway) role service on a server that runs Windows Server 2008 R2. Employees connect to RDS from unmanaged remote computers. Employees are unable to access the RD Gateway server from the unmanaged remote computers.You need to ensure that employees can access the RD Gateway server. What should you do?()
第5题:
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Outlook Web App to have access to their e-mail.A new Company.com policy prohibits the employees from downloading ZIP files from Outlook Web App.The CIO wants the employees to use Microsoft Office Outlook to download ZIP files.What should you do?()
第6题:
You are the network administrator for Company. Many of the employees in the sales department travel on a regular basis and needs to dial into the company network from their Windows 2000 Professional portable computers. Your company recently implemented a new computing security policy that mandates all remote connections be established by a two-way authentication method. You configure a Windows 2000 Server computer to run Routing and Remote Access to meet the requirements of the new security policy. Employees who travel report they can no longer initiate a dial-up connection. You need to give employees who travel the ability to dial in to the company network. What should you do? ()
第7题:
Multicasting
Proxy server
NAT
Subnetting
第8题:
username=* -> Employee-role Stop username=con-* -> Contractor-role
username=* -> Employee-role username=con-* -> Contractor-role Stop
username=con-* -> Contractor-role Stop username=* -> Employee-role
username=con-* -> Contractor-role username=* -> Employee-role Stop
第9题:
The best option is to set up an Outlook Web App Mailbox policy.
The best option is to set up the Content Filter agent.
The best option is to set up a managed folder mailbox policy.
The best option is to set up the Attachment Filter agent.
第10题:
You should consider changing the OWA virtual directory’s authentication settings.
You should consider issuing the employees a certificate.
You should consider using a third-party ca for -ex11.
You should consider importing a root CA certificate for each employee.
第11题:
Create a global distribution group in the forest root domain and name it Company Editors.
Create a global security group in the forest root domain and name it Company Editors.
Create a universal distribution group in the forest root domain and name it Company Editors.
Create a universal security group in the forest root domain and name it Company Editors.
第12题:
Implement a Network Access Protection (NAP) strategy for the 172.16.0.0/23 subnet.
Create an extranet domain within the same forest. Migrate the temporary employees user accounts to the extranet domain. Install the necessary domain resources on the 172.16.0.0/23 subnet.
Move the temporary employees user accounts to a new organizational unit (OU). Create a new Group Policy object (GPO) that uses an intranet Microsoft Update server. Link the new GPO tothe new OU.
Create a new subnet in a perimeter network. Relocate the wireless access point to the perimeter network. Require authentication through a VPN server before allowing access to the internal resources.
第13题:
Your network consists of a single Active Directory domain. The network is located on the 172.16.0.0/23 subnet. The company hires temporary employees. You provide user accounts and computers to the temporaryem ployees. The temporary employees receive computers that are outside the Active Directory domain. The temporary employees use their computers to connect to the network by using wired connections andwireless connections. The company’s security policy specifies that the computers connected to the network must have the latest updates for the operating system. You need to plan the network’s security so that it complies with the company 's security policy. What should you include in your plan?()
第14题:
Your company hires 10 new employees. You want the new employees to connect to the main office through a VPN connection. You create new user accounts and grant the new employees the Allow Read and Allow Execute permissions to shared resources in the main office. The new employees are unable to access shared resources in the main office. You need to ensure that users are able to establish a VPN connection to the main office. What should you do()
第15题:
The human resources department has informed you that two new temporary part-time employees will join your company next week. You are required to set up a workstation that will be used bythese employees. They do not need access to the network but they will need to access an HP LaserJet printer attached to the local computer. You install Windows 2000 Professional and format the hard disk using NTFS. What type of user account should you create for them?()
第16题:
You are a security administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows 2000 Professional. You manage a Windows Server 2003 computer named Server1 that is a domain member server. You use IIS on Server1 to host an Internet Web site. Approximately 4,000 employees of your company connect over the lnternet to access company confidential data on Server1. You control access to data on Server1 by using NTFS file permissions assigned to groups. Different groups are assigned access to different files. Employees must have access only to files that they are assigned access to based on their membership in a group. You enable SSL on Server1 to protect confidential data while it is in transit. You issue each employee an Authenticated Session certificate and store a copy of that certificate with their user account in the Active Directory domain. You need to ensure that Server1 authenticates users based on possession of their certificate. What should you do?()
第17题:
Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Microsoft Office Outlook 2007 to connect to their mailboxes.RPC over HTTP and Auto discover are configured on Microsoft Office Outlook 2007. Company.com has acquired a new Exchange Server 2010 server and moved the mailboxes to it.However, the employees find a problem to access their mailboxes. What should you do?()
第18题:
Grant the new employees the Allow Full control permission.
Grant the new employees the Allow Access Dial-in permission.
Add the new employees to the Remote Desktop Users security group.
Add the new employees to the Windows Authorization Access security group.
第19题:
Modify the time zone for the computer.
Modify the IPv4 settings on the computer.
Create an A record for the computer in an internal DNS zone.
Request that an administrator create a prestaged computer account in the domain.
第20题:
No account. They can use the built-in guest account.
No Account. They can use the built-in Administrator account.
Local user account
Domain user account
第21题:
You begin to worry that you’ll never be a useful member of the society again.
You begin to worry that you’ll never be able to find a job again.
You begin to worry that you’ll never be able to face the reality.
You begin to worry that you’ll never be able to see your relatives again.
第22题:
Create a Remote Desktop resource authorization policy (RD RAP).
Create a Remote Desktop connection authorization policy (RD CAP).
On the RD Gateway server, open port 3389 on the Windows Firewall.
On the RD Gateway server, configure Network Access Protection (NAP) health policy checking.
第23题:
Request a Web server certificate from a commercial certification authority (CA).
Configure access restrictions based on employee ip address.
Enable Digest authentication for Windows domain servers.
Configure client certificate mapping.
第24题:
Configure the dial-up connection on all of the portable computers to use L2TP.
Configure the dial-up connection on all of the portable computers to use MS-CHAP v2.
Apply the Compatws.inf Security Template to all of the portable computers.
Apply the Hisecws.inf Security Template to all of the portable computers.