网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
A companys legal and regulatory departments have drafted a new policy in which emails must be retained for no longer than three years.  Which of the following locations should an administrator configure when complying with the new policy?()
A

Local workstations

B

Backup tapes

C

Domain controllers

D

Email server

E

SMTP gateway

F

Proxy server


参考答案

参考解析
解析: 暂无解析
更多 “多选题A companys legal and regulatory departments have drafted a new policy in which emails must be retained for no longer than three years.  Which of the following locations should an administrator configure when complying with the new policy?()ALocal workstationsBBackup tapesCDomain controllersDEmail serverESMTP gatewayFProxy server” 相关考题
考题 You have enabled backup optimization in RMAN. You issue the following RMAN command to configure a redundancy-based retention policy:CONFIGURE RETENTION POLICY TO REDUNDANCY 3;Which statement is true?()A. The command fails because you cannot configure a redundancy-based retention policy when backup optimization is enabledB. Backup optimization is performed, but RMAN considers the redundancy-based retention policy when it determines which datafiles should be backed upC. Backup optimization is permanently disabledD. Backup optimization is temporarily disabled because a redundancy-based retention policy is specified

考题 An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections.Which of the following MUST be deployed?() A.IDSB.IPSC.FirewallD.Managed PKI

考题 A companys legal and regulatory departments have drafted a new policy in which emails must be retained for no longer than three years.  Which of the following locations should an administrator configure when complying with the new policy?()A、 Local workstationsB、 Backup tapesC、 Domain controllersD、 Email serverE、 SMTP gatewayF、 Proxy server

考题 If there is a conflict in policy for data retention, which of the following should the technician adhere to FIRST?()A、Industry best practicesB、Company policyC、International standardsD、Local legal requirements

考题 An administrator is implementing a new data retention program for the company. Which of the following is the MOST important consideration as the new program is created? ()A、 Awareness of company policy requirementsB、 Differentiating between archiving and backup processesC、 Awareness of potential legal requirementsD、 Ensuring that the backups for the retention program cover key business areas

考题 An administrator is creating a new data retention policy. Which of the following is the MOST important consideration?()A、Compile technical requirements for new policyB、Comply with applicable laws and regulationsC、Destroy the old data retention policyD、Have hard copies of the new policy stored offsite

考题 A companys computer policy dictates that all users workstations must use the companys corporate web page as their default home page.  Which of the following methods should an administrator use to BEST comply with this policy?()A、 Configure a logon script to set the homepage at logon.B、 Set the default homepage to the corporate website in Group Policy.C、 Manually configure the homepage on all workstations and setup trace logs to ensure compliance.D、 Set the default homepage to the corporate website on the base computer image.

考题 When disposing of data, which of the following should be considered FIRST?()A、Company policy requirementsB、Local legal requirementsC、Storage requirementsD、Disposal requirements

考题 An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections. Which of the following MUST be deployed?()A、IDSB、IPSC、FirewallD、Managed PKI

考题 You have enabled backup optimization in RMAN. You issue the following RMAN command to configure a redundancy-based retention policy: CONFIGURE RETENTION POLICY TO REDUNDANCY 3; Which statement is true?()A、The command fails because you cannot configure a redundancy-based retention policy when backup optimization is enabledB、Backup optimization is performed, but RMAN considers the redundancy-based retention policy when it determines which datafiles should be backed upC、Backup optimization is permanently disabledD、Backup optimization is temporarily disabled because a redundancy-based retention policy is specified

考题 Your network consists of three Active Directory forests. Forest trust relationships exist between all forests. Each forest contains one domain. All domain controllers run Windows Server 2008 R2. Your company has three network administrators. Each network administrator manages a forest and the Group Policy objects (GPOs) within that forest.   You need to create standard GPOs that the network administrators in each forest will use. The GPOs must meet the following requirements:   èThe GPOs must only contain settings for either user configurations or computer configurations. èThe number of GPOs must be minimized.   Which two actions should you perform?()A、Export the new GPOs to .cab files. Ensure that the .cab files are available to the network administrator  in each forest.B、Create two new GPOs. Configure both GPOs to use the required user configurations and the required  computer configurations.C、Create two new GPOs. Configure one GPO to use the required user configuration. Configure the other GPO to use the required computer configuration.D、Back up the Sysvol folder that is located on the domain controller where the new GPOs were created. Provide the backup to the network administrator in each forest.

考题 You have an Exchange Server 2010 organization.  You have a global security group named Legal that contains all the members of your companys legaldepartment.  The companys security policy states that the Legal group must be able to search all mailboxes for e-mailmessages that contain specific keywords.  You need to recommend a solution for the organization that complies with the security policy.  What should you include in the solution?()A、a Discovery Management role groupB、a legal holdC、administrator audit loggingD、Mailbox journaling

考题 You need to configure the security settings for the new app servers. Which two actions should you perform?()A、Create a Group policy object (GPO) for the web servers.B、Create a Group policy object (GPO) for the database servers.C、Modify the Default Domain Policy.D、Modify the Default Domain Controllers Policy.

考题 You need to design Group Policy object (GPO) settings to support the use of the Encrypting File System (EFS). Your solution must meet business and security requirements. Which two actions should you perform?()A、Designate a data recovery agent and issue an EFS certificate to the data recovery agent. Export the private key and restrict access to the exported keyB、Make the data recovery agent a local administrator on all client computersC、Remove the default data recovery agent from the Default Domain Policy GPO. Then, include the new data recovery agent insteadD、Delete the Default Domain Policy GPO. Configure a new GPO linked to the domain that does not specify a data recovery agent

考题 You are the network administrator for The network consists of a single Activev Directory domain named . All network servers run Windows Server 2003. purchases a new server to test applications in a stand-alone environment. The company's written security policy states that if a user attempts to log on by using an incorrect password three times in 30 minutes, the account is locked out. An administrator must unlock the account. You discover that users of the new server who have accounts that are locked out can log on again after 30 minutes. You need to ensure that the new server meets the requirements of the written security policy. What should you do?()A、Set the Reset account lockout counter after policy to 1.B、Set the Reset account lockout counter after policy to 99999.C、Set the Account lockout duration policy to 0.D、Set the Account lockout duration policy to 99999

考题 You are the network administrator in the New York office of TestKing. The company network consists of a single Active Directory domain The New York office currently contains one Windows Server 2003 file server named TestKingA. All file servers in the New York office are in an organizational unit (OU) named New York Servers. You have been assigned the Allow - Change permission for a Group Policy object (GPO) named NYServersGPO, which is linked to the New York Servers OU. The written company security policy states that all new servers must be configured with specified predefined security settings when the servers join the domain. These settings differ slightly for the various company offices. You plan to install Windows Sever 2003, on 15 new computers, which all functions as file servers. You will need to configure the specified security settings on the new file servers. TestKingA currently has the specified security settings configured in its local security policy. You need to ensure that the security configuration of the new file servers is identical to that of TestKingA. You export a copy of TestKingA's local security policy settings to a template file. You need to configure the security settings of the new servers, and you want to use the minimum amount of administrative effort. What should you do?()A、Use the Security Configuration and Analysis tool on one of the new servers to import the template file.B、Use the default Domain Security Policy console on one of the new servers to import the template file.C、Use the Group Policy Editor console to open NYServersGPO and import the template file.D、Use the default Local Security Policy console on one of the new servers to import the template file.

考题 You have an Exchange Server 2010 organization. Your company’s compliance policy states the following:.Delete e-mail messages sent to legal department users that are older than 180 days. .Delete e-mail messages sent to all other users that are older than 60 days You need to recommend a solution that meets the requirements of the compliance policy. What should you recommend?()A、Configure deleted item retention for all users.B、Configure Personal Archives for the legal department users.C、Create two Managed Folder mailbox policies. Use one policy for the legal department users. Use the other policy for all other users.D、Create two new message classifications. Use one message classification for the e-mails sent to legal department users. Use the other message classification for the e-mails sent to all other users.

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services,and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The TerminalServices server role is installed on the server. A Terminal Services application runs on the server. Now youreceive report from users saying that that the application stops responding. You monitor the memory usageon the server for a week and find that the application has a memory leak. A patch is not currently available.You create a new resource-allocation policy in Microsoft Windows System Resource Manager (WSRM).You configure a Process Matching Criteria named TrackShip and choose the application. You have toterminate the application when the application consumes more than half of the available memory on theserver. What action should you perform?()A、The resource-allocation policy and the maximum working set limit option should be set to half the available memory on the server. The new policy should be set as a Managing Policy.B、The resource-allocation policy and the maximum committed memory option should be set to half the available memory on the server. The new policy should be set as a Profiling Policy.C、The resource-allocation policy and the maximum committed memory option should be set to half the available memory on the server. The new policy should be set as a Managing Policy.D、The resource-allocation policy should be configured and the maximum working set limit option should be set to half the available memory on the server. The new policy should be set as a Profiling Policy.

考题 Terminal Services application runs on the server. Users report that the application stops responding. You monitor the memory usage on the server for a week. You discover that the application has a memory leak. A patch is not currently available.  You create a new resource-allocation policy in Microsoft Windows Server Resource Manager. You configure a Process Matching Criteria named TrackShip and select the application.  You need to terminate the application when the application consumes more than half of the available memory on the server. What should you do?()A、Configure the resource-allocation policy and set the maximum working set limit option to half the available memory on the server. Set the new policy as a Profiling Policy.B、Configure the resource-allocation policy and set the maximum working set limit option to half the available memory on the server. Set the new policy as a Managing Policy.C、Configure the resource-allocation policy and set the maximum committed memory option to half the available memory on the server. Set the new policy as a Profiling Policy.D、Configure the resource-allocation policy and set the maximum committed memory option to half the available memory on the server. Set the new policy as a Managing Policy.

考题 A System p administrator is looking at changing attributes of a logical volume.  Which of the following must be defined when it is created()A、placement of the logical volumeB、stripe size of the logical volumeC、inter-disk policy of the logical volumeD、intra-disk policy of the logical volume

考题 单选题You have an Exchange Server 2010 organization.  You have a global security group named Legal that contains all the members of your companys legaldepartment.  The companys security policy states that the Legal group must be able to search all mailboxes for e-mailmessages that contain specific keywords.  You need to recommend a solution for the organization that complies with the security policy.  What should you include in the solution?()A a Discovery Management role groupB a legal holdC administrator audit loggingD Mailbox journaling

考题 多选题Which three of the following are organizational objectives that should be addressed when developing a new VLAN implementation plan? ()Anetwork managementBimproving QoSCdetermining budgetDreducing costsEincreasing competitivenessFimproving customer support

考题 多选题Your network consists of three Active Directory forests. Forest trust relationships exist between all forests. Each forest contains one domain. All domain controllers run Windows Server 2008 R2. Your company has three network administrators. Each network administrator manages a forest and the Group Policy objects (GPOs) within that forest.   You need to create standard GPOs that the network administrators in each forest will use. The GPOs must meet the following requirements:   èThe GPOs must only contain settings for either user configurations or computer configurations. èThe number of GPOs must be minimized.   Which two actions should you perform?()AExport the new GPOs to .cab files. Ensure that the .cab files are available to the network administrator  in each forest.BCreate two new GPOs. Configure both GPOs to use the required user configurations and the required  computer configurations.CCreate two new GPOs. Configure one GPO to use the required user configuration. Configure the other GPO to use the required computer configuration.DBack up the Sysvol folder that is located on the domain controller where the new GPOs were created. Provide the backup to the network administrator in each forest.

考题 单选题An administrator is implementing a new data retention program for the company. Which of the following is the MOST important consideration as the new program is created? ()A  Awareness of company policy requirementsB  Differentiating between archiving and backup processesC  Awareness of potential legal requirementsD  Ensuring that the backups for the retention program cover key business areas

考题 多选题You need to configure the security settings for the new app servers.  Which two actions should you perform?()ACreate a Group policy object (GPO) for the web servers.BCreate a Group policy object (GPO) for the database servers.CModify the Default Domain Policy.DModify the Default Domain Controllers Policy.

考题 多选题You need to design Group Policy object (GPO) settings to support the use of the Encrypting File System (EFS). Your solution must meet business and security requirements. Which two actions should you perform?()ADesignate a data recovery agent and issue an EFS certificate to the data recovery agent. Export the private key and restrict access to the exported keyBMake the data recovery agent a local administrator on all client computersCRemove the default data recovery agent from the Default Domain Policy GPO. Then, include the new data recovery agent insteadDDelete the Default Domain Policy GPO. Configure a new GPO linked to the domain that does not specify a data recovery agent

考题 单选题An administrator is creating a new data retention policy. Which of the following is the MOST important consideration?()A Compile technical requirements for new policyB Comply with applicable laws and regulationsC Destroy the old data retention policyD Have hard copies of the new policy stored offsite