单项选择题你需要设计配置触摸屏计算机。你尽可能少的使用管理工具去解决问题。你应该怎样做?()

A.配置触摸计算机不作为任何一个域成员。使用本地计算机策略去配置计算去应用触摸屏计算机配置规范
B.用一个触摸屏计算机作为模版。配置这个计算机应用触摸屏计算机规范,复制这个计算机C:\Documents and Settings\Default Users Folder 的内容到其它所有的触摸屏计算机
C.创建一个应用触摸屏计算机规范的系统文件名为Ntconfig.pol。把触摸屏计算机加入到域。使用组策略对象去配置应用启动脚本去复制Ntconfig.pol到所有触摸屏计算机的System32目录下
D.创建一个组策略对象去配置应用触摸计算机配置规范:同样包括一个软件限制策略。把触摸屏计算机加入到域并放在同一个OU中,把GPO连接到OU中


您可能感兴趣的试卷

你可能感兴趣的试题

1.单项选择题You need to improve the company’s security patch management process. Your solution must meet existing business requirements and it cannot increase the number of employees or unnecessarily increase ongoing administrative effort. What should you do?()

A.Provide all users with the ability to access and use the Windows Update Web site
B.Upgrade all client computers to either Windows 2000 Professional or Windows XP Professional. Implement Software Update Services (SUS)
C.Upgrade all client computers to either Windows 2000 Professional or Windows XP Professional.Make all users members of the Power Users group on their client computers
D.Install the Active Directory Client Extensions on all Windows 95, Windows 98, and Windows NT Workstation 4.0 computers. Manually download all security patches to a Distributed File System (DFS) replica. Instruct all users to use the DFS replica to install security patches
E.Install the Active Directory Client Extensions on all Windows 95, Windows 98, and Windows NT Workstation 4.0 computers. Install a Software Update Services (SUS) server and make all users local administrators on their client computers

2.单项选择题You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()

A.Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access point
B.Configure IEEE 802.1x authentication with smart cards
C.Configure the wireless network to use Wired Equivalent Privacy (WEP)
D.Install and configure an Internet Authentication Service (IAS) server

3.单项选择题You need to design an authentication strategy for users of portable computers. Your solution must meet business requirements. What should you do?()

A.Issue smart cards and smart card readers to all portable computer users. Configure the domain to require smart cards for login and to log off users who remote their smart cards
B.Configure the portable computers to connect to only wireless networks that use Wired Equivalent Privacy (WEP). Install digital certificates on all portable computers
C.Install computer certificates on all portable computers. Configure all portable computers to respond to requests for IPSec encryption
D.Install biometric authentication devices on all portable computers. Configure the Default Domain Policy GPO to require complex passwords for all users

4.单项选择题You need to design a security strategy for communications between the Boston and New York offices. What should you do?()

A.Configure RRAS2 as a VPN server. Use Web enrollment to acquire computer certificates for both RRAS1 and RRAS2. Create demand-dial L2TP/IPSec connections on both RRAS1 and RRAS2. Configure dial-out credentials on both RRAS1 and RRAS2. Enable the Basic Firewall settings on RRAS1 and RRAS2
B.Configure RRAS2 as a VPN server. Create demand-dial L2TP/IPSec connections on both RRAS1 and RRAS2. Configure dial-out credentials on both RRAS1 and RRAS2. Configure static routes on both RRAS1 and RRAS2. Set the connection type to persistent on the demand-dial interface on both RRAS1 and RRAS2
C.Create a new OU named RRAS Servers in the boston.northwindtraders.com domain. Move RRAS1 into the RRAS Servers OU. On the Default Domain Policy Group Policy object (GPO), edit the Secure Server (Require Security) IPSec policy. Configure the IPSec policy to use a certificate for authentication. Specify RRAS2 as the tunnel endpoint. Assign the IPSec policy.
D.Create a new OU named RRAS Server in the northwindtraders.com domain. Move the RRAS2 into the RRAS Servers OU. On the RRAS Servers OU create new Group Policy object (GPO) named IPSECPOL. In IPSECPOL create an IPSec policy and specify RRAS as the tunnel.

5.单项选择题You need to design an authentication solution for Terminal Services that meets the business requirements.What should you do?()

A.Configure the terminal server to use smart cards
B.Configure IPSec to permit only Remote Desktop Protocol (RDP) connections to the terminal server
C.Deny the Remote Desktop Users group access to the terminal server
D.Restrict treyresearch.com users from logging on locally to the terminal server

6.单项选择题You need to design a domain model that meets the company business and security requirements for controlling access to the new Web-based ordering application. What should you do?()

A.Create a child OU within the existing domain
B.Create a child domain of the existing domain
C.Create a new domain in a new forest. Configure the new domain to trust the existing domain
D.Create a new tree in the existing forest. Configure the new domain to trust the existing domain

7.单项选择题You need to design a strategy to move confidential data from research users’ client computers to ATLFP2. Your solution must meet the business requirements. What should you instruct the research users to do?()

A.Move the encrypted data to a folder on ATLFP2 over an IPSec connection
B.Move the encrypted data to an Encrypting File System (EFS) folder on ATLFP2 over an IPSec connection
C.Move the encrypted data to a new server that is not a member of the domain, and then move it to ATLFP2
D.Move the encrypted data to a compressed folder on ATLFP2 by using Web Distributed Authoring and Versioning (WebDAV) over SSL

8.多项选择题You need to design an access control strategy for the external and intranet Web sites. Which two actions should you perform?()

A.Enable SSL on the external Web site by using a Microsoft cryptographic service provider (CSP)
B.Enable Microsoft .NET Passport authentication on the external Web site. Use Passport Level 0 with SSL on the external Web site
C.Enable SSL on the external Web site by using a commercial digital certificate
D.Enable SSL on the intranet Web site by using an internal server certificate
E.Enable SSL on the external Web site by using an internal server certificate

9.单项选择题You need to configure ISA3 in Seattle to enable communication with the network in New York.What should you do?()

A.Open the ports for DNS, HTTP, HTTPS, Kerberos, RADIUS, LDAP, RPC endpoint mapper and client, and Server Message Block (SMB) over IP
B.Enable the Routing and Remote Access Basic Firewall. Open the ports for DNS, Kerberos, LDAP, Exchange RPCs, RADIUS, L2TP, and Internet Key Exchange (IKE)
C.Create a PPTP tunnel from ISA3 to the New York network
D.Create an L2TP/IPSec tunnel from ISA3 to the New York network

10.单项选择题You need to design a PKI that meets business requirements. What should you do?()

A.Move ATLCA1 offline and create an enterprise subordinate CA to issue certificates
B.Create a stand-alone subordinate CA to issue certificates
C.Use a qualified subordinate CA
D.Configure certificate template access control lists (ACLs) on ATLCA1

最新试题

The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()

题型:单项选择题

You need to design an access control strategy for the Contact Info and the Order History folders. What should you do?()

题型:单项选择题

You are designing a security strategy for the public Web server. You solution must address the chief security officer’s concerns. What should you do?()

题型:单项选择题

You need to design a PKI that meets business requirements. What should you do?()

题型:单项选择题

You need to design a PKI for the Northwind Traders internal network. What should you do?()

题型:单项选择题

You need to design a method to standardize and deploy a baseline security configuration for servers. You solution must meet business requirements. What should you do?()

题型:单项选择题

You need to design a patch management strategy for Northwind Traders. What should you do?()

题型:单项选择题

You need to design a strategy to move confidential data from research users’ client computers to ATLFP2. Your solution must meet the business requirements. What should you instruct the research users to do?()

题型:单项选择题

You need to configure ISA3 in Seattle to enable communication with the network in New York.What should you do?()

题型:单项选择题

You need to design a method to ensure that research intellectual property remains confidential. You solution must meet security requirements. What should you do?()

题型:单项选择题