What should you do?
You need to design an access control strategy that meets business and security requirements, whilst ensuring that your solution minimize forest-wide replication.
What should you do?
What should you do?
You need to design an access control strategy for resources that are located in the intranet for Willow Bridge, Ltd., and Stanford Finance users, whilst ensuring that your solution meet business and security requirements.
What should you do?
What should you do?
You need to design a smart card issuance system that will meet the Stanford Finance security requirements. You need to take certain steps in the design to issue the smart cards.
What should you do?
What should you do?
You need to test the remote access security solutions. To this end in the test environment in the Chicago office, you install an IAS server on TestRAS1. After RADIUS clients have been configured appropriately, users in the test environment who attempt to connect via TestVPN1 are not authenticated. You need to address this issue for deployment to the production network. You thus need to ensure that all Testdomain user accounts are authenticated using the IAS on TestRAS1.
What should you do?
What should you do?
You need to design an access control strategy to prevent unauthorized users from modifying the registry on the DNS servers.
What should you do?
What should you do?
You need to design an access control strategy for the Willow Bridge, Ltd. internal DNS zone file.Take care in your solution to meet the requirements.
What should you do?
What should you do?
You need to identify which security patches are missing on the Willow Bridge, Ltd. client computers.
What should you do?
What should you do?
You need to design a patch management strategy for Willow Bridge, Ltd. Take care that you solutions meet the requirements.
What should you do?
What should you do?
You need to design the public key infrastructure (PKI) for the Willow Bridge, Ltd. network. Take care that you solution meet the requirements.
What should you do? (Each correct answer presents part of the solution. Choose TWO.)
What should you do?
You need to design a solution to address the concern of the Chief Security officer regarding the installation of unauthorized software on domain computers. What should you do? (Each correct answer presents a complete solution. Choose TWO.)