MCSE

单选题You are designing the wireless networks for the three warehouses. Your design must support the inventory and shipping management solution, and it must meet security requirements. What should you do?()A Ensure that all wireless networking equipment full

题目
单选题
You are designing the wireless networks for the three warehouses. Your design must support the inventory and shipping management solution, and it must meet security requirements. What should you do?()
A

Ensure that all wireless networking equipment fully supports the IEE 802.11a, IEEE 802.11b, and IEEE 802.11g wireless networking protocols

B

Assign a random service set identifier (SSID) to each wireless access point. Disable broadcasting of SSIDs on all wireless access points

C

Create a firewall to block traffic to any IP address that did not originate from the company’s DHCP servers. Ensure that all wireless access points connect behind this new firewall

D

Configure a server to use Internet Authentication Service (IAS). Configure the wireless networking equipment to use the IEEE 802.1x protocol and the IAS server

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You need to design a method to standardize and deploy a baseline security configuration for servers. You solution must meet business requirements. What should you do?()

  • A、Create a script that installs the Hisecdc.inf security template
  • B、Use a GPO to distribute and apply the Hisec.inf security template
  • C、Use the System Policy Editor to configure each server’s security settings
  • D、Use a GPO to distribute and apply a custom security template

正确答案:D

第2题:

You need to design a method for junior IT administrators to perform more IT support tasks. Your solution must meet business and security requirements. What should you do?()

  • A、Delegate appropriate Active Directory permissions to the junior IT administrators
  • B、Add the junior IT administrators’ user accounts to the Domain Admins user group
  • C、Create a custom Microsoft Management Console (MMC) that uses taskpad views to enable the appropriate tasks for the junior IT administrators
  • D、Make the junior IT administrators’ domain user accounts member of the local Administrators group on all client computers
  • E、Create new domain user accounts for each junior IT administrator. Make the new accounts members of the Domain Admins group and instruct junior IT administrators to use the new accounts only for appropriate administrative tasks

正确答案:A

第3题:

Your computer has a wireless network adapter installed. However, the computer fails to connect to the wireless network. You need to ensure that the computer is able to connect to the wireless network.What should you do?()

A.A

B.B

C.C

D.D


参考答案:D

第4题:

You need to design a security patch management strategy. Your solution must meet business and security requirements, and it must accommodate the company’s resource restrictions. What should you do?()

  • A、Test and manually deploy updates
  • B、Deploy a Software Update Services (SUS) server. Test all updates and then approve them. Configure all client computers to automatically obtain updates from the server
  • C、Test all updates and then use a third-party utility to repackage updates in a Windows Installer file. Deploy the -.msi files by using Group Policy
  • D、Configure all client computers to use Automatic Updates to obtain security updates from the Windows Update Web site. Test all updates posted to the Windows Update Web site

正确答案:B

第5题:

You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()

  • A、Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access point
  • B、Configure IEEE 802.1x authentication with smart cards
  • C、Configure the wireless network to use Wired Equivalent Privacy (WEP)
  • D、Install and configure an Internet Authentication Service (IAS) server

正确答案:C

第6题:

Your company has Active Directory Certificate Services (AD CS) and Network Access Protection (NAP)  deployed on the network. You need to ensure that NAP policies are enforced on portable computers taht  use a wireless connection to access the network. What should you do?()

  • A、 Configure all access points to use 802.1X authentication
  • B、 Configure all protable computers to use MS-CHAP v2 authentication
  • C、 Use the Group Policy Management Console to access the wireless group policy settings, and enable the Prevent connections to ad-hoc networks option.
  • D、 Use the Group Policy Management Console to access the wireless group policy settings, and disable the Prevent connections to infrastructure networks option.

正确答案:A

第7题:

You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()

  • A、Configure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addresses
  • B、Configure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points use
  • C、Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networks
  • D、Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks

正确答案:D

第8题:

You are designing the wireless networks for the three warehouses. Your design must support the inventory and shipping management solution, and it must meet security requirements. What should you do?()

  • A、Ensure that all wireless networking equipment fully supports the IEE 802.11a, IEEE 802.11b, and IEEE 802.11g wireless networking protocols
  • B、Assign a random service set identifier (SSID) to each wireless access point. Disable broadcasting of SSIDs on all wireless access points
  • C、Create a firewall to block traffic to any IP address that did not originate from the company’s DHCP servers. Ensure that all wireless access points connect behind this new firewall
  • D、Configure a server to use Internet Authentication Service (IAS). Configure the wireless networking equipment to use the IEEE 802.1x protocol and the IAS server

正确答案:D

第9题:

You are designing an authentication strategy for the accounting department. Your solution must meet business requirements. What should you do?()

  • A、Install wireless network cards on all accounting department computers. Select PEAP authentication
  • B、Install user certificates on all accounting department computers. Configure these computers to respond to requests for IPSec encryption
  • C、Issue smart cards and smart card readers to all accounting department users and computers. Require NTLMv2 authentication
  • D、Issue smart cards and smart card readers to all accounting department users and computers. Configure the domain to require smart cards for the accounting department users during logon

正确答案:D

第10题:

You need to design a method to ensure that research intellectual property remains confidential. You solution must meet security requirements. What should you do?()

  • A、Require client computers to connect to research intellectual property through a SSL VPN
  • B、Place SFSQL1 and ATLSQL1 on a separate virtual LAN from the internal network. Grant access to these virtual LAN segments to only the client computers that are used by authorized users
  • C、Require that communications between SFSQL1, SFFP1, ATLSQL1, and ATLFP1 use IPSec
  • D、Create a separate subnet for all servers that contain research intellectual property

正确答案:C

更多相关问题