网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You have a Microsoft Internet Security and Accelerator (ISA) 2006 server that provides all Internet accessfor your company.  You have two Mailbox servers configured in a database availability group (DAG), two Client Accessservers, and two Hub Transport servers.  You need to recommend changes to the environment to ensure that users can access Outlook Web App(OWA) from the Internet if any single server fails.  What should you recommend?()
A

Configure a Client Access server array.

B

Deploy a second ISA server and create an ISA server array.

C

Implement Windows Network Load Balancing for the Client Access servers.

D

Deploy two Edge Transport servers that are configured to use EdgeSync synchronization.


参考答案

参考解析
解析: 暂无解析
更多 “单选题You have a Microsoft Internet Security and Accelerator (ISA) 2006 server that provides all Internet accessfor your company.  You have two Mailbox servers configured in a database availability group (DAG), two Client Accessservers, and two Hub Transport servers.  You need to recommend changes to the environment to ensure that users can access Outlook Web App(OWA) from the Internet if any single server fails.  What should you recommend?()A Configure a Client Access server array.B Deploy a second ISA server and create an ISA server array.C Implement Windows Network Load Balancing for the Client Access servers.D Deploy two Edge Transport servers that are configured to use EdgeSync synchronization.” 相关考题
考题 You have a computer that runs Windows Vista.You need to restore the default Windows Internet Explorer settings for the internal network. You want to maintain the current settings for the Internet.What should you do on the Internet Explorer Security tab?()A.AB.BC.CD.D

考题 You are the domain administrator for TestKing‘s Active Directory domain named All client computers run Windows XP Professional.You need to implement a solution for managing security updates on client computers. You plan to use a Windows Server 2003 computer to manage security updates. Your solution for managing security updates must meet the following requirements:1. You must not purchase additional software or licences.2. Security updates must be installed automatically.3. You must be able to control which updates are available to install.4. Security updates must synchronize automatically with the latest updates offered by Microsoft.You need to implement a solution for managing security updates that meets the requirements.What should you do?()A. Publish the security updates by using a Group Policy object (GPO). Assign the GPO to the client computers that require updatesB. Install Software Update Services (SUS). Configure the SUS software to synchronize daily with Microsoft. Use Group Policy to configure the appropriate Windows Update settings on the client computers.C. Install Microsoft Internet Security and Acceleration (ISA) Server on a Windows Server 2003 computer.D. Create a process to run Windows Update on all client computers.

考题 You have an Exchange Server 2010 organization.You need to identify whether an administrator has made a configuration change in the Exchange organization.What should you run?()A、Get-EventLogLevelB、Get-ExchangeServerC、Exchange Best Practices AnalyzerD、Microsoft Baseline Security Analyzer (MBSA)

考题 You are designing a strategy to ensure that all employees have Internet access. For each branch office,  what should you do?()A、 Configure a DNS server to function as caching-only serversB、 Configure Internet Connection sharing on terminal servers.C、 Install and configure an Internet Security and Acceleration (ISA) Server ComputerD、 Install and configure a server running Routing and Remote Acess to function as a VPN server

考题 You have an Exchange Server 2010 organization.  An Edge Transport server sends and receives all e- mail messages from the Internet.  You notice that some servers on the Internet identify e-mail messages from your organization as spam. You need to minimize the possibility that e-mail messages sent from your organization are identified asspam.  What should you do?()A、Implement Microsoft Forefront Security for Exchange Server.B、Create SenderID TXT records for the Edge Transport servers.C、Configure the Edge Transport servers to use a real-time block list (RBL).D、Install a server certificate from a trusted third-party certification authority (CA).

考题 Your company has an Active Directory forest named contoso.com.  You plan to deploy an Exchange Server 2010 organization that will contain two servers.  Each server will have the Client Access server role, the Hub Transport server role, and the Mailbox serverrole installed.  You plan to add both servers to a database availability group (DAG).  You need to recommend a high-availability solution for the Client Access server role.  Your solution must ensure that users are not prompted to authenticate if a Client Access server becomesunavailable.  What should you recommend?()A、Create and configure a Client Access server array, and then install a hardware load balancer.B、Create and configure a Client Access server array, and then install Windows Network Load Balancingon both servers.C、Deploy Microsoft Internet Security and Acceleration (ISA) Server 2006, and then implement DNS round robin.D、Deploy Microsoft Internet Security and Acceleration (ISA) Server 2006, and then install Windows Network Load Balancing.

考题 You have an Exchange Server 2010 organization that consists of 50 Exchange Server 2010 servers. Your companys security policy states that approved Exchange and Windows Server patches and securityupdates must be applied to all Exchange servers within one week of being released.  You need to recommend a patch management solution that meets the following requirements: .Allow administrators to manually approve patches and security updates .Allow only the installation of approved patches and security updates  .Minimize the administrative effort to deploy patches  .Minimize the deployment costs What should you include in the solution?()A、Microsoft UpdateB、Microsoft System Center Configuration ManagerC、Windows Server Update ServicesD、Windows Update

考题 You have an Exchange 2010 organization.  Your companys security policy states that all connections to Outlook Web App (OWA) must use smartcard authentication.  You need to recommend a solution to meet the security policy requirements.  Which two possible ways to achieve this goal should you recommend?()A、Require certificate-based authentication for all Internet-facing Client Access servers.B、Require Windows Integrated Authentication for all Internet-facing Client Access servers.C、Deploy an Edge Transport server, and then disable Windows Integrated Authentication.D、Deploy a server that runs Microsoft Internet Security and Acceleration (ISA) Server,and then  enableKerberos constrained delegation.

考题 You need to ensure that all servers meet the company’s security requirements. Which tool should you use?()A、Microsoft Baseline Security Analyzer (MBSA)B、Microsoft Security Assessment Tool (MSAT)C、Resultant Set of Policy (RSoP)D、Security Configuration Wizard (SCW)

考题 Your company has client computers that run Windows Vista and client computers that run Windows 7.   The client computers connect directly to the Microsoft Update Web site once per week and automatically install all available security updates.  Microsoft releases a security update for Windows 7.   You have the following requirements:   Create a report of all Windows 7 computers that are currently connected to the network and that do not have the security update installed. Use the least amount of administrative effort.  You need to manage the software update process to meet the requirements.   What should you do?()A、 Deploy Microsoft Windows Server Update Services (WSUS). Approve the security update for installation,and forcea detection cycle on the client computers.B、 Deploy Microsoft Windows Server Update Services (WSUS). Approve the security update for detection, and force adetection cycle on the client computers.C、 Use the Microsoft Baseline Security Analyzer (MBSA) to scan the client computers.Configure MBSA to use the Microsoft Update site catalog.D、 Use the Microsoft Baseline Configuration Analyzer (MBCA) to scan the client computers.

考题 You have a Microsoft Internet Security and Accelerator (ISA) 2006 server that provides all Internet accessfor your company.  You have two Mailbox servers configured in a database availability group (DAG), two Client Accessservers, and two Hub Transport servers.  You need to recommend changes to the environment to ensure that users can access Outlook Web App(OWA) from the Internet if any single server fails.  What should you recommend?()A、Configure a Client Access server array.B、Deploy a second ISA server and create an ISA server array.C、Implement Windows Network Load Balancing for the Client Access servers.D、Deploy two Edge Transport servers that are configured to use EdgeSync synchronization.

考题 You have a server that runs Windows Server 2003 Service Pack 2 (SP2).You need to compare the current security settings of the server to a security template. Which tool should you use?()A、Security Templates snap-in B、Group Policy Management Console C、Security Configuration and Analysis snap-in D、Microsoft Baseline Security Analyzer (MBSA)

考题 You have two stand-alone servers named Server1 and Server2. Both servers run Windows Server 2003 Service Pack 2 (SP2).On Server1, you save the local security policy as a template. You need to import the template to Server2. What should you run on Server2?()A、the Security Templates snap-inB、the Security Configuration WizardC、the Microsoft Baseline Security AnalyzerD、the Security Configuration and Analysis snap-in

考题 You need to recommend a solution for controlling access to the Internet.The solution must meet the museum’s security polic. What should you include in the recommendation?()A、File Server Resource Manager (FSRM) file screens and Group Policy objects (GPOs)B、Microsoft Forefront Threat Management Gateway (TMG) 2010C、Microsoft Forefront Unified Access Gateway (UAG) 2010D、Windows Firewall with Advanced Security and Group Policy objects (GPOs)

考题 You have a computer that runs Windows 7. You need to prevent ActiveX controls from running in WindowsInternet Explorer.  Which Internet Explorer settings should you modify?()A、ContentB、EncodingC、SafetyD、Security

考题 单选题Your company has client computers that run Windows Vista and client computers that run Windows 7.   The client computers connect directly to the Microsoft Update Web site once per week and automatically install all available security updates.  Microsoft releases a security update for Windows 7.   You have the following requirements:   Create a report of all Windows 7 computers that are currently connected to the network and that do not have the security update installed. Use the least amount of administrative effort.  You need to manage the software update process to meet the requirements.   What should you do?()A  Deploy Microsoft Windows Server Update Services (WSUS). Approve the security update for installation,and forcea detection cycle on the client computers.B  Deploy Microsoft Windows Server Update Services (WSUS). Approve the security update for detection, and force adetection cycle on the client computers.C  Use the Microsoft Baseline Security Analyzer (MBSA) to scan the client computers.Configure MBSA to use the Microsoft Update site catalog.D  Use the Microsoft Baseline Configuration Analyzer (MBCA) to scan the client computers.

考题 单选题You need to reduce the level of access that a malicious Web site might have to your computer.  What should you do? ()A Start a Windows Defender scan.B Enable Microsoft Windows Internet Explorer Phishing Filter.C Enable Microsoft Windows Internet Explorer Pop-up Blocker.D Confirm that Microsoft Windows Internet Explorer Protected Mode is enabled on the Internet security zone.

考题 单选题You work as an application developer at Contoso.com. You use Microsoft .NET Framework 3.5 and Microsoft ADO.NET to develop an application that will connect to the Microsoft SQL Server 2005 database. You want to use Windows Authentication along with the Microsoft OLE DB provider. You now need to make sure that the OLE DB connection is as secure as possible.   What should you do?()A  Add the following parameter to the connection string: Integrated Security=true; PersistSecurityInfo=true;B  Add the following parameter to the connection string: Integrated Security=SSPI;C  Add the following parameter to the connection string: Integrated Security=SSPI; PersistSecurityInfo=yes;D  Add the following parameter to the connection string: Integrated Security=true;

考题 单选题You are designing a strategy to ensure that all employees have Internet access. For each branch office, what should you do?()A Configure a DNS server to function as caching-only servers.B Configure Internet Connection sharing on terminal servers.C Install and configure an Internet Security and Acceleration (ISA) Server Computer.D Install and configure a server running Routing and Remote Acess to function as a VPN server.

考题 单选题You are planning to upgrade Internet Explorer.   You have the following requirements:   Create a report that identifies which computers are successfully upgraded. Do not install additional software on the client computers.   You need to design a deployment method that meets the requirements.   What should you do?()A Use Internet Explorer Administration Kit (IEAK) and Group Policy.B Use Microsoft System Center Configuration Manager.C Use Windows Server Update Services (WSUS).D Use Microsoft System Center Essentials.

考题 单选题You have two stand-alone servers named Server1 and Server2. Both servers run Windows Server 2003 Service Pack 2 (SP2).On Server1, you save the local security policy as a template. You need to import the template to Server2. What should you run on Server2?()A the Security Templates snap-inB the Security Configuration WizardC the Microsoft Baseline Security AnalyzerD the Security Configuration and Analysis snap-in

考题 单选题You have an Exchange Server 2010 organization named contoso.com.You have a Client Access server named cas1.contoso.com that is accessible on the Internet.You access cas1.contoso.com on the Internet by using the following domain names:  (1)mail.contoso.com  (2)autodiscover.contoso.com  You need to ensure that mobile devices can use Auto discover on the Internet.What should you do?()A Set the external URL for Microsoft-Server-ActiveSync to $NULL.B Set the external URL for Microsoft-Server-ActiveSync to https:// cas1.contoso.com/Microsoft Server ActiveSync .C Set the external URL for Microsoft-Server-ActiveSync to https://mail.contoso.com /Microsoft- Server- ActiveSync.D Set the external URL for Microsoft-Server-ActiveSync to http://autodiscover.contoso.com /Microsoft- Server- ActiveSync.

考题 单选题You are designing a strategy to ensure that all employees have Internet access. For each branch office,  what should you do?()A  Configure a DNS server to function as caching-only serversB  Configure Internet Connection sharing on terminal servers.C  Install and configure an Internet Security and Acceleration (ISA) Server ComputerD  Install and configure a server running Routing and Remote Acess to function as a VPN server