READ Free Dumps For Microsoft- 70-410
Question ID 9723 | Your network contains an Active Directory domain named contoso.com.
All client computers run Windows 8.
You deploy a server named Server1 that runs Windows Server 2012 R2. You install a new client-server application named App1 on Server1 and on the client
computers. The client computers must use TCP port 6444 to connect to App1 on Server1.Server1 publishes the information of App1 to an intranet server named
Server2 by using TCP port 3080.
You need to ensure that all of the client computers can connect to App1. The solution must ensure that the application can connect to Server2.
Which Windows Firewall rule should you create on Server1?
|
Option A | an inbound rule to allow a connection to TCP port 3080
|
Option B | an outbound rule to allow a connection to TCP port 3080
|
Option C | an outbound rule to allow a connection to TCP port 6444
|
Option D | an inbound rule to allow a connection to TCP port 6444
|
Correct Answer | D |
Explanation Explanation/Reference: Explanation: A. Server2 needs inbound on 3080. B. All ports outbound allowed by default. D. Server1 gets request from Client PC's it needs an inbound rule for 6444. By default, Windows Firewall with Advanced Security blocks all unsolicited inbound network traffic, and allows all outbound network traffic. For unsolicited inbound network traffic to reach your computer, you must create an allow rule to permit that type of network traffic. If a network program cannot get access, verify that in the Windows Firewall with Advanced Security snap-in there is an active allow rule for the current profile. To verify that there is an active allow rule, double-click Monitoring and then click Firewall. If there is no active allow rule for the program, go to the Inbound Rules node and create a new rule for that program. Create either a program rule, or a service rule, or search for a group that applies to the feature and make sure all the rules in the group are enabled. To permit the traffic, you must create a rule for the program that needs to listen for that traffic. If you know the TCP or UDP port numbers required by the program, you can additionally restrict the rule to only those ports, reducing the vulnerability of opening up all ports for the program.
Question ID 9724 | Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server
2012 R2.You create a security template named Template1 by using the security template snap-in.
You need to apply Template1 to Server2.
Which tool should you use?
|
Option A | Security Templates
|
Option B | Computer Management
|
Option C | Security Configuration and Analysis
|
Option D | System Configuration
|
Correct Answer | C |
Explanation Explanation/Reference: A security policy is a combination of security settings that affect the security on a computer. You can use your local security policy to edit account policies and local policies on your local computer. Explanation: A. Template was already created - Provide standard security option to use in security policies B. Needs to be applied at the GP level C. Security templates are inactive until imported into a Group Policy object or the SecurityConfiguration and Analysis D. Tool to ID windows problems