单项选择题You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()

A.Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computers
B.Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computers
C.Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computers
D.Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers


您可能感兴趣的试卷

你可能感兴趣的试题

1.单项选择题You are designing a security strategy for the public Web server. You solution must address the chief security officer’s concerns. What should you do?()

A.Install  a Web server certificate on WEB1
B.Enable Internet Connection Firewalll (ICF) on WEB1
C.Configure IIS on WEB1 to operate in IIS 5.0 isolation mode
D.Install and configure the URLScan ISAPI filer on WEB1

2.单项选择题You need to design a remote access strategy for portable computers. Your solution must meet business requirements. What should you do?()

A.Issue a computer certificate to P_RAS1. Reconfigure the remote access policy on P_RAS1 to accept only EAP-MD5 authentication. Then, specify that P_RAS1’s computer certificate is to be used for authentication
B.Issue a user certificate to the Administrator account on P_RAS1. Reconfigure the remote access policy to accept only EAP-MD5 authentication. Then, specify that the Administrator account’s user certificate is to be used for authentication
C.Issue a computer certificate to P_RAS1. Reconfigure the remote access policy to accept only EAP-TLS authentication. Then, specify the P_RAS1’s computer certificate is to be used for authentication
D.Issue a user certificate to the Administrator account on P_RAS1. Reconfigure the remote access policy to accept only EAP-TLS authentication. Then, specify that the Administrator account’s user certificate is to be used for authentication

3.单项选择题You need to design a patch management strategy that meets business requirements. What should you do?()

A.Install Systems Management Server (SMS) on a computer on the internal network. Use the Default Domain Policy GPO to distribute the SMS client software to all computers in the domain
B.Install Microsoft Operations Manager (MOM) on a computer on the internal network. Use the Default Domain Policy GPO to distribute the MOM client software to all computers in the domain
C.Install Software Update Services (SUS) on a Web server, and configure it to synchronize and approve updates nightly. Configure client computers to receive automatic updates from the Web server. Ensure that users restart their client computers daily
D.Install Software Update Services (SUS) on a domain controller, and configure it to synchronize and approve updates nightly. Configure client computers to receive automatic updates from the domain controller. Ensure that users restart their client computers daily

4.单项选择题You are designing a remote administration solution that meets business requirements. You need to specify client or server software that will be required. What should you do?()

A.Ensure that all client computers have a graphical Telnet client installed
B.Ensure that all client computers have the Remote Desktop Connection client software installed
C.Ensure that all server computers have RCONSOLE installed and that it is configured to start automatically
D.Ensure that all server computers have Remote Administration (HTML) installed

5.单项选择题You need to design a security solution for the internally developed Web applications that meets business requirements. What should you do?()

A.Install and configure a stand-alone root certification authorative (CA) that is trusted by all company client computers. Issue encryption certificates to all developers
B.Install and configure root certification authority (CA) that is trusted by all company client computers. Issue code-signing certificates to all developers
C.Purchase a root certification from a trusted commercial certification authority (CA). Install the root certificated on all developers’ computers
D.Purchase a code-signing certificate from a trusted commercial certification authority (CA). Install the certificate on all company client computers

6.单项选择题You need to improve the company’s security patch management process. Your solution must meet existing business requirements and it cannot increase the number of employees or unnecessarily increase ongoing administrative effort. What should you do?()

A.Provide all users with the ability to access and use the Windows Update Web site
B.Upgrade all client computers to either Windows 2000 Professional or Windows XP Professional. Implement Software Update Services (SUS)
C.Upgrade all client computers to either Windows 2000 Professional or Windows XP Professional.Make all users members of the Power Users group on their client computers
D.Install the Active Directory Client Extensions on all Windows 95, Windows 98, and Windows NT Workstation 4.0 computers. Manually download all security patches to a Distributed File System (DFS) replica. Instruct all users to use the DFS replica to install security patches
E.Install the Active Directory Client Extensions on all Windows 95, Windows 98, and Windows NT Workstation 4.0 computers. Install a Software Update Services (SUS) server and make all users local administrators on their client computers

7.单项选择题You need to design security changes that provide maximum protection for customer data and courier assignments.What should you do?()

A.Create a separate domain for courier authentication
B.Implement smart card authentication for business office users and couriers, upgrading client operating systems as needed. Modify the Web kiosks to require smart card presence for continued access
C.Modify the Default Domain Policy Group Policy object (GPO) so that couriers must use complex user account passwords. Require all couriers to change their passwords the next time they log on to the Web application
D.Use Encrypting File System (EFS) to encrypt all files that contain customer data

8.单项选择题You need to design a method for junior IT administrators to perform more IT support tasks. Your solution must meet business and security requirements. What should you do?()

A.Delegate appropriate Active Directory permissions to the junior IT administrators
B.Add the junior IT administrators’ user accounts to the Domain Admins user group
C.Create a custom Microsoft Management Console (MMC) that uses taskpad views to enable the appropriate tasks for the junior IT administrators
D.Make the junior IT administrators’ domain user accounts member of the local Administrators group on all client computers
E.Create new domain user accounts for each junior IT administrator. Make the new accounts members of the Domain Admins group and instruct junior IT administrators to use the new accounts only for appropriate administrative tasks

9.单项选择题You need to identify potential security threats. Which of the following security breaches might occur under the current IT and security practices?(Choose all that apply)()

A.A virus that infects an IT administrator’s client computer could gain domain administrator privileges
B.Couriers could gain access to domain administrator privileges
C.Business office staff could discover couriers’ passwords and use them to access couriers’ information
D.All users could use their user accounts to gain the ability to install untested security patches on their client computers

10.单项选择题The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()

A.On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policy
B.On all client computers, implement logon auditing for all user account logons
C.On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policy
D.On all domain controllers, implement logon auditing for all user account logons

最新试题

You need to design a security strategy for the Web folders and files created by the consultants and the internal Web developers. What are two possible ways to achieve this goal?()

题型:多项选择题

You need to design a password policy that meets business requirements. What should you do? Select all that apply.()

题型:多项选择题

You need to design a method to ensure that research intellectual property remains confidential. You solution must meet security requirements. What should you do?()

题型:单项选择题

You need to design a patch management strategy for Northwind Traders. What should you do?()

题型:单项选择题

You need to design a patch management strategy that meets business requirements. What should you do?()

题型:单项选择题

You are designing a remote administration solution that meets business requirements. You need to specify client or server software that will be required. What should you do?()

题型:单项选择题

You need to design a strategy to increase security for the client computers in the finance department. Which two actions should you perform?()

题型:多项选择题

You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()

题型:单项选择题

You need to design a security patch management strategy. Your solution must meet business and security requirements, and it must accommodate the company’s resource restrictions. What should you do?()

题型:单项选择题

You need to design a method to ensure that only scripts that are approved by the IT department can run on company computers. Your solution must meet business requirements. What should you do?()

题型:单项选择题