单项选择题You need to design a security solution for WEB1. Your solution must address the chief information officer’s concerns. What should you do?()

A.Enable Web distributed Authoring and Versioning (WebDAV) components on WEB1
B.Install and configure the URLScan ISAPI filter on WEB1
C.Install a computer certificate on WEB1, and enable the Server (Request Security) IPSec policy on WEB1
D.Configure the Web site redirection option on the properties of WEB1 in the Internet Service Manager console


您可能感兴趣的试卷

你可能感兴趣的试题

1.单项选择题You are designing an authentication strategy for the accounting department. Your solution must meet business requirements. What should you do?()

A.Install wireless network cards on all accounting department computers. Select PEAP authentication
B.Install user certificates on all accounting department computers. Configure these computers to respond to requests for IPSec encryption
C.Issue smart cards and smart card readers to all accounting department users and computers. Require NTLMv2 authentication
D.Issue smart cards and smart card readers to all accounting department users and computers. Configure the domain to require smart cards for the accounting department users during logon

2.单项选择题You need to design a security strategy for VPN2. Your solution must meet business requirements. What should you do?()

A.Create and configure a new security template. Import the template into the Default Domain Policy Group Policy object (GPO)
B.Install Internet Authentication Service (IAS) on RAS1. Configure VPN2 to be the RADIUS client of RAS1. Configure the remote access policy on VPN2
C.Create and configure a new security template. Import the template into the local policy on VPN2
D.Move VPN2 into the VPN Servers OU. Configure the remote access policy on VPN2

3.单项选择题You need to design a method to address the chief information officer’s security concerns. What should you do?()

A.Configure Windows Management Instrumentation (WMI) filtering options in the Default Domain Policy GPO
B.Use the gpresult command
C.Use Mbsacli.exe
D.Configure software restriction policy options in the Default Domain Policy GPO

4.单项选择题You are designing an access control strategy for WEB2. Your solution must meet business requirements. What should you do?()

A.Install the Terminal Services Advanced Client Web client on WEB2
B.Modify the Winreg registry key on WEB2
C.Install the RPC over HTTP service on WEB2
D.Modify the RestrictAnonymous registry key on WEB2

5.单项选择题You need to design an audit strategy for Southbridge Video. Your solution must meet business requirements.What should you do?()

A.Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPO
B.Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPO
C.Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPO
D.Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPO

6.单项选择题You need to design a method to implement account policies that meets the requirements in the written security policy. What should you do?()

A.Create a GPO and link it to the New York OU, to the Denver OU, and to the Dallas OU.Configure the GPO with the required account policy settings
B.On all computers in the domain, configure the Local Security Policy7 with the required account policy settings
C.Configure the Default Domain Policy GPO with the required account policy settings
D.Configure the Default Domain Controllers Policy GPO with the required account policy settings

7.单项选择题You need to design a method to enable remote encryption on Server5. What should you do?()

A.Configure the editor’s user account properties to enable Store password using reversible encryption
B.Configure the editor’s user account properties to enable Use DES encryption for this account
C.Configure the Local Security Policy on Server to enable the System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing security policy
D.Configure the Server5 computer account properties to enable Trust computer for delegation

8.单项选择题You need to design a group membership strategy for the EditorialAdmins group. What should you do?()

A.Move the EditorialAdmins group to the Servers OU in the editorial department
B.Move the members of the EditorialAdmins group to the Editorial OU
C.Move the members of the EditorialAdmins group to the New York OU
D.Move the EditorialAdmins group to the New York OU

9.单项选择题You need to design a method to deploy security configuration settings to servers. What should you do?()

A.Run the Resultant Set of Policy wizard with a Windows Management Instrumentation (WMI) filter on each department’s Server OU
B.Log on to each server and use local policy to configure and manage the security settings
C.Create a customer security template. Log on to a domain controller and run the seceditcommand to import the security template
D.Create a customer security template. Create a GPO and import the security template. Link the GPO to each department’s Server OU

10.单项选择题You need to design a strategy to log access to the company Web site. What should you do?()

A.Enable logging on the company Web site and select the NCSA Common Log File Format. Store the log files on a SQL Server computer
B.Use System Monitor to create a counter log that captures network traffic to the Web server by using the Web Service object. Store the log files on a SQL Server computer
C.Run the Network Monitor on the Web server. Create a capture filter for the SNA protocol and save the results to a capture file. Store the capture file on a SQL Server computer
D.Enable logging on the company Web site and select ODBC Logging. Configure the ODBC logging options by using a nonadministrative SQL account

最新试题

You need to design an access control strategy for the financial data used by the accounting department. Your solution must meet business requirements. What should you do?()

题型:单项选择题

You need to design security changes that provide maximum protection for customer data and courier assignments.What should you do?()

题型:单项选择题

You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()

题型:单项选择题

The company is evaluating using a new Active Directory domain to contain all customer user accounts. You need to design a monitoring or logging strategy that meets business and security requirements for the new Web-based ordering application. Your solution must minimize overhead on existing domain controllers and servers. What should you do?()

题型:单项选择题

You need to design a patch management strategy that meets business requirements. What should you do?()

题型:单项选择题

You need to design a method to ensure that only scripts that are approved by the IT department can run on company computers. Your solution must meet business requirements. What should you do?()

题型:单项选择题

You need to design a security strategy for the Web folders and files created by the consultants and the internal Web developers. What are two possible ways to achieve this goal?()

题型:多项选择题

You need to design a strategy to move confidential data from research users’ client computers to ATLFP2. Your solution must meet the business requirements. What should you instruct the research users to do?()

题型:单项选择题

You need to design a remote access strategy for portable computers. Your solution must meet business requirements. What should you do?()

题型:单项选择题

You need to identify potential security threats. Which of the following security breaches might occur under the current IT and security practices?(Choose all that apply)()

题型:单项选择题