单项选择题You need to design an access control strategy for resources that are located in the extranet for partners and for internal users. Your solution must meet business and security requirements. What should you do?()

A.Create a new child domain named extranet.corp.woodgrovebank.com in the existing forest. Create user accounts for users from partner companies in the new child domain. Create shortcut trusts in which the child domain trusts every domain in the forest
B.Create a new forest and domain named extranet.woodgrovebank.com. Create user accounts for users from partner companies in the new domain. Create a one-way forest trust relationship in which the extranet forest trusts the company forest
C.Create a new forest and domain named extranet.woodgrovebank.com. Create user accounts for users from partner companies in the new domain. Create an external trust relationship in which the extranet domain trusts the den.corp.woodgrovebank.com domain
D.Create a child domain of the den.corp.woodgrovebank.com domain for the extranet. Create user accounts for users from partner companies in the new child domain. Create an external trust relationship in which the forest root domain trusts the extranet domain


您可能感兴趣的试卷

你可能感兴趣的试题

1.单项选择题You need to design a remote access strategy for the customer support users when they work from home. Your solution must meet security requirements. What should you do?()

A.Deploy an L2TP/IPsec VPN server in each call center. Configure the portable computers as L2TP VPN clients
B.Create IPSec tunnel mode connections between the customer support users home and the company’s Internet-facing routers
C.Create IP packet filters on the company’s Internet-facing routers to allow the Remote Desktop Protocol (RDP).Create IPSec filters on the terminal servers to allow only connections that use RDP
D.Create IP packet filters on the company’s Internet-facing routers to allow the IPSec protocols. Assign the Secure Server (Require Security) IPSec policy to the terminal servers. Assign the Client (Respond only) IPSec policy to the portable computers

2.单项选择题You need to design a patch management strategy for Southbridge Video. Your solution must meet business requirements. What should you do?()

A.Configure all client computers to use Automatic Updates to obtain security patches from the Windows Update Web site. Test and install all patches
B.Configure a batch file to download security patches daily. Distribute the security patches by using a.zap file and the Default Domain Policy Group Policy object (GPO)
C.Deploy a Software Update Services (SUS) server. Test all security patches and then approve them. Configure all client computers to automatically obtain updates from the server
D.Configure a batch file to download security patches daily. Manually install the security patches on all computers

3.单项选择题You need to design phase one of the new authentication strategy. Your solution must meet business requirements.What should you do?()

A.Install a Windows Server 2003 enterprise root CA, Configure certificate templates for autoenrollment
B.Install a Windows Server 2003 enterprise subordinate CA, Configure certificate templates for autoenrollment
C.Install a Windows Server 2003 stand-alone subordinate CA, Write a logon script for the client computers in the HR department that contains the Certreq.execommand
D.Install a Windows Server 2003 stand-alone root CA,Write a logon script for the client computers in the HR department that contains the Certreq.execommand

4.单项选择题You need to design a software usage policy for the employees of Southbridge Video. The policy must meet business requirements. What should you do?()

A.Configure the software restriction policy in the Default Domain Policy Group Policy object (GPO)
B.Create a new connection object by using the Connection Manager Administration Kit (CMAK), and install the new connection object on all client computers
C.Create and configure a local security policy on both of the ISA server computers
D.Configure the Internet Explorer settings in the Default Domain Policy Group Policy object (GPO)

5.单项选择题You need to design a security solution for WEB1. Your solution must address the chief information officer’s concerns. What should you do?()

A.Enable Web distributed Authoring and Versioning (WebDAV) components on WEB1
B.Install and configure the URLScan ISAPI filter on WEB1
C.Install a computer certificate on WEB1, and enable the Server (Request Security) IPSec policy on WEB1
D.Configure the Web site redirection option on the properties of WEB1 in the Internet Service Manager console

6.单项选择题You are designing an authentication strategy for the accounting department. Your solution must meet business requirements. What should you do?()

A.Install wireless network cards on all accounting department computers. Select PEAP authentication
B.Install user certificates on all accounting department computers. Configure these computers to respond to requests for IPSec encryption
C.Issue smart cards and smart card readers to all accounting department users and computers. Require NTLMv2 authentication
D.Issue smart cards and smart card readers to all accounting department users and computers. Configure the domain to require smart cards for the accounting department users during logon

7.单项选择题You need to design a security strategy for VPN2. Your solution must meet business requirements. What should you do?()

A.Create and configure a new security template. Import the template into the Default Domain Policy Group Policy object (GPO)
B.Install Internet Authentication Service (IAS) on RAS1. Configure VPN2 to be the RADIUS client of RAS1. Configure the remote access policy on VPN2
C.Create and configure a new security template. Import the template into the local policy on VPN2
D.Move VPN2 into the VPN Servers OU. Configure the remote access policy on VPN2

8.单项选择题You need to design a method to address the chief information officer’s security concerns. What should you do?()

A.Configure Windows Management Instrumentation (WMI) filtering options in the Default Domain Policy GPO
B.Use the gpresult command
C.Use Mbsacli.exe
D.Configure software restriction policy options in the Default Domain Policy GPO

9.单项选择题You are designing an access control strategy for WEB2. Your solution must meet business requirements. What should you do?()

A.Install the Terminal Services Advanced Client Web client on WEB2
B.Modify the Winreg registry key on WEB2
C.Install the RPC over HTTP service on WEB2
D.Modify the RestrictAnonymous registry key on WEB2

10.单项选择题You need to design an audit strategy for Southbridge Video. Your solution must meet business requirements.What should you do?()

A.Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPO
B.Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPO
C.Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPO
D.Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPO

最新试题

You need to design a patch management strategy that meets business requirements. What should you do?()

题型:单项选择题

You need to design a method to modify the current e-mail ordering system. Which will be used until Fourth Coffee deploys the Web-based ordering application. Your solution must address business concerns and improve security. What should you do?()

题型:单项选择题

The company is evaluating using a new Active Directory domain to contain all customer user accounts. You need to design a monitoring or logging strategy that meets business and security requirements for the new Web-based ordering application. Your solution must minimize overhead on existing domain controllers and servers. What should you do?()

题型:单项选择题

You need to design a patch management strategy for Northwind Traders. What should you do?()

题型:单项选择题

You need to design an authentication strategy for users of portable computers. Your solution must meet business requirements. What should you do?()

题型:单项选择题

You are designing a security strategy for the public Web server. You solution must address the chief security officer’s concerns. What should you do?()

题型:单项选择题

You need to design a remote access strategy for portable computers. Your solution must meet business requirements. What should you do?()

题型:单项选择题

You are designing a remote administration solution that meets business requirements. You need to specify client or server software that will be required. What should you do?()

题型:单项选择题

You need to design a strategy to move confidential data from research users’ client computers to ATLFP2. Your solution must meet the business requirements. What should you instruct the research users to do?()

题型:单项选择题

You need to provide users in the research department access to different functions of the Web-based research application based on individual user roles. What should you do?()

题型:单项选择题