网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
You need to design a strategy to increase security for the client computers in the finance department. Which two actions should you perform?()
A

Enable automatic certificate enrollment

B

Enforce smart card logons

C

Enable Encrypting File System (EFS) for offline files

D

Enable a screen saver password


参考答案

参考解析
解析: 暂无解析
更多 “多选题You need to design a strategy to increase security for the client computers in the finance department. Which two actions should you perform?()AEnable automatic certificate enrollmentBEnforce smart card logonsCEnable Encrypting File System (EFS) for offline filesDEnable a screen saver password” 相关考题
考题 你们需要安保专家对场馆做安全评估吗?A.Do you need a security expert to value the potential danger of the region?B.Do you need a security expert to calculate the potential adventure of the area?C.Do you need a security expert to account the potential risks of the region?D.Do you need a security expert to evaluate the potential risks of the place?

考题 Your company has 1,000 client computers. Each client computer has 1 GB of RAM. You are planning to deploy Windows 7 Enterprise.   You need to design a zero-touch deployment strategy to increase the number of client computers that can be imaged at one time.   What should you do?()A、Increase the amount of RAM on the client computers.B、Change from unicast to multicast deployment of images.C、Change from multicast to unicast deployment of images.D、Decrease the trivial file transfer protocol (TFTP) block size on the TFTP server.

考题 You need to design a method to standardize and deploy a baseline security configuration for servers. You solution must meet business requirements. What should you do?()A、Create a script that installs the Hisecdc.inf security templateB、Use a GPO to distribute and apply the Hisec.inf security templateC、Use the System Policy Editor to configure each server’s security settingsD、Use a GPO to distribute and apply a custom security template

考题 You need to design a security strategy for VPN2. Your solution must meet business requirements. What should you do?()A、Create and configure a new security template. Import the template into the Default Domain Policy Group Policy object (GPO)B、Install Internet Authentication Service (IAS) on RAS1. Configure VPN2 to be the RADIUS client of RAS1. Configure the remote access policy on VPN2C、Create and configure a new security template. Import the template into the local policy on VPN2D、Move VPN2 into the VPN Servers OU. Configure the remote access policy on VPN2

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains 50 application servers that run Windows Server 2003.   The security configuration of the application servers is not uniform. The application servers were deployed by local administrators who configured the settings for each of the application servers differently based on their knowledge and skills. The application servers are configured with different authentication methods, audit settings, and account policy settings.   The security team recently completed a new network security design. The design includes a baseline configuration for security settings on all servers. The baseline security settings use the Hisecws.inf predefined security template. The design also requires modified settings for servers in an application role. These settings include system service startup requirements, renaming the administrator account, and more stringent account lockout policies. The security team created a security template named Application.inf that contains the modified settings.   You need to plan the deployment of the new security design. You need to ensure that all security settings for the application servers are standardized, and that after the deployment, the security settings on all application servers meet the design requirements.   What should you do? ()A、 Apply the Setup security.inf template first, the Hisecws.inf template next, and then the Application.inf template.B、 Apply the Application.inf template and then the Hisecws.inf template.C、 Apply the Application.inf template first, the Setup security.inf template next, and then the Hisecws.inf template.D、 Apply the Setup security.inf template and then the Application.inf template.

考题 You need to design an audit strategy for Southbridge Video. Your solution must meet business requirements.What should you do?()A、Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPOB、Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPOC、Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPOD、Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPO

考题 You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()A、Require client computers to connect to the marketing application by using a VPN connectionB、Use IPSec to encrypt communications between the servers in the New York and Atlanta officesC、Require the high security setting on Terminal Services connections to the marketing applicationD、Configure all marketing application Web pages to require SSL

考题 You need to recommend a Group Policy strategy for the Remote Desktop servers. What should you include in the recommendation?()A、block inheritanceB、loopback processingC、security filteringD、WMI filtering

考题 You need to design the consolidation strategy for the Promotions and Partners databases. You want to choose a strategy that results in the best database performance while maintaining the permissions of end users in each database.What consolidation strategy should you choose?()A、Place each database in a separate instance running on SQL2.B、Place each database in a separate instance running on SQL3.C、Place both databases in a single instance running on SQL2.D、Place both databases in a single instance running on SQL3.

考题 You need to design a security strategy for the DHCP servers in the Seattle office. Which two actions should you perform?()A、Disable all unnecessary services on each DHCP serverB、Modify the discretionary access control lists (DACLs) in Active Directory so that only members of the Enterprise Admins security group can authorize additional DHCP serversC、Use an IPSec policy that allows only the packets necessary for DHCP and domain membership for each DHCP serverD、Install a digital certificate for SSL on each DHCP server

考题 You need to design an access control strategy for the Payment folder for the Sales Managers group. What should you do?()A、Use IPSec in transport modeB、Use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV)C、Use PEAP-EAP-TLSD、Use Encrypting File System (EFS) remote encryption

考题 You need to design an administrative control strategy for Denver administrators. What should you do?()A、Create a security group named HelpDesk. Add the HelpDesk group to the Enterprise Admins group in both domainsB、Create a security group named HelpDesk. Add the HelpDesk group to the Domain Admins groups in both domainsC、Add the Domain Admins group in the litwareinc.com domain to the Domain Admins group in the contoso.com domain. Delegate full control of the litwareinc.com domain to the Domain Admins group in the contoso.com domainD、Create a security group named HelpDesk for each office. Delegate administrative tasks to their respective OU or domain.Delegate full control of the contoso.com domain to the Domain Admins group from the litwareinc.com domain

考题 You need to design an access control and permission strategy for user objects in Active Directory.What should you do?()A、Make the members of the AdvancedSupport security group members of the Domain Admins security groupB、Give each desktop support technician permission to reset passwords for the top-level OU that contains user accounts at their own locationC、Delegate full control over all OUs that contain user accounts to all AllSupport  security groupD、Change the permissions on the domain object and its child objects so that the BasicSupport security group is denied permissions. Then, add a permission to each OU that contains user accounts that allows AllSupport security group members to reset passwords in that OU

考题 You need to recommend a security strategy for WebApp2 that meets the company’s applicaton  requirements.What should you include in the recommendation?()A、Basic authentication and connection security rulesB、Basic authentication and SSLC、Digest authentication and connection security rulesD、Digest authentication and SSL

考题 You need to design a patch management strategy for Southbridge Video. Your solution must meet business requirements. What should you do?()A、Configure all client computers to use Automatic Updates to obtain security patches from the Windows Update Web site. Test and install all patchesB、Configure a batch file to download security patches daily. Distribute the security patches by using a.zap file and the Default Domain Policy Group Policy object (GPO)C、Deploy a Software Update Services (SUS) server. Test all security patches and then approve them. Configure all client computers to automatically obtain updates from the serverD、Configure a batch file to download security patches daily. Manually install the security patches on all computers

考题 You need to design a password policy that meets business requirements. What should you do? Select all that apply.()A、Increase the number of passwords that are rememberedB、Disable reversible encryptionC、Set the minimum password age to zero daysD、Increase the maximum password age

考题 You need to design a strategy to ensure that all servers are in compliance with the business requirements for maintaining security patches. What should you do?()A、Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the domainB、Log on to each server and run Security Configuration and Analysis to analyze the security settings by using a custom security templateC、Create a logon script to run the secedit command to analyze all servers in the domainD、Run the Microsoft Baseline Security Analyzer (MBSA) on a server to scan for Windows vulnerabilities on all servers in the domain

考题 单选题You need to design a security strategy for a remote e-mail access. What should you do?()A Require remote users to access e-mails by using Outlook Mobile AccessB Require Outlook Web Access users to install the secure MIME ActiveX-Control and to encrypt all messagesC On Outlook Web Access servers that accept connections from the Internet configure IIS to require SSL for all connectionsD On Outlook Web Access servers that accept connections from the Internet configure IIS to require Integrated Windows Authentication

考题 单选题You need to design an access control strategy for the Payment folder for the Sales Managers group. What should you do?()A Use IPSec in transport modeB Use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV)C Use PEAP-EAP-TLSD Use Encrypting File System (EFS) remote encryption

考题 单选题Your company has 1,000 client computers. Each client computer has 1 GB of RAM. You are planning to deploy Windows 7 Enterprise.   You need to design a zero-touch deployment strategy to increase the number of client computers that can be imaged at one time.   What should you do?()A Increase the amount of RAM on the client computers.B Change from unicast to multicast deployment of images.C Change from multicast to unicast deployment of images.D Decrease the trivial file transfer protocol (TFTP) block size on the TFTP server.

考题 单选题You need to design a patch management strategy for Southbridge Video. Your solution must meet business requirements. What should you do?()A Configure all client computers to use Automatic Updates to obtain security patches from the Windows Update Web site. Test and install all patchesB Configure a batch file to download security patches daily. Distribute the security patches by using a.zap file and the Default Domain Policy Group Policy object (GPO)C Deploy a Software Update Services (SUS) server. Test all security patches and then approve them. Configure all client computers to automatically obtain updates from the serverD Configure a batch file to download security patches daily. Manually install the security patches on all computers

考题 单选题You need to design the consolidation strategy for the Promotions and Partners databases. You want to choose a strategy that results in the best database performance while maintaining the permissions of end users in each database.What consolidation strategy should you choose?()A Place each database in a separate instance running on SQL2.B Place each database in a separate instance running on SQL3.C Place both databases in a single instance running on SQL2.D Place both databases in a single instance running on SQL3.

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains 50 application servers that run Windows Server 2003.   The security configuration of the application servers is not uniform. The application servers were deployed by local administrators who configured the settings for each of the application servers differently based on their knowledge and skills. The application servers are configured with different authentication methods, audit settings, and account policy settings.   The security team recently completed a new network security design. The design includes a baseline configuration for security settings on all servers. The baseline security settings use the Hisecws.inf predefined security template. The design also requires modified settings for servers in an application role. These settings include system service startup requirements, renaming the administrator account, and more stringent account lockout policies. The security team created a security template named Application.inf that contains the modified settings.   You need to plan the deployment of the new security design. You need to ensure that all security settings for the application servers are standardized, and that after the deployment, the security settings on all application servers meet the design requirements.   What should you do? ()A  Apply the Setup security.inf template first, the Hisecws.inf template next, and then the Application.inf template.B  Apply the Application.inf template and then the Hisecws.inf template.C  Apply the Application.inf template first, the Setup security.inf template next, and then the Hisecws.inf template.D  Apply the Setup security.inf template and then the Application.inf template.

考题 单选题You need to design a group membership strategy for the EditorialAdmins group. What should you do?()A Move the EditorialAdmins group to the Servers OU in the editorial departmentB Move the members of the EditorialAdmins group to the Editorial OUC Move the members of the EditorialAdmins group to the New York OUD Move the EditorialAdmins group to the New York OU

考题 单选题You need to design a monitoring strategy to meet business requirements for data on servers in the production department. What should you do?()A Use the Microsoft Baseline Security Analyzer (MBSA) to scan for Windows vulnerabilities on all servers in the production departmentB Run Security and Configuration Analysis to analyze the security settings of all servers in the production departmentC Enable auditing for data on each server in the production department. Run System Monitor on all servers in the production department to create a counter log that tracks activity for the Objects performance objectD Create a Group Policy Object (GPO) that enables auditing for object access and link it to the product department’s Servers OU. Enable auditing for data on each server in the production department

考题 单选题You need to design a method to monitor the security configuration of the IIS server to meet the requirements in the written security policy. What should you do?()A Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the IIS server computer accountB Run the Microsoft Baseline Security Analyzer (MBSA) on the IIS server and scan for vulnerabilities in Windows and IIS checksC Run Security Configuration and Analysis to analyze the IIS server’s security settings by using a custom security templateD On the IIS server, run the gpresult command from a command prompt and analyze the output

考题 单选题You need to design a security strategy for VPN2. Your solution must meet business requirements. What should you do?()A Create and configure a new security template. Import the template into the Default Domain Policy Group Policy object (GPO)B Install Internet Authentication Service (IAS) on RAS1. Configure VPN2 to be the RADIUS client of RAS1. Configure the remote access policy on VPN2C Create and configure a new security template. Import the template into the local policy on VPN2D Move VPN2 into the VPN Servers OU. Configure the remote access policy on VPN2