A.Configure the terminal server so that users log on by using local user accounts
B.Configure the terminal server so that users log on by using domain accounts
C.Configure the server to run SalesForceMax in a dedicated window when a user logs on to the terminal server
D.Configure the server to allow each user to have a Windows desktop when the user logs on to the terminal server
E.Use software restriction polices in Group Policy objects (GPOs) that apply to the terminal server
F.Use Appsec.exe to restrict applications on the terminal server
您可能感兴趣的试卷
你可能感兴趣的试题
A.Require a PPTP VPN for all connections to the Web server
B.Require that traffic between Web browsers and the Web server uses an L2TP/IPSec tunnel
C.Require that traffic between Web browsers and the Web server uses SSL
D.Require certificate mappings between the Web server and Active Directory
A.On each client computer in the call center, configure a local policy that lists only authorized programs in the Allowed Windows Programs list
B.Using NTFS permissions, assign the Deny – Read permission for all unauthorized executable files to the client computer domain accounts
C.Design a Group Policy object (GPO) that enforces a software restriction policy on all client computers in the call center
D.Design a Group Policy object (GPO) that implements an IPSec policy on all client computers in the call center. Ensure that the IPSec policy rejects connections to any Web servers that the company does not operate
A.Disable all unnecessary services on each DHCP server
B.Modify the discretionary access control lists (DACLs) in Active Directory so that only members of the Enterprise Admins security group can authorize additional DHCP servers
C.Use an IPSec policy that allows only the packets necessary for DHCP and domain membership for each DHCP server
D.Install a digital certificate for SSL on each DHCP server
A.Configure and publish a certificate template that is suitable for S/MIME, Deploy a Group Policy object (GPO) so that a certificate that is based on this template is automatically issued to all domain users
B.Specify Group Policy objects (GPOs) and IPSec policies that require all client computers to use Kerberos authentication to connect to mail servers
C.For each mail server, acquire an SSL server certificate from a commercial CA whose root certificate is already trusted
D.Require IPSec encryption on all TCP connections that are used to send or receive e-mail messages
A.Deploy a Windows Server 2003 computer running SUS in the test network. Deploy SUS servers in each child domain to download administrator-approved updates from the test network SUS server
B.Deploy a Windows Server 2003 computer running SUS in the test network Use autoupdate policies in each child domain to download and deploy updates from the test network SUS server
C.Install MBSA on a Windows Server 2003 computer in the network network. Deploy MBSA as a Windows Installer package to all computers in the child domains, and configure MBSA to scan for updates from the server in the test network
D.Install IIS on a Windows Server 2003 computer in the test network. Create a Web site named Updates on this server. Configure an autoupdate policy in each child domain to download and deploy updates from the Updates Web site
A.Deploy an offline enterprise root CA in the corp.woodgrovebank.com domain. Deploy subordinate enterprise root CAs in each child domain. Install Internet Authentication Service (IAS) on one member server in the la.corp.woodgrovebank.com domain and one member server in the den.corp.woodgrovebank.com domain
B.Deploy an enterprise root CA in each domain. Install Internet Authentication Service (IAS) on a member server in the corp.woodgrovebank.com domain. Install the Routing and Remote Access service on a member server in each child domain, and configure these servers as RADIUS clients
C.Enroll and deploy user certificates to all administrators in each domain. Enroll and deploy computer certificates to all portable computers that have wireless network adapters. Configure each portable computer to use Protected EAP (PEAP) for authentication
D.Enroll and deploy computer certificates to all portable computers that have wireless network adapters. Configure each portable computer to use EAP-MS-CHAP v2 for authentication. Configure each portable computer to connect to the Internet Authentication Service (IAS) server
A.Implement an enterprise root CA in the corp.woodgrovebank.com domain.Implement subordinate CAs in each child domain. Take the root CA offline
B.Implement an enterprise root CA in the corp.woodgrovebank.com domain
C.Implement an enterprise root CA in each of the child domains. Take the enterprise CA in each domain offline
D.Implement an enterprise root CA in the corp.woodgrovebank.com domain. Implement a stand-alone root CA in each of the child domains
A.In the Default Domain Policy Group Policy object (GPO) for the corp.woodgrovebank.com domain, add the LA\HRUsers group to the Restricted Groups list. Add only the HR department user accounts to the Allowed Members list
B.In the Default Domain Policy Group Policy object (GPO) for the la.corp.woodgrovebank.com domain, add the LA\HRUsers group to the Restricted Groups list. Add only the HR department user accounts to the Allowed Members list
C.In the Default Domain Policy Group Policy object (GPO) for the corp.woodgrovebank.com domain, add the LA\HRUsers group and the CORP\Backup Operators group to the Restricted Groups list. Add only the HR department user accounts and the administrator user accounts to the Allowed Members list for each group
D.In the Default Domain Policy Group Policy object (GPO) for the la.corp.woodgrovebank.com domain, add the LA\HRUsers group and the CORP\Backup Operators group to the Restricted Groups list. Add only the HR department user accounts to the Allowed Members list for the LA\HRUsers group. Add only the administrator user accounts to the Allowed Members list for the CORP\Backup Operators group
A.Configure the Web site to require SSL connections. Configure the Web site to require client certificates. Enable and configure client certificate mapping on the Web site
B.Configure the Web site to require SSL connections. Disable anonymous access to the Web site.Assign the Allow – Read permission to the customer user accounts for the folder that contains the Web site files
C.Configure the Web site to use only Microsoft .NET Passport authentication. Specify the den.corp.woodgrovebank.com domain as the default domain for .NET Passport authentication.Configure a custom local IPSec policy on the Web servers to require IPSec communications
D.Configure the Web site to use only Windows Integrated authentication. Configure a custom local IPSec policy on the Web servers to require IPSec communications. Configure the IPSec policy to use certificate-based authentication and encryption
A.Install Internet Authentication Services (IAS) on a server in the den.corp.woodgrovebank.com domain. Configure the VPN servers as RADIUS clients
B.Install Internet Authentication Services (IAS) on a stand-alone server in the Denver extranet. Create local user accounts for the IT personnel on the IAS server. Configure the VPN servers as RADIUS clients
C.Create a remote access policy on each of the VPN servers. Configure the policy to use the den.corp.woodgrovebank.com to authenticate remote access users. Configure the policy to require L2TP to establish a connection
D.Create a remote access policy on each of the VPN servers. Create local user accounts for the IT personnel on the VPN servers. Configure the policy to use the VPN servers’ local accounts database to authenticate users. Configure the policy to require L2TP to establish a connection
最新试题
You need to design a security solution for the internally developed Web applications that meets business requirements. What should you do?()
You need to design a strategy to move confidential data from research users’ client computers to ATLFP2. Your solution must meet the business requirements. What should you instruct the research users to do?()
You need to design an access control strategy for the financial data used by the accounting department. Your solution must meet business requirements. What should you do?()
You need to design a method to modify the current e-mail ordering system. Which will be used until Fourth Coffee deploys the Web-based ordering application. Your solution must address business concerns and improve security. What should you do?()
You need to design a method to ensure that research intellectual property remains confidential. You solution must meet security requirements. What should you do?()
You need to design a password policy that meets business requirements. What should you do? Select all that apply.()
You need to design a certificate management process for internal users. What should you do?()
You need to design a strategy to increase security for the client computers in the finance department. Which two actions should you perform?()
You need to design an access control strategy for the external and intranet Web sites. Which two actions should you perform?()
You need to design a domain model that meets the company business and security requirements for controlling access to the new Web-based ordering application. What should you do?()