网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Acme Booster Corporation has a corporate policy stating that all routing devices will have their configurations backed up to a corporate server on a weekly basis. Their CUE module is a component of the Cisco CallManager Express device. Which three parameters will ensure successful backup of the CUE module configuration?()
A

ATFTP server must be present and available to the CUE module.

B

The CUE module must have modify permissions on the backup server directory.

C

The CUE module must be in an offline mode prior to instituting the backup.

D

An FTP server must be present and available to the CUE module.

E

The CUE module must copy the configuration and messages to separate directories on the backup server.

F

The CUE module must have read and write permissions on the backup server directory.


参考答案

参考解析
解析: 暂无解析
更多 “多选题Acme Booster Corporation has a corporate policy stating that all routing devices will have their configurations backed up to a corporate server on a weekly basis. Their CUE module is a component of the Cisco CallManager Express device. Which three parameters will ensure successful backup of the CUE module configuration?()AATFTP server must be present and available to the CUE module.BThe CUE module must have modify permissions on the backup server directory.CThe CUE module must be in an offline mode prior to instituting the backup.DAn FTP server must be present and available to the CUE module.EThe CUE module must copy the configuration and messages to separate directories on the backup server.FThe CUE module must have read and write permissions on the backup server directory.” 相关考题
考题 One of the main disadvantages of the corporate form. is the( ) A、professional managementB、double taxation of dividendsC、charterD、corporation must issue stock

考题 (ii) Illustrate the benefit of revising the corporate structure by calculating the corporation tax (CT) payablefor the year ended 31 March 2006, on the assumptions that:(1) no action is taken; and(2) an amended structure as recommended in (i) above is implemented from 1 June 2005. (3 marks)

考题 Your network contains an Active Directory domain. The network has DirectAccess deployed.You deploy the DirectAccess Connectivity Assistant (DCA) to all client computers.You need to ensure that users can view their DirectAccess status by using the DCA.Which two group policy settings should you configure?()A. Dynamic Tunnel Endpoints (DTEs)B. Corporate Portal SiteC. Corporate ResourcesD. PortalName

考题 Most of the companies have a policy stating that each employee must _______ a formal, annual, and written performance appraisal by their manager.A.give B.be given C.be giving D.have given

考题 lie got a job with the corporation in 2000 and has worked there__________A.since B.ever since C.ever before D.till then

考题 Since independence the Irish Republic has adhered to().Aa policy of protectionismBa policy of containmentCa policy of military allianceDa policy of neutrality and nonalignment

考题 Since independence the Irish Republic has adhered to().A、a policy of protectionismB、a policy of containmentC、a policy of military allianceD、a policy of neutrality and nonalignment

考题 An organization has decided to deploy an IBM Tivoli Access Manager for Enterprise Single-on solution to help address security and productivity issues. Per their corporate security policy, the organization has detailed requirements related to password management for their enterprise applications.  Which password requirements need to be captured?()A、details related to application user ID requirementsB、policy requirements related to the number of applications that a user can accessC、policy requirements for application and user initiated password resets and password complexityD、do nothing as password policy requirements are best addressed within the application space rather than in an Enterprise Single Sign-On project

考题 You are designing a Windows Azure application.   Corporate policy dictates that you must retain all application logs.   You need to recommend an approach for complying with the corporate policy.  What should you recommend?()A、 Perform on-demand transfers.B、 Configure scheduled transfers.C、 Configure a diagnostic trace listener.D、 Increase the diagnostics buffer quotas.

考题 Your network contains an Active Directory domain. The network has DirectAccess deployed.You deploy the DirectAccess Connectivity Assistant (DCA) to all client computers.You need to ensure that users can view their DirectAccess status by using the DCA.Which two group policy settings should you configure?()A、Dynamic Tunnel Endpoints (DTEs)B、Corporate Portal SiteC、Corporate ResourcesD、PortalName

考题 CIS的英文词组翻译是下列哪一个?()A、Corporation Identity SystemB、Corporate Identity SystemC、Corporate Idea SystemD、Corporation Idea System

考题 A companys computer policy dictates that all users workstations must use the companys corporate web page as their default home page.  Which of the following methods should an administrator use to BEST comply with this policy?()A、 Configure a logon script to set the homepage at logon.B、 Set the default homepage to the corporate website in Group Policy.C、 Manually configure the homepage on all workstations and setup trace logs to ensure compliance.D、 Set the default homepage to the corporate website on the base computer image.

考题 Your company's corporate network uses Network Access Protection (NAP).Users are able to connect to the corporate network remotely.You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do?()A、Apply an IPsec NAP policy.B、Configure a NAP policy for 802.1X wireless connections.C、Configure VPN connections to use MS-CHAP v2 authentication.D、Restrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP.

考题 Your corporate network has a member server named RAS1 that runs Windows Server 2008 R2. You configure RAS1 to use the Routing and Remote Access Services (RRAS).The companys remote access policy allows members of the Domain Users group to dial in to RAS1. The company issues smart cards to all employees.You need to ensure that smart card users are able to connect to RAS1 by using a dial-up connection.What should you do?()A、Install the Network Policy Server (NPS) server role on RAS1.B、Create a remote access policy that requires users to authenticate by using SPAP.C、Create a remote access policy that requires users to authenticate by using EAP-TLS.D、Create a remote access policy that requires users to authenticate by using MS-CHAP v2.

考题 Network Access Protection (NAP) is configured for the corporate network.Users connect to the corporate network by using portable computers.The company policy requires confidentiality of data when the data is in transit between the portable computers and the servers.You need to ensure that users can access network resources only from computers that comply with the company policy.What should you do?()A、Create an IPsec Enforcement Network policy.B、Create an 802.1X Enforcement Network policy.C、Create a Wired Network (IEEE 802.3) Group policy.D、Create an Extensible Authentication Protocol (EAP) Enforcement Network policy.

考题 Your corporate network has a member server named RAS1 that runs Windows Server 2008. You configure RAS1 to use the Routing and Remote Access Service (RRAS) The companys remote access policy allows members of the Domain Users group to dial in to RAS1. The company issues smart cards to all employees. You need to ensure that smart card users are able to connect to RAS1 by using a dial-up connection. What should you do?()A、 Install the Network Policy Server (NPS) on the RAS1 serverB、 Create a remote access policy that requires users to authenticate by using SPAPC、 Create a remote access policy that requires users to authenticate by using EAP-TLSD、 Create a remote access policy that requires users to authenticate by using MS-CHAP v2

考题 You have a single Active Directory directory service domain. You create organizational units (OUs)  named Corporate and Support. You move the corporate user and computer accounts into the Corporate  OU. You move the accounts of computers in the support department into the Support OU. You need to ensure that users have one screensaver while using computers that are in the Corporate OU, and aseparate screensaver while using computers that are in the Support OU.  What should you do?()A、 Create a new parent OU for the Corporate and Support OUs and name the parent OU Users. Move all user objects to the Users OU, and then create and link a Group Policy object (GPO) with the screensaver setting to the Users OU.B、 Create and link a Group Policy object (GPO) with the screensaver setting to the Support OU and select the Block Inheritance option.C、 Create and link a Group Policy object (GPO) with the screensaver setting to the Corporate OU, create and link a GPO with the screensaver setting to the Support OU, and then enable loopback processing in Replace mode on the Support OUs GPO.D、 Create and link a Group Policy object (GPO) with the screensaver setting to the Support OU and select the Enforced option.

考题 Your company, A. Datum Corporation, has a single Active Directory domain named intranet.adatum.com. The  domain has two domain controllers that run Windows Server 2008 R2 operating system. The  domain controllers also run DNS servers.   The intranet.adatum.com DNS zone is configured as an Active Directory-integrated zone with the  Dynamic updates setting configured to Secure only. A new corporate security policy requires that  the intranet.adatum.com DNS zone must be updated only by domain controllers or member  servers.   You need to configure the intranet.adatum.com zone to meet the new security policy requirement.     Which two actions should you perform()A、Remove the Authenticated Users account from the Security tab of the intranet.adatum.com DNS zone properties.B、Assign the SELF Account Deny on Write permission on the Security tab of the intranet.adatum.com DNS zone propC、Assign the server computer accounts the Allow on Write All Properties permission on the Security tab of the intraneD、Assign the server computer accounts the Allow on Create All Child Objects permission on the Security tab of the int

考题 Your  company,  A.  Datum  Corporation,  has  a  single  Active  Directory  domain  named  intranet.adatum.com. The domain has two domain controllers that run Windows Server 2008 R2  operating system. The domain controllers also run DNS servers.  The intranet.adatum.com DNS zone is configured as an Active Directoryintegrated zone with the  Dynamic updates setting configured to Secure only.  A new corporate security policy requires that the intranet.adatum.com DNS zone must be updated only by  domain controllers or member servers.  You need to configure the intranet.adatum.com zone to meet the new security policy requirement.  Which two actions should you perform()A、Remove the Authenticated Users account from the Security tab of the intranet.adatum.com DNS zone  properties.B、Assign the SELF Account Deny on Write permission on the Security tab of the intranet.adatum.com  DNS zone properties.C、Assign the server computer accounts the Allow on Write All Properties permission on the Security tab  of the intranet.adatum.com DNS zone properties.D、Assign the server computer accounts the Allow on Create All Child Objects permission on the Security  tab of the intranet.adatum.com DNS zone properties.

考题 Your network consists of a single Active Directory forest that contains a root domain and two child domains. All servers run Windows Server 2008 R2.  A corporate policy has the following requirements:   èAll local guest accounts must be renamed and disabled. èAll local administrator accounts must be renamed.   You need to recommend a solution that meets the requirements of the corporate policy. What should you recommend?()A、Implement a Group Policy object(GPO) for each domain.B、Implement a Group Policy object(GPO) for the root domain.C、Deploy Network Policy and Access Services(NPAS)on all domain controllers in each domain. D、Deploy Active Directory Rights Management Services(AD RMS)on the root domain controllers.

考题 Your companys corporate network uses Network Access Protection (NAP). Users are able to connect to the corporate network remotely. You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible.  What should you do()?  A、Apply an IPsec NAP policy.B、Configure a NAP Policy for 802.1x Wireless connectionsC、Configure VPN connections to use MS-CHAP v2 authenticationD、Restrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP

考题 单选题An organization has decided to deploy an IBM Tivoli Access Manager for Enterprise Single-on solution to help address security and productivity issues. Per their corporate security policy, the organization has detailed requirements related to password management for their enterprise applications.  Which password requirements need to be captured?()A details related to application user ID requirementsB policy requirements related to the number of applications that a user can accessC policy requirements for application and user initiated password resets and password complexityD do nothing as password policy requirements are best addressed within the application space rather than in an Enterprise Single Sign-On project

考题 单选题You are designing a Windows Azure application.   Corporate policy dictates that you must retain all application logs.   You need to recommend an approach for complying with the corporate policy.  What should you recommend?()A  Perform on-demand transfers.B  Configure scheduled transfers.C  Configure a diagnostic trace listener.D  Increase the diagnostics buffer quotas.

考题 单选题Since independence the Irish Republic has adhered to().A a policy of protectionismB a policy of containmentC a policy of military allianceD a policy of neutrality and nonalignment

考题 多选题You are an enterprise administrator for Cer-tech .com. The corporate network of the company consists ofan Active Directory domain. All the servers on the network run Windows Server 2008. The network runs aTerminal services role on a server to enable remote users to run commonly required applications from theirterminal. A Terminal Services application called App1 that runs on the server has suddenly stopped responding. Todiagnose the problem, you monitored the memory usage on the server for a week and discover that App1application has a memory leak. To resolve the problem, you first looked for a patch but that was not currently available. So you created a new resource-allocation policy in Microsoft Windows Server ResourceManager and configured a Process Matching Criteria named TrackMem for the application. Which of the following options would you choose to terminate the application when the application consumes more than half of the available memory on the server?()AConfigure the resource-allocation policy and set the maximum working set limit option to half theavailable memory on the server.BConfigure the resource-allocation policy and set the maximum committed memory option to half theavailable memory on the server.CSet the new policy as a Profiling Policy.DSet the new policy as a Managing Policy.

考题 单选题Your company has users who connect remotely to the main office through a Windows Server 2008 VPN server.You need to ensure that users cannot access the VPN server remotely from 22:00 to 05:00. What should you do?()A Create a network policy for VPN connections. Modify the Day and time restrictions.B Create a network policy for VPN connections. Apply an IP filter to deny access to the corporate network.C Modify the Logon hours for all user objects to specify only the VPN server on the Computer restrictions option.D Modify the Logon Hours for the default domain policy to enable the Force logoff when logon hours expire option.

考题 单选题Network Access Protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The company policy required confidentiality of data when the data is in transmit between the portable computers and the servers. You need to ensure taht users can access network resources only from computers that comply with the company policy. What should you do? ()A  Create an IPsec Enforcement Network policyB  Create an 802.1X enforcement network policyC  Create a wired network (IEEE 802.3) Group PolicyD  Create an Extensible Authentication Portocol (EAP) Enforcement Network Policy