Preview

70-680

Powerful Essays
Open Document
Open Document
79519 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
70-680
QUESTION 1 Your network consists of an Active Directory domain and a DirectAccess infrastructure. You install Windows 7 on a new portable computer and join the computer to the domain. You need to ensure that the computer can establish DirectAccess connections. What should you do? A. B. C. D. Install a computer certificate. Create a new network connection. Enable the Network Discovery firewall exception. Add the computer account to the Network Configuration Operators group.

Correct Answer: A Explanation Explanation/Reference: 101 20192 Certificates The DirectAccess IPsec session is established when the client running Windows 7 and the DirectAccess server authenticate with each other using computer certificates. DirectAccess supports only certificate-based authentication. DirectAccess Client Configuration Clients receive their DirectAccess configuration through Group Policy. This differs from traditional VPN configuration where connections are configured manually or distributed through the connection manager administration kit. Once you have added the computer’s client account to the designated security group, you need to install a computer certificate on the client for the purpose of DirectAccess authentication. An organization needs to deploy Active Directory Certificate Services so that clients can automatically enroll with the appropriate certificates. QUESTION 2 You have a portable computer named Computer1 that runs Windows 7. You have a file server named Server1 that runs Windows Server 2008. Server1 contains a shared folder named Share1. You need to configure Computer1 to meet the following requirements: Ensure that cached files from Share1 are encrypted. Ensure that files located in Share1 are available when Server1 is disconnected from the network. What should you do? A. B. C. D. On Server1, encrypt the files in Share1. On Computer1, make Share1 available offline. On Server1, configure BitLocker Drive Encryption. On Computer1, make Share1 available

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 1 Case Study

    • 825 Words
    • 4 Pages

    When configuring windows networking, two major approaches are valid to secure all the network resources, the workgroup approach and the Domain approach. The workgroup approach is simply to create a windows peer-to-peer network with a decentralized security system. This workgroup security approach…

    • 825 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The DHCP server can be configured with Active Directory Explorer and DHCP Server for Windows. We can also include Internet Printing Client and Storage Manager for SANs to the file sharing and printing server. The email server can also be configured with the SMTP Server tool.…

    • 247 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    It331 Unit 5 Essay

    • 593 Words
    • 3 Pages

    6) For the network that you have chosen to characterize for this class, identify the primary types of media employed. Be sure to include both how the computers individually connect into the network devices as well as how network devices interconnect and how the connection to the Internet is achieved. Briefly explain the purpose in the network of each type of media employed and identify at least one alternative media which could also fulfill this purpose.…

    • 593 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The Workstation Domain is also another domain infrastructure that has great reason to be affect by internal use only data because this is where the user connects to the our network. The reason that this can cause security threats and other problems is because this domain can be connected via a personal laptop or even a cell phone or other mobile device.…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    70 680 Lab01

    • 243 Words
    • 2 Pages

    This workstation is able to upgrade to 32-bit Windows 7 Enterprise. This workstation is only capable of running 64-bit Windows 7 if a custom installation is performed.…

    • 243 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 3 Assignment 1

    • 2755 Words
    • 12 Pages

    Setting up my new computer, with the Window 7, operating system was fairly simple. The setup directions were easy to follow, in order to get me up and running. Upon setting up my new system I took care of establishing my internet connection, from my Internet Service Provider, which happens to be Comcast. Now that I’m connected to the internet and ready to take on the World Wide Web the fun part begins, making sure it’s protected against any harmful attackers, and any virus threats.…

    • 2755 Words
    • 12 Pages
    Good Essays
  • Powerful Essays

    Ar 735-5

    • 9157 Words
    • 37 Pages

    Army Regulation 735–5 Property Accountability Policies and Procedures for Property Accountability Headquarters Department of the Army Washington, DC 28 February 2005 UNCLASSIFIED SUMMARY of CHANGE AR 735–5 Policies and Procedures for Property Accountability This revision, dated 28 February 2005 -- o Changes the Deputy Chief of Staff for Logistics (DCSLOG) to Deputy Chief of Staff, G-4 (DCS, G-4) (throughout). o Revises DA Form 1659, Reports of Survey to Financial Liability Investigations of Property Loss (chaps 1, 8, 12, 13, 14 and 15). o Requires contractors to report reportable Army property under the continuing balance system-expanded and unique item tracking to the Logistics Support…

    • 9157 Words
    • 37 Pages
    Powerful Essays
  • Satisfactory Essays

    1. You are the network administrator for a new company that has 10 users and plans to add five more users within a year. The files need to be accessed by all 10 users and each user must have different security rights. What kind of network would you install and how would the pieces and components of this network relate to each other? Define each component.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Ar 670 1

    • 431 Words
    • 2 Pages

    a. Soldiers may wear a wristwatch, a wrist identification bracelet, and a total of two rings (a wedding set is considered one ring) with Army uniforms, unless prohibited by the commander for safety or health reasons. Any jewelry soldiers wear must be conservative and in good taste. Identification bracelets are limited to medical alert bracelets and MIA/POW identification bracelets. Soldiers may wear only one item on each wrist.…

    • 431 Words
    • 2 Pages
    Good Essays
  • Good Essays

    AR 600-8-10

    • 682 Words
    • 3 Pages

    This is an Essay by me, PV2 Craig D. Caudill, on AR 600-8-10, leaves and passes. I am having to write this essay as a form of corrective training, for having failed…

    • 682 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    remote access it255

    • 345 Words
    • 2 Pages

    • The power of access points will be turned down to a minimum that still allows…

    • 345 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Give students the scenario below asking them to respond in detail with recommendations for site-link protocols and replication schedule/frequency, as well as the possibility of recommending/justifying redundant links to each branch.…

    • 452 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    7010 s14 qp 32

    • 1396 Words
    • 9 Pages

    Write your Centre number, candidate number and name on all the work you hand in.…

    • 1396 Words
    • 9 Pages
    Better Essays
  • Satisfactory Essays

    75unreumn

    • 584 Words
    • 3 Pages

    14 Aug 2012 – In a couple years from now, I will reassess my goals, maybe pull out this 5-year plan, and I'll make another. After all, as long as I'm breathing, ...…

    • 584 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Computer Based Technology

    • 6376 Words
    • 26 Pages

    A network is defined as ‘A collection of computers or devises connected together by communication devices, in order to share resources, data and information.’ In order to carry out this project, specific topics will be researched to bring together the networking and infrastructure of the library. These including drawing out the network floor plan, relating the network to the matching topology, discussing and justifying specifications for chosen multimedia laptops, computers and peripherals, specifications for core components such as an Email and File Server, a full software specification, a business internet access providers and lastly discussing the 802.11 standard. The final section describes the conclusion as to the proposed system with viable cost model, and the benefits achieved.…

    • 6376 Words
    • 26 Pages
    Powerful Essays

Related Topics