网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You need to design an access control strategy for the financial data used by the accounting department. Your solution must meet business requirements. What should you do?()
A

Modify the properties of the computer object named P_FS2 to enable the Trust computer for delegation attribute. Instruct accounting department users to use Encrypting File System (EFS) to encrypt files

B

Modify the properties of all accounting department user accounts to enable the Account is trusted for delegation attribute. Instruct accounting department users to use Encrypting File System (EFS) to encrypt files

C

Modify the properties of accounting department computers to enable the Trust computer for delegation attribute. Configure accounting department client computers to use IPSec to communicate with P_FS2

D

Modify the properties of all administrator accounts in the forest to enable to Account is trusted for delegation attribute. Configure accounting department client computers to use IPSec to communicate with P_FS2


参考答案

参考解析
解析: 暂无解析
更多 “单选题You need to design an access control strategy for the financial data used by the accounting department. Your solution must meet business requirements. What should you do?()A Modify the properties of the computer object named P_FS2 to enable the Trust computer for delegation attribute. Instruct accounting department users to use Encrypting File System (EFS) to encrypt filesB Modify the properties of all accounting department user accounts to enable the Account is trusted for delegation attribute. Instruct accounting department users to use Encrypting File System (EFS) to encrypt filesC Modify the properties of accounting department computers to enable the Trust computer for delegation attribute. Configure accounting department client computers to use IPSec to communicate with P_FS2D Modify the properties of all administrator accounts in the forest to enable to Account is trusted for delegation attribute. Configure accounting department client computers to use IPSec to communicate with P_FS2” 相关考题
考题 One of the file servers in the domain is a Windows 2000 Server computer named Ezonexamfiles.Ezonexamfiles contains a shared folder named Accounting, which is used to store data for the company's accounts payable department.The permissions on the Accounting folder are configured as shown in the following table.Mr. King is an employee in the operations department. He uses a Windows 2000 Professional client computer. His manager requests that King be granted access to the files in the Accounting folder.You add King's user account to the AcctPay domain local group, but he still cannot access the files in the Accounting folder.You need to ensure that King can access the files. What should you do?A.Instruct King to log off his computer and log on again.B.Move King's user account to the same Active Directory organizational unit (OU) as Ezonexamfiles.C.Modify the NTFS permissions on the Accounting folder to grant King Full Control permissions.D.Modify the NTFS permissions on the Accounting folder to grant the AcctPay domain local group Full Control permission.

考题 You need to design a monitoring strategy to meet business requirements for data on servers in the production department. What should you do?()A、Use the Microsoft Baseline Security Analyzer (MBSA) to scan for Windows vulnerabilities on all servers in the production departmentB、Run Security and Configuration Analysis to analyze the security settings of all servers in the production departmentC、Enable auditing for data on each server in the production department. Run System Monitor on all servers in the production department to create a counter log that tracks activity for the Objects performance objectD、Create a Group Policy Object (GPO) that enables auditing for object access and link it to the product department’s Servers OU. Enable auditing for data on each server in the production department

考题 You need to design an access control strategy for the financial data used by the accounting department. Your solution must meet business requirements. What should you do?()A、Modify the properties of the computer object named P_FS2 to enable the Trust computer for delegation attribute. Instruct accounting department users to use Encrypting File System (EFS) to encrypt filesB、Modify the properties of all accounting department user accounts to enable the Account is trusted for delegation attribute. Instruct accounting department users to use Encrypting File System (EFS) to encrypt filesC、Modify the properties of accounting department computers to enable the Trust computer for delegation attribute. Configure accounting department client computers to use IPSec to communicate with P_FS2D、Modify the properties of all administrator accounts in the forest to enable to Account is trusted for delegation attribute. Configure accounting department client computers to use IPSec to communicate with P_FS2

考题 Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3). You have an organizational unit (OU) named Accounting. You create a Group Policy object (GPO) and link it to the Accounting OU. You join a new client computer to the domain. You discover that the new client computer fails to receive the settings from the new GPO. You need to ensure that the new GPO is applied to the new computer. What should you do? ()A、Move the computer account to the Accounting OU.B、Modify the Location attribute of the computer account.C、Modify the Managed By attribute of the computer account.D、Enable the Trust computer for delegation option on the computer account.

考题 You need to design a security strategy for VPN2. Your solution must meet business requirements. What should you do?()A、Create and configure a new security template. Import the template into the Default Domain Policy Group Policy object (GPO)B、Install Internet Authentication Service (IAS) on RAS1. Configure VPN2 to be the RADIUS client of RAS1. Configure the remote access policy on VPN2C、Create and configure a new security template. Import the template into the local policy on VPN2D、Move VPN2 into the VPN Servers OU. Configure the remote access policy on VPN2

考题 You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()A、Configure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addressesB、Configure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points useC、Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networksD、Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks

考题 Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3). You have an organizational unit (OU) named Accounting. You create a Group Policy object (GPO) and link it to the Accounting OU. You join a new client computer to the domain. You discover that the new client computer fails to receive the settings from the new GPO. You need to ensure that the new GPO is applied to the new computer. What should you do? ()A、Move the computer account to the Accounting OU.B、Modify the Location attribute of the computer account.C、Modify the Managed By attribute of the computer account.D、Enable the Trust computer for delegation option on the computer account.

考题 You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()A、Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access pointB、Configure IEEE 802.1x authentication with smart cardsC、Configure the wireless network to use Wired Equivalent Privacy (WEP)D、Install and configure an Internet Authentication Service (IAS) server

考题 You have a print server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). Server1 has a shared printer named Printer1. You need to track the usage for Printer1. The tracked information must indicate the user that submitted the print job. You enable auditing for object access on Server1. What should you do next? ()A、From the Performance console, create a counter log.B、From the properties of Printer1, modify the Device settings.C、From the properties of Printer1, modify the Security settings.D、From the Print Server properties, modify the Advanced setting.

考题 You have a computer that runs Windows 7. Multiple users log on to your computer. You enable auditing ona folder stored on your computer. You need to ensure that each access to the folder is logged.  What should you do?()A、Start the Problem Steps Recorder.B、From Event Viewer, modify the properties of the Security log.C、From the local Group Policy, configure the Audit object access setting.D、From the local Group Policy, configure the Audit directory service Access setting.

考题 You are designing an authentication strategy for the accounting department. Your solution must meet business requirements. What should you do?()A、Install wireless network cards on all accounting department computers. Select PEAP authenticationB、Install user certificates on all accounting department computers. Configure these computers to respond to requests for IPSec encryptionC、Issue smart cards and smart card readers to all accounting department users and computers. Require NTLMv2 authenticationD、Issue smart cards and smart card readers to all accounting department users and computers. Configure the domain to require smart cards for the accounting department users during logon

考题 You need to design a strategy to move confidential data from research users’ client computers to ATLFP2. Your solution must meet the business requirements. What should you instruct the research users to do?()A、Move the encrypted data to a folder on ATLFP2 over an IPSec connectionB、Move the encrypted data to an Encrypting File System (EFS) folder on ATLFP2 over an IPSec connectionC、Move the encrypted data to a new server that is not a member of the domain, and then move it to ATLFP2D、Move the encrypted data to a compressed folder on ATLFP2 by using Web Distributed Authoring and Versioning (WebDAV) over SSL

考题 You need to design a remote administration solution for servers on the internal network. Your solution must meet business and security requirements. What should you do?()A、Permit administrators to use an HTTP interface to manage servers remotelyB、Permit only administrators to connect to the servers’ Telnet serviceC、Permit administrators to manage the servers by using Microsoft NetMeetingD、Require administrators to use Remote Desktop for Administration connections to manage the servers

考题 You are designing an access control strategy for WEB2. Your solution must meet business requirements. What should you do?()A、Install the Terminal Services Advanced Client Web client on WEB2B、Modify the Winreg registry key on WEB2C、Install the RPC over HTTP service on WEB2D、Modify the RestrictAnonymous registry key on WEB2

考题 You need to design a remote access strategy for portable computers. Your solution must meet business requirements. What should you do?()A、Issue a computer certificate to P_RAS1. Reconfigure the remote access policy on P_RAS1 to accept only EAP-MD5 authentication. Then, specify that P_RAS1’s computer certificate is to be used for authenticationB、Issue a user certificate to the Administrator account on P_RAS1. Reconfigure the remote access policy to accept only EAP-MD5 authentication. Then, specify that the Administrator account’s user certificate is to be used for authenticationC、Issue a computer certificate to P_RAS1. Reconfigure the remote access policy to accept only EAP-TLS authentication. Then, specify the P_RAS1’s computer certificate is to be used for authenticationD、Issue a user certificate to the Administrator account on P_RAS1. Reconfigure the remote access policy to accept only EAP-TLS authentication. Then, specify that the Administrator account’s user certificate is to be used for authentication

考题 单选题You need to design a remote administration solution for servers on the internal network. Your solution must meet business and security requirements. What should you do?()A Permit administrators to use an HTTP interface to manage servers remotelyB Permit only administrators to connect to the servers’ Telnet serviceC Permit administrators to manage the servers by using Microsoft NetMeetingD Require administrators to use Remote Desktop for Administration connections to manage the servers

考题 单选题You are designing an access control strategy for WEB2. Your solution must meet business requirements. What should you do?()A Install the Terminal Services Advanced Client Web client on WEB2B Modify the Winreg registry key on WEB2C Install the RPC over HTTP service on WEB2D Modify the RestrictAnonymous registry key on WEB2

考题 单选题You need to design a strategy to move confidential data from research users’ client computers to ATLFP2. Your solution must meet the business requirements. What should you instruct the research users to do?()A Move the encrypted data to a folder on ATLFP2 over an IPSec connectionB Move the encrypted data to an Encrypting File System (EFS) folder on ATLFP2 over an IPSec connectionC Move the encrypted data to a new server that is not a member of the domain, and then move it to ATLFP2D Move the encrypted data to a compressed folder on ATLFP2 by using Web Distributed Authoring and Versioning (WebDAV) over SSL

考题 单选题You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()A Configure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addressesB Configure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points useC Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networksD Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks

考题 单选题You need to design a monitoring strategy to meet business requirements for data on servers in the production department. What should you do?()A Use the Microsoft Baseline Security Analyzer (MBSA) to scan for Windows vulnerabilities on all servers in the production departmentB Run Security and Configuration Analysis to analyze the security settings of all servers in the production departmentC Enable auditing for data on each server in the production department. Run System Monitor on all servers in the production department to create a counter log that tracks activity for the Objects performance objectD Create a Group Policy Object (GPO) that enables auditing for object access and link it to the product department’s Servers OU. Enable auditing for data on each server in the production department

考题 单选题You have a computer that runs Windows 7. Multiple users log on to your computer. You enable auditing ona folder stored on your computer. You need to ensure that each access to the folder is logged.  What should you do?()A Start the Problem Steps Recorder.B From Event Viewer, modify the properties of the Security log.C From the local Group Policy, configure the Audit object access setting.D From the local Group Policy, configure the Audit directory service Access setting.

考题 单选题You need to design a method to enable remote encryption on Server5. What should you do?()A Configure the editor’s user account properties to enable Store password using reversible encryptionB Configure the editor’s user account properties to enable Use DES encryption for this accountC Configure the Local Security Policy on Server to enable the System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing security policyD Configure the Server5 computer account properties to enable Trust computer for delegation

考题 单选题You are designing an authentication strategy for the accounting department. Your solution must meet business requirements. What should you do?()A Install wireless network cards on all accounting department computers. Select PEAP authenticationB Install user certificates on all accounting department computers. Configure these computers to respond to requests for IPSec encryptionC Issue smart cards and smart card readers to all accounting department users and computers. Require NTLMv2 authenticationD Issue smart cards and smart card readers to all accounting department users and computers. Configure the domain to require smart cards for the accounting department users during logon

考题 单选题You need to design a security strategy for VPN2. Your solution must meet business requirements. What should you do?()A Create and configure a new security template. Import the template into the Default Domain Policy Group Policy object (GPO)B Install Internet Authentication Service (IAS) on RAS1. Configure VPN2 to be the RADIUS client of RAS1. Configure the remote access policy on VPN2C Create and configure a new security template. Import the template into the local policy on VPN2D Move VPN2 into the VPN Servers OU. Configure the remote access policy on VPN2

考题 单选题You need to design a remote access strategy for portable computers. Your solution must meet business requirements. What should you do?()A Issue a computer certificate to P_RAS1. Reconfigure the remote access policy on P_RAS1 to accept only EAP-MD5 authentication. Then, specify that P_RAS1’s computer certificate is to be used for authenticationB Issue a user certificate to the Administrator account on P_RAS1. Reconfigure the remote access policy to accept only EAP-MD5 authentication. Then, specify that the Administrator account’s user certificate is to be used for authenticationC Issue a computer certificate to P_RAS1. Reconfigure the remote access policy to accept only EAP-TLS authentication. Then, specify the P_RAS1’s computer certificate is to be used for authenticationD Issue a user certificate to the Administrator account on P_RAS1. Reconfigure the remote access policy to accept only EAP-TLS authentication. Then, specify that the Administrator account’s user certificate is to be used for authentication

考题 单选题You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()A Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access pointB Configure IEEE 802.1x authentication with smart cardsC Configure the wireless network to use Wired Equivalent Privacy (WEP)D Install and configure an Internet Authentication Service (IAS) server

考题 单选题You have a print server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). Server1 has a shared printer named Printer1. You need to track the usage for Printer1. The tracked information must indicate the user that submitted the print job. You enable auditing for object access on Server1. What should you do next? ()A From the Performance console, create a counter log.B From the properties of Printer1, modify the Device settings.C From the properties of Printer1, modify the Security settings.D From the Print Server properties, modify the Advanced setting.