You need to configure ISA3 in Seattle to enable communication with the network in New York.What should you do?()
A、Open the ports for DNS, HTTP, HTTPS, Kerberos, RADIUS, LDAP, RPC endpoint mapper and client, and Server Message Block (SMB) over IP
B、Enable the Routing and Remote Access Basic Firewall. Open the ports for DNS, Kerberos, LDAP, Exchange RPCs, RADIUS, L2TP, and Internet Key Exchange (IKE)
C、Create a PPTP tunnel from ISA3 to the New York network
D、Create an L2TP/IPSec tunnel from ISA3 to the New York network
您需要设计一个存取控制战略为外部和内部网网站。二次行动您应该执行哪些?()
A、使能SSL在外在网站由使用微软密码服务提供者(CSP)
B、使能微软NET护照认证在外在网站。使用护照水平0与SSL在外在网站
C、使能SSL在外在网站由使用一份商业数字式证明
D、使能SSL在内部网网站由使用一份内部服务器证明
E、使能SSL在外在网站由使用一份内部服务器证明
You need to design a security strategy for the Web folders and files created by the consultants and the internal Web developers. What are two possible ways to achieve this goal?()
ARequire the internal Web developers to use Telnet with Kerberos authentication. Require the consultants to use L2TP with IPSec
BRequire the internal Web developers to use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV). Require the consultants to use Microsoft.NET Passport authentication with Security Level 0
CRequire the internal Web developers to use Web Distributed Authoring and Versioning (WebDAV) over SSL.Require the consultants to use WebDAV over SSL
DRequire the internal Web developers to use L2TP with IPSec. Require the consultants to use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV)
ERequire the internal Web developers to use Web Distributed Authoring and Versioning (WebDAV) over SSL.Require the consultants to use L2TP with IPSec
You need to design a strategy to log access to the company Web site. What should you do?()
A、Enable logging on the company Web site and select the NCSA Common Log File Format. Store the log files on a SQL Server computer
B、Use System Monitor to create a counter log that captures network traffic to the Web server by using the Web Service object. Store the log files on a SQL Server computer
C、Run the Network Monitor on the Web server. Create a capture filter for the SNA protocol and save the results to a capture file. Store the capture file on a SQL Server computer
D、Enable logging on the company Web site and select ODBC Logging. Configure the ODBC logging options by using a nonadministrative SQL account
You need to design a method to enable remote encryption on Server5. What should you do?()
A、Configure the editor’s user account properties to enable Store password using reversible encryption
B、Configure the editor’s user account properties to enable Use DES encryption for this account
C、Configure the Local Security Policy on Server to enable the System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing security policy
D、Configure the Server5 computer account properties to enable Trust computer for delegation
你要为终端服务器设计一个认证解决方案以满足商业的要求,你要怎么做?()
A、配置终端服务器使用智能卡
B、配置IPSec只允许使用远程桌面控制连接到终端服务器
C、拒绝远程桌面用户组访问终端服务器
D、限制treyresearch.com的用户从本地登录到终端服务器