网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You need to configure a computer to encrypt all inbound connections by using IPSec. What should you do?()
A

From Network and Sharing Center, click Connect to a network.

B

From Network and Sharing Center, click Set up a new connection or network.

C

From Windows Firewall with Advanced Security, click Inbound Rules and then click New Rule.

D

From Windows Firewall with Advanced Security, click Connection Security Rules and then click NewRule.


参考答案

参考解析
解析: 暂无解析
更多 “单选题You need to configure a computer to encrypt all inbound connections by using IPSec. What should you do?()A From Network and Sharing Center, click Connect to a network.B From Network and Sharing Center, click Set up a new connection or network.C From Windows Firewall with Advanced Security, click Inbound Rules and then click New Rule.D From Windows Firewall with Advanced Security, click Connection Security Rules and then click NewRule.” 相关考题
考题 Your network contains a Windows Server Update Services (WSUS) server.You have an organizational unit (OU) named Sales. The Sales OU contains all of the computer objects for the sales department. You enable client-side targeting for the Sales OU and set the target group name to Sales-Computers.You restart a sales computer.You discover that the computer is not added to the Sales-Computer computer group in WSUS.You need to ensure that all sales computers are added to the Sales-Computers group.Which options should you configure?()A. Automatic ApprovalsB. ComputersC. PersonalizationD. Products and Classifications

考题 You have a computer that runs Windows Vista.You need to prevent all inbound traffic to your computer without being notified.What should you do?() A.AB.BC.CD.D

考题 You have a computer that runs Windows Vista.You need to configure your computer so that you can interact with your desktop when you are prompted for user account control permissions.What should you do?()A.AB.BC.CD.D

考题 You have a domain controller that runs Windows Server 2008 and is configured as a DNS server. You need to record all inbound DNS queries to the server. What should you configure in the DNS Manager console()A、Enable debug logging.B、Enable automatic testing for simple queries.C、Enable automatic testing for recursive queries.D、Configure event logging to log errors and warnings.

考题 You have a domain controller that runs Windows Server 2008 R2 and is configured as a DNS  server.     You need to record all inbound DNS queries to the server.     What should you configure in the DNS Manager console()A、Enable debug logging.B、Enable automatic testing for simple queries.C、Enable automatic testing for recursive queries.D、Configure event logging to log errors and warnings.

考题 You have a domain controller that runs Windows Server 2008 and is configured as a DNS server You need to record all inbound DNS queries to the server. What should you configure in the DNS Manager console()A、Enable debug logging.B、Enable automatic testing for simple queries.C、Enable automatic testing for recursrve queries.D、Configure event logging to log errors and warnings.

考题 You discover audit log entries that report attempts to log on to your computer. You need to be notified of all logon attempts that occur on your computer.  What should you do?()A、Enable the Problem Reporting feature for all users.B、Configure a custom view to monitor failed logon events on your computer.C、Use the Computer Management console to connect to your computer from another computer and monitor the audit logs.D、In the Event Viewer window, attach a task to a failed logon event. Configure this task to send an e-mail message to your e-mail account.

考题 You need to configure a computer to encrypt all inbound connections by using IPSec. What should you do?()A、From Network and Sharing Center, click Connect to a network.B、From Network and Sharing Center, click Set up a new connection or network.C、From Windows Firewall with Advanced Security, click Inbound Rules and then click New Rule.D、From Windows Firewall with Advanced Security, click Connection Security Rules and then click NewRule.

考题 You have a computer that runs Windows 7 Professional. A removable drive is attached to the computer.You need to protect data on the removable drive by using BitLocker To Go.  What should you do first? ()A、Upgrade the computer to Windows 7 Enterprise.B、Install all Windows Updates for Windows 7 Professional.C、Issue a digital certificate for the Encrypting File System (EFS).D、Select the Encrypt contents to secure data checkbox from the properties on the removable drive.

考题 Your portable computer is in sleep mode. When you resume work on the portable computer, you are not prompted for a password.  You need to ensure that you are prompted for a password each time the portable computer recovers from sleep mode.  What should you do?()A、Configure the computer to hibernate when not in use.B、In the current power plan settings, configure the computer to require a password when recovering from sleep mode.C、Configure the computer to use the High Performance power plan.D、Configure the screen saver settings to require a password on resumption of work.

考题 ou share a computer with other users.  You need to ensure that all application and device driver failure reports for this computer are submitted to Microsoft Problem Reports and Solutions.  What should you do?()A、After each error occurs, perform a Microsoft Windows Update scan.B、Turn on the Windows Problem Reporting feature for all users.C、Configure the computer to take part in the Microsoft Windows Customer Experience Improvement Program.D、Create a standard user account. Instruct all users to log on by using this standard user account. Configure auditing for this user account.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.You install and configure a single server to run Windows Server Update Services (WSUS). You configure the appropriate Group Policy settings to specify separate WSUS target groups for client and server computers. You need to ensure that computers automatically assign themselves to the correct computer group.  What should you do?()A、In the WSUS console, configure Computer Options so that Use group policy or registry settings on computers is selected.B、In the WSUS console, configure Computer Options so that Use the Move Computers Task in Windows Server Update Services is selected.C、In the WSUS console, create the appropriate computer groups.D、Create organizational units (OUs) for each group.

考题 You need to configure the power settings of your portable computer so that the display turns off when it is inactive and running on battery power. You also need to ensure that the power settings of the hard disk remain unaffected.  What should you do?()A、Change the advanced power settings of the Balanced power plan.B、Configure the portable computer to use the Power saver power plan.C、Configure the portable computer to use the High performance power plan.D、Restore the Power Saver power plan to the default settings.

考题 You have 15 computers that run Windows 7. You need to implement a monitoring solution that meets thefollowing requirements. Sends an e-mail notification when an application error is logged in the event log  Runs a script to restart the computer if an application error occurs between 17:00 and 07:00 Minimizes the administrative effort required to monitor applications. What should you do?()A、On all the computers, configure a custom view. Configure a custom task for the application error events.B、On a computer, configure a custom view to display the application errors. Configure a custom task forthe application error events.C、On a central computer, configure an event subscription. On all of the computers, configure a customtask in the Forwarded Events log.D、On all the computers, configure an event subscription to a central computer. On the central computer,configure a custom task in the Forwarded Events log.

考题 You have a domain controller that runs Windows Server 2008 R2 and is configured as a DNS server.  You need to record all inbound DNS queries to the server.  What should you configure in the DNS Manager console()A、Enable debug logging.B、Enable automatic testing for simple queries.  The safer , easier way to help you pass any IT exams.  9 / 90C、Enable automatic testing for recursive queries.D、Configure event logging to log errors and warnings.

考题 Your network contains an Active Directory domain named contoso.com.  You have a management computer named Computer1 that runs Windows 7.   You need to forward the logon events of all the domain controllers in contoso.com to Computer1. All new  domain controllers must be dynamically added to the subscription.   What should you do()A、From Computer1, configure source-initiated event subscriptions. From a Group Policy object (GPO)  linked to the Domain Controllers organizational unit (OU), configure the Event Forwarding node.B、From Computer1, configure collector-initiated event subscriptions. From a Group Policy object (GPO)  linked to the Domain Controllers organizational unit (OU), configure the Event Forwarding node.C、From Computer1, configure source-initiated event subscriptions. Install a serverauthentication  certificate on Computer1. Implement autoenrollment for the Domain Controllers organizational unit (OU).D、From Computer1, configure collector-initiated event subscriptions. Install a server authentication  certificate on Computer1. Implement autoenrollment for the Domain Controllers organizational unit (OU).

考题 Your network contains an Active Directory domain named contoso.com. You have a management  computer named Computer1 that runs Windows 7.     You need to forward the logon events of all the domain controllers in contoso.com to Computer1.     All new domain controllers must be dynamically added to the subscription.   What should you do()A、From Computer1, configure source-initiated event subscriptions. From a Group Policy object (GPO) linked to the DoB、From Computer1, configure collector-initiated event subscriptions. From a Group Policy object (GPO) linked to the DC、From Computer1, configure source-initiated event subscriptions. Install a server authentication certificate on CompuD、From Computer1, configure collector-initiated event subscriptions. Install a server authentication certificate on Com

考题 You have a computer that runs Windows 7. You have a third-party application. You need to ensure that onlya specific version of the application runs on the computer. The solution must ensure that all applicationrestrictions are based on the application vendor s digital signature.  What should you do?()A、From Application Control Policies, configure a path rule.B、From Application Control Policies, configure a publisher rule.C、From Software Restriction Policies, configure a path rule.D、From Software Restriction Policies, configure a certificate rule.

考题 You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()A、Encrypt customer information when it is stored and when it is being transmittedB、Require encrypted connections to the public Web site, which is hosted on the Web server on the perimeter networkC、Encrypt all marketing information on file servers and client computersD、Require encrypted connections to all file servers

考题 You need to design access to e-mail by Internet users. What should you do?()A、Configure front-end servers to use HTTP to communicate with back-end serversB、Configure the internal firewall to allow IPSec traffic between front-end and back-end Exchange serversC、Require all users to encrypt all outbound e-mail messagesD、Issue digital certificates to all remote users. Require the certificates to be used when authenticating to Outlook Web Access

考题 You need to design an authentication strategy for users of portable computers. Your solution must meet business requirements. What should you do?()A、Issue smart cards and smart card readers to all portable computer users. Configure the domain to require smart cards for login and to log off users who remote their smart cardsB、Configure the portable computers to connect to only wireless networks that use Wired Equivalent Privacy (WEP). Install digital certificates on all portable computersC、Install computer certificates on all portable computers. Configure all portable computers to respond to requests for IPSec encryptionD、Install biometric authentication devices on all portable computers. Configure the Default Domain Policy GPO to require complex passwords for all users

考题 单选题You need to design a security strategy for a remote e-mail access. What should you do?()A Require remote users to access e-mails by using Outlook Mobile AccessB Require Outlook Web Access users to install the secure MIME ActiveX-Control and to encrypt all messagesC On Outlook Web Access servers that accept connections from the Internet configure IIS to require SSL for all connectionsD On Outlook Web Access servers that accept connections from the Internet configure IIS to require Integrated Windows Authentication

考题 单选题You need to design an access control strategy for the financial data used by the accounting department. Your solution must meet business requirements. What should you do?()A Modify the properties of the computer object named P_FS2 to enable the Trust computer for delegation attribute. Instruct accounting department users to use Encrypting File System (EFS) to encrypt filesB Modify the properties of all accounting department user accounts to enable the Account is trusted for delegation attribute. Instruct accounting department users to use Encrypting File System (EFS) to encrypt filesC Modify the properties of accounting department computers to enable the Trust computer for delegation attribute. Configure accounting department client computers to use IPSec to communicate with P_FS2D Modify the properties of all administrator accounts in the forest to enable to Account is trusted for delegation attribute. Configure accounting department client computers to use IPSec to communicate with P_FS2

考题 单选题You have a domain controller that runs Windows Server 2008 and is configured as a DNS server You need to record all inbound DNS queries to the server. What should you configure in the DNS Manager console()A Enable debug logging.B Enable automatic testing for simple queries.C Enable automatic testing for recursrve queries.D Configure event logging to log errors and warnings.

考题 单选题You discover audit log entries that report attempts to log on to your computer. You need to be notified of all logon attempts that occur on your computer.  What should you do?()A Enable the Problem Reporting feature for all users.B Configure a custom view to monitor failed logon events on your computer.C Use the Computer Management console to connect to your computer from another computer and monitor the audit logs.D In the Event Viewer window, attach a task to a failed logon event. Configure this task to send an e-mail message to your e-mail account.

考题 单选题You need to design an authentication strategy for users of portable computers. Your solution must meet business requirements. What should you do?()A Issue smart cards and smart card readers to all portable computer users. Configure the domain to require smart cards for login and to log off users who remote their smart cardsB Configure the portable computers to connect to only wireless networks that use Wired Equivalent Privacy (WEP). Install digital certificates on all portable computersC Install computer certificates on all portable computers. Configure all portable computers to respond to requests for IPSec encryptionD Install biometric authentication devices on all portable computers. Configure the Default Domain Policy GPO to require complex passwords for all users

考题 单选题Your network contains a Windows Server Update Services (WSUS) server.You have an organizational unit (OU) named Sales. The Sales OU contains all of the computer objects for the sales department. You enable client-side targeting for the Sales OU and set the target group name to Sales-Computers.You restart a sales computer.You discover that the computer is not added to the Sales-Computer computer group in WSUS.You need to ensure that all sales computers are added to the Sales-Computers group. Which options should you configure?()A Automatic ApprovalsB ComputersC PersonalizationD Products and Classifications

考题 单选题You network contains a server named Server1. You have a computer named Computer1 that runs Windows XP Professional. Employees log on to Computer1 by using local user accounts. You need to configure the user profiles on Computer1 to be stored on Server1. What should you do?()A On Computer1, map a drive to an administrative share on Server1.  Configure each user's profile path to point to the mapped drive. B Create a shared folder on Server1.  Assign Full Control permissions to all users. On Computer1, configure each user's profile path to a folder in the shared folder. C Create a shared folder on Server1.  Assign Full Control permissions to all users. On Computer1, configure each user's home folder path to a folder in the shared folder. D On Computer1, map a drive from each client computer to an administrative share on Server1.  Configure each user's home folder path to point to the mapped drive.