What should you do?
You need to redesign the network infrastructure to support the implementation of Software Update Services (SUS).
What should you do?
What should you do?
You need to design an auditing strategy for the CK_Customers folder the meets the business requirements.
What should you do?
What should you do?
You need to design a security patch management strategy that addresses the concerns of the Chief Information Officer. You need to ensure that your solution must meet the company’s business requirements.
What should you do?
What should you do?
You need to design a public key infrastructure (PKI) for Domain.com. You need to ensure that your solution meets Domain.com’s business requirements. What should you do? (Each correct answer presents part of the solution. Choose TWO.)
What should you do?
You need to design a strategy to provide maximum protection for customer and delivery data. You need to ensure that your solution meets Domain.com’s business requirements.
What should you do?
What should you do?
You need to design an Encrypted File System (EFS) strategy that meets the requirements of the Chief Security Officer.
What should you do?
What should you do?
You need to design the network to support mobile Customer Support users who need remote access to the corporate network. You need to ensure that you solution meets business requirements.
What should you do? (Each correct answer presents part of the solution. Choose TWO.)
What should you do?
You need to design a remote access strategy that meets business requirements. You want to test you remote access security solutions. You configure a server named CERTKILLER-SR06 as a VPN server. You then install Internet Authentication Service (IAS) on CERTKILLER-SR05 and configure the RADIUS clients. However, when remote users attempt to connect to the corporate network through CERTKILLER-SR06 they are not authenticated by Active Directory. You need to ensure that remote users can be authenticated by using IAS on CERTKILLER-SR05.
What should you do?
What should you do?
You need to design a solution that ensures that the network users are kept up-to-date with the latest security patches as Microsoft releases them. You are required to select which of the following tools can be used to identify all the missing security updates on network computers.
What should you do?
What should you do?
You work as a network administrator at Bilco Engineering, Inc. You have received instruction to start designing the configuration for the wireless network. The solution you are in the process of designing should meet the requirements of the wireless users. What should you do? (Each correct answer presents part of the solution. Choose TWO.)