单项选择题
You need to recommend a NAP enforcement method that meets the company¯s security requirements.
Which method should you recommend?()
A.802.1X
B.DHCP
C.IPSec
D.VPN
相关考题
-
单项选择题
You need to identify each help desk user who bypasses the new corporate security policy. What should you do?()
A.Configure Audit Special Logon and define Special Groups.
B.Configure Audit Other Privilege Use Events and define Special Groups.
C.Configure Audit Sensitive Privilege Use and configure auditing for the HelpDesk group.
D.Configure Audit Object Access and modify the auditing settings for the HelpDesk group. -
单项选择题
You need to protect the confidential data files on File2 against unauthorized offline access. What should you use?()
A.Encrypting File System (EFS) on File2
B.file screens on Node1 and Node2
C.NTFS permissions on File2
D.Windows BitLocker Drive Encryption (BitLocker) on Node1 and Node2 -
单项选择题
YouneedtorecommendaVPNsolutionforthenewsalesoffice.Thesolutionmustsupportthecompany'splannedchangs. Whatshouldyouincludeintherecommendation?()
A.Internet Key Exchange version 2 (IKEv2)
B.Layer 2 Tunneling Protocol (L2TP)
C.Point-to-Point Tunneling Protocol (PPTP)
D.Secure Socket Tunneling Protocol (SSTP)
