单项选择题
Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.
what should you do()?
A.Configure all access points as RADIUS clients to the Remediation Servers
B.Configure all access points as RADIUS clients to the Network Policy Server (NPS)
C.Create a Network Policy that defines Remote Access Server as a network connection method
D.Create a Network Policy that specifies EAP-TLS as the only availible authentication method.
相关考题
-
单项选择题
You have a server that runs Windows Server 2008. You need to configure the server as a VPN server. What should you installed on the server()?
A.Windows Deployment Serivces role and Deployment Server role service
B.Windows Deployment Services role and Deployment Transport Role Service
C.Network Policy and Access Services role and Routing and Remote Access Services role service.
D.Network Policy and Access Services role and Routing and Host Credential Authorization Protocolr ole service. -
单项选择题
Your company has users who connect remotely to the main office though a Windows Server 2008 VPN server. You need to ensure that users cannot access the VPN server remotely from 22:00 to 05:00. What should you do()?
A.Create a network policy for VPN connections. modify the Day and time restrictions.
B.Create a network policy for VPN connections. apply an ip filter to deny access to the corporate network.
C.Modify the Logon hours for all users objects to specify only the VPN server otn he computer restrictions option
D.Modify the Logon hours for the default domain policy to enable the Force logoff when logon hours expire option. -
单项选择题
You deploy Windows Server 2008 VPN server behind a firewall. Remote users connect to the VPN by using portable computers that run Windows Vista with the latest service pack. The firewall is configured to allow only secured web communications. You need to enable remote users to connect as securely as possible. you must achieve this goal without opening any additional ports on the firewall. What should you do ()?
A.Create an IPsec tunnel
B.Create an SSTP VPN connection
C.Create a PPTP VPN connection
D.Create an L2TP VPN connection
