多项选择题
Your company uses Active Directory-integrated DNS. Users require access to the Internet.You run a network capture.You notice the DNS server is sending DNS name resolution queries to a erver named f.root-servers.net.You need to prevent the DNS server from sending queries to f.root-servers.net. The server must be able to resolve names for Internet hosts.Which two actions should you perform?()
A. Enable forwarding to your ISPs DNS servers.
B. Disable the root hints on the DNS server.
C. Disable the netmask ordering option on the DNS server.
D. Configure Reverse Lookup Zones for the IP subnets on the network.
相关考题
-
单项选择题
Yourcompany’scorporatenetworkusesNetworkAccessProtection(NAP).Usersareabletoconnecttothecorporatenetworkremotely.Youneedtoensurethatdatatransmissionsbetweenremoteclientcomputersandthecorporatenetworkareassecureaspossible.Whatshouldyoudo?()
A.Apply an IPsec NAP policy.
B.Configure a NAP policy for 802.1X wireless connections.
C.Configure VPN connections to use MS-CHAP v2 authentication.
D.Restrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP -
单项选择题
YouhaveaserverthatrunsWindowsServer2008.YouneedtoconfiguretheserverasaVPNserver.Whatshouldyouinstallontheserver?()
A.Windows Deployment Services server role and Deployment Server role service.
B.Windows Deployment Services server role and Transport role Service.
C.Network Policy and Access Services server role and Routing and Remote Access Services role service.
D.Network Policy and Access Services server role and Host Credential Authorization Protocol role. -
单项选择题
Your network consists of a single Active Directory domain. The domain contains a server named Server1 that runs Windows Server 2008 R2. All client computers run Windows 7. All computers are members of the Active Directory domain.You assign the Secure Server (Require Security) IPsec policy to Server1 by using a Group Policy object(GPO).Users report that they fail to connect to Server1.You need to ensure that users can connect to Server1. All connections to Server1 must be encrypted.What should you do?()
A. Restart the IPsec Policy Agent service on Server1.
B. Assign the Client (Respond Only) IPsec policy to Server1.
C. Assign the Server (Request Security) IPsec policy to Server1.
D. Assign the Client (Respond Only) IPsec policy to all client computers.
