网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You need to design an access control and permission strategy for user objects in Active Directory.What should you do?()
A

Make the members of the AdvancedSupport security group members of the Domain Admins security group

B

Give each desktop support technician permission to reset passwords for the top-level OU that contains user accounts at their own location

C

Delegate full control over all OUs that contain user accounts to all AllSupport  security group

D

Change the permissions on the domain object and its child objects so that the BasicSupport security group is denied permissions. Then, add a permission to each OU that contains user accounts that allows AllSupport security group members to reset passwords in that OU


参考答案

参考解析
解析: 暂无解析
更多 “单选题You need to design an access control and permission strategy for user objects in Active Directory.What should you do?()A Make the members of the AdvancedSupport security group members of the Domain Admins security groupB Give each desktop support technician permission to reset passwords for the top-level OU that contains user accounts at their own locationC Delegate full control over all OUs that contain user accounts to all AllSupport  security groupD Change the permissions on the domain object and its child objects so that the BasicSupport security group is denied permissions. Then, add a permission to each OU that contains user accounts that allows AllSupport security group members to reset passwords in that OU” 相关考题
考题 You configure a Group Policy Object for the Marketing organizational unit (OU) to prevent users from accessing My Network Places and from running System in Control Panel. You want the Managers domain local group to be able to access My Network Places, but you still want to prevent them from running System in Control Panel.What should you do?A.Add the managers group to the access control list of the GPO. Disable the permission of the managers group to read and apply the group policy.B.Add the managers group to the access control list of the GPO. Deny the permission of the managers group to read and apply the group policy.C.Create a second GPO in the OU. Add the managers group to the access control list. Allow the managers group to apply the group policy. Deny the authenticated users group permission to read and apply group policy. Configure the new GPO to deny the ability to run System in Control Panel. Give the original GPO a higher priority than the new GPO.D.Create a second GPO in the OU. Add the managers group to the access control list. Allow the managers group to read and apply the group policy. Disable the permission of the authenticated user group to read and apply the group policy. Configure the new GPO to allow access to My Network Places. Give the new GPO a higher priority than the original GPO.

考题 You are developing a Windows Presentation Foundation (WPF) application for a travel reservation systemYou need to ensure that users can select a range of travel dates.What should you do ?() A. Add single DatePicker control to the design surfaceB. Add single Calendar control to the design surfaceC. Add single MediaElement control to the design surface to display a calendarD. Add the appropriate Windows Forms references to the project references. Add a single Windows Forms DateTimePicker control to the design surface

考题 You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()A、Require client computers to connect to the marketing application by using a VPN connectionB、Use IPSec to encrypt communications between the servers in the New York and Atlanta officesC、Require the high security setting on Terminal Services connections to the marketing applicationD、Configure all marketing application Web pages to require SSL

考题 You need to design a PKI that meets business requirements. What should you do?()A、Move ATLCA1 offline and create an enterprise subordinate CA to issue certificatesB、Create a stand-alone subordinate CA to issue certificatesC、Use a qualified subordinate CAD、Configure certificate template access control lists (ACLs) on ATLCA1

考题 You need to design a security strategy for the DHCP servers in the Seattle office. Which two actions should you perform?()A、Disable all unnecessary services on each DHCP serverB、Modify the discretionary access control lists (DACLs) in Active Directory so that only members of the Enterprise Admins security group can authorize additional DHCP serversC、Use an IPSec policy that allows only the packets necessary for DHCP and domain membership for each DHCP serverD、Install a digital certificate for SSL on each DHCP server

考题 You need to design an e-mail access strategy for remote users. What should you do? () A、 Instruct remote users to connect to their e-mail by using RPCB、 Instruct remote users to connect to Outlook Web Access by using only HTTPSC、 Instruct remote users to connect to the company network by using PPTP connectionsD、 Instruct remote users to connectd to their e-mail by using RPC over HTTP Configure the HTTP servers to require encryption.

考题 You are a help desk technician for your company. All employees use Windows XP Professional computers. A salesperson named Philippe receives a removable disk drive cartridge from his supervisor. Philippe now reports that he cannot edit files on the cartridge. When he tries to open any files or folders on the cartridge, he receives an “access denied” error message. Philippe’s supervisor is currently out of the office. You place the cartridge in the removable drive on your computer. You receive the same “access denied” error message when you try to access the files and folders. You call Philippe’s supervisor. She asks you to grant permission to access the contents of the cartridge only to Philippe. However, she also wants to prevent Philippe from changing permissions on the contents of the cartridge. Which two actions should you take?()A、As Administrator, take ownership of the files and folders. B、As Administrator, grant your help desk user account Allow - Full Control permission on the files and folders.C、Grant Philippe Allow - Modify permission on the files and folders.D、Grant Philippe Allow - Full Control permission on the files and folders.E、Grant Philippe Allow - Take Ownership permission on the files and folders. 

考题 You are developing a Windows Forms Application by using the .NET Framework 3.5.You plan to design a composite custom control for the application. You include a ListBox control has a property that provides the item count of  the ListBox control. You need to ensure that the property cannot be accessed at design time. Which attribute should you use?()A、[Bindable(false)]B、[DesignOnly(false)]C、[EditorBrowsable(EditorBrowsableState.Never)]D、[Browsable(false)]

考题 You are developing a Windows Presentation Foundation (WPF) application for a travel reservation system You need to ensure that users can select a range of travel dates. What should you do ?()A、Add single DatePicker control to the design surfaceB、Add single Calendar control to the design surfaceC、Add single MediaElement control to the design surface to display a calendarD、Add the appropriate Windows Forms references to the project references. Add a single Windows Forms DateTimePicker control to the design surface

考题 You need to design an access control and permission strategy for user objects in Active Directory.What should you do?()A、Make the members of the AdvancedSupport security group members of the Domain Admins security groupB、Give each desktop support technician permission to reset passwords for the top-level OU that contains user accounts at their own locationC、Delegate full control over all OUs that contain user accounts to all AllSupport  security groupD、Change the permissions on the domain object and its child objects so that the BasicSupport security group is denied permissions. Then, add a permission to each OU that contains user accounts that allows AllSupport security group members to reset passwords in that OU

考题 You need to design the database permissions for access from the terminals to the database server. Which action or actions should you perform?()A、Create a database role named BankTerminals.B、Grant the BankTerminals role the Execute permission for the WoodgroveBanking database.C、Grant database access to the Windows Bank Terminals group, and add the group to the BankTerminals role.D、Grant the BankTerminals role the Execute permission for the Bank schema.E、Grant the Windows Bank Terminals group the Execute permission for the Bank schema.F、Grant the BankTerminals role the Execute permission for all stored procedures and user-defined functions in the Bank schema.

考题 单选题You need to design a security strategy for a remote e-mail access. What should you do?()A Require remote users to access e-mails by using Outlook Mobile AccessB Require Outlook Web Access users to install the secure MIME ActiveX-Control and to encrypt all messagesC On Outlook Web Access servers that accept connections from the Internet configure IIS to require SSL for all connectionsD On Outlook Web Access servers that accept connections from the Internet configure IIS to require Integrated Windows Authentication

考题 多选题You are the network administrator for All network servers run Windows Server 2003. All client computers run Windows XP Professional. You create a folder on thet network and share it as TestKingDocs. You want users to be able to read, create, and modify documents that are stored in the shared folder. You also want users to be able to delete the folders and the files that they create. A user reports that another used deleted a folder that she created. You discover that the Everyone group ias assigned the Allow - Full Control NTFS permission for the folder. You remove all assigned permissions for the Everyone group. You need to configure permission for the TestKingDocs shared folder to meet your requirements. You also need to ensure that users cannot delete the folders and files that other users create. Which two actions should you perform ()(Each correct answer presents part of the solution. Choose two.)AAssign the Authenticated Users group the Allow - Read Execute permission.BAssign the Anonymous group the Allow - Modify permission.CAssign the Creator Owner group the Allow - Modify permission.DAssign the Creator Owner group the Allow - Full Control permission

考题 单选题You need to design an access control strategy for the Payment folder for the Sales Managers group. What should you do?()A Use IPSec in transport modeB Use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV)C Use PEAP-EAP-TLSD Use Encrypting File System (EFS) remote encryption

考题 单选题You are developing a Windows Presentation Foundation (WPF) application.You need to display HTML content from a Web page on the WPF form. What should you do?()A Add a FlowDocumentReader control to the design surface. Then create a FlowDocument control.B Add a DocumentViewer control to the design surface. Then create a FixedDocument control.C Add a WebBrowser control to the design surface. Then use the Navigate method to navigate the URI object.D Add a ContentControl control to the design surface. Then reference a WebClient object to return an HTML string.

考题 单选题You are developing a Windows Forms Application by using the .NET Framework 3.5.You plan to design a composite custom control for the application. You include a ListBox control has a property that provides the item count of  the ListBox control. You need to ensure that the property cannot be accessed at design time. Which attribute should you use?()A [Bindable(false)]B [DesignOnly(false)]C [EditorBrowsable(EditorBrowsableState.Never)]D [Browsable(false)]

考题 多选题You need to design a strategy to increase security for the client computers in the finance department. Which two actions should you perform?()AEnable automatic certificate enrollmentBEnforce smart card logonsCEnable Encrypting File System (EFS) for offline filesDEnable a screen saver password

考题 单选题All network servers run Windows Server 2003, and all client computers run Windows XP Professional. Sandra, the manager of the human resources department, asks you to create a shared folder named HRDrop. You create a HRDrop folder on a member server. You assign the Allow - Full Control share permission to the Everyone group. Now you need to configure the NTFS permissions on HRDrop to fulfil the following requirements: 1. Sandra must be able to read, modify, change permissions on, and delete all files and subfolders in HRDrop. 2. All other domain users must only be able to add new files to HRDrop. What should you do?()A Assign the Allow - Modify permission to Sandra. Assign the Allow - Read permission to the Users group.B Assign the Allow - Full Control permission to Sandra. Assign the Allow - Write permission and the Deny - Read and Execute permission to the Users group.C Assign the Allow - Modify permission to Sandra. Assign the Allow - List Folder permission to the Users group.D Assign the Allow - Full Control permission to Sandra. Assign the Allow - Read permission to the Users group.E Assign the Allow - Full Control permission to Sandra. Assign the Allow - Write permission to the Users group and remove the Read and Execute permissions to the Users group.

考题 多选题You need to design the database permissions for access from the terminals to the database server. Which action or actions should you perform?()ACreate a database role named BankTerminals.BGrant the BankTerminals role the Execute permission for the WoodgroveBanking database.CGrant database access to the Windows Bank Terminals group, and add the group to the BankTerminals role.DGrant the BankTerminals role the Execute permission for the Bank schema.EGrant the Windows Bank Terminals group the Execute permission for the Bank schema.FGrant the BankTerminals role the Execute permission for all stored procedures and user-defined functions in the Bank schema.

考题 单选题You are developing a Windows Presentation Foundation (WPF) application. You need to display HTML content from a Web Page on the WPF form. What should you do?()A Add a FlowDocumentReader control to the design surface. Then create a FlowDocument control.B Add a ContentControl control to the design surface. The reference a WebClient object to return an HTML string.C Add a DocumentViewer control to the design surface. The create a FixedDocument control.

考题 单选题You are the network administrator for The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. The domain contains a group named SalesAdmin. Members of the SalesAdmin group need the permission to add Group Policy links and create Group Policy objects (GPOs) for only the Sales organizational unit (OU). You need to configure the domain to provide the SalesAdmin group with the minimum permissions necessary to meet these requirements. What should you do?()A Add the SalesAdmins group to the Group Policy Creator Owners group.B Configure the discretionary access control list (DACL) on all of the Group Policy links for the Sales OU to assign the SalesAdmins group the Allow - Apply Group Policy permission.C Run the Delegation of Control wizard on the domain to assign the SalesAdmin group the Manage Group Policy links task.D Run the Delegation of Control wizard on the Sales OU to assign the SalesAdmins group the Manage Group Policy links task.

考题 多选题You need to design an access control strategy for the external and intranet Web sites. Which two actions should you perform?()AEnable SSL on the external Web site by using a Microsoft cryptographic service provider (CSP)BEnable Microsoft .NET Passport authentication on the external Web site. Use Passport Level 0 with SSL on the external Web siteCEnable SSL on the external Web site by using a commercial digital certificateDEnable SSL on the intranet Web site by using an internal server certificateEEnable SSL on the external Web site by using an internal server certificate

考题 单选题You are creating a Windows Forms application by using the .Net Framework 3.5.You plan to design a composite control for the application.You need to derive the control from a base class that supports templates.What should you do?()A Derive from the Control class.B Derive from the UserControl class.C Derive from the ScrollableControl class.D Derive from the ContainerControl class.

考题 单选题Your company hires 10 new employees. You want the new employees to connect to the main office through a VPN connection. You create new user accounts and grant the new employees the Allow Read and Allow Execute permissions to shared resources in the main office. The new employees are unable to access shared resources in the main office. You need to ensure that users are able to establish a VPN connection to the main office What should you do()A Grant the new employees the Allow Full control permission.B Grant the new employees the Allow Access Dial-in permission.C Add the new employees to the Remote Desktop Users security group.D Add the new employees to the Windows Authorization Access security group.

考题 单选题You are creating a Windows Forms Application by using the .NET Framework 3.5.You plan to design a control for the application.You need to ensure that the control meets the following requirements:    (1)Contains the DataGridView, BindingSource, and BindingNavigator controls.  (2)Exposes the properties of the BindingSource control.   (3)Protects the properties of the DataGridView and BindingNavigator controls.    What sholud you do?()A Extend the Control class.B Extend the ContainerControl class.C Create protected accesses for each control property.D Create public accesses for the properties of the BindingSource control.