网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You need to design phase one of the new authentication strategy。你的设计必须符合他们的要求,你该怎么做?()
A

安装一个Windows Server 2003企业根CA、配置验证的证书模版

B

安装一个Windows Server 2003企业从属CA、配置验证的证书模版

C

安装一个Windows Server 2003独立从属CA、为HR部门创建一个包含Certreq.exe命令的登陆脚本

D

安装一个Windows Server 2003独立根CA、为HR部门创建一个包含Certreq.exe命令的登陆脚本


参考答案

参考解析
解析: 暂无解析
更多 “单选题You need to design phase one of the new authentication strategy。你的设计必须符合他们的要求,你该怎么做?()A 安装一个Windows Server 2003企业根CA、配置验证的证书模版B 安装一个Windows Server 2003企业从属CA、配置验证的证书模版C 安装一个Windows Server 2003独立从属CA、为HR部门创建一个包含Certreq.exe命令的登陆脚本D 安装一个Windows Server 2003独立根CA、为HR部门创建一个包含Certreq.exe命令的登陆脚本” 相关考题
考题 Development is a structured design methodology that proceeds in a sequence from one phase to the next.A.WaterfallB.PhasedC.PrototypingD.Parallel

考题 The purpose of systems analysis phase is to build a logical model of the new system. The first step is( ), where you investigate business processes and document what the new system must do to satisfy users. This step continues the investigation that began during the( ). You use the fact-finding results to build business models, data and process models, and object models. The deliverable for the systems analysis phase is the( ), which describes management and user requirements, costs and benefits, and outlines alternative development strategies. The purpose of the systems design phase is to create a physical model that will satisfy all documented requirements for the system. During the systems design phase, you need to determine the( ), which programmers will use to transform the logical design into program modules and code. The deliverable for this phase is the( ), which is presented to management and users for review and approval.A.System logical modelingB.use case modelingC.requirements modelingD.application modeling A.systems planning phaseB.systems modeling phaseC.systems analysis phaseD.systems design phase A.system charterB.system scope definitionC.system blueprintD.system requirement document A.application architectureB.system data modelC.system process modelD.implement environment A.system architecture descriptionB.system design specificationC.system technique architectureD.physical deployment architecture

考题 The purpose of the systems analysis phase is to build a logical model of the new system.The first step is(71),where you investigate business processes and document what the new system must do to satisfy users. This step continues the investigation that began during the(72). You use the fact-finding results to build business models,data and process models,and object models. The deliverable for the systems analysis phase is the(73),which describes management and user requirements,costs and benefits,and outlines alternative development strategies.The purpose of the systems design phase is to create a physical model that will satisfy all documented requirements for the system. During the systems design phase,you need to determine the(74),which programmers will use to transform the logical design into program modules and code. The deliverable for this phase is the(75),which is presented to management and users for review and approval.A.system charter B.system scope definition C.system blueprint D.system requirements document

考题 The purpose of the systems analysis phase is to build a logical model of the new system.The first step is(71),where you investigate business processes and document what the new system must do to satisfy users. This step continues the investigation that began during the(72). You use the fact-finding results to build business models,data and process models,and object models. The deliverable for the systems analysis phase is the(73),which describes management and user requirements,costs and benefits,and outlines alternative development strategies.The purpose of the systems design phase is to create a physical model that will satisfy all documented requirements for the system. During the systems design phase,you need to determine the(74),which programmers will use to transform the logical design into program modules and code. The deliverable for this phase is the(75),which is presented to management and users for review and approval.A.systems planning phase B.systems modeling phase C.systems analysis phase D.systems design phase

考题 The purpose of the systems analysis phase is to build a logical model of the new system.The first step is(71),where you investigate business processes and document what the new system must do to satisfy users. This step continues the investigation that began during the(72). You use the fact-finding results to build business models,data and process models,and object models. The deliverable for the systems analysis phase is the(73),which describes management and user requirements,costs and benefits,and outlines alternative development strategies.The purpose of the systems design phase is to create a physical model that will satisfy all documented requirements for the system. During the systems design phase,you need to determine the(74),which programmers will use to transform the logical design into program modules and code. The deliverable for this phase is the(75),which is presented to management and users for review and approval.A.system architecture description B.system design specification C.system technique architecture D.physical deployment architecture

考题 Which of the following options lists the steps in PPP session establishment in the correct order?()A、Optional authentication phase, link establishment phase, network layer protocol phase.B、Network layer protocol phase, link establishment phase, optional authentication phase.C、Network layer protocol phase, optional authentication phase, link establishment phase.D、Link establishment phase, network layer protocol phase, optional authentication phase.E、Link establishment phase, optional authentication phase, network layer protocol phase.F、Optional authentication phase, network layer protocol phase, link establishment phase.

考题 Company.com network consists of a single Active Directory domain named  Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Microsoft Office Outlook 2007 to connect to their mailboxes.RPC over HTTP and Auto discover are configured on Microsoft Office Outlook 2007. A new Company.com security policy requires that the employees connected to the domain does not need authentication when using Outlook Anywhere.However, those not connected t the domain needs to be authentication when using Outlook Anywhere.The employees need to comply with the new Company.com security policy.  What should you do?()A、You should consider using Basic authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.B、You should consider using NTLM authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.C、You should consider using NTLM authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.D、You should consider using Basic authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.

考题 You need to design phase one of the new authentication strategy. Your solution must meet business requirements.What should you do?()A、Install a Windows Server 2003 enterprise root CA, Configure certificate templates for autoenrollmentB、Install a Windows Server 2003 enterprise subordinate CA, Configure certificate templates for autoenrollmentC、Install a Windows Server 2003 stand-alone subordinate CA, Write a logon script for the client computers in the HR department that contains the Certreq.execommandD、Install a Windows Server 2003 stand-alone root CA,Write a logon script for the client computers in the HR department that contains the Certreq.execommand

考题 You need to design phase one of the new authentication strategy。你的设计必须符合他们的要求,你该怎么做?()A、安装一个Windows Server 2003企业根CA、配置验证的证书模版B、安装一个Windows Server 2003企业从属CA、配置验证的证书模版C、安装一个Windows Server 2003独立从属CA、为HR部门创建一个包含Certreq.exe命令的登陆脚本D、安装一个Windows Server 2003独立根CA、为HR部门创建一个包含Certreq.exe命令的登陆脚本

考题 You need to design the consolidation plan for SQL1, SQL2, and SQL3. You need to identify the appropriate combination of SQL Server instances and SQL Server 2005 computers that are needed to fulfill the company’s consolidation plans and security requirements.Which combination should you use?()A、one SQL Server 2005 computer with one instanceB、two SQL Server 2005 computers, each with two instancesC、two SQL Server computers, one with one instance and one with three instancesD、one SQL Server 2005 computer with two instances

考题 You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()A、Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access pointB、Configure IEEE 802.1x authentication with smart cardsC、Configure the wireless network to use Wired Equivalent Privacy (WEP)D、Install and configure an Internet Authentication Service (IAS) server

考题 You are designing the placement of the global catalog servers. You want to use the minimum number of global catalog servers that are required. Which design should you use?()A、One global catalog server in New York.B、Two global catalog servers in New York.C、One global catalog server in Chicago and one global catalog server in New York.D、Two global catalog servers in Chicago and two global catalog servers in New York.E、One global catalog server in Chicago, one global catalog server in New York, and one global catalog server in Boston.

考题 You need to design a domain model that meets the company business and security requirements for controlling access to the new Web-based ordering application. What should you do?()A、Create a child OU within the existing domainB、Create a child domain of the existing domainC、Create a new domain in a new forest. Configure the new domain to trust the existing domainD、Create a new tree in the existing forest. Configure the new domain to trust the existing domain

考题 You are designing the loan application process for the customer terminals. You need to design a Transact-SQL stored procedure that fulfills the business and technical requirements. Which type of Transact-SQL stored procedure should you use?()A、one that uses an internal SQL Server Web service endpointB、one that runs a SQL Server Integration Services (SSIS) packageC、one that uses Service BrokerD、one that runs a user-defined function

考题 You are designing a strategy for migrating domain user accounts to the new Windows Server 2003 Active Directory environment. You want to identify the minimum number of trust relationships that need to be manually created to perform this operation.  Which design should you use?()A、one external trust relationshipB、two external trust relationshipsC、six external trust relationshipsD、twelve external trust relationshipsE、one two-way cross-forest trust relationship

考题 Your network contains one Active Directory domain. You have a member server named Server1 that runs Windows Server 2008 R2. The server has the Routing and Remote Access Services role service installed.You implement Network Access Protection (NAP) for the domain.You need to configure the Point-to-Point Protocol (PPP) authentication method on Server1. Which authentication method should you use?()A、Challenge Handshake Authentication Protocol (CHAP)B、Extensible Authentication Protocol (EAP)C、Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2)D、Password Authentication Protocol (PAP)

考题 You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()A、Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computersB、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersC、Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersD、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers

考题 You need to recommend a configuration design for the new VMs. The design must ensure that operating systems can be deployed to the new VMs. What should you include in the recommendation?()A、virtual machine queue (VMQ)B、Virtual Machine ChimneyC、a synthetic network adapterD、an emulated network adapter

考题 单选题You are designing the placement of the global catalog servers. You want to use the minimum number of global catalog servers that are required.  Which design should you use?()A  One global catalog server in New York.B  Two global catalog servers in New York.C  One global catalog server in Chicago and one global catalog server in New York.D  Two global catalog servers in Chicago and two global catalog servers in New York.E  One global catalog server in Chicago, one global catalog server in New York, and one global catalog server in Boston.

考题 单选题You need to recommend a configuration design for the new VMs. The design must ensure that operating systems can be deployed to the new VMs. What should you include in the recommendation?()A virtual machine queue (VMQ)B Virtual Machine ChimneyC a synthetic network adapterD an emulated network adapter

考题 单选题You are designing the placement of the global catalog servers. You want to use the minimum number of global catalog servers that are required. Which design should you use?()A One global catalog server in New York.B Two global catalog servers in New York.C One global catalog server in Chicago and one global catalog server in New York.D Two global catalog servers in Chicago and two global catalog servers in New York.E One global catalog server in Chicago, one global catalog server in New York, and one global catalog server in Boston.

考题 单选题Which of the following options lists the steps in PPP session establishment in the correct order?()A Optional authentication phase, link establishment phase, network layer protocol phase.B Network layer protocol phase, link establishment phase, optional authentication phase.C Network layer protocol phase, optional authentication phase, link establishment phase.D Link establishment phase, network layer protocol phase, optional authentication phase.E Link establishment phase, optional authentication phase, network layer protocol phase.F Optional authentication phase, network layer protocol phase, link establishment phase.

考题 单选题—What do you think of his new design?—It’s of even ______practical value than the old one. He’s just a bookworm!A greaterB greatC lessD little

考题 单选题You are designing a strategy for migrating domain user accounts to the new Windows Server 2003 Active Directory environment. You want to identify the minimum number of trust relationships that need to be manually created to perform this operation.  Which design should you use? ()A  one external trust relationshipB  two external trust relationshipsC  six external trust relationshipsD  twelve external trust relationshipsE  one two-way cross-forest trust relationship

考题 多选题You are the systems engineer for your company. The network consists of three physical networks connected by hardware-based routers. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.   Each physical network contains at least one domain controller and at least one DNS server. One physical network contains a Microsoft Internet Security and Acceleration (ISA) Server array that provides Internet access for the entire company. The network also contains a certificate server.   Company management wants to ensure that all data is encrypted on the network and that all computers transmitting data on the network are authenticated.   You decide to implement IPSec on all computers on the network. You edit the Default Domain Policy Group Policy object (GPO) to apply the Secure Server (Require Security) IPSec policy.   Users immediately report that they cannot access resources located in remote networks. You investigate and discover that all packets are being dropped by the routers. You also discover that Active Directory replication is not functioning between domain controllers in different networks.   You need to revise your design and implementation to allow computers to communicate across the entire network. You also need to ensure that the authentication keys are stored encrypted.   Which two actions should you take?()AConfigure the routers to use IPSec and a preshared key for authentication.BConfigure the routers to use IPSec and a certificate for authentication.CConfigure the routers to use IPSec and Kerberos for authenticationDReconfigure the GPOs to require a preshared key for IPSec authentication.EReconfigure the GPOs to require a certificate for IPSec authentication.

考题 单选题You need to design a group membership strategy for the EditorialAdmins group. What should you do?()A Move the EditorialAdmins group to the Servers OU in the editorial departmentB Move the members of the EditorialAdmins group to the Editorial OUC Move the members of the EditorialAdmins group to the New York OUD Move the EditorialAdmins group to the New York OU

考题 单选题You need to design the consolidation plan for SQL1, SQL2, and SQL3. You need to identify the appropriate combination of SQL Server instances and SQL Server 2005 computers that are needed to fulfill the company’s consolidation plans and security requirements.Which combination should you use?()A one SQL Server 2005 computer with one instanceB two SQL Server 2005 computers, each with two instancesC two SQL Server computers, one with one instance and one with three instancesD one SQL Server 2005 computer with two instances