网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
You are designing a password management solution to meet the business and technical requirements.  Which two actions should you perform?hich two actions should you perform?()
A

Delegate the password management controls to the help desk staff.

B

Delegate the password management controls to the Domain Users group.

C

Configure the Default Domain Policy to enforce password expiration settings.

D

Configure the Default Domain Controller Policy to enforce password expiration settings.


参考答案

参考解析
解析: 暂无解析
更多 “多选题You are designing a password management solution to meet the business and technical requirements.  Which two actions should you perform?hich two actions should you perform?()ADelegate the password management controls to the help desk staff.BDelegate the password management controls to the Domain Users group.CConfigure the Default Domain Policy to enforce password expiration settings.DConfigure the Default Domain Controller Policy to enforce password expiration settings.” 相关考题
考题 You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()A、IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsB、a list of the customer requirementsC、detailed security device specificationsD、results from pilot network testing

考题 You are designing the placement of the PDC emulator role to meet the business and technical requirements. In which location should you place the PDC emulator role?()A、Los AngelesB、ParisC、SydneyD、LisbonE、Barcelona 

考题 You need to recommend a solution for monitoring the servers. The solution must meet the  company’s technical requirements    What should you include in the recommendation?()A、Data Collector Sets (DCSs)B、event subscriptionsC、Reliability MonitorD、Windows System Resource Manager (WSRM)

考题 You are designing an IP addressing strategy for your VPN solution. How many public addresses should you use?()A、1B、25C、50D、255

考题 You are designing the Active Directory infrastructure to meet the business and technical requirements. You run ADSizer, and find that it provides a solution that contains only one domain controller for Amsterdam.  What should you do?()A、 Place at least two domain controllers in Amsterdam.B、 Configure the domain controller as a bridgehead server.C、 Configure the domain controller as a global catalog server.D、 Distribute the users among sites in ADSizer and recalculate the number of domain controllers.

考题 You have an Exchange Server 2010 organization.  You need to recommend a mailbox storage management solution for your organization to meet thefollowing requirements: .Apply quota limits for users by department.Automatically apply quota limits for new users What should you recommend?()A、A storage group for each department.B、A mailbox database for each department.C、An organizational unit for each department.D、A managed folder mailbox policy for each department.

考题 You need to recommend a solution for managing the service accounts for SQL1 and SQL2. The  solution must meet the company’s security requirements. What should you include in the recommendation?()A、a custom password filterB、a Password Settings object (PSO)C、managed service accountsD、manual password changes

考题 You are designing an access control strategy for WEB2. Your solution must meet business requirements. What should you do?()A、Install the Terminal Services Advanced Client Web client on WEB2B、Modify the Winreg registry key on WEB2C、Install the RPC over HTTP service on WEB2D、Modify the RestrictAnonymous registry key on WEB2

考题 You have an Exchange Server 2010 organization.  Company policy states that a copy of a users mailbox must be kept for one year after the user leaves thecompany.  All user accounts are in an organizational unit (OU) named OU1.  A compliance administrator plans to export the mailboxes to personal folders.  You need to recommend a solution that allows the compliance administrator to meet the requirements ofthe company policy.  What should you include in the solution?()A、a new management role assignmentB、delegated permissions to OU1C、managed folder mailbox policiesD、new Personal Archives

考题 单选题You are designing the placement of the PDC emulator role to meet the business and technical requirements. In which location should you place the PDC emulator role?()A Los AngelesB ParisC SydneyD LisbonE Barcelona 

考题 单选题You are designing the placement of the PDC emulator role to meet the business and technical requirements.  In which location should you place the PDC emulator role?()A  Los AngelesB  ParisC  SydneyD  LisbonE  Barcelona

考题 单选题You need to create a Password Settings object (PSO).     Which tool should you use()A Active Directory Users and ComputersB ADSI EditC Group Policy Management ConsoleD Ntdsutil

考题 单选题You are designing a forest structure to meet the business and technical requirements.  How many forests should you create?()A  OneB  TwoC  ThreeD  Four

考题 单选题You are designing a forest structure to meet the business and technical requirements. How many forests should you create?()A OneB TwoC ThreeD Four

考题 单选题You are designing a DHCP solution to meet the business and technical requirements. What should you do?()A Increase the default lease time on all DHCP servers.B Split all address ranges across multiple DHCP servers.C Configure duplicate scopes on at least two DHCP servers.  D Force client computers to obtain an IP address from Automatic Private IP Addressing (APIPA).

考题 单选题You have an Exchange Server 2010 organization.  You need to recommend a mailbox storage management solution for your organization to meet thefollowing requirements: .Apply quota limits for users by department.Automatically apply quota limits for new users What should you recommend?()A A storage group for each department.B A mailbox database for each department.C An organizational unit for each department.D A managed folder mailbox policy for each department.

考题 单选题You need to recommend a solution for controlling access to the Internet.The solution must meet the museum’s security polic. What should you include in the recommendation?()A File Server Resource Manager (FSRM) file screens and Group Policy objects (GPOs)B Microsoft Forefront Threat Management Gateway (TMG) 2010C Microsoft Forefront Unified Access Gateway (UAG) 2010D Windows Firewall with Advanced Security and Group Policy objects (GPOs)

考题 单选题You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()A a list of applications currently in use in the networkB IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsC detailed security device specificationsD results from pilot network testing

考题 单选题You are designing a DNS implementing strategy to meet the business and technical requirement. Which type of zone should you use?()A Sub ZonesB Standard Primary ZonesC Secondary ZonesD Active DirectoryIntegrated Zones 

考题 单选题You need to recommend a solution for managing the service accounts for SQL1 and SQL2. The  solution must meet the company’s security requirements. What should you include in the recommendation?()A a custom password filterB a Password Settings object (PSO)C managed service accountsD manual password changes

考题 单选题You are designing a DHCP solution to meet the business and technical requirements.  What should you do?()A  Increase the default lease time on all DHCP servers.B  Split all address ranges across multiple DHCP servers.C  Configure duplicate scopes on at least two DHCP servers.D  Force client computers to obtain an IP address from Automatic Private IP Addressing (APIPA).