单项选择题

The company is evaluating using a new Active Directory domain to contain all customer user accounts. You need to design a monitoring or logging strategy that meets business and security requirements for the new Web-based ordering application. Your solution must minimize overhead on existing domain controllers and servers. 
What should you do?()

A.Enable logon auditing in both the new and the existing domains
B.Enable logon auditing only in the existing domain
C.Enable logon auditing only in the new domain
D.Enable logon auditing on only the Web server


您可能感兴趣的试卷

你可能感兴趣的试题

1.单项选择题You need to design a security patch management strategy. Your solution must meet business and security requirements, and it must accommodate the company’s resource restrictions. What should you do?()

A.Test and manually deploy updates
B.Deploy a Software Update Services (SUS) server. Test all updates and then approve them. Configure all client computers to automatically obtain updates from the server
C.Test all updates and then use a third-party utility to repackage updates in a Windows Installer file. Deploy the -.msi files by using Group Policy
D.Configure all client computers to use Automatic Updates to obtain security updates from the Windows Update Web site. Test all updates posted to the Windows Update Web site

2.单项选择题You need to design a domain model that meets the company business and security requirements for controlling access to the new Web-based ordering application. What should you do?()

A.Create a child OU within the existing domain
B.Create a child domain of the existing domain
C.Create a new domain in a new forest. Configure the new domain to trust the existing domain
D.Create a new tree in the existing forest. Configure the new domain to trust the existing domain

3.单项选择题You need to design a method to modify the current e-mail ordering system. Which will be used until Fourth Coffee deploys the Web-based ordering application. Your solution must address business concerns and improve security. What should you do?()

A.Configure the mail server to disallow SMTP relaying
B.Instruct customers to obtain digital certificates from a trusted commercial authority (CA), and digitally sign all order e-mail messages. Reject unsigned order e-mail messages
C.Provide customers with a public encryption key, and instruct them to encrypt all order e-mail messages. Reject unencrypted e-mail messages
D.Implement an e-mail filtering solution, and add customer e-mail addresses to the list of allowed addresses. Reject e-mail messages from other addresses

4.单项选择题You need to design a method to ensure that only scripts that are approved by the IT department can run on company computers. Your solution must meet business requirements. What should you do?()

A.Create a new software restriction policy in the Default Domain Policy GPO that removes the Microsoft Visual Basic Scripting Edition and the Windows Script Component file types from the File Types list
B.Create a new software restriction policy in the Default Domain Policy GPO that disables the use of Wscript.exe and Cscript.exe
C.Configure Windows Script Host to not execute Windows Script Component file types
D.Configure Windows Script Host to execute only scripts that are signed by a certificate issued by an approved certification authority (CA)

5.单项选择题You need to design an access control strategy for the financial data used by the accounting department. Your solution must meet business requirements. What should you do?()

A.Modify the properties of the computer object named P_FS2 to enable the Trust computer for delegation attribute. Instruct accounting department users to use Encrypting File System (EFS) to encrypt files
B.Modify the properties of all accounting department user accounts to enable the Account is trusted for delegation attribute. Instruct accounting department users to use Encrypting File System (EFS) to encrypt files
C.Modify the properties of accounting department computers to enable the Trust computer for delegation attribute. Configure accounting department client computers to use IPSec to communicate with P_FS2
D.Modify the properties of all administrator accounts in the forest to enable to Account is trusted for delegation attribute. Configure accounting department client computers to use IPSec to communicate with P_FS2

6.单项选择题You need to design an authentication strategy for users of portable computers. Your solution must meet business requirements. What should you do?()

A.Issue smart cards and smart card readers to all portable computer users. Configure the domain to require smart cards for login and to log off users who remote their smart cards
B.Configure the portable computers to connect to only wireless networks that use Wired Equivalent Privacy (WEP). Install digital certificates on all portable computers
C.Install computer certificates on all portable computers. Configure all portable computers to respond to requests for IPSec encryption
D.Install biometric authentication devices on all portable computers. Configure the Default Domain Policy GPO to require complex passwords for all users

7.单项选择题You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()

A.Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computers
B.Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computers
C.Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computers
D.Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers

8.单项选择题You are designing a security strategy for the public Web server. You solution must address the chief security officer’s concerns. What should you do?()

A.Install  a Web server certificate on WEB1
B.Enable Internet Connection Firewalll (ICF) on WEB1
C.Configure IIS on WEB1 to operate in IIS 5.0 isolation mode
D.Install and configure the URLScan ISAPI filer on WEB1

9.单项选择题You need to design a remote access strategy for portable computers. Your solution must meet business requirements. What should you do?()

A.Issue a computer certificate to P_RAS1. Reconfigure the remote access policy on P_RAS1 to accept only EAP-MD5 authentication. Then, specify that P_RAS1’s computer certificate is to be used for authentication
B.Issue a user certificate to the Administrator account on P_RAS1. Reconfigure the remote access policy to accept only EAP-MD5 authentication. Then, specify that the Administrator account’s user certificate is to be used for authentication
C.Issue a computer certificate to P_RAS1. Reconfigure the remote access policy to accept only EAP-TLS authentication. Then, specify the P_RAS1’s computer certificate is to be used for authentication
D.Issue a user certificate to the Administrator account on P_RAS1. Reconfigure the remote access policy to accept only EAP-TLS authentication. Then, specify that the Administrator account’s user certificate is to be used for authentication

10.单项选择题You need to design a patch management strategy that meets business requirements. What should you do?()

A.Install Systems Management Server (SMS) on a computer on the internal network. Use the Default Domain Policy GPO to distribute the SMS client software to all computers in the domain
B.Install Microsoft Operations Manager (MOM) on a computer on the internal network. Use the Default Domain Policy GPO to distribute the MOM client software to all computers in the domain
C.Install Software Update Services (SUS) on a Web server, and configure it to synchronize and approve updates nightly. Configure client computers to receive automatic updates from the Web server. Ensure that users restart their client computers daily
D.Install Software Update Services (SUS) on a domain controller, and configure it to synchronize and approve updates nightly. Configure client computers to receive automatic updates from the domain controller. Ensure that users restart their client computers daily

最新试题

You need to design a security strategy for the Web folders and files created by the consultants and the internal Web developers. What are two possible ways to achieve this goal?()

题型:多项选择题

You need to design a method to modify the current e-mail ordering system. Which will be used until Fourth Coffee deploys the Web-based ordering application. Your solution must address business concerns and improve security. What should you do?()

题型:单项选择题

You need to design a PKI that meets business requirements. What should you do?()

题型:单项选择题

You need to design a strategy to increase security for the client computers in the finance department. Which two actions should you perform?()

题型:多项选择题

You need to design a domain model that meets the company business and security requirements for controlling access to the new Web-based ordering application. What should you do?()

题型:单项选择题

You need to design an authentication solution for Terminal Services that meets the business requirements.What should you do?()

题型:单项选择题

You need to design security changes that provide maximum protection for customer data and courier assignments.What should you do?()

题型:单项选择题

You need to design an authentication strategy for users of portable computers. Your solution must meet business requirements. What should you do?()

题型:单项选择题

You need to design a strategy to move confidential data from research users’ client computers to ATLFP2. Your solution must meet the business requirements. What should you instruct the research users to do?()

题型:单项选择题

You need to provide users in the research department access to different functions of the Web-based research application based on individual user roles. What should you do?()

题型:单项选择题