单项选择题You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()

A.Require client computers to connect to the marketing application by using a VPN connection
B.Use IPSec to encrypt communications between the servers in the New York and Atlanta offices
C.Require the high security setting on Terminal Services connections to the marketing application
D.Configure all marketing application Web pages to require SSL


您可能感兴趣的试卷

你可能感兴趣的试题

1.单项选择题You need to design a strategy to move confidential data from research users’ client computers to ATLFP2. Your solution must meet the business requirements. What should you instruct the research users to do?()

A.Move the encrypted data to a folder on ATLFP2 over an IPSec connection
B.Move the encrypted data to an Encrypting File System (EFS) folder on ATLFP2 over an IPSec connection
C.Move the encrypted data to a new server that is not a member of the domain, and then move it to ATLFP2
D.Move the encrypted data to a compressed folder on ATLFP2 by using Web Distributed Authoring and Versioning (WebDAV) over SSL

2.单项选择题You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()

A.Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access point
B.Configure IEEE 802.1x authentication with smart cards
C.Configure the wireless network to use Wired Equivalent Privacy (WEP)
D.Install and configure an Internet Authentication Service (IAS) server

3.单项选择题You need to design an authentication solution for Terminal Services that meets the business requirements.What should you do?()

A.Configure the terminal server to use smart cards
B.Configure IPSec to permit only Remote Desktop Protocol (RDP) connections to the terminal server
C.Deny the Remote Desktop Users group access to the terminal server
D.Restrict treyresearch.com users from logging on locally to the terminal server

5.单项选择题You need to design a security patch management strategy. Your solution must meet business and security requirements, and it must accommodate the company’s resource restrictions. What should you do?()

A.Test and manually deploy updates
B.Deploy a Software Update Services (SUS) server. Test all updates and then approve them. Configure all client computers to automatically obtain updates from the server
C.Test all updates and then use a third-party utility to repackage updates in a Windows Installer file. Deploy the -.msi files by using Group Policy
D.Configure all client computers to use Automatic Updates to obtain security updates from the Windows Update Web site. Test all updates posted to the Windows Update Web site

6.单项选择题You need to design a domain model that meets the company business and security requirements for controlling access to the new Web-based ordering application. What should you do?()

A.Create a child OU within the existing domain
B.Create a child domain of the existing domain
C.Create a new domain in a new forest. Configure the new domain to trust the existing domain
D.Create a new tree in the existing forest. Configure the new domain to trust the existing domain

7.单项选择题You need to design a method to modify the current e-mail ordering system. Which will be used until Fourth Coffee deploys the Web-based ordering application. Your solution must address business concerns and improve security. What should you do?()

A.Configure the mail server to disallow SMTP relaying
B.Instruct customers to obtain digital certificates from a trusted commercial authority (CA), and digitally sign all order e-mail messages. Reject unsigned order e-mail messages
C.Provide customers with a public encryption key, and instruct them to encrypt all order e-mail messages. Reject unencrypted e-mail messages
D.Implement an e-mail filtering solution, and add customer e-mail addresses to the list of allowed addresses. Reject e-mail messages from other addresses

8.单项选择题You need to design a method to ensure that only scripts that are approved by the IT department can run on company computers. Your solution must meet business requirements. What should you do?()

A.Create a new software restriction policy in the Default Domain Policy GPO that removes the Microsoft Visual Basic Scripting Edition and the Windows Script Component file types from the File Types list
B.Create a new software restriction policy in the Default Domain Policy GPO that disables the use of Wscript.exe and Cscript.exe
C.Configure Windows Script Host to not execute Windows Script Component file types
D.Configure Windows Script Host to execute only scripts that are signed by a certificate issued by an approved certification authority (CA)

9.单项选择题You need to design an access control strategy for the financial data used by the accounting department. Your solution must meet business requirements. What should you do?()

A.Modify the properties of the computer object named P_FS2 to enable the Trust computer for delegation attribute. Instruct accounting department users to use Encrypting File System (EFS) to encrypt files
B.Modify the properties of all accounting department user accounts to enable the Account is trusted for delegation attribute. Instruct accounting department users to use Encrypting File System (EFS) to encrypt files
C.Modify the properties of accounting department computers to enable the Trust computer for delegation attribute. Configure accounting department client computers to use IPSec to communicate with P_FS2
D.Modify the properties of all administrator accounts in the forest to enable to Account is trusted for delegation attribute. Configure accounting department client computers to use IPSec to communicate with P_FS2

10.单项选择题You need to design an authentication strategy for users of portable computers. Your solution must meet business requirements. What should you do?()

A.Issue smart cards and smart card readers to all portable computer users. Configure the domain to require smart cards for login and to log off users who remote their smart cards
B.Configure the portable computers to connect to only wireless networks that use Wired Equivalent Privacy (WEP). Install digital certificates on all portable computers
C.Install computer certificates on all portable computers. Configure all portable computers to respond to requests for IPSec encryption
D.Install biometric authentication devices on all portable computers. Configure the Default Domain Policy GPO to require complex passwords for all users

最新试题

You need to design an authentication solution for Terminal Services that meets the business requirements.What should you do?()

题型:单项选择题

You need to design a security solution for the internally developed Web applications that meets business requirements. What should you do?()

题型:单项选择题

You need to design an access control strategy for the Contact Info and the Order History folders. What should you do?()

题型:单项选择题

The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()

题型:单项选择题

You need to design an access control strategy for the external and intranet Web sites. Which two actions should you perform?()

题型:多项选择题

You need to design a method to ensure that research intellectual property remains confidential. You solution must meet security requirements. What should you do?()

题型:单项选择题

You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()

题型:单项选择题

You need to design a domain model that meets the company business and security requirements for controlling access to the new Web-based ordering application. What should you do?()

题型:单项选择题

You need to design a strategy to increase security for the client computers in the finance department. Which two actions should you perform?()

题型:多项选择题

You need to design an authentication strategy for users of portable computers. Your solution must meet business requirements. What should you do?()

题型:单项选择题