Preview

70-680

Powerful Essays
Open Document
Open Document
79519 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
70-680
QUESTION 1 Your network consists of an Active Directory domain and a DirectAccess infrastructure. You install Windows 7 on a new portable computer and join the computer to the domain. You need to ensure that the computer can establish DirectAccess connections. What should you do? A. B. C. D. Install a computer certificate. Create a new network connection. Enable the Network Discovery firewall exception. Add the computer account to the Network Configuration Operators group.

Correct Answer: A Explanation Explanation/Reference: 101 20192 Certificates The DirectAccess IPsec session is established when the client running Windows 7 and the DirectAccess server authenticate with each other using computer certificates. DirectAccess supports only certificate-based authentication. DirectAccess Client Configuration Clients receive their DirectAccess configuration through Group Policy. This differs from traditional VPN configuration where connections are configured manually or distributed through the connection manager administration kit. Once you have added the computer’s client account to the designated security group, you need to install a computer certificate on the client for the purpose of DirectAccess authentication. An organization needs to deploy Active Directory Certificate Services so that clients can automatically enroll with the appropriate certificates. QUESTION 2 You have a portable computer named Computer1 that runs Windows 7. You have a file server named Server1 that runs Windows Server 2008. Server1 contains a shared folder named Share1. You need to configure Computer1 to meet the following requirements: Ensure that cached files from Share1 are encrypted. Ensure that files located in Share1 are available when Server1 is disconnected from the network. What should you do? A. B. C. D. On Server1, encrypt the files in Share1. On Computer1, make Share1 available offline. On Server1, configure BitLocker Drive Encryption. On Computer1, make Share1 available

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The DHCP server can be configured with Active Directory Explorer and DHCP Server for Windows. We can also include Internet Printing Client and Storage Manager for SANs to the file sharing and printing server. The email server can also be configured with the SMTP Server tool.…

    • 247 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    NT2670 Lab1 2

    • 1472 Words
    • 7 Pages

    You are setting up a new computer that was delivered with Windows Server 2008 already installed in its default configuration. Your first task is to configure the computer with appropriate settings for the test lab network.…

    • 1472 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    The Workstation Domain is also another domain infrastructure that has great reason to be affect by internal use only data because this is where the user connects to the our network. The reason that this can cause security threats and other problems is because this domain can be connected via a personal laptop or even a cell phone or other mobile device.…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    70 680 Lab01

    • 243 Words
    • 2 Pages

    This workstation is able to upgrade to 32-bit Windows 7 Enterprise. This workstation is only capable of running 64-bit Windows 7 if a custom installation is performed.…

    • 243 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Employees will be also using the workstation domain is where they will connect to the company’s network. Tight security and access controls will be enforced on company equipment and users must have proper access rights…

    • 539 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Ar 735-5

    • 9157 Words
    • 37 Pages

    Army Regulation 735–5 Property Accountability Policies and Procedures for Property Accountability Headquarters Department of the Army Washington, DC 28 February 2005 UNCLASSIFIED SUMMARY of CHANGE AR 735–5 Policies and Procedures for Property Accountability This revision, dated 28 February 2005 -- o Changes the Deputy Chief of Staff for Logistics (DCSLOG) to Deputy Chief of Staff, G-4 (DCS, G-4) (throughout). o Revises DA Form 1659, Reports of Survey to Financial Liability Investigations of Property Loss (chaps 1, 8, 12, 13, 14 and 15). o Requires contractors to report reportable Army property under the continuing balance system-expanded and unique item tracking to the Logistics Support…

    • 9157 Words
    • 37 Pages
    Powerful Essays
  • Satisfactory Essays

    1. You are the network administrator for a new company that has 10 users and plans to add five more users within a year. The files need to be accessed by all 10 users and each user must have different security rights. What kind of network would you install and how would the pieces and components of this network relate to each other? Define each component.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    remote access it255

    • 345 Words
    • 2 Pages

    • The power of access points will be turned down to a minimum that still allows…

    • 345 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    AR 600-8-10

    • 682 Words
    • 3 Pages

    This is an Essay by me, PV2 Craig D. Caudill, on AR 600-8-10, leaves and passes. I am having to write this essay as a form of corrective training, for having failed…

    • 682 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Ar 670 1

    • 431 Words
    • 2 Pages

    a. Soldiers may wear a wristwatch, a wrist identification bracelet, and a total of two rings (a wedding set is considered one ring) with Army uniforms, unless prohibited by the commander for safety or health reasons. Any jewelry soldiers wear must be conservative and in good taste. Identification bracelets are limited to medical alert bracelets and MIA/POW identification bracelets. Soldiers may wear only one item on each wrist.…

    • 431 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Give students the scenario below asking them to respond in detail with recommendations for site-link protocols and replication schedule/frequency, as well as the possibility of recommending/justifying redundant links to each branch.…

    • 452 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    7010 s14 qp 32

    • 1396 Words
    • 9 Pages

    Write your Centre number, candidate number and name on all the work you hand in.…

    • 1396 Words
    • 9 Pages
    Better Essays
  • Good Essays

    RA 7942

    • 12352 Words
    • 50 Pages

    Republic of the Philippines Congress of the Philippines Metro Manila Republic Act No. 7942 AN ACT INSTITUTING A NEW SYSTEM OF MINERAL RESOURCES EXPLORATION, DEVELOPMENT, UTILIZATION AND CONSERVATION CHAPTER I INTRODUCTORY PROVISIONS Section 1. Title. - This act shall be known as the Philippine Mining Act of 1995.…

    • 12352 Words
    • 50 Pages
    Good Essays
  • Satisfactory Essays

    75unreumn

    • 584 Words
    • 3 Pages

    14 Aug 2012 – In a couple years from now, I will reassess my goals, maybe pull out this 5-year plan, and I'll make another. After all, as long as I'm breathing, ...…

    • 584 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Computer Based Technology

    • 6376 Words
    • 26 Pages

    A network is defined as ‘A collection of computers or devises connected together by communication devices, in order to share resources, data and information.’ In order to carry out this project, specific topics will be researched to bring together the networking and infrastructure of the library. These including drawing out the network floor plan, relating the network to the matching topology, discussing and justifying specifications for chosen multimedia laptops, computers and peripherals, specifications for core components such as an Email and File Server, a full software specification, a business internet access providers and lastly discussing the 802.11 standard. The final section describes the conclusion as to the proposed system with viable cost model, and the benefits achieved.…

    • 6376 Words
    • 26 Pages
    Powerful Essays

Related Topics