网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You are designing a security group strategy to meet the business and technical requirements. What should you do?()
A

Create one global group named G_Executives. Make all executives user accounts members of that group.

B

Create two global groups named G_Executives and one universal group named U_Executives. Make the two global members of U_Executives. Make the executive user accounts members of the appropriate global group.

C

Create three global groups named G_NY_Executives and G_Chi_Executives and G_Executives. Make G_NY_Executives and G_Chi_Executives members of G_Executives. Make the executive user accounts members of the appropriate global group.  

D

Create one domain local group named DL_Executives. Make all executive user accounts members of that group.


参考答案

参考解析
解析: 暂无解析
更多 “单选题You are designing a security group strategy to meet the business and technical requirements. What should you do?()A Create one global group named G_Executives. Make all executives user accounts members of that group.B Create two global groups named G_Executives and one universal group named U_Executives. Make the two global members of U_Executives. Make the executive user accounts members of the appropriate global group.C Create three global groups named G_NY_Executives and G_Chi_Executives and G_Executives. Make G_NY_Executives and G_Chi_Executives members of G_Executives. Make the executive user accounts members of the appropriate global group.  D Create one domain local group named DL_Executives. Make all executive user accounts members of that group.” 相关考题
考题 You need to recommend a Group Policy strategy for the Remote Desktop servers. What should you include in the recommendation?()A、block inheritanceB、loopback processingC、security filteringD、WMI filtering

考题 You are designing a strategy to meet the security and financial requirements related to the Manifest application.  What should you do? ()A、 Configure a VPN server in Sydney.B、 Configure a VPN server in each branch office.C、 Configure a dial-up server in SydneyD、 Configure a dial-up server in each branch office.

考题 You are designing the Active Directory site topology to meet the business and technical requirements. Which site or sites will require universal group membership caching?()A、New YorkB、MontrealC、QuebecD、San FranciscoE、SeattleF、Vancouver

考题 You are designing a remote access strategy to meet the business  technical requirements. Which authentication mechanism should you use?()A、MS-CHAP v2.B、Internet Authentication service (IAS).C、Multilink  Bandwidth Allocation Protocol (BAP).D、Remote access policies on all servers running Routing  Remote Access.

考题 You need to recommend a solution for managing administrative rights for the branch office client computers. The solution must meet the companys technical requirements.What should you recommend configuring?()A、Account Policies by using GPOsB、Local Users and Groups by using Group Policy preferencesC、Restricted Groups by using GPOsD、Security Options by using Group Policy preferences

考题 You are designing a DHCP strategy for the new Active Directory environment.Which two groups have the necessary rights to authorize the DHCP servers?()A、IT staff in AtlantaB、IT staff in SeattleC、DHCP administrators in all officesD、DHCP administrators in Atlanta onlyE、Members of the Enterprise Admins group

考题 You need to design an administrative control strategy for Denver administrators. What should you do?()A、Create a security group named HelpDesk. Add the HelpDesk group to the Enterprise Admins group in both domainsB、Create a security group named HelpDesk. Add the HelpDesk group to the Domain Admins groups in both domainsC、Add the Domain Admins group in the litwareinc.com domain to the Domain Admins group in the contoso.com domain. Delegate full control of the litwareinc.com domain to the Domain Admins group in the contoso.com domainD、Create a security group named HelpDesk for each office. Delegate administrative tasks to their respective OU or domain.Delegate full control of the contoso.com domain to the Domain Admins group from the litwareinc.com domain

考题 You are designing a VPN strategy to meet the business and technical requirements. Based on the current infrastructure,  what is the maximum number of VPN connections that can be supported? ()A、 25B、 35C、 70D、 128E、 256

考题 You are designing a security strategy for the public Web server. You solution must address the chief security officer’s concerns. What should you do?()A、Install  a Web server certificate on WEB1B、Enable Internet Connection Firewalll (ICF) on WEB1C、Configure IIS on WEB1 to operate in IIS 5.0 isolation modeD、Install and configure the URLScan ISAPI filer on WEB1

考题 You need to design an access control and permission strategy for user objects in Active Directory.What should you do?()A、Make the members of the AdvancedSupport security group members of the Domain Admins security groupB、Give each desktop support technician permission to reset passwords for the top-level OU that contains user accounts at their own locationC、Delegate full control over all OUs that contain user accounts to all AllSupport  security groupD、Change the permissions on the domain object and its child objects so that the BasicSupport security group is denied permissions. Then, add a permission to each OU that contains user accounts that allows AllSupport security group members to reset passwords in that OU

考题 Your environment includes multiple Windows Server 2008 R2 Hyper-V servers. You are designing an administrative strategy for virtual machines (VMs). You need to ensure that members of the Security Compliance Active Directory Domain Services (AD DS) security group can monitor failed logon events on the VMs. What should you do?()A、Add the Security Compliance group to the local administrators group of each VMB、Add the Security Compliance group to the local administrators group of each Hyper-V serverC、In the InitialStore.xml file of each VM, define an access policy for the Security Compliance groupD、in the InitialStore.xml file of each Hyper-V server, define an access policy for the Security Compliance group

考题 单选题You are designing a strategy to meet the security and financial requirements related to the Manifest application.  What should you do? ()A  Configure a VPN server in Sydney.B  Configure a VPN server in each branch office.C  Configure a dial-up server in SydneyD  Configure a dial-up server in each branch office.

考题 单选题You are designing a remote access strategy to meet the business  technical requirements.  Which authentication mechanism should you use?()A  MS-CHAP v2.B  Internet Authentication service (IAS).C  Multilink  Bandwidth Allocation Protocol (BAP).D  Remote access policies on all servers running Routing  Remote Access.

考题 单选题You are designing a VPN strategy to meet the business and technical requirements. Based on the current infrastructure,  what is the maximum number of VPN connections that can be supported? ()A  25B  35C  70D  128E  256

考题 单选题You are designing a group management strategy for users in the finance department. You need to  identify the appropriate changes that need to be made to the current group management strategy. You want to accomplish this goal by using the minimum number of groups.  What should you do?()A  Add the finance users to the financeData group to which the necessary permissions have been assigned.B  Add the finance users to the financeGG group to which the necessary permissions have been assigned.C  Add the finance users to the financeGG group. Then add the financeGG group to the financeData group to which the necessary permissions have been assigned.D  Add the finance users to the financeGG group. Add the financeGG group to the financeUG group to the financeDat group to which the necessary permissions have been assigned.

考题 单选题You need to design a patch management strategy for Southbridge Video. Your solution must meet business requirements. What should you do?()A Configure all client computers to use Automatic Updates to obtain security patches from the Windows Update Web site. Test and install all patchesB Configure a batch file to download security patches daily. Distribute the security patches by using a.zap file and the Default Domain Policy Group Policy object (GPO)C Deploy a Software Update Services (SUS) server. Test all security patches and then approve them. Configure all client computers to automatically obtain updates from the serverD Configure a batch file to download security patches daily. Manually install the security patches on all computers

考题 单选题You need to recommend a solution for controlling access to the Internet.The solution must meet the museum’s security polic. What should you include in the recommendation?()A File Server Resource Manager (FSRM) file screens and Group Policy objects (GPOs)B Microsoft Forefront Threat Management Gateway (TMG) 2010C Microsoft Forefront Unified Access Gateway (UAG) 2010D Windows Firewall with Advanced Security and Group Policy objects (GPOs)

考题 单选题You need to recommend a strategy for managing the domain controllers in the branch offices thatmeets the company security requirements.What should you include in the recommendation?()A Configure Administration Role Separation.B Add the BranchAdmins group to the Domains Admins group.C Add the BranchAdmins group to the Server Operators group.D Assign the permission for the domain controller computer objects to the BranchAdmins group.

考题 多选题You are designing a DHCP strategy for the new Active Directory environment.  Which two groups have the necessary rights to authorize the DHCP servers?()AIT staff in AtlantaBIT staff in SeattleCDHCP administrators in all officesDDHCP administrators in Atlanta onlyEMembers of the Enterprise Admins group

考题 多选题You are designing the Active Directory site topology to meet the business and technical requirements.  Which site or sites will require universal group membership caching?()ANew YorkBMontrealCQuebecDSan FranciscoESeattleFVancouver

考题 单选题You need to design a monitoring strategy to meet business requirements for data on servers in the production department. What should you do?()A Use the Microsoft Baseline Security Analyzer (MBSA) to scan for Windows vulnerabilities on all servers in the production departmentB Run Security and Configuration Analysis to analyze the security settings of all servers in the production departmentC Enable auditing for data on each server in the production department. Run System Monitor on all servers in the production department to create a counter log that tracks activity for the Objects performance objectD Create a Group Policy Object (GPO) that enables auditing for object access and link it to the product department’s Servers OU. Enable auditing for data on each server in the production department

考题 单选题Your environment includes multiple Windows Server 2008 R2 Hyper-V servers. You are designing an administrative strategy for virtual machines (VMs). You need to ensure that members of the Security Compliance Active Directory Domain Services (AD DS) security group can monitor failed logon events on the VMs. What should you do?()A Add the Security Compliance group to the local administrators group of each VMB Add the Security Compliance group to the local administrators group of each Hyper-V serverC In the InitialStore.xml file of each VM, define an access policy for the Security Compliance groupD in the InitialStore.xml file of each Hyper-V server, define an access policy for the Security Compliance group

考题 单选题You are designing a DNS implementing strategy to meet the business and technical requirement.  Which type of zone should you use?()A  Sub ZonesB  Standard Primary ZonesC  Secondary ZonesD  Active DirectoryIntegrated Zones

考题 单选题You are designing a DNS implementing strategy to meet the business and technical requirement. Which type of zone should you use?()A Sub ZonesB Standard Primary ZonesC Secondary ZonesD Active DirectoryIntegrated Zones 

考题 多选题You are designing a security strategy for the infrastructure servers at the resorts.Which two actions should you perform?(Each correct answer presents part of the solution. Choose two)()APlace all infrastructure servers in subnets that cannot exchange information with the InternetBEstablish a custom security template that contains unique required settings for each combination of services that run on the infrastructure serversCUse Group Policy objects (GPOs) to apply the custom security template or templates to the Infrastructure serversDEdit the local policy settings to configure each individual server