网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which should be the key driver for a company security policy’s creation, implementation and enforcement?()
A

 the business knowledge of the IT staff

B

 the technical knowledge of the IT staff

C

 the company’s business objectives

D

 the company’s network topology

E

 the IT future directions


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which should be the key driver for a company security policy’s creation, implementation and enforcement?()A  the business knowledge of the IT staffB  the technical knowledge of the IT staffC  the company’s business objectivesD  the company’s network topologyE  the IT future directions” 相关考题
考题 Which of the following documents should always be kept up-to-date after any major changes aremade to a network backbone?() A. Network diagramB. Performance baselineC. Network security procedureD. Company policy

考题 If there is a conflict in policy for data retention, which of the following should the technician adhere to FIRST?()A、Industry best practicesB、Company policyC、International standardsD、Local legal requirements

考题 An administrator is implementing a new data retention program for the company. Which of the following is the MOST important consideration as the new program is created? ()A、 Awareness of company policy requirementsB、 Differentiating between archiving and backup processesC、 Awareness of potential legal requirementsD、 Ensuring that the backups for the retention program cover key business areas

考题 Which should be the key driver for a company security policy’s creation, implementation and enforcement?()A、 the business knowledge of the IT staffB、 the technical knowledge of the IT staffC、 the company’s business objectivesD、 the company’s network topologyE、 the IT future directions

考题 When determining a customer’s security requirements using the security site survey from the steps for success methodology, which three of theses should be included in the customer’s security policy and procedures?()A、Third-party due diligence policy reviewB、Remote Access PolicyC、Encryption PolicyD、Application change control policyE、Security Personnel policy

考题 When disposing of data, which of the following should be considered FIRST?()A、Company policy requirementsB、Local legal requirementsC、Storage requirementsD、Disposal requirements

考题 Which of the following documents should always be kept up-to-date after any major changes aremade to a network backbone?()A、Network diagramB、Performance baselineC、Network security procedureD、Company policy

考题 You deploy mobile devices that run Microsoft Windows Mobile 5.0 with Microsoft Messaging and Security Feature Pack. A server that runs Microsoft Exchange Server 2003 Service Pack 2 is configured by using the default installation settings.   Company security policy requires a complex password for unlocking the Windows Mobilebased devices.   You need to ensure that the Windows Mobilebased devices that perform Microsoft ActiveSync synchronization meet the company security policy.   Which two actions should you perform?()A、Enter all mobile device users in the Exceptions list.B、Enable the Require both numbers and letters option.C、Enable the Allow access to devices that do not fully support password settings option.D、Enable the Minimum password length (characters) option. Configure a value of 6 or greater.

考题 You are the administrator of the Corp arborshoes.com domain. Users in the domain run Windows 2000 Professional on their desktop computers.   A user named Katrin in the Sales organizational unit (OU) reports that her mouse is not working correctly. You log on to the domain from Katrin’s computer by using the domain Administrator account. You use Device Manager to display the current information for the mouse driver.   You discover that Katrin’s computer is using an older version of the mouse driver. You have current drivers furnished by the manufacturer of the mouse. You install the current driver by using Device manager and restart the computer.   You test the mouse and it is still not functioning correctly. You view Device Manger and notice that the display of the current driver indicates that the previous driver is still uninstalled.   You want to be able to install the correct mouse driver. What should you do? ()A、Set the Sales OU policy for security to warn and allow the installation to override the local security defaults. B、Set the domain policy for security to block but allow the installation to override the local and Sales OU security defaults. C、Set the Local Computer Policy for security on Katrin’s computer to warn but allow the installation to override the domain and the Sales OU security defaults. D、Disable plug and play on Katrin’s computer. Restart the computer and manually set up the system resources for the mouse. 

考题 You are the administrator of your company’s network. You use Security Templates to configure a Security Policy on the Windows 2000 Professional Computers in the Sales organizational unit (OU). You notice that the Computers in the Sales OU are not downloading the Security Policy settings. On each computer, the Security Policy appears in the Local Computer Policy, but is not listed as the effective policy. You want all computers in the Sales OU to have the Security Policy listed as the effective policy. How should you accomplish this task? ()A、Use Security Templates to correct the setting and export the security file.B、Use Security Configuration and Analysis to import the security setting. Then create a Group policy object (GPO) for the Sales QU.C、Use Secedit /RefreshPolicy Machine_Policy command.D、Use the Basicwk.inf security file settings, save the security file, and then import the fileto theComputers.

考题 You need to configure the security settings for the new app servers. Which two actions should you perform?()A、Create a Group policy object (GPO) for the web servers.B、Create a Group policy object (GPO) for the database servers.C、Modify the Default Domain Policy.D、Modify the Default Domain Controllers Policy.

考题 You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com security policy prohibits the employees to send certain words between them.What should you do?()A、The best option is to create an Outlook Protection Rule to comply with the Company.com security policy.B、The best option is to set up a content filtering feature to comply with the Company.com security policy.C、The best option is to create a transport rule to comply with the Company.com security policy.D、The best option is to set up a sender reputation feature to comply with the Company.com security policy.

考题 You deploy mobile devices that run Microsoft Windows Mobile 5.0.   Company security policy requires an authentication process that is stronger than a user name and password combination.   You need to ensure that Microsoft ActiveSync sessions use an authentication process that meets the company security policy.   What should you do?()A、Deploy a two-factor authentication process.B、Deploy a single-factor authentication process.C、Deploy a simple PIN policy for the Windows Mobilebased devices.D、Deploy a complex PIN policy for the Windows Mobilebased devices.

考题 You need to ensure that all servers meet the company’s security requirements. Which tool should you use?()A、Microsoft Baseline Security Analyzer (MBSA)B、Microsoft Security Assessment Tool (MSAT)C、Resultant Set of Policy (RSoP)D、Security Configuration Wizard (SCW)

考题 You are the network administrator in the New York office of TestKing. The company network consists of a single Active Directory domain The New York office currently contains one Windows Server 2003 file server named TestKingA. All file servers in the New York office are in an organizational unit (OU) named New York Servers. You have been assigned the Allow - Change permission for a Group Policy object (GPO) named NYServersGPO, which is linked to the New York Servers OU. The written company security policy states that all new servers must be configured with specified predefined security settings when the servers join the domain. These settings differ slightly for the various company offices. You plan to install Windows Sever 2003, on 15 new computers, which all functions as file servers. You will need to configure the specified security settings on the new file servers. TestKingA currently has the specified security settings configured in its local security policy. You need to ensure that the security configuration of the new file servers is identical to that of TestKingA. You export a copy of TestKingA's local security policy settings to a template file. You need to configure the security settings of the new servers, and you want to use the minimum amount of administrative effort. What should you do?()A、Use the Security Configuration and Analysis tool on one of the new servers to import the template file.B、Use the default Domain Security Policy console on one of the new servers to import the template file.C、Use the Group Policy Editor console to open NYServersGPO and import the template file.D、Use the default Local Security Policy console on one of the new servers to import the template file.

考题 单选题Which of the following documents should always be kept up-to-date after any major changes aremade to a network backbone?()A Network diagramB Performance baselineC Network security procedureD Company policy

考题 多选题When determining a customer’s security requirements using the security site survey from the steps for success methodology, which three of theses should be included in the customer’s security policy and procedures?()AThird-party due diligence policy reviewBRemote Access PolicyCEncryption PolicyDApplication change control policyESecurity Personnel policy

考题 单选题You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as the administrator of a SQL Server 2005 computer, and the computer is named SQL1. Microsoft Windows Server 2003 is run by all servers. All the servers belong to a Microsoft Active Directory domain. According to the company written security policy, strong passwords are mandated for all domain, local, and application accounts. The company utilizes a Group Policy object (GPO) to deploy the proper domain password policy. MS-DOS-based or UNIX-based operating systems are run by many of the company’s computers. Varying levels of access to a database named Services on SQL1 is requested by the computers. Since you are the database administrator, you are required to confirm that the Services database can be accessed by these computers. And the company’s written security policy should not be violated.  Which action should be performed by you?()A A domain account should be created for each of the company’s users. And then, each domain account should be offered with access to SQL1 and the Services database.B A local logon account should be created on SQL1 for each of the company’s users. And then, each logon account should be offered with access to SQL1 and the Services database.C One SQL Server logon account should be created for all of the company’s computers running MS-DOS or UNIX-based operating systems. And then, the Enforce password policy option should be enabled for users’ accounts. At last, the logon accounts should be provided with access to the Services database.D A SQL Server logon account should be created for each of the company’s users. And then, the Enforce password policy option should be enabled for each logon account. At last, each logon account should be offered with access to the Services database.E A virtual directory should be configured through Internet Information Services (IIS) for access to SQL1. And then, users should be directed to the virtual directory for data access.

考题 单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is an internal application which uses Analysis Services and Reporting Services. You use the application on the basis of SQL Server 2008. According to the requirement of company security policy, the surface area for all the deployed components of SQL Server 2008 should be configured. You have to implement the security policy and devise a method to evaluate the security policy against other database servers. What should you do?()A You should create policies based on the appropriate facets. Apply the policies against a server group. The server group includes the database servers that need to be configured B You should create a Transact-SQL script based on the sp_configure stored procedure. Use a configuration server to run the script against a server group that includes the database servers that need to be configured C You should edit the RSReportServer.config configuration file. Distribute the file to all database servers that need to be configured D You should analyze your database servers by using the SQL Server Best Practices Analyzer (BPA). Implement the recommendations of the BPA

考题 单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com security policy prohibits the employees to send certain words between them.What should you do?()A The best option is to create an Outlook Protection Rule to comply with the Company.com security policy.B The best option is to set up a content filtering feature to comply with the Company.com security policy.C The best option is to create a transport rule to comply with the Company.com security policy.D The best option is to set up a sender reputation feature to comply with the Company.com security policy.

考题 单选题You need to ensure that all servers meet the company’s security requirements. Which tool should you use?()A Microsoft Baseline Security Analyzer (MBSA)B Microsoft Security Assessment Tool (MSAT)C Resultant Set of Policy (RSoP)D Security Configuration Wizard (SCW)

考题 单选题You are a security administrator for your company. The network consists of a single Active Directory domain. All client computers run Windows XP Professional. All servers run Windows Server 2003. All computers on the network are members of the domain.    Traffic on the network is encrypted by IPSec. The domain contains a custom IPSec policy named Lan Security that applies to all computers in the domain. The Lan Security policy does not allow unsecured communication with non-lPSec-aware computers. The company’s written security policy states that the configuration of the domain and the configuration of the Lan Security policy must not be changed. The domain contains a multihomed server named Server1. Server1 isconnected to the company network, and Server1 is also connected to a test network. Currently, the Lan Security IPSec policy applies to network traffic on both network adapters in Server1. You need to configure Server1 so that it communicates on the test network without IPSec security. Server1 must still use the Lan Security policy when it communicates on the company network.  How should you configure Server1?()A  Configure a packet filter for the network adapter on the test network to block the Internet Key Exchange (IKE) port.B  Configure the network adapter on the test network to disable IEEE 802.1x authentication.C  Configure the network adapter on the test network to enable TCP/IP filtering, and then permit all traffic.D  Use the netsh command to assign a persistent IPSec policy that permits all traffic on the network adapter on the test.E  Assign an IPSec policy in the local computer policy that permits all traffic on the network adapter on the test.

考题 单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is an Active Directory domain in your company. The company runsTerminal Services. You have the head office printer configured as the default printer on the TerminalServer. According to the requirements of the company policy, all remote client computers must meet thefollowing requirements: Users must be able to access their local printers during a terminal session. The head office printer must bethe default printer of the client computers. A Group Policy object (GPO) needs to be created by using theTerminal Services Printer Redirection template to meet the company policy. What action should you perform?()A The Do not set default client printer should be set to be default printer in a session option to Enabled.The GPO should be applied to all the client computers.B The Easy Print driver first option should be set to Disabled. The GPO should be applied to the Terminal Server.C The Use Terminal Services Easy Print driver first option should be set to Disabled. The GPO should be applied to all the client computers.D The Do not set default client printer should be set to be default printer in a session option to Enabled.The GPO should be applied to the Terminal Server.

考题 单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You manage a server that runs Windows Server 2008. The TS Gateway roleservice is installed on this server. You have to provide a security group access to the TS Gateway server. So what action should you perform?()A A Terminal Services Resource Authorization Policy should be created and configured.B A Terminal Services Connection Authorization Policy should be created and configured.C The security group should be added to the Remote Desktop Users group.D The security group should be added to the TS Web Access Computers group.

考题 单选题You need to recommend a NAP enforcement method that meets the companyˉs security requirements. Which method should you recommend?()A 802.1XB DHCPC IPSecD VPN

考题 单选题Which should be the key driver for a company security policy’s creation, implementation and enforcement?()A  the business knowledge of the IT staffB  the technical knowledge of the IT staffC  the company’s business objectivesD  the company’s network topologyE  the IT future directions

考题 单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance.You must make sure that all SQL Server instances are consistently configured for naming conventions, security settings, force index creation and avoidance of data fragmentation. So what action should you perform to achieve this goal?()A You should use the Database Engine Tuning Advisor. B In Microsoft SQL Server Management Studio, you should create a maintenance plan C You should use the SQL Server Configuration Manager D In Microsoft SQL Server Management Studio, you should create a policy

考题 单选题You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005.You work as a database administrator for your company. A SQL Server 2005 database is utilized in your company. And a table named Inventory is contained by the database. A column named Price is included by the table. According to the company policy, you cannot reduce more than 10 percent the value in the Price column in any single database operation. Through many kinds of method, the company makes updates to the Price column. For instance, the utilization of ad hoc queries is one of the methods. Since you are the database administrator, you should confirm that this company policy takes its effect. Which action should be performed?()A A stored procedure should be created, and changes are disallowed by the procedure to the Price column that violates company policy.B On the Price column, a check constraint should be created, and a specified minimum value is required by the check constraint.C A trigger should be created, and changes are rolled back by the trigger to the Price column that violates company policy.D On the Price column, a foreign key constraint is created to a table that valid prices are included.