网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
You need to design a security strategy for the Web folders and files created by the consultants and the internal Web developers. What are two possible ways to achieve this goal?()
A

Require the internal Web developers to use Telnet with Kerberos authentication. Require the consultants to use L2TP with IPSec

B

Require the internal Web developers to use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV). Require the consultants to use Microsoft.NET Passport authentication with Security Level 0

C

Require the internal Web developers to use Web Distributed Authoring and Versioning (WebDAV) over SSL.Require the consultants to use WebDAV over SSL

D

Require the internal Web developers to use L2TP with IPSec. Require the consultants to use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV)

E

Require the internal Web developers to use Web Distributed Authoring and Versioning (WebDAV) over SSL.Require the consultants to use L2TP with IPSec


参考答案

参考解析
解析: 暂无解析
更多 “多选题You need to design a security strategy for the Web folders and files created by the consultants and the internal Web developers. What are two possible ways to achieve this goal?()ARequire the internal Web developers to use Telnet with Kerberos authentication. Require the consultants to use L2TP with IPSecBRequire the internal Web developers to use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV). Require the consultants to use Microsoft.NET Passport authentication with Security Level 0CRequire the internal Web developers to use Web Distributed Authoring and Versioning (WebDAV) over SSL.Require the consultants to use WebDAV over SSLDRequire the internal Web developers to use L2TP with IPSec. Require the consultants to use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV)ERequire the internal Web developers to use Web Distributed Authoring and Versioning (WebDAV) over SSL.Require the consultants to use L2TP with IPSec” 相关考题
考题 You need to design a strategy to log access to the company Web site. What should you do?()A、Enable logging on the company Web site and select the NCSA Common Log File Format. Store the log files on a SQL Server computerB、Use System Monitor to create a counter log that captures network traffic to the Web server by using the Web Service object. Store the log files on a SQL Server computerC、Run the Network Monitor on the Web server. Create a capture filter for the SNA protocol and save the results to a capture file. Store the capture file on a SQL Server computerD、Enable logging on the company Web site and select ODBC Logging. Configure the ODBC logging options by using a nonadministrative SQL account

考题 You need to design the retrieval of advertising statistics without compromising security. What should you do?()A、Design a Notification Services solution that sends the advertising statistics to specified subscribers by e-mail.B、Design a SQL Server Web service that runs a stored procedure to return the statistics on a call from the advertisers application.C、Design a Database Mail solution that sends the advertising statistics to e-mail addresses that are specified in a table.D、Design a stored procedure to return the statistics on a call from the advertisers application.E、Design a user-defined function to return the statistics on a call from the advertisers application.

考题 You need to design a method to standardize and deploy a baseline security configuration for servers. You solution must meet business requirements. What should you do?()A、Create a script that installs the Hisecdc.inf security templateB、Use a GPO to distribute and apply the Hisec.inf security templateC、Use the System Policy Editor to configure each server’s security settingsD、Use a GPO to distribute and apply a custom security template

考题 You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()A、Require client computers to connect to the marketing application by using a VPN connectionB、Use IPSec to encrypt communications between the servers in the New York and Atlanta officesC、Require the high security setting on Terminal Services connections to the marketing applicationD、Configure all marketing application Web pages to require SSL

考题 You need to design a method to allow the new-ideas-testking.com Web site to function in accordance with security and business requirements.  What should you do?()A、Require a PPTP VPN for all connections to the Web serverB、Require that traffic between Web browsers and the Web server uses an L2TP/IPSec tunnelC、Require that traffic between Web browsers and the Web server uses SSLD、Require certificate mappings between the Web server and Active Directory

考题 You need to recommend a Group Policy strategy for the Remote Desktop servers. What should you include in the recommendation?()A、block inheritanceB、loopback processingC、security filteringD、WMI filtering

考题 You create a Web site. The Web site has many predefined roles and associated users that will be used for security purposes. You need to manage these roles and user accounts. Which tool should you use? ()A、the Microsoft .NET Framework Configuration toolB、the Code Access Security Policy toolC、the ASP.NET IIS Registration toolD、the Web Site Administration Tool

考题 You need to design a security strategy for the DHCP servers in the Seattle office. Which two actions should you perform?()A、Disable all unnecessary services on each DHCP serverB、Modify the discretionary access control lists (DACLs) in Active Directory so that only members of the Enterprise Admins security group can authorize additional DHCP serversC、Use an IPSec policy that allows only the packets necessary for DHCP and domain membership for each DHCP serverD、Install a digital certificate for SSL on each DHCP server

考题 Your network consists of a single Active Directory domain. The network contains five Windows Server 2008 R2 servers that host Web applications. You need to plan a remote management strategy to manage the Web servers.  Your plan must meet the following requirements: èAllow Web developers to configure features on the Web sites   èPrevent Web developers from having full administrative rights on the Web servers What should you include in your plan?()A、Configure request filtering on each Web server.B、Configure authorization rules for Web developers on each Web server.C、Configure the security settings in Internet Explorer for all Web developers by using a Group Policy.D、Add the Web developers to the Account Operators group in the domain.

考题 You need to design a method to update the content on the Web server. Your solution must meet business and security requirements. What are two possible ways to achieve this goal?()A、Use SSH to encrypt content as it is transferred to the Web server on the perimeter networkB、Install the Microsoft FrontPage Server Extensions, and use FrontPage to update contentC、Use Web Distributed Authoring and Versioning (WebDAV) over and SSL connection to the Web server to update contentD、Use FTP over an IPSec connection to transfer content to the Web serverE、Use Telnet to connect to the Web server, and then perform content changes directly on the server

考题 You need to design a security patch management strategy. Your solution must meet business and security requirements, and it must accommodate the company’s resource restrictions. What should you do?()A、Test and manually deploy updatesB、Deploy a Software Update Services (SUS) server. Test all updates and then approve them. Configure all client computers to automatically obtain updates from the serverC、Test all updates and then use a third-party utility to repackage updates in a Windows Installer file. Deploy the -.msi files by using Group PolicyD、Configure all client computers to use Automatic Updates to obtain security updates from the Windows Update Web site. Test all updates posted to the Windows Update Web site

考题 You are designing a security strategy for the public Web server. You solution must address the chief security officer’s concerns. What should you do?()A、Install  a Web server certificate on WEB1B、Enable Internet Connection Firewalll (ICF) on WEB1C、Configure IIS on WEB1 to operate in IIS 5.0 isolation modeD、Install and configure the URLScan ISAPI filer on WEB1

考题 You need to design an access control and permission strategy for user objects in Active Directory.What should you do?()A、Make the members of the AdvancedSupport security group members of the Domain Admins security groupB、Give each desktop support technician permission to reset passwords for the top-level OU that contains user accounts at their own locationC、Delegate full control over all OUs that contain user accounts to all AllSupport  security groupD、Change the permissions on the domain object and its child objects so that the BasicSupport security group is denied permissions. Then, add a permission to each OU that contains user accounts that allows AllSupport security group members to reset passwords in that OU

考题 You need to recommend a strategy for using managed service accounts on the Web servers.How many managed service accounts should you recommend?()A、1B、2C、3D、5

考题 You need to recommend a security strategy for WebApp2 that meets the company’s applicaton  requirements.What should you include in the recommendation?()A、Basic authentication and connection security rulesB、Basic authentication and SSLC、Digest authentication and connection security rulesD、Digest authentication and SSL

考题 You need to design a strategy to ensure that all servers are in compliance with the business requirements for maintaining security patches. What should you do?()A、Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the domainB、Log on to each server and run Security Configuration and Analysis to analyze the security settings by using a custom security templateC、Create a logon script to run the secedit command to analyze all servers in the domainD、Run the Microsoft Baseline Security Analyzer (MBSA) on a server to scan for Windows vulnerabilities on all servers in the domain

考题 单选题You need to design a security strategy for a remote e-mail access. What should you do?()A Require remote users to access e-mails by using Outlook Mobile AccessB Require Outlook Web Access users to install the secure MIME ActiveX-Control and to encrypt all messagesC On Outlook Web Access servers that accept connections from the Internet configure IIS to require SSL for all connectionsD On Outlook Web Access servers that accept connections from the Internet configure IIS to require Integrated Windows Authentication

考题 单选题You need to design an access control strategy for the Payment folder for the Sales Managers group. What should you do?()A Use IPSec in transport modeB Use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV)C Use PEAP-EAP-TLSD Use Encrypting File System (EFS) remote encryption

考题 单选题The company is evaluating using a new Active Directory domain to contain all customer user accounts. You need to design a monitoring or logging strategy that meets business and security requirements for the new Web-based ordering application. Your solution must minimize overhead on existing domain controllers and servers.  What should you do?()A Enable logon auditing in both the new and the existing domainsB Enable logon auditing only in the existing domainC Enable logon auditing only in the new domainD Enable logon auditing on only the Web server

考题 多选题You need to design a strategy to increase security for the client computers in the finance department. Which two actions should you perform?()AEnable automatic certificate enrollmentBEnforce smart card logonsCEnable Encrypting File System (EFS) for offline filesDEnable a screen saver password

考题 单选题You need to design a patch management strategy for Southbridge Video. Your solution must meet business requirements. What should you do?()A Configure all client computers to use Automatic Updates to obtain security patches from the Windows Update Web site. Test and install all patchesB Configure a batch file to download security patches daily. Distribute the security patches by using a.zap file and the Default Domain Policy Group Policy object (GPO)C Deploy a Software Update Services (SUS) server. Test all security patches and then approve them. Configure all client computers to automatically obtain updates from the serverD Configure a batch file to download security patches daily. Manually install the security patches on all computers

考题 单选题You create a Web site. The Web site has many predefined roles and associated users that will be used for security purposes. You need to manage these roles and user accounts. Which tool should you use? ()A the Microsoft .NET Framework Configuration toolB the Code Access Security Policy toolC the ASP.NET IIS Registration toolD the Web Site Administration Tool

考题 单选题You need to recommend a strategy for using managed service accounts on the Web servers.How many managed service accounts should you recommend?()A 1B 2C 3D 5

考题 多选题You need to design an access control strategy for the external and intranet Web sites. Which two actions should you perform?()AEnable SSL on the external Web site by using a Microsoft cryptographic service provider (CSP)BEnable Microsoft .NET Passport authentication on the external Web site. Use Passport Level 0 with SSL on the external Web siteCEnable SSL on the external Web site by using a commercial digital certificateDEnable SSL on the intranet Web site by using an internal server certificateEEnable SSL on the external Web site by using an internal server certificate

考题 单选题You need to design a security solution for WEB1. Your solution must address the chief information officer’s concerns. What should you do?()A Enable Web distributed Authoring and Versioning (WebDAV) components on WEB1B Install and configure the URLScan ISAPI filter on WEB1C Install a computer certificate on WEB1, and enable the Server (Request Security) IPSec policy on WEB1D Configure the Web site redirection option on the properties of WEB1 in the Internet Service Manager console