网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
You need to configure the security settings for the new app servers.  Which two actions should you perform?()
A

Create a Group policy object (GPO) for the web servers.

B

Create a Group policy object (GPO) for the database servers.

C

Modify the Default Domain Policy.

D

Modify the Default Domain Controllers Policy.


参考答案

参考解析
解析: 暂无解析
更多 “多选题You need to configure the security settings for the new app servers.  Which two actions should you perform?()ACreate a Group policy object (GPO) for the web servers.BCreate a Group policy object (GPO) for the database servers.CModify the Default Domain Policy.DModify the Default Domain Controllers Policy.” 相关考题
考题 Your network contains a server that has the SNMP Service installed.You need to configure the SNMP security settings on the server.Which tool should you use?() A.Local Security PolicyB.ScwC.SeceditD.Services console

考题 You are the administrator responsible for security and user desktop settings on your network. You need to configure a custom registry entry for all users. You want to add the custom registry entry into a Group Policy object (GPO) with the least amount of administrative effort.What should you do?A.Configure an ADM template and add the template to the GPO.B.Configure an INF policy and add the policy to the GPO.C.Configure a Microsoft Windows installer package and add the package to the GPO.D.Configure RIS to include the registry entry.

考题 You need to design a security strategy for VPN2. Your solution must meet business requirements. What should you do?()A、Create and configure a new security template. Import the template into the Default Domain Policy Group Policy object (GPO)B、Install Internet Authentication Service (IAS) on RAS1. Configure VPN2 to be the RADIUS client of RAS1. Configure the remote access policy on VPN2C、Create and configure a new security template. Import the template into the local policy on VPN2D、Move VPN2 into the VPN Servers OU. Configure the remote access policy on VPN2

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains 50 application servers that run Windows Server 2003.   The security configuration of the application servers is not uniform. The application servers were deployed by local administrators who configured the settings for each of the application servers differently based on their knowledge and skills. The application servers are configured with different authentication methods, audit settings, and account policy settings.   The security team recently completed a new network security design. The design includes a baseline configuration for security settings on all servers. The baseline security settings use the Hisecws.inf predefined security template. The design also requires modified settings for servers in an application role. These settings include system service startup requirements, renaming the administrator account, and more stringent account lockout policies. The security team created a security template named Application.inf that contains the modified settings.   You need to plan the deployment of the new security design. You need to ensure that all security settings for the application servers are standardized, and that after the deployment, the security settings on all application servers meet the design requirements.   What should you do? ()A、 Apply the Setup security.inf template first, the Hisecws.inf template next, and then the Application.inf template.B、 Apply the Application.inf template and then the Hisecws.inf template.C、 Apply the Application.inf template first, the Setup security.inf template next, and then the Hisecws.inf template.D、 Apply the Setup security.inf template and then the Application.inf template.

考题 You are the desktop administrator for your company. The company's network contains 500 Windows XP Professional computers. The information security department releases a new security template named NewSec.inf. You import NewSec.inf into a security database named NewSec.sdb. You analyze the result, and you review the changes that the template makes. You examine the security policies that are defined in NewSec.inf. You discover that the settings in NewSec.inf have not been implemented on your computer. You need to ensure that the settings in NewSec.inf overwrite the settings in your computer's local security policy. What are two possible ways to achieve this goal?()A、Run the Secedit /configure /db C:/NewSec.sdb command.B、Run the Secedit /refreshpolicy machine_policy command.C、Copy NewSec.inf to the C:/Windows/Inf folder. D、Copy NewSec.sdb to the C:/Windows/System32/Microsoft/Protect folder. E、Use the Security Configuration and Analysis console to open NewSec.sdb and then to perform a Configure operation. F、Use the Security Configuration and Analysis console to export NewSec.sdb to the Defltwk.inf security template. 

考题 Your company has an Active Directory domain and an organizational unit. The organizational unit  is named Web. You configure and test new security settings for Internet Information Service (IIS)  servers on a server named IISServerA.     You need to deploy the new security settings only on the IIS servers that are members of the  Web organizational unit.     What should you do()A、Run secedit /configure /db iis.inf from the command prompt on IISServera, and then run secedit /configure /db webB、Export the settings on IISServera to create a security template. Import the security template into a gpo and link theC、Export the settings on IISServera to create a security template. Run secedit /configure /db webou.inf from the commD、Import the hisecws.inf file template into a gpo and link the gpo to the Web organizational unit.

考题 You need to design a method to implement account policies that meets the requirements in the written security policy. What should you do?()A、Create a GPO and link it to the New York OU, to the Denver OU, and to the Dallas OU.Configure the GPO with the required account policy settingsB、On all computers in the domain, configure the Local Security Policy7 with the required account policy settingsC、Configure the Default Domain Policy GPO with the required account policy settingsD、Configure the Default Domain Controllers Policy GPO with the required account policy settings

考题 Your company has an Active Directory domain. You have a server that runs Windows Server 2008. The Terminal Services role is installed on the server.  The company security policy does not allow users to copy and paste information to a local computer during a Terminal Services session.  You deploy the remote application named APP1.  You need to configure Terminal Services to meet the security requirement. What should you do?()A、Enable the Use temporary folders per session option.B、Change the Security Encryption Level to FIPS Compliant.C、Deselect the Clipboard option in the RDP Settings for the published application.D、Disable the Drive option in the RDP-Tcp Client Setting properties for the server.

考题 You have two servers named Server1 and Server2 that run Windows Server 2003 Service Pack 2 (SP2).On Server1, you install an application that runs as a service named App1. App1 will save files to a file share on Server2.You perform the following actions:  (1)Create a domain account named App1Service.  (2)Set the password for App1Service.  (3)Create a file share on Server2.  (4)Grant App1Service the Allow - Change share permission.  You need to ensure that App1 can save files to the share on Server2. What should you do?()A、From the Services snap-in, configure the Log On settings.B、From the Services snap-in, configure the Recovery settings. C、From Local Security Policy, disable the Network access: Shares that can be accessed anonymously setting. D、From Local Security Policy, disable the Network access: Let Everyone permissions apply to anonymous users setting. 

考题 You need to configure the security settings for the new app servers. Which two actions should you perform?()A、Create a Group policy object (GPO) for the web servers.B、Create a Group policy object (GPO) for the database servers.C、Modify the Default Domain Policy.D、Modify the Default Domain Controllers Policy.

考题 You need to design a domain model that meets the company business and security requirements for controlling access to the new Web-based ordering application. What should you do?()A、Create a child OU within the existing domainB、Create a child domain of the existing domainC、Create a new domain in a new forest. Configure the new domain to trust the existing domainD、Create a new tree in the existing forest. Configure the new domain to trust the existing domain

考题 You are the network administrator in the New York office of TestKing. The company network consists of a single Active Directory domain The New York office currently contains one Windows Server 2003 file server named TestKingA. All file servers in the New York office are in an organizational unit (OU) named New York Servers. You have been assigned the Allow - Change permission for a Group Policy object (GPO) named NYServersGPO, which is linked to the New York Servers OU. The written company security policy states that all new servers must be configured with specified predefined security settings when the servers join the domain. These settings differ slightly for the various company offices. You plan to install Windows Sever 2003, on 15 new computers, which all functions as file servers. You will need to configure the specified security settings on the new file servers. TestKingA currently has the specified security settings configured in its local security policy. You need to ensure that the security configuration of the new file servers is identical to that of TestKingA. You export a copy of TestKingA's local security policy settings to a template file. You need to configure the security settings of the new servers, and you want to use the minimum amount of administrative effort. What should you do?()A、Use the Security Configuration and Analysis tool on one of the new servers to import the template file.B、Use the default Domain Security Policy console on one of the new servers to import the template file.C、Use the Group Policy Editor console to open NYServersGPO and import the template file.D、Use the default Local Security Policy console on one of the new servers to import the template file.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All domain controllers run Windows Server 2003. All client computers run Windows XP Professional.   The company has legacy applications that run on UNIX servers. The legacy applications use the LDAP protocol to query Active Directory for employee information.  The domain controllers are currently configured with the default security settings. You need to configure enhanced security for the domain controllers. In particular, you want to configure stronger password settings, audit settings, and lockout settings. You want to minimize interference with the proper functioning of the legacy applications.   You decide to use the predefined security templates. You need to choose the appropriate predefined security template to apply to the domain controllers.  What should you do?()A、 Apply the Setup security.inf template to the domain controllers.B、 Apply the DC security.inf template to the domain controllers.C、 Apply the Securedc.inf template to the domain controllers.D、 Apply the Rootsec.inf template to the domain controllers.

考题 You need to configure Microsoft Windows Fax and Scan to send and receive faxes.  What should you do? ()A、Create a new fax account.B、Configure the fax settings to require manual receipt of faxes.C、Configure the fax security settings to permit Send and Receive.D、Configure the Transmitting Subscriber ID (TSID) of the fax with the correct phone number.

考题 You need to identify each help desk user who bypasses the new corporate security policy. What should you do?()A、Configure Audit Special Logon and define Special Groups.B、Configure Audit Other Privilege Use Events and define Special Groups.C、Configure Audit Sensitive Privilege Use and configure auditing for the HelpDesk group.D、Configure Audit Object Access and modify the auditing settings for the HelpDesk group.

考题 You are developing an application to create a new file on the local file system.You need to define specific security settings for the file. You must deny the file inheritance of any default security settings during creation.What should you do?()A、Create the file by using a new FileStream object by passing the FileSecurity object as a parameter to the FileStream constructor.B、Create a new FileSecurity object.C、Apply the permissions by using the File class.D、Create a new FileSystem Access Rule object for each permission that you need,and add each rule to the FileSecurity object.E、Create a new FileSystem Audit Rule object and add it to the FileSecurity object.

考题 单选题You need to design a method to implement account policies that meets the requirements in the written security policy. What should you do?()A Create a GPO and link it to the New York OU, to the Denver OU, and to the Dallas OU.Configure the GPO with the required account policy settingsB On all computers in the domain, configure the Local Security Policy7 with the required account policy settingsC Configure the Default Domain Policy GPO with the required account policy settingsD Configure the Default Domain Controllers Policy GPO with the required account policy settings

考题 单选题You have a computer that runs Windows 7. You add a new hard disk drive to the computer and create anew NTFS partition. You need to ensure that you can use the Previous Versions feature on the new drive. What should you do?()A From Disk Management, convert the new disk to a dynamic disk.B From System Properties, configure the System Protection settings.C From System and Security, enable BitLocker Drive Encryption (BitLocker).D From the properties of the new drive, create a share and modify the caching settings.

考题 多选题You are developing an application to create a new file on the local file system.You need to define specific security settings for the file. You must deny the file inheritance of any default security settings during creation.What should you do?()ACreate the file by using a new FileStream object by passing the FileSecurity object as a parameter to the FileStream constructor.BCreate a new FileSecurity object.CApply the permissions by using the File class.DCreate a new FileSystem Access Rule object for each permission that you need,and add each rule to the FileSecurity object.ECreate a new FileSystem Audit Rule object and add it to the FileSecurity object.

考题 单选题Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 hosts a custom application named App1. App1 is accessible on TCP port 5000.You need to encrypt App1 data on the network.What should you do?()A From the Local Security Policy console, configure the Security Options.B From the Local Security Policy console, configure the Application Control Policies.C From the Windows Firewall with Advanced Security console, create an inbound rule.D From the Windows Firewall with Advanced Security console, create a connection security rule.

考题 多选题You have a single Active Directory directory service forest named contoso.com. You create baseline  security settings for a group of computers, and you store the settings in a database. You deploy thebaseline security settings. You need to confirm that the security settings on one of the computers are  applied correctly.  What are two possible commands that you can run to achieve this goal?()AseceditBgpupdateCnetdomDscwcmd

考题 单选题You have an Exchange Server 2010 organization.You need to prevent users in the organization from changing passwords by using Outlook Web App.The solution must not prevent users from changing passwords by using Windows. What should you do? ()A From the properties of the user accounts, configure the settings on the Account tab.B From the properties of the mailboxes, configure the settings on the Mailbox Features tab.C From the properties of the OWA virtual directory, configure the settings on the Segmentation tab.D From the properties of the OWA virtual directory, configure the settings on the Authentication tab.

考题 单选题You need to configure Microsoft Windows Fax and Scan to send and receive faxes.  What should you do? ()A Create a new fax account.B Configure the fax settings to require manual receipt of faxes.C Configure the fax security settings to permit Send and Receive.D Configure the Transmitting Subscriber ID (TSID) of the fax with the correct phone number.

考题 单选题You are the administrator of your company's network. You want to configure a Security Policy for the Windows 2000 Professional Computers that are in the sales department.   On one of the computers, you use Security Templates to configure the Security Policy based on the desired security settings. You then export those settings to an .inf file that will be used on all of the Computers in the sales department. You want to configure each Computer to have a customized Security Policy. What steps should you follow in order to achieve your goal?()A Use Secedit.exe to import the security settings from the .inf file to the computers in the sales department.B Use a text editor to change the default security settings to the desired security settings. Then export those settings to the Computers in the sales department.C Create an organizational unit (OU) named Sales. Add the users in the sales department to the Sales OU. Then apply the security template to the users in the Sales OU.D Create an organizational unit (OU) named Sales. Add the computers in the sales department to the Sales OU. Then apply the security template to computers in the Sales OU.

考题 单选题Your network contains a server that has the SNMP Service installed.You need to configure the SNMP security settings on the server.Which tool should you use?()A Local Security PolicyB ScwC SeceditD Services console

考题 单选题You need to configure Active Directory to implement the new password policy for the HR department. What should you do?()A Create a new child domain named hr.ad.margiestravel.com in the existing forest. Move the resources from the HR OU to this new domain. Add the appropriate security settings in the Default Domain Policy for this new domain.B Add the appropriate security settings to the current Default Domain Policy.C Add the appropriate security settings to the local security policy of SQL1.D Set the SQL server check_policy and check_expiration options to On when creating all user accounts.

考题 单选题You need to identify each help desk user who bypasses the new corporate security policy. What should you do?()A Configure Audit Special Logon and define Special Groups.B Configure Audit Other Privilege Use Events and define Special Groups.C Configure Audit Sensitive Privilege Use and configure auditing for the HelpDesk group.D Configure Audit Object Access and modify the auditing settings for the HelpDesk group.