单项选择题
Your company infrastructure includes a Windows Server 2008 R2 file server and 1,000 Windows 7 Enterprise client computers.
The company wants to require a secure connection between client computers and the file server. You need to create and deploy a Group Policy object (GPO) that includes a rule for Windows Firewall with Advanced Security.
What should you do?()
A.Create a Tunnel rule and specify Gateway-to-client as the tunnel type.
B.Create a Server-to-server rule and specify the endpoints as Any IP address and the file server IP address.
C.Create an Isolation rule and specify Request authentication for inbound and outbound connections.
D.Create an Authentication exemption rule and add the file server IP address to the Exempt Computers list.
相关考题
-
单项选择题
Your company’s network includes client computers that run Windows 7. You design a wireless network to use Extensible Authentication Protocol-Transport Level Security (EAP-TLS). The Network Policy Server has a certificate installed. Client computers are unable to connect to the wireless access points. You need to enable client computers to connect to the wireless network. What should you do?()
A.Configure client computers to use Protected Extensible Authentication Protocol-Microsoft Challenge Handshake Authentication Protocol version 2 (PEAP-MS-CHAP v2).
B.Configure client computers to use Protected Extensible Authentication Protocol-Transport Layer Security (PEAP-TLS).
C.Install a certificate in the Trusted Root Certification Authorities certificate store.
D.Install a certificate in the Third-Party Root Certification Authorities certificate store. -
单项选择题
Your company has a single Active Directory Domain Services (AD DS) forest with a single domain named PassGuide.com. All client computers run Windows 7. All client computer accounts are located in the Computers container in the PassGuide.com domain. You discover that multiple client computers were automatically shut down because the security log was full. You need to ensure that client computers are not shut down when the security log becomes full. What should you do?()
A.Configure an Event Viewer subscription.
B.Increase the maximum log size.
C.Modify the event log policy settings in the Default Domain Policy Group Policy object (GPO).
D.Modify the event log policy settings in the Default Domain Controllers Policy Group Policy object(GPO). -
单项选择题
Your company’s network includes a main office and several branch offices. The branch offices are connected to the main office by high-latency links. All client computers run Windows 7 Enterprise, and all servers run Windows Server 2008 R2. No servers are located in the branch offices. Client computers in the branch offices frequently access a specific group of files on a file server named Server1. These access requests consume significant amounts of bandwidth and reduce the speed of higher-priority traffic. You need to reduce the bandwidth that is consumed by requests for frequently accessed files. What should you do?()
A.Configure BranchCache in Hosted Cache mode on client computers in the main office and the branch offices.
B.Configure BranchCache in Distributed Cache mode on client computers in the main office and the branch offices.
C.Enable the BranchCache For Network Files role service on Server1. Configure BranchCache in Hosted Cache modon client computers in only the branch offices.
D.Enable the BranchCache For Network Files role service on Server1. Configure BranchCache in Distributed Cache mode on client computers in only the branch offices.
