You need to configure support for encrypted communication
You are configuring a Terminal Services Gateway server for your organization. The server will provide remote users with access to select internal file resources on your network. All communications between the server and Terminal Services clients will be encrypted. Communication must pass through firewalls both at the client end and at the server end of the connection.
You need to configure support for encrypted communication. You are using a certificate from a trusted third-party Certificate Authority (CA) for this purpose. You should not install any components that are not required by the solution and should keep network changes to a minimum.
What should you do?
You need to enable the necessary feature.
You are configuring a server running Windows Server 2008 and Internet Information Services (IIS). You are deploying a Web site and need to be able to restrict access to the SalesTotals.aspx page to members of the Managers group by adding an authorization rule in IIS Manager.
You need to enable the necessary feature.
What should you do?
You need to add the split images to create a capture boot image.
Your company’s network consists of a server running Windows Server 2008 and 50 Microsoft Windows Vista computers installed in various departments.
You are implementing Windows Deployment Services (WDS) with both Deployment Server (DS) and Transport Server (TS) in Windows Server 2008 to set up a remote application installation. You are creating a capture boot image using split images in WDS server.
You need to add the split images to create a capture boot image.
What should you do?
When installing the very first domain controller in a new forest, which one of the following must be installed
When installing the very first domain controller in a new forest, which one of the following must be installed during the Active Directory installation?
What is the BEST option to use for directory services when security is often an unknown?
You are the administrator for a nationwide company with over 5,000 employees. Your main office has approximately 4,500 employees, while the company’s ten remote offices have 50 users residing in each. You are often unaware of the physical security in place at these offices. However, since there is a fairly sizable amount of users at each office, you must provide them with directory services. What is the BEST option to use for directory services when security is often an unknown?
Which of the following can Active Directory Federation Services NOT connect to?
You are the administrator for a nationwide company with over 5,000 employees. Your director tells you your company has just signed into a partnership with another organization, and that you will be responsible for ensuring that authentication can occur between both organizations without the need for additional sign-on accounts. Your boss mentions that the partner has a variety of Directory Services installed throughout their organizations. Which of the following can Active Directory Federation Services NOT connect to?
What is the major security issue with this scenario?
Two users, Dave and Dixine, wish to communicate privately. Dave and Dixine each own a key pair consisting of a public key and a private key. A public key was used to encrypt a message and the corresponding private key was used to decrypt. What is the major security issue with this scenario?
Which of the following is the best trust model deployment for this scenario?
You are administrating a large hierarchal government environment in which a trust model needs to be established. The company does not want external CA’s involved in the verification process. Which of the following is the best trust model deployment for this scenario?
How do you accomplish this?
You are responsible for performing backups on the DCs on your network. Your boss has requested that you conduct system state backups to DVD. How do you accomplish this?
What type of trust relationship should you create?
Your company, mycompany.com, is merging with the yourcompany.com company. The details of the merger are not yet complete. You need to gain access to the resources in the yourcompany.com company before the merger is completed. What type of trust relationship should you create?