What should you do?

Your company has two network segments. The core network segment is where centralized management is performed. The high-security network segment is an isolated network. A firewall between the core network segment and the high-security network segment limits network communication between the segments. These network segments are shown in the following diagram.
(Exhibit)

Your company plans to deploy Windows 7 to all client computers. You need to manage activation for client computers that are located in the high-security network segment. What should you do?

Your company has two network segments. The core network segment is where centralized management is performed. The high-security network segment is an isolated network. A firewall between the core network segment and the high-security network segment limits network communication between the segments. These network segments are shown in the following diagram.

Your company plans to deploy Windows 7 to all client computers. You need to manage activation for client computers that are located in the high-security network segment. What should you do?

A.
Deploy the Key Management Service (KMS) in the core network segment.

B.
Deploy the Key Management Service (KMS) in the high-security network segment.

C.
Install the Volume Activation Management Tool (VAMT) in the core network segment.

D.
Install the Volume Activation Management Tool (VAMT) in the high-security network segment.



Leave a Reply 0

Your email address will not be published. Required fields are marked *