A.Increase the number of passwords that are remembered
B.Disable reversible encryption
C.Set the minimum password age to zero days
D.Increase the maximum password age
您可能感兴趣的试卷
你可能感兴趣的试题
A.Use Windows directory service mapper and enable Microsoft .NET Passport authentication
B.Create authorization rules and scopes by using Authorization Manager
C.Use one-to-many client certificate mapping
D.Define permissions by using access control lists (ACLs)
A.Require client computers to connect to research intellectual property through a SSL VPN
B.Place SFSQL1 and ATLSQL1 on a separate virtual LAN from the internal network. Grant access to these virtual LAN segments to only the client computers that are used by authorized users
C.Require that communications between SFSQL1, SFFP1, ATLSQL1, and ATLFP1 use IPSec
D.Create a separate subnet for all servers that contain research intellectual property
A.Move ATLCA1 offline and create an enterprise subordinate CA to issue certificates
B.Create a stand-alone subordinate CA to issue certificates
C.Use a qualified subordinate CA
D.Configure certificate template access control lists (ACLs) on ATLCA1
A.Require client computers to connect to the marketing application by using a VPN connection
B.Use IPSec to encrypt communications between the servers in the New York and Atlanta offices
C.Require the high security setting on Terminal Services connections to the marketing application
D.Configure all marketing application Web pages to require SSL
A.Move the encrypted data to a folder on ATLFP2 over an IPSec connection
B.Move the encrypted data to an Encrypting File System (EFS) folder on ATLFP2 over an IPSec connection
C.Move the encrypted data to a new server that is not a member of the domain, and then move it to ATLFP2
D.Move the encrypted data to a compressed folder on ATLFP2 by using Web Distributed Authoring and Versioning (WebDAV) over SSL
A.Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access point
B.Configure IEEE 802.1x authentication with smart cards
C.Configure the wireless network to use Wired Equivalent Privacy (WEP)
D.Install and configure an Internet Authentication Service (IAS) server
A.Configure the terminal server to use smart cards
B.Configure IPSec to permit only Remote Desktop Protocol (RDP) connections to the terminal server
C.Deny the Remote Desktop Users group access to the terminal server
D.Restrict treyresearch.com users from logging on locally to the terminal server
The company is evaluating using a new Active Directory domain to contain all customer user accounts. You need to design a monitoring or logging strategy that meets business and security requirements for the new Web-based ordering application. Your solution must minimize overhead on existing domain controllers and servers.
What should you do?()
A.Enable logon auditing in both the new and the existing domains
B.Enable logon auditing only in the existing domain
C.Enable logon auditing only in the new domain
D.Enable logon auditing on only the Web server
A.Test and manually deploy updates
B.Deploy a Software Update Services (SUS) server. Test all updates and then approve them. Configure all client computers to automatically obtain updates from the server
C.Test all updates and then use a third-party utility to repackage updates in a Windows Installer file. Deploy the -.msi files by using Group Policy
D.Configure all client computers to use Automatic Updates to obtain security updates from the Windows Update Web site. Test all updates posted to the Windows Update Web site
A.Create a child OU within the existing domain
B.Create a child domain of the existing domain
C.Create a new domain in a new forest. Configure the new domain to trust the existing domain
D.Create a new tree in the existing forest. Configure the new domain to trust the existing domain
最新试题
You need to design a domain model that meets the company business and security requirements for controlling access to the new Web-based ordering application. What should you do?()
You need to design an authentication solution for Terminal Services that meets the business requirements.What should you do?()
You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()
You need to improve the company’s security patch management process. Your solution must meet existing business requirements and it cannot increase the number of employees or unnecessarily increase ongoing administrative effort. What should you do?()
The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()
You need to design a security solution for the internally developed Web applications that meets business requirements. What should you do?()
You need to design an access control strategy for the external and intranet Web sites. Which two actions should you perform?()
You need to design a strategy to move confidential data from research users’ client computers to ATLFP2. Your solution must meet the business requirements. What should you instruct the research users to do?()
You need to design a patch management strategy that meets business requirements. What should you do?()
You need to design security changes that provide maximum protection for customer data and courier assignments.What should you do?()