多项选择题
You need to design an authentication solution for wireless network access. Your solution must meet business and technical requirements. Which two actions should you perform?()
A.Deploy an offline enterprise root CA in the corp.woodgrovebank.com domain. Deploy subordinate enterprise root CAs in each child domain. Install Internet Authentication Service (IAS) on one member server in the la.corp.woodgrovebank.com domain and one member server in the den.corp.woodgrovebank.com domain
B.Deploy an enterprise root CA in each domain. Install Internet Authentication Service (IAS) on a member server in the corp.woodgrovebank.com domain. Install the Routing and Remote Access service on a member server in each child domain, and configure these servers as RADIUS clients
C.Enroll and deploy user certificates to all administrators in each domain. Enroll and deploy computer certificates to all portable computers that have wireless network adapters. Configure each portable computer to use Protected EAP (PEAP) for authentication
D.Enroll and deploy computer certificates to all portable computers that have wireless network adapters. Configure each portable computer to use EAP-MS-CHAP v2 for authentication. Configure each portable computer to connect to the Internet Authentication Service (IAS) server
相关考题
-
单项选择题
YouneedtodesignaPKIsolutionthatmeetsbusinessandsecurityrequirements.Whatshouldyoudo?()
A.Implement an enterprise root CA in the corp.woodgrovebank.com domain.Implement subordinate CAs in each child domain. Take the root CA offline
B.Implement an enterprise root CA in the corp.woodgrovebank.com domain
C.Implement an enterprise root CA in each of the child domains. Take the enterprise CA in each domain offline
D.Implement an enterprise root CA in the corp.woodgrovebank.com domain. Implement a stand-alone root CA in each of the child domains -
单项选择题
Youneedtodesignasecuritystrategythatwillensurethatunauthorizeduserscannotaccesspersonneldata.Yoursolutionmustcomplywithsecurityrequirementsandthecompany’snewadministrativemodel.Whatshouldyoudo?()
A.In the Default Domain Policy Group Policy object (GPO) for the corp.woodgrovebank.com domain, add the LA\HRUsers group to the Restricted Groups list. Add only the HR department user accounts to the Allowed Members list
B.In the Default Domain Policy Group Policy object (GPO) for the la.corp.woodgrovebank.com domain, add the LA\HRUsers group to the Restricted Groups list. Add only the HR department user accounts to the Allowed Members list
C.In the Default Domain Policy Group Policy object (GPO) for the corp.woodgrovebank.com domain, add the LA\HRUsers group and the CORP\Backup Operators group to the Restricted Groups list. Add only the HR department user accounts and the administrator user accounts to the Allowed Members list for each group
D.In the Default Domain Policy Group Policy object (GPO) for the la.corp.woodgrovebank.com domain, add the LA\HRUsers group and the CORP\Backup Operators group to the Restricted Groups list. Add only the HR department user accounts to the Allowed Members list for the LA\HRUsers group. Add only the administrator user accounts to the Allowed Members list for the CORP\Backup Operators group -
单项选择题
Youneedtodesignanaccesscontrolsolutionforcustomerinformation.Yoursolutionmustmeetsecurityrequirements.Whatshouldyoudo?()
A.Configure the Web site to require SSL connections. Configure the Web site to require client certificates. Enable and configure client certificate mapping on the Web site
B.Configure the Web site to require SSL connections. Disable anonymous access to the Web site.Assign the Allow – Read permission to the customer user accounts for the folder that contains the Web site files
C.Configure the Web site to use only Microsoft .NET Passport authentication. Specify the den.corp.woodgrovebank.com domain as the default domain for .NET Passport authentication.Configure a custom local IPSec policy on the Web servers to require IPSec communications
D.Configure the Web site to use only Windows Integrated authentication. Configure a custom local IPSec policy on the Web servers to require IPSec communications. Configure the IPSec policy to use certificate-based authentication and encryption
