网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You need to recommend a security solution for the documents in the finance department.The solution must meet the companys security requirements    What should you include in the recommendation?()
A

access-based enumeration (ABE) and Encrypted File System (EFS)

B

access-based enumeration (ABE) and Windows BitLocker Drive Encryption (BitLocker)

C

Active Directory Rights Management Services (AD RMS)

D

File Server Resource Manager (FSRM) file screens


参考答案

参考解析
解析: 暂无解析
更多 “单选题You need to recommend a security solution for the documents in the finance department.The solution must meet the companys security requirements    What should you include in the recommendation?()A access-based enumeration (ABE) and Encrypted File System (EFS)B access-based enumeration (ABE) and Windows BitLocker Drive Encryption (BitLocker)C Active Directory Rights Management Services (AD RMS)D File Server Resource Manager (FSRM) file screens” 相关考题
考题 You need to recommend a delegation solution for CA1 that meets the company’s security requirements.   What should you include in the recommendation?()A、access-based enumeration (ABE)B、Active Directory delegationC、Authorization ManagerD、role separation

考题 You need to recommend a solution for storing user documents. What should you include in the recommendation?()A、folder redirectionB、home foldersC、mandatory user profilesD、roaming user profiles

考题 You have an Exchange Server 2010 organization.  You have a global security group named Legal that contains all the members of your companys legaldepartment.  The companys security policy states that the Legal group must be able to search all mailboxes for e-mailmessages that contain specific keywords.  You need to recommend a solution for the organization that complies with the security policy.  What should you include in the solution?()A、a Discovery Management role groupB、a legal holdC、administrator audit loggingD、Mailbox journaling

考题 You need to recommend a solution for configuring the Automatic Updates settings on the VMs.   What should you include in the recommendation?()A、block inheritanceB、loopback processingC、security filteringD、WMI filtering

考题 You have an Exchange Server 2010 organization.  Your companys security policy states that users must not be able to encrypt e-mail messages by usingOutlook Web App (OWA).  You need to recommend a client access solution that meets the requirements of the security policy.  What should you include in the solution?()A、managed folder mailbox policiesB、multiple OWA virtual directoriesC、OWA segmentationD、WebReady Document Viewing

考题 You need to recommend a solution for managing administrative rights for the branch office client computers. The solution must meet the companys technical requirements.What should you recommend configuring?()A、Account Policies by using GPOsB、Local Users and Groups by using Group Policy preferencesC、Restricted Groups by using GPOsD、Security Options by using Group Policy preferences

考题 You need to recommend a management solution for Server1 that meets the company's security  requirements.   What should you include in the recommendation?()A、access-based enumeration (ABE)B、Authentication Mechanism AssuranceC、Authorization ManagerD、Hyper-V Manager

考题 You need to recommend a solution for managing the service accounts for SQL1 and SQL2. The  solution must meet the company’s security requirements. What should you include in the recommendation?()A、a custom password filterB、a Password Settings object (PSO)C、managed service accountsD、manual password changes

考题 单选题You need to recommend a solution for controlling access to the Internet.The solution must meet the museum’s security polic. What should you include in the recommendation?()A File Server Resource Manager (FSRM) file screens and Group Policy objects (GPOs)B Microsoft Forefront Threat Management Gateway (TMG) 2010C Microsoft Forefront Unified Access Gateway (UAG) 2010D Windows Firewall with Advanced Security and Group Policy objects (GPOs)

考题 单选题Your network consists of a single Active Directory domain. Users access and share documents by using a DFS namespace. You need to recommend a solution to manage user access to documents. The solution must meet the following requirements: èAllow for document versioning èAllow for online collaboration What should you recommend?()A File Server Resource Manager (FSRM)B Volume Shadow Copy Service (VSS)C Microsoft SharePoint Foundation 2010D Windows System Resource Manager (WSRM)

考题 单选题You need to recommend a management solution for the corporate Web sites that meets the museum’s security policy    What should you include in the recommendation?()A Internet Information Services (IIS) ManagerB Remote Desktop Services (RDS)C Remote Server Administration Tools (RSAT)D Windows PowerShell 2.0

考题 单选题You need to recommend a NAP enforcement method that meets the companyˉs security requirements. Which method should you recommend?()A 802.1XB DHCPC IPSecD VPN

考题 单选题You need to recommend an administrative solution for the local support technicians in the satellite offices. The solution must meet the companys security requirements.What should you include in the recommendation?()A Active Directory delegationB Administrator Role SeparationC managed service accountsD Restricted Groups

考题 单选题You have an Exchange Server 2010 organization.  You plan to delegate Exchange administrative rights to some users in the organization.  You need to recommend a solution that tracks all changes made to the Exchange organization.  What should you include in the solution?()A administrator audit loggingB circular loggingC diagnostic loggingD Windows Security Auditing

考题 单选题You need to recommend a solution for managing the service accounts for SQL1 and SQL2. The  solution must meet the company’s security requirements. What should you include in the recommendation?()A a custom password filterB a Password Settings object (PSO)C managed service accountsD manual password changes

考题 单选题You need to recommend a solution for managing the public computers in the branch offices. What should you recommend?()A Create a GPO that is linked to the domain and configure security filtering for the GPO.B Create a GPO that is linked to the Public OU and configure security filtering for the GPO.C Create a GPO that is linked to the Public OU and enable loopback processing in the GPO.D Create a GPO that is linked to the domain and enable block inheritance on the Public OU.

考题 单选题You need to recommend a solution for managing the address information of the user accounts. The solution must meet the company’s security requirements. What should you include in the recommendation?()A Active Directory delegationB Authorization ManagerC built-in security groupsD user rights assignments

考题 单选题You need to recommend a solution that enables User1 to perform the required actions on the Hyper-V server.What should you include in the recommendation?()A Active Directory delegationB Authorization Manager role assignmentC local security groups on the Hyper-V serverD local security groups on the VMs