网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You need to design a PKI solution that meets business and security requirements. What should you do?()
A

Implement an enterprise root CA in the corp.woodgrovebank.com domain.Implement subordinate CAs in each child domain. Take the root CA offline

B

Implement an enterprise root CA in the corp.woodgrovebank.com domain

C

Implement an enterprise root CA in each of the child domains. Take the enterprise CA in each domain offline

D

Implement an enterprise root CA in the corp.woodgrovebank.com domain. Implement a stand-alone root CA in each of the child domains


参考答案

参考解析
解析: 暂无解析
更多 “单选题You need to design a PKI solution that meets business and security requirements. What should you do?()A Implement an enterprise root CA in the corp.woodgrovebank.com domain.Implement subordinate CAs in each child domain. Take the root CA offlineB Implement an enterprise root CA in the corp.woodgrovebank.com domainC Implement an enterprise root CA in each of the child domains. Take the enterprise CA in each domain offlineD Implement an enterprise root CA in the corp.woodgrovebank.com domain. Implement a stand-alone root CA in each of the child domains” 相关考题
考题 Which three pre-sales Smart Design documents are available to help you implement and install a solution?()A、 Design GuideB、 Cisco Configuration AssistantC、 Implementation GuideD、 Small Business Product GuideE、 Solution ProfileF、 Application Notes

考题 Which three post-sales Smart Design documents are available to help you better serve your customers? ()  A、 Quick Quoting ToolB、 Smart Business Communications SystemC、 Overview PresentationD、 Cisco Configuration AssistantE、 Solution ProfileF、 Small Business Product Guide

考题 You need to design a method to standardize and deploy a baseline security configuration for servers. You solution must meet business requirements. What should you do?()A、Create a script that installs the Hisecdc.inf security templateB、Use a GPO to distribute and apply the Hisec.inf security templateC、Use the System Policy Editor to configure each server’s security settingsD、Use a GPO to distribute and apply a custom security template

考题 You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. TestKing.com is configured to run an exchange 2010 environment.  You are planning to design the installation of numerous Mailbox servers. TestKing.com Service LevelAgreement (SLA) requires the following: * The servers need to support 1,500 concurrent connections to mailboxes.* The servers need to maintain a latency of less than 20 milliseconds. You ensure deployment success you need to ensure that your design comply with the Service LevelAgreement (SLA) of TestKing.com. What should you do?()A、The best option is to use the Exchange Server User Monitor (ExMon) tool to check if your design meets the requirements.B、The best option is to use the Exchange Server Load Generator (LoadGen) 2010 tool to check if your design meets the requirements.C、The best option is to use the Exchange Server Connectivity Analyzer (ExRCA) tool to check if your design meets the requirements.D、The best option is to use the Exchange Server Jetstress 2010 tool to check if you design meets there quirements.

考题 You need to recommend an availability solution for Site1 that meets the company's application requirements and business goals.   What should you include in the recommendation?()A、hardware load balancingB、Network Load Balancing (NLB)C、round robin DNSD、Windows Failover Clustering

考题 You need to design a PKI that meets business requirements. What should you do?()A、Move ATLCA1 offline and create an enterprise subordinate CA to issue certificatesB、Create a stand-alone subordinate CA to issue certificatesC、Use a qualified subordinate CAD、Configure certificate template access control lists (ACLs) on ATLCA1

考题 You are designing a remote administration solution that meets business requirements. You need to specify client or server software that will be required. What should you do?()A、Ensure that all client computers have a graphical Telnet client installedB、Ensure that all client computers have the Remote Desktop Connection client software installedC、Ensure that all server computers have RCONSOLE installed and that it is configured to start automaticallyD、Ensure that all server computers have Remote Administration (HTML) installed

考题 You need to recommend a monitoring solution for the file server that meets the technical  requirements.   What should you include in the recommendation?()A、Data Collector SetsB、File Server Resource Manger quotasC、File Server Resource Manger storage reportsD、NTFS disk quotas

考题 You need to recommend a delegation solution for CA1 that meets the company’s security requirements.   What should you include in the recommendation?()A、access-based enumeration (ABE)B、Active Directory delegationC、Authorization ManagerD、role separation

考题 You need to design a domain model that meets the company business and security requirements for controlling access to the new Web-based ordering application. What should you do?()A、Create a child OU within the existing domainB、Create a child domain of the existing domainC、Create a new domain in a new forest. Configure the new domain to trust the existing domainD、Create a new tree in the existing forest. Configure the new domain to trust the existing domain

考题 You need to design a remote administration solution for servers on the internal network. Your solution must meet business and security requirements. What should you do?()A、Permit administrators to use an HTTP interface to manage servers remotelyB、Permit only administrators to connect to the servers’ Telnet serviceC、Permit administrators to manage the servers by using Microsoft NetMeetingD、Require administrators to use Remote Desktop for Administration connections to manage the servers

考题 You need to recommend a management solution for Server1 that meets the company's security  requirements.   What should you include in the recommendation?()A、access-based enumeration (ABE)B、Authentication Mechanism AssuranceC、Authorization ManagerD、Hyper-V Manager

考题 You need to recommend a file recovery solution that meets the company's technical requirements. What should you include in the recommendation?()A、Distributed File System (DFS) ReplicationB、File Server Resource Manager (FSRM) active file screensC、shadow copiesD、Windows Storage Server 2008

考题 You need to design a password policy that meets business requirements. What should you do? Select all that apply.()A、Increase the number of passwords that are rememberedB、Disable reversible encryptionC、Set the minimum password age to zero daysD、Increase the maximum password age

考题 单选题You are planning to deploy Windows 7.   You have a custom line-of-business application that is not compatible with Windows 7.   You need to design a solution that allows the application to run.   What should you do?()A Use the Setup Analysis Tool.B Use the Compatibility Administrator.C Use the Update Compatibility Evaluator.D Use the Windows Compatibility Evaluator.

考题 多选题Which three pre-sales Smart Design documents are available to help you implement and install a solution?()ADesign GuideBCisco Configuration AssistantCImplementation GuideDSmall Business Product GuideESolution ProfileFApplication Notes

考题 单选题The company is evaluating using a new Active Directory domain to contain all customer user accounts. You need to design a monitoring or logging strategy that meets business and security requirements for the new Web-based ordering application. Your solution must minimize overhead on existing domain controllers and servers.  What should you do?()A Enable logon auditing in both the new and the existing domainsB Enable logon auditing only in the existing domainC Enable logon auditing only in the new domainD Enable logon auditing on only the Web server

考题 单选题You need to design an authentication solution for Terminal Services that meets the business requirements.What should you do?()A Configure the terminal server to use smart cardsB Configure IPSec to permit only Remote Desktop Protocol (RDP) connections to the terminal serverC Deny the Remote Desktop Users group access to the terminal serverD Restrict treyresearch.com users from logging on locally to the terminal server

考题 单选题You design a Business Intelligence (BI) solution by using SQL Server 2008. The solution contains a SQL Server 2008 Analysis Services (SSAS) database. A measure group in the database contains log entries of manufacturing events. These events include accidents, machine failures, production capacity metrics, and other activities. You need to implement a data mining model that meets the following requirements: Predict the frequency of different event types. Identify short-term and long-term patterns. Which algorithm should the data mining model use?()A  the Microsoft Time Series algorithmB  the Microsoft Decision Trees algorithmC  the Microsoft Linear Regression algorithmD  the Microsoft Logistic Regression algorithm

考题 单选题You need to design a security solution for the internally developed Web applications that meets business requirements. What should you do?()A Install and configure a stand-alone root certification authorative (CA) that is trusted by all company client computers. Issue encryption certificates to all developersB Install and configure root certification authority (CA) that is trusted by all company client computers. Issue code-signing certificates to all developersC Purchase a root certification from a trusted commercial certification authority (CA). Install the root certificated on all developers’ computersD Purchase a code-signing certificate from a trusted commercial certification authority (CA). Install the certificate on all company client computers

考题 单选题You need to recommend an access solution for the users in the sales department that meets the  museum's technical requirements.    What should you include in the recommendation?()A BranchCache in Distributed Cache modeB BranchCache in Hosted Cache modeC offline filesD transparent caching

考题 单选题You need to recommend a solution for the Web server content that meets the company’s technical requirements.   What should you include in the recommendation?()A Distributed File System (DFS) ReplicationB folder redirectionC HTTP redirectionD IIS Shared Configuration