单项选择题You need to identify potential security threats. Which of the following security breaches might occur under the current IT and security practices?(Choose all that apply)()

A.A virus that infects an IT administrator’s client computer could gain domain administrator privileges
B.Couriers could gain access to domain administrator privileges
C.Business office staff could discover couriers’ passwords and use them to access couriers’ information
D.All users could use their user accounts to gain the ability to install untested security patches on their client computers


您可能感兴趣的试卷

你可能感兴趣的试题

1.单项选择题The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()

A.On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policy
B.On all client computers, implement logon auditing for all user account logons
C.On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policy
D.On all domain controllers, implement logon auditing for all user account logons

2.单项选择题You need to design an access control strategy for the Contact Info and the Order History folders. What should you do?()

A.Create a domain local group named Customer Relations in the northwindtraders.com domain. Add the Sales group and the Sales Managers groups to the Customer Relations group. Add the Customer Relationships group to the Customer Information folder. Assign the appropriate permissions. Add the accounts for the sales department users in Boston to the Boston Customer Relationship group. Add the Boston Customer Relationships group to the Customer Relations group. Disable inheritance on the Payment folder
B.Create a domain local group named Customer Relations in the boston.northwindtraders.com domain. Add the Customer Relations group to the Customer Information folder. Assign the appropriate permissions. Add the Boston Customer Relations group to the Customer Relations group. Disable permission inheritance on the Payment folder
C.Create a domain local group named Customer Relations in the boston.northwindtraders.com domain. Add the Customer Relations group to the Order History folder. Assign the appropriate permissions. Add the Boston Customer Relations group to the Customer Relations group. Disable permission inheritance on the Payment folder
D.Create a domain local group named Customer Relations in the boston.northwindtraders.com domain. Add the Customer Relations group to the Customer Information folder. Assign the appropriate permissions. Add the Boston Customer Relations group to the Customer **MISSING**

3.多项选择题You need to design an access control strategy for the external and intranet Web sites. Which two actions should you perform?()

A.Enable SSL on the external Web site by using a Microsoft cryptographic service provider (CSP)
B.Enable Microsoft .NET Passport authentication on the external Web site. Use Passport Level 0 with SSL on the external Web site
C.Enable SSL on the external Web site by using a commercial digital certificate
D.Enable SSL on the intranet Web site by using an internal server certificate
E.Enable SSL on the external Web site by using an internal server certificate

4.单项选择题You need to design a patch management strategy for Northwind Traders. What should you do?()

A.Configure the Default Domain Policy Group Policy object (GPO) for the northwindtraders.com domain to configure client computers to download updates from the SUS server in New York. Configure the Default Domain Policy GPO for the boston.northwindtraders.com domain to configure client computers to download updates from the SUS server in New York
B.Use Group Policy to configure client computers to download updates from a Windows Update server on the Internet. Configure the Default Domain Policy Group Policy object (GPO) with a startup script that runs Mbsacli.exe. Configure it to scan the computers in both of the branch offices
C.Install and configure a SUS server in the Boston branch office. Configure the server to download updates from a Windows Update server on the Internet. Configure Microsoft Baseline Security Analyzer (MBSA) to scan for updates and computers in the New York office
D.Install and configure a SUS server in each branch office. Configure the SUS servers to download updates from the New York SUS server. Configure Microsoft Baseline Security Analyzer (MBSA) to scan for updates on computers in the New York office

5.单项选择题You need to design a PKI for the Northwind Traders internal network. What should you do?()

A.Add an enterprise root CA to the northwindtraders.com domain. Configure cross-certification between the northwindtraders.com domain and the boston.northwindtraders.com domain
B.Add an enterprise subordinate issuing CA to the northwindtraders.com domain. Configure qualified subordination for the enterprise subordinate issuing CA in Boston
C.Add enterprise subordinate issuing CAs to the New York, Boston, and Seattle LANs. Configure qualified subordinations for each enterprise subordinate issuing CA
D.Add a stand-alone commercial issuing CA to only the northwindtraders.com domain. Configure cross-certification between the commercial CA and the boston.northwindtraders.com domain

6.多项选择题You need to design a security strategy for the Web folders and files created by the consultants and the internal Web developers. What are two possible ways to achieve this goal?()

A.Require the internal Web developers to use Telnet with Kerberos authentication. Require the consultants to use L2TP with IPSec
B.Require the internal Web developers to use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV). Require the consultants to use Microsoft.NET Passport authentication with Security Level 0
C.Require the internal Web developers to use Web Distributed Authoring and Versioning (WebDAV) over SSL.Require the consultants to use WebDAV over SSL
D.Require the internal Web developers to use L2TP with IPSec. Require the consultants to use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV)
E.Require the internal Web developers to use Web Distributed Authoring and Versioning (WebDAV) over SSL.Require the consultants to use L2TP with IPSec

7.多项选择题You need to design a strategy to increase security for the client computers in the finance department. Which two actions should you perform?()

A.Enable automatic certificate enrollment
B.Enforce smart card logons
C.Enable Encrypting File System (EFS) for offline files
D.Enable a screen saver password

8.单项选择题You need to design a security strategy for communications between the Boston and New York offices. What should you do?()

A.Configure RRAS2 as a VPN server. Use Web enrollment to acquire computer certificates for both RRAS1 and RRAS2. Create demand-dial L2TP/IPSec connections on both RRAS1 and RRAS2. Configure dial-out credentials on both RRAS1 and RRAS2. Enable the Basic Firewall settings on RRAS1 and RRAS2
B.Configure RRAS2 as a VPN server. Create demand-dial L2TP/IPSec connections on both RRAS1 and RRAS2. Configure dial-out credentials on both RRAS1 and RRAS2. Configure static routes on both RRAS1 and RRAS2. Set the connection type to persistent on the demand-dial interface on both RRAS1 and RRAS2
C.Create a new OU named RRAS Servers in the boston.northwindtraders.com domain. Move RRAS1 into the RRAS Servers OU. On the Default Domain Policy Group Policy object (GPO), edit the Secure Server (Require Security) IPSec policy. Configure the IPSec policy to use a certificate for authentication. Specify RRAS2 as the tunnel endpoint. Assign the IPSec policy.
D.Create a new OU named RRAS Server in the northwindtraders.com domain. Move the RRAS2 into the RRAS Servers OU. On the RRAS Servers OU create new Group Policy object (GPO) named IPSECPOL. In IPSECPOL create an IPSec policy and specify RRAS as the tunnel.

9.单项选择题You need to configure ISA3 in Seattle to enable communication with the network in New York.What should you do?()

A.Open the ports for DNS, HTTP, HTTPS, Kerberos, RADIUS, LDAP, RPC endpoint mapper and client, and Server Message Block (SMB) over IP
B.Enable the Routing and Remote Access Basic Firewall. Open the ports for DNS, Kerberos, LDAP, Exchange RPCs, RADIUS, L2TP, and Internet Key Exchange (IKE)
C.Create a PPTP tunnel from ISA3 to the New York network
D.Create an L2TP/IPSec tunnel from ISA3 to the New York network

10.单项选择题You need to design an access control strategy for the Payment folder for the Sales Managers group. What should you do?()

A.Use IPSec in transport mode
B.Use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV)
C.Use PEAP-EAP-TLS
D.Use Encrypting File System (EFS) remote encryption

最新试题

You need to design a certificate management process for internal users. What should you do?()

题型:单项选择题

You need to design a security strategy for the Web folders and files created by the consultants and the internal Web developers. What are two possible ways to achieve this goal?()

题型:多项选择题

You need to design a remote access strategy for portable computers. Your solution must meet business requirements. What should you do?()

题型:单项选择题

The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()

题型:单项选择题

You need to design a domain model that meets the company business and security requirements for controlling access to the new Web-based ordering application. What should you do?()

题型:单项选择题

You need to design a security strategy for communications between the Boston and New York offices. What should you do?()

题型:单项选择题

The company is evaluating using a new Active Directory domain to contain all customer user accounts. You need to design a monitoring or logging strategy that meets business and security requirements for the new Web-based ordering application. Your solution must minimize overhead on existing domain controllers and servers. What should you do?()

题型:单项选择题

You need to design a method to ensure that only scripts that are approved by the IT department can run on company computers. Your solution must meet business requirements. What should you do?()

题型:单项选择题

You are designing a security strategy for the public Web server. You solution must address the chief security officer’s concerns. What should you do?()

题型:单项选择题

You need to design a security solution for the internally developed Web applications that meets business requirements. What should you do?()

题型:单项选择题