###BeginCaseStudy###
Case Study: 3
A)
Datum Corporation
Scenario:
You are an enterprise desktop support technician for A. Datum Corporation.
Active Directory Configuration
The company has three offices. The offices are configured as shown in the following table.
The network contains a single Active Directory domain named adatum.com. Two Group
Policy objects (GPOs) are configured as shown in the following table.
The relevant servers in the main office are configured as shown in the following table.
Wireless Network
A wireless network is implemented in the main office. The wireless network is configured to
use WPA2-Enterprise security.
Client Configuration
All client computers run Windows 7 Enterprise and are configured to use DHCP. Windows
Firewall is disabled on all client computers. All computers in the research department have
Windows XP Mode and Windows Virtual PC installed. You deploy a custom Windows XP
Mode image to the research department computers. An application named App1 is installed
in the image.
Each research department computer has the following hardware:
• 4 GB of RAM
• Intel Core i7 processor
• 500 -GB hard disk drive
Corporate Security Policy
The corporate security policy includes the following requirements:
• Users without domain accounts must be denied access to internal servers.
• All connections to the company’s wireless access points must be encrypted.
• Only employees can be configured to have user accounts in the Active Directory
domain.
• The hard disk drives on all portable computers must be encrypted by using Windows
BitLocker Drive Encryption (BitLocker).
###EndCaseStudy###
Datum hires several consultants to work at the main office for six months. The consultants require
Internet access. The help desk reports that the consultants cannot access the company’s wireless
network. You need to ensure that the consultants have wireless access to the Internet. The solution
must adhere to the corporate security policy. What should you request?
A.
that a wireless access key be given to each consultant
B.
that a user certificate be generated and imported to each consultant’s computer
C.
that a computer certificate be generated and imported to each consultant’s computer
D.
that a network administrator install a wireless access point that is connected directly to the
Internet
Explanation:
answer is D. because of the “users without domain accounts” policy.
Chapter 2 Lesson 3 p 89