What should you request?

Start of repeated scenarioYou are an enterprise desktop support technician for A. Datum Corporation. Active Directory ConfigurationThe company has three offices. The offices are configured as shown in the following table.
The network consists of a single Active Directory domain named adatum.com. Two Group Policy objects (GPOs) are configured as shown in the following table.
Servers
The relevant servers in the main office are configured as shown in the following table.

Wireless NetworkA wireless network is implemented in the main office. The wireless network is configured to use WPA2-Enterprise security. Client ConfigurationAll client computers run Windows 7 Enterprise and are configured to use DHCP. Windows Firewall is disabled on all client computers. All computers in the research department have Windows XP Mode and Windows Virtual PC installed. You deploy a custom Windows XP Mode image to the research department computers. An application named App1 is installed in the image. Each research department computer has the following hardware. 4 GB of RAMIntel Core i7 processor500-GB hard disk drive Corporate Security PolicyThe corporate security policy includes the following requirements. Users without domain accounts must be denied access to internal servers.All connections to the companys wireless access points must be encrypted.Only employees can be configured to have user accounts in the Active Directory domain.The hard disk drives on all portable computers must be encrypted by using Windows BitLocker Drive Encryption (BitLocker). End of repeated scenario A. Datum hires several consultants to work at the main office for six months. The consultants require Internet access. The help desk reports that the consultants cannot access the companys wireless network. You need to ensure that the consultants have wireless access to the Internet. The solution must adhere to the corporate security policy. What should you request?

Changed with the DEMO VERSION of CAD-KAS PDF-Editor (http://www.cadkas.com).

Start of repeated scenarioYou are an enterprise desktop support technician for A. Datum Corporation. Active Directory ConfigurationThe company has three offices. The offices are configured as shown in the following table.
The network consists of a single Active Directory domain named adatum.com. Two Group Policy objects (GPOs) are configured as shown in the following table.
Servers
The relevant servers in the main office are configured as shown in the following table.

Wireless NetworkA wireless network is implemented in the main office. The wireless network is configured to use WPA2-Enterprise security. Client ConfigurationAll client computers run Windows 7 Enterprise and are configured to use DHCP. Windows Firewall is disabled on all client computers. All computers in the research department have Windows XP Mode and Windows Virtual PC installed. You deploy a custom Windows XP Mode image to the research department computers. An application named App1 is installed in the image. Each research department computer has the following hardware. 4 GB of RAMIntel Core i7 processor500-GB hard disk drive Corporate Security PolicyThe corporate security policy includes the following requirements. Users without domain accounts must be denied access to internal servers.All connections to the companys wireless access points must be encrypted.Only employees can be configured to have user accounts in the Active Directory domain.The hard disk drives on all portable computers must be encrypted by using Windows BitLocker Drive Encryption (BitLocker). End of repeated scenario A. Datum hires several consultants to work at the main office for six months. The consultants require Internet access. The help desk reports that the consultants cannot access the companys wireless network. You need to ensure that the consultants have wireless access to the Internet. The solution must adhere to the corporate security policy. What should you request?

A.
that a wireless access key be given to each consultant

B.
that a user certificate be generated and imported to each consultants computer

C.
that a computer certificate be generated and imported to each consultants computer

D.
that a network administrator install a wireless access point that is connected directly to the Internet



Leave a Reply 1

Your email address will not be published. Required fields are marked *


afamdaacal.skyrock.com

afamdaacal.skyrock.com

Other foods which should be avoided or limited. Their metabolisms
also slowed and more of the food on plan, is DELICIOUS. But I believe with all my heart
that the cycle of dirty dieting #0, you need to put that into our bread?