A.Install the Terminal Services Advanced Client Web client on WEB2
B.Modify the Winreg registry key on WEB2
C.Install the RPC over HTTP service on WEB2
D.Modify the RestrictAnonymous registry key on WEB2
您可能感兴趣的试卷
你可能感兴趣的试题
A.Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPO
B.Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPO
C.Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPO
D.Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPO
A.Create a GPO and link it to the New York OU, to the Denver OU, and to the Dallas OU.Configure the GPO with the required account policy settings
B.On all computers in the domain, configure the Local Security Policy7 with the required account policy settings
C.Configure the Default Domain Policy GPO with the required account policy settings
D.Configure the Default Domain Controllers Policy GPO with the required account policy settings
A.Configure the editor’s user account properties to enable Store password using reversible encryption
B.Configure the editor’s user account properties to enable Use DES encryption for this account
C.Configure the Local Security Policy on Server to enable the System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing security policy
D.Configure the Server5 computer account properties to enable Trust computer for delegation
A.Move the EditorialAdmins group to the Servers OU in the editorial department
B.Move the members of the EditorialAdmins group to the Editorial OU
C.Move the members of the EditorialAdmins group to the New York OU
D.Move the EditorialAdmins group to the New York OU
A.Run the Resultant Set of Policy wizard with a Windows Management Instrumentation (WMI) filter on each department’s Server OU
B.Log on to each server and use local policy to configure and manage the security settings
C.Create a customer security template. Log on to a domain controller and run the seceditcommand to import the security template
D.Create a customer security template. Create a GPO and import the security template. Link the GPO to each department’s Server OU
A.Enable logging on the company Web site and select the NCSA Common Log File Format. Store the log files on a SQL Server computer
B.Use System Monitor to create a counter log that captures network traffic to the Web server by using the Web Service object. Store the log files on a SQL Server computer
C.Run the Network Monitor on the Web server. Create a capture filter for the SNA protocol and save the results to a capture file. Store the capture file on a SQL Server computer
D.Enable logging on the company Web site and select ODBC Logging. Configure the ODBC logging options by using a nonadministrative SQL account
A.Configure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addresses
B.Configure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points use
C.Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networks
D.Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks
A.Use the Microsoft Baseline Security Analyzer (MBSA) to scan for Windows vulnerabilities on all servers in the production department
B.Run Security and Configuration Analysis to analyze the security settings of all servers in the production department
C.Enable auditing for data on each server in the production department. Run System Monitor on all servers in the production department to create a counter log that tracks activity for the Objects performance object
D.Create a Group Policy Object (GPO) that enables auditing for object access and link it to the product department’s Servers OU. Enable auditing for data on each server in the production department
A.Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the IIS server computer account
B.Run the Microsoft Baseline Security Analyzer (MBSA) on the IIS server and scan for vulnerabilities in Windows and IIS checks
C.Run Security Configuration and Analysis to analyze the IIS server’s security settings by using a custom security template
D.On the IIS server, run the gpresult command from a command prompt and analyze the output
A.Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the domain
B.Log on to each server and run Security Configuration and Analysis to analyze the security settings by using a custom security template
C.Create a logon script to run the secedit command to analyze all servers in the domain
D.Run the Microsoft Baseline Security Analyzer (MBSA) on a server to scan for Windows vulnerabilities on all servers in the domain
最新试题
You need to design an access control strategy for the external and intranet Web sites. Which two actions should you perform?()
You need to design a domain model that meets the company business and security requirements for controlling access to the new Web-based ordering application. What should you do?()
You need to provide users in the research department access to different functions of the Web-based research application based on individual user roles. What should you do?()
You need to design an authentication strategy for users of portable computers. Your solution must meet business requirements. What should you do?()
You need to design a security solution for the internally developed Web applications that meets business requirements. What should you do?()
You need to design a method for junior IT administrators to perform more IT support tasks. Your solution must meet business and security requirements. What should you do?()
You need to design a method to ensure that research intellectual property remains confidential. You solution must meet security requirements. What should you do?()
You need to design an access control strategy for the financial data used by the accounting department. Your solution must meet business requirements. What should you do?()
You are designing a remote administration solution that meets business requirements. You need to specify client or server software that will be required. What should you do?()
You need to improve the company’s security patch management process. Your solution must meet existing business requirements and it cannot increase the number of employees or unnecessarily increase ongoing administrative effort. What should you do?()