Free JN0-250 Exam Braindumps (page: 4)

Page 3 of 17

The ABC.com network consists of a single Active Directory domain named ABC.com.

You deploy an enterprise certification authority (CA) on a Windows Server computer named ABC-CA1. The primary purpose of the CA is issue company users with digital certificates to enable them to authenticate with the new company Intranet website.

You create a new certificate template named Web Authentication. You enable the Web Authentication certificate template on ABC-CA1 and configure the default domain group policy so that users who log on to the domain receive a Web Authentication certificate.

The following morning users complain that they do not have certificates which can be used to authenticate to the Intranet Web site. How can you ensure the users are issued with a certificate?

  1. By configuring ABC-CA1 to be an Enterprise Subordinate CA of a public CA such as VeriSign.
  2. By modifying the permissions of the Web Authentication certificate template to give the Domain Users group the Allow – Autoenroll permission.
  3. By adding your Domain Admin user account to the Cert Managers group in Active Directory.
  4. By configuring the Default Domain Controllers GPO to assign the certificates to users when they log on.

Answer(s): B



The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the ABC.com network run Windows Server. The ABC.com network also contains a file server named ABC-SR10. A ABC.com user named Rory Allen complains that when connecting to ABC-SR10, it often takes quite some time to respond. Other users report the same problem.

Your investigations reveal that the network interface on ABC-SR10 has a large load during times when the server is slow to respond. You suspect that one of the network computers is causing the problem. How would you identify the problematic machine?

  1. By examining the event logs on ABC-SR10.
  2. By viewing the Local Area Connection status on ABC-SR10.
  3. By using Network Monitor to inspect the network traffic on the client computers.
  4. By using System Monitor to inspect the performance monitor counters on ABC-SR10.
  5. By examining the event logs on the client computers.
  6. By using System Monitor to inspect the performance monitor counters on the client computers.
  7. By using Network Monitor to inspect the network traffic on ABC-SR10.

Answer(s): G



The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the ABC.com network run Windows Server.

ABC.com has its headquarters in Chicago and two branch offices in Dallas and Miami. The branch offices are connected to the headquarters by means of T1 WAN links. The network at each office is configured as a separate Active Directory site as shown below.

ABC.com users in all three sites require access to a file server named ABC-SR10 that is located in the Chicago site.

Users in the Miami and Dallas offices are complaining about the unacceptable file server performance during peak working hours. You want to design a solution that provides fault tolerance for the file server and minimizes traffic over the WAN links during office hours.

Which solution would you recommend?

  1. Implement a Distributed File System (DFS) with the DFS root in the Chicago office and DFS replicas in the Dallas and Miami offices. Configure replication to occur during off-peak hours.
  2. Install Windows Server file servers in the Dallas and Miami offices. Use the File Replication Service to replicate the folders during off-peak hours.
  3. Implement a two-node file server cluster in the Chicago office using Microsoft Cluster Services.
  4. Implement a two-node file server cluster in each office using Microsoft Cluster Services.

Answer(s): A



The company consists of an Active Directory domain called ABC.com. All servers on the corporate network run Windows Server.

The network contains a server that runs Internet Authentication Service (IAS) called ABC-SR01. ABC-SR01also runs the Routing and Remote Access service to provide VPN access to the network for external users. During routine monitoring you discover that an external unauthorized user is trying to access the network through ABC-SR01.

How would you set up ABC-SR01 to log the IP addresses of the remote computers when they attempt to connect to the network using the VPN connection?

  1. Log the details of the access attempts by the VPN users by using IAS to configure the Authentication requests option enabled in the Remote Access Logging.
  2. Log the details of the access attempts by the VPN users by configuring the Routing and Remote Access service to log all IPSec connections.
  3. Log the details of the access attempts by the VPN users by enabling auditing of TCP/IP.sys.
  4. Log the details of the access attempts by the VPN users by enabling auditing of all Account Logon events on a domain controller.

Answer(s): A






Post your Comments and Discuss Juniper JN0-250 exam with other Community members:

JN0-250 Discussions & Posts