网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You need to design a monitoring strategy to meet business requirements for data on servers in the production department. What should you do?()
A

Use the Microsoft Baseline Security Analyzer (MBSA) to scan for Windows vulnerabilities on all servers in the production department

B

Run Security and Configuration Analysis to analyze the security settings of all servers in the production department

C

Enable auditing for data on each server in the production department. Run System Monitor on all servers in the production department to create a counter log that tracks activity for the Objects performance object

D

Create a Group Policy Object (GPO) that enables auditing for object access and link it to the product department’s Servers OU. Enable auditing for data on each server in the production department


参考答案

参考解析
解析: 暂无解析
更多 “单选题You need to design a monitoring strategy to meet business requirements for data on servers in the production department. What should you do?()A Use the Microsoft Baseline Security Analyzer (MBSA) to scan for Windows vulnerabilities on all servers in the production departmentB Run Security and Configuration Analysis to analyze the security settings of all servers in the production departmentC Enable auditing for data on each server in the production department. Run System Monitor on all servers in the production department to create a counter log that tracks activity for the Objects performance objectD Create a Group Policy Object (GPO) that enables auditing for object access and link it to the product department’s Servers OU. Enable auditing for data on each server in the production department” 相关考题
考题 You need to design a method to standardize and deploy a baseline security configuration for servers. You solution must meet business requirements. What should you do?()A、Create a script that installs the Hisecdc.inf security templateB、Use a GPO to distribute and apply the Hisec.inf security templateC、Use the System Policy Editor to configure each server’s security settingsD、Use a GPO to distribute and apply a custom security template

考题 You design a Business Intelligence (BI) solution by using SQL Server 2008. You plan to design the report strategy for a new report project that will be used by a financial application. The application uses five calculations that are implemented in Microsoft .NET Framework 3.5 assemblies. The assemblies are written in the C# language and use the static methods. You need to ensure that the calculations can be used by the expressions in all reports. You also need to ensure consistency within the reports by using the least amount of development effort. What should you do?()A、 Add a reference to the assemblies in the Report Properties References tab. B、 Write the calculation logic used by the calculations by using T-SQL functions. C、 Write the code of the calculation logic into the Report Properties Custom Code tab.D、 Write the calculation logic in each report by using the mathematical functions available natively to SQL Server 2008 Reporting Services (SSRS).

考题 You need to design a security strategy for VPN2. Your solution must meet business requirements. What should you do?()A、Create and configure a new security template. Import the template into the Default Domain Policy Group Policy object (GPO)B、Install Internet Authentication Service (IAS) on RAS1. Configure VPN2 to be the RADIUS client of RAS1. Configure the remote access policy on VPN2C、Create and configure a new security template. Import the template into the local policy on VPN2D、Move VPN2 into the VPN Servers OU. Configure the remote access policy on VPN2

考题 You need to design phase one of the new authentication strategy. Your solution must meet business requirements.What should you do?()A、Install a Windows Server 2003 enterprise root CA, Configure certificate templates for autoenrollmentB、Install a Windows Server 2003 enterprise subordinate CA, Configure certificate templates for autoenrollmentC、Install a Windows Server 2003 stand-alone subordinate CA, Write a logon script for the client computers in the HR department that contains the Certreq.execommandD、Install a Windows Server 2003 stand-alone root CA,Write a logon script for the client computers in the HR department that contains the Certreq.execommand

考题 You need to recommend a backup strategy for the servers in the San Francisco office. The strategy must meet the company's technical requirements    What should you include in the recommendation?()A、native-boot virtual hard disks (VHDs)B、Microsoft System Center Data Protection Manager 2010C、system restore pointsD、Windows Server Backup

考题 You need to recommend a solution for monitoring the servers. The solution must meet the  company’s technical requirements    What should you include in the recommendation?()A、Data Collector Sets (DCSs)B、event subscriptionsC、Reliability MonitorD、Windows System Resource Manager (WSRM)

考题 You need to recommend a process for monitoring the servers. The process must meet the  company’s technical requirements.    What should you include in the recommendation?()A、event subscriptionsB、Data Collector Sets (DCSs)C、Resource MonitorD、Microsoft System Center Operations Manager

考题 You need to design a security patch management strategy. Your solution must meet business and security requirements, and it must accommodate the company’s resource restrictions. What should you do?()A、Test and manually deploy updatesB、Deploy a Software Update Services (SUS) server. Test all updates and then approve them. Configure all client computers to automatically obtain updates from the serverC、Test all updates and then use a third-party utility to repackage updates in a Windows Installer file. Deploy the -.msi files by using Group PolicyD、Configure all client computers to use Automatic Updates to obtain security updates from the Windows Update Web site. Test all updates posted to the Windows Update Web site

考题 You are designing a remote access strategy to meet the business  technical requirements. Which authentication mechanism should you use?()A、MS-CHAP v2.B、Internet Authentication service (IAS).C、Multilink  Bandwidth Allocation Protocol (BAP).D、Remote access policies on all servers running Routing  Remote Access.

考题 You need to design a remote administration solution for servers on the internal network. Your solution must meet business and security requirements. What should you do?()A、Permit administrators to use an HTTP interface to manage servers remotelyB、Permit only administrators to connect to the servers’ Telnet serviceC、Permit administrators to manage the servers by using Microsoft NetMeetingD、Require administrators to use Remote Desktop for Administration connections to manage the servers

考题 You are designing a VPN strategy to meet the business and technical requirements. Based on the current infrastructure,  what is the maximum number of VPN connections that can be supported? ()A、 25B、 35C、 70D、 128E、 256

考题 You need to implement an auditing strategy that will fulfill the company’s business requirements.What should you do?()A、Use C2 auditing.B、Use DML triggers.C、Use DDL triggers.D、Use event notifications.

考题 You need to design a password policy that meets business requirements. What should you do? Select all that apply.()A、Increase the number of passwords that are rememberedB、Disable reversible encryptionC、Set the minimum password age to zero daysD、Increase the maximum password age

考题 You need to design a strategy to ensure that all servers are in compliance with the business requirements for maintaining security patches. What should you do?()A、Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the domainB、Log on to each server and run Security Configuration and Analysis to analyze the security settings by using a custom security templateC、Create a logon script to run the secedit command to analyze all servers in the domainD、Run the Microsoft Baseline Security Analyzer (MBSA) on a server to scan for Windows vulnerabilities on all servers in the domain

考题 单选题The company is evaluating using a new Active Directory domain to contain all customer user accounts. You need to design a monitoring or logging strategy that meets business and security requirements for the new Web-based ordering application. Your solution must minimize overhead on existing domain controllers and servers.  What should you do?()A Enable logon auditing in both the new and the existing domainsB Enable logon auditing only in the existing domainC Enable logon auditing only in the new domainD Enable logon auditing on only the Web server

考题 单选题You are designing a VPN strategy to meet the business and technical requirements. Based on the current infrastructure,  what is the maximum number of VPN connections that can be supported? ()A  25B  35C  70D  128E  256

考题 多选题You need to design a strategy to increase security for the client computers in the finance department. Which two actions should you perform?()AEnable automatic certificate enrollmentBEnforce smart card logonsCEnable Encrypting File System (EFS) for offline filesDEnable a screen saver password

考题 单选题You need to design the consolidation strategy for the Promotions and Partners databases. You want to choose a strategy that results in the best database performance while maintaining the permissions of end users in each database.What consolidation strategy should you choose?()A Place each database in a separate instance running on SQL2.B Place each database in a separate instance running on SQL3.C Place both databases in a single instance running on SQL2.D Place both databases in a single instance running on SQL3.

考题 单选题You need to design a group membership strategy for the EditorialAdmins group. What should you do?()A Move the EditorialAdmins group to the Servers OU in the editorial departmentB Move the members of the EditorialAdmins group to the Editorial OUC Move the members of the EditorialAdmins group to the New York OUD Move the EditorialAdmins group to the New York OU

考题 单选题You are designing a DNS implementing strategy to meet the business and technical requirement.  Which type of zone should you use?()A  Sub ZonesB  Standard Primary ZonesC  Secondary ZonesD  Active DirectoryIntegrated Zones

考题 单选题You are designing a DNS implementing strategy to meet the business and technical requirement. Which type of zone should you use?()A Sub ZonesB Standard Primary ZonesC Secondary ZonesD Active DirectoryIntegrated Zones 

考题 单选题You need to design a storage strategy that meets all business and technical requirements. What should you do?()A Create a storage group for each office. Within each storage group, create a single databaseB Create a storage group for each region. Within each storage group, create a single databaseC Create a storage group for each region. Within each storage group, create separate databases for each office in that regionD Create a single storage group. Within that storage group, create a separate database for each office