单项选择题
You are the network administrator for Humongous Insurance. The network consists of a single Active Directory domain named humongous.com. The domain contains Windows Server 2003 computers and Windows XP Professional computers.You configure several Group Policy objects (GPOs) to enforce the use of IPSec for certain types of communication between specified computers.
A server named Server2 runs the Telnet service. A GPO is supposed to ensure that all Telnet connections to Server2 are encrypted by using IPSec. However, when you monitor network traffic, you notice that Telnet connections are not being encrypted.You need to view all of the IPSec settings that are applied to Server2 by GPOs.
Which tool should you use?()
A.the IP Security Policy Management console
B.the IP Security Monitor console
C.the Resultant Set of Policy console
D.Microsoft Baseline Security Analyzer (MBSA)
相关考题
-
单项选择题
You are a network administrator for your company. The network consists of a single Active Directory domain. The domain contains three Windows Server 2003 domain controllers, 20 Windows Server 2003 member servers, and 750 Windows XP Professional computers. The domain is configured to use only Kerberos authentication for all server connections.A user reports that she receives an "Access denied" error message when she attempts to connect to one of the member servers. You want to test the functionality of Kerberos authentication on the user’s client computer. Which command should you run from the command prompt on the user’s computer?()
A.netsh
B.netdiag
C.ktpass
D.ksetup -
单项选择题
You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains 35 Windows Server 2003 computers; 3,000 Windows XP Professional computers; and 2,200 Windows 2000 Professional computers. The written company security policy states that all computers in the domain must be examined, with the following goals: (1)to find out whether all available security updates are present (2)to find out whether shared folders are present to record the file system type on each hard disk You need to provide this security assessment of every computer and verify that the requirementsof the written security policy are met. What should you do?()
A.Open the Default Domain Policy and enable the Configure Automatic Updates policy.
B.Open the Default Domain Policy and enable the Audit object access policy, the Audit account management policy, and the Audit system events policy.
C.On a server, install and run mbsacli.exe with the appropriate configuration switches.
D.On a server, install and run HFNetChk.exe with the appropriate configuration switches. -
单项选择题
You are the network administrator for Fabrikam, Inc. The network consists of a single Active Directory domain named fabrikam.com. A Windows Server 2003 computer named Server1 is the only DNS server in the domain. It hosts no other zones. Users report that connecting to computers within the fabrikam.com domain is slow. You need to find out whether DNS client traffic on Server1 is causing this problem. What should you do?()
A.Use System Monitor to create a log of the DNS counters Dynamic updates/sec and Total queries/sec.
B.Use System Monitor to create a log of the NetworkInterface counter Total bytes/sec.
C.Enable debug logging on Server1. Configure the log to capture Notification events.
D.Enable debug logging on Server1. Configure the log to capture Update events.
