CMS专题

单选题You need to design an authentication solution for Terminal Services that meets the business requirements.What should you do?()A Configure the terminal server to use smart cardsB Configure IPSec to permit only Remote Desktop Protocol (RDP) connections t

题目
单选题
You need to design an authentication solution for Terminal Services that meets the business requirements.What should you do?()
A

Configure the terminal server to use smart cards

B

Configure IPSec to permit only Remote Desktop Protocol (RDP) connections to the terminal server

C

Deny the Remote Desktop Users group access to the terminal server

D

Restrict treyresearch.com users from logging on locally to the terminal server

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You design a Business Intelligence (BI) solution by using SQL Server 2008.  The solution includes a SQL Server 2008 Reporting Services (SSRS) infrastructure in a scale-out deployment. All reports use a SQL Server 2008 relational database as the data source. You implement row-level security. You need to ensure that all reports display only the expected data based on the user who is viewing the report. What should you do?()

  • A、 Store the credential of a user in the data source.
  • B、 Configure the infrastructure to support Kerberos authentication.
  • C、 Configure the infrastructure to support anonymous authentication by using a custom authentication extension.
  • D、 Ensure that all report queries add a filter that uses the User.UserID value as a hidden parameter.

正确答案:B

第2题:

You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()

  • A、Require client computers to connect to the marketing application by using a VPN connection
  • B、Use IPSec to encrypt communications between the servers in the New York and Atlanta offices
  • C、Require the high security setting on Terminal Services connections to the marketing application
  • D、Configure all marketing application Web pages to require SSL

正确答案:D

第3题:

Which of the following is a benefit of having a Solution Assurance?()

  • A、The need to involve solution experts is removed
  • B、Financial justification of the proposal is enhanced
  • C、Time required to design a solution is decreased
  • D、Complex solutions are simplified considerably

正确答案:B

第4题:

You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()

  • A、Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access point
  • B、Configure IEEE 802.1x authentication with smart cards
  • C、Configure the wireless network to use Wired Equivalent Privacy (WEP)
  • D、Install and configure an Internet Authentication Service (IAS) server

正确答案:C

第5题:

You need to design a remote access strategy for the customer support users when they work from home. Your solution must meet security requirements. What should you do?()

  • A、Deploy an L2TP/IPsec VPN server in each call center. Configure the portable computers as L2TP VPN clients
  • B、Create IPSec tunnel mode connections between the customer support users home and the company’s Internet-facing routers
  • C、Create IP packet filters on the company’s Internet-facing routers to allow the Remote Desktop Protocol (RDP).Create IPSec filters on the terminal servers to allow only connections that use RDP
  • D、Create IP packet filters on the company’s Internet-facing routers to allow the IPSec protocols. Assign the Secure Server (Require Security) IPSec policy to the terminal servers. Assign the Client (Respond only) IPSec policy to the portable computers

正确答案:A

第6题:

You need to design a method to standardize and deploy a baseline security configuration for servers. You solution must meet business requirements. What should you do?()

  • A、Create a script that installs the Hisecdc.inf security template
  • B、Use a GPO to distribute and apply the Hisec.inf security template
  • C、Use the System Policy Editor to configure each server’s security settings
  • D、Use a GPO to distribute and apply a custom security template

正确答案:D

第7题:

You need to design a remote access solution for the mobile sales users in the litwareinc.com domain. Which two actions should you perform?()

  • A、Configure autoenrollment for user certificates and computer certificates
  • B、Configure Web enrollment for user certificates and computer certificates
  • C、Configure a Certificate Services hierarchy in the litwareinc.com domain
  • D、Configure qualified subordination between the litwareinc.com and the contoso.com domains
  • E、Configure PEAP authentication on the remote access servers

正确答案:A,C

第8题:

You need to design the retrieval of advertising statistics without compromising security. What should you do?()

  • A、Design a Notification Services solution that sends the advertising statistics to specified subscribers by e-mail.
  • B、Design a SQL Server Web service that runs a stored procedure to return the statistics on a call from the advertisers application.
  • C、Design a Database Mail solution that sends the advertising statistics to e-mail addresses that are specified in a table.
  • D、Design a stored procedure to return the statistics on a call from the advertisers application.
  • E、Design a user-defined function to return the statistics on a call from the advertisers application.

正确答案:B

第9题:

You need to recommend a solution for monitoring the servers. The solution must meet the  company’s technical requirements    What should you include in the recommendation?()

  • A、Data Collector Sets (DCSs)
  • B、event subscriptions
  • C、Reliability Monitor
  • D、Windows System Resource Manager (WSRM)

正确答案:A

第10题:

You are evaluating the implementation of two Hyper-V hosts for the Web servers. You need to design a solution that will move the Web servers automatically between the Hyper-V hosts based on the physical resources available. Which software should you include in the design?()

  • A、Microsoft System Center Operations Manager
  • B、Microsoft System Center Virtual Machine Manager
  • C、Microsoft System Center Data Protection Manager
  • D、Microsoft System Center Configuration Manager

正确答案:A,B

更多相关问题