单项选择题You need to design a strategy to log access to the company Web site. What should you do?()

A.Enable logging on the company Web site and select the NCSA Common Log File Format. Store the log files on a SQL Server computer
B.Use System Monitor to create a counter log that captures network traffic to the Web server by using the Web Service object. Store the log files on a SQL Server computer
C.Run the Network Monitor on the Web server. Create a capture filter for the SNA protocol and save the results to a capture file. Store the capture file on a SQL Server computer
D.Enable logging on the company Web site and select ODBC Logging. Configure the ODBC logging options by using a nonadministrative SQL account


您可能感兴趣的试卷

你可能感兴趣的试题

1.单项选择题You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()

A.Configure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addresses
B.Configure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points use
C.Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networks
D.Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks

2.单项选择题You need to design a monitoring strategy to meet business requirements for data on servers in the production department. What should you do?()

A.Use the Microsoft Baseline Security Analyzer (MBSA) to scan for Windows vulnerabilities on all servers in the production department
B.Run Security and Configuration Analysis to analyze the security settings of all servers in the production department
C.Enable auditing for data on each server in the production department. Run System Monitor on all servers in the production department to create a counter log that tracks activity for the Objects performance object
D.Create a Group Policy Object (GPO) that enables auditing for object access and link it to the product department’s Servers OU. Enable auditing for data on each server in the production department

3.单项选择题You need to design a method to monitor the security configuration of the IIS server to meet the requirements in the written security policy. What should you do?()

A.Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the IIS server computer account
B.Run the Microsoft Baseline Security Analyzer (MBSA) on the IIS server and scan for vulnerabilities in Windows and IIS checks
C.Run Security Configuration and Analysis to analyze the IIS server’s security settings by using a custom security template
D.On the IIS server, run the gpresult command from a command prompt and analyze the output

4.单项选择题You need to design a strategy to ensure that all servers are in compliance with the business requirements for maintaining security patches. What should you do?()

A.Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the domain
B.Log on to each server and run Security Configuration and Analysis to analyze the security settings by using a custom security template
C.Create a logon script to run the secedit command to analyze all servers in the domain
D.Run the Microsoft Baseline Security Analyzer (MBSA) on a server to scan for Windows vulnerabilities on all servers in the domain

5.单项选择题You need to design a method to log changes that are made to servers and domain controllers. You also need to track when administrators modify local security account manager objects on servers. What should you do?()

A.Enable failure audit for privilege user and object access on all servers and domain controllers
B.Enable success audit for policy change and account management on all servers and domain controllers
C.Enable success audit for process tracking and logon events on all servers and domain controllers
D.Enable failure audit for system events and directory service access on all servers and domain controllers

6.单项选择题You need to design a method to configure the servers in the development department to meet the requirements of the chief information officer. What should you do?()

A.Use error reporting on all servers in the development department to report errors for a custom application
B.Configure all servers in the development department so that they do not require the CTRL+ALT+DELTE keys to pressed in order to log on interactively to the server
C.Create a Group Policy object (GPO) and link it to the development department’s Servers OU. Configure the GPO with an interactive logon policy to display a message for users who attempt to log on
D.Configure the screen saver on all servers in the development department to require a password

7.多项选择题You need to design a method to update the content on the Web server. Your solution must meet business and security requirements. What are two possible ways to achieve this goal?()

A.Use SSH to encrypt content as it is transferred to the Web server on the perimeter network
B.Install the Microsoft FrontPage Server Extensions, and use FrontPage to update content
C.Use Web Distributed Authoring and Versioning (WebDAV) over and SSL connection to the Web server to update content
D.Use FTP over an IPSec connection to transfer content to the Web server
E.Use Telnet to connect to the Web server, and then perform content changes directly on the server

8.单项选择题You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()

A.Encrypt customer information when it is stored and when it is being transmitted
B.Require encrypted connections to the public Web site, which is hosted on the Web server on the perimeter network
C.Encrypt all marketing information on file servers and client computers
D.Require encrypted connections to all file servers

9.单项选择题You need to design a remote administration solution for servers on the internal network. Your solution must meet business and security requirements. What should you do?()

A.Permit administrators to use an HTTP interface to manage servers remotely
B.Permit only administrators to connect to the servers’ Telnet service
C.Permit administrators to manage the servers by using Microsoft NetMeeting
D.Require administrators to use Remote Desktop for Administration connections to manage the servers

10.单项选择题You need to design an access control strategy that meets business and security requirements. Your solution must minimize forestwide replication. What should you do?()

A.Create a global group for each department and a global group for each location. Add users to their respective departmental groups as members. Place the departmental global groups within the location global groups. Assign the location global groups to file and printer resources in their respective domains, and then assign permissions for the file and printer resources by using the location global groups
B.Create a global group for each department, and add the respective users as members. Create domain local groups for file and printer resources. Add the global groups to the respective domain local groups. Then, assign permissions to the file and printer resources by using the domain local groups
C.Create a local group on each server and add the authorized users as members. Assign appropriate permissions for the file and printer resources to the local groups
D.Create a universal group for each location, and add the respective users as members. Assign the universal groups to file and printer resources. Then, assign permissions by using the universal groups

最新试题

You need to configure ISA3 in Seattle to enable communication with the network in New York.What should you do?()

题型:单项选择题

You need to design a domain model that meets the company business and security requirements for controlling access to the new Web-based ordering application. What should you do?()

题型:单项选择题

You need to design an access control strategy for the external and intranet Web sites. Which two actions should you perform?()

题型:多项选择题

You need to design a password policy that meets business requirements. What should you do? Select all that apply.()

题型:多项选择题

You need to design a security strategy for communications between the Boston and New York offices. What should you do?()

题型:单项选择题

You need to design security changes that provide maximum protection for customer data and courier assignments.What should you do?()

题型:单项选择题

You need to design a security strategy for the Web folders and files created by the consultants and the internal Web developers. What are two possible ways to achieve this goal?()

题型:多项选择题

You need to design a remote access strategy for portable computers. Your solution must meet business requirements. What should you do?()

题型:单项选择题

The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()

题型:单项选择题

You need to design a strategy to increase security for the client computers in the finance department. Which two actions should you perform?()

题型:多项选择题