单选题You need to design a method to implement account policies that meets the requirements in the written security policy. What should you do?()ACreate a GPO and link it to the New York OU, to the Denver OU, and to the Dallas OU.Configure the GPO with the required account policy settingsBOn all computers in the domain, configure the Local Security Policy7 with the required account policy settingsCConfigure the Default Domain Policy GPO with the required account policy settingsDConfigure the Default Domain Controllers Policy GPO with the required account policy settings

单选题
You need to design a method to implement account policies that meets the requirements in the written security policy. What should you do?()
A

Create a GPO and link it to the New York OU, to the Denver OU, and to the Dallas OU.Configure the GPO with the required account policy settings

B

On all computers in the domain, configure the Local Security Policy7 with the required account policy settings

C

Configure the Default Domain Policy GPO with the required account policy settings

D

Configure the Default Domain Controllers Policy GPO with the required account policy settings


参考解析

解析: 暂无解析

相关考题:

You are creating a Windows Communication Foundation (WCF) service that implements operations in a RESTful manner. You need to add a delete operation. You implement the delete method as follows:void DeleteItems(string id);You need to configure WCF to call this method when the client calls the service with the HTTP DELETE operation. What should you do?()A. Add the WebInvoke(UriTemplate=/Items/{id}, Method=DELETE) attribute to the operationB. Add the HttpDelete atribute to the operationC. Replace the string parameter with a RemovedActivityAction parameterD. Replace the return type with RemovedActivityAction.

You need to implement a high availability design in the Company routed network.  Which protocol  allows for the automatic selection and simultaneous use of multiple available gateways as well as  automatic failover between those gateways?()A、 VRRPB、 GLBPC、 IRDPD、 HSRPE、 None of the other alternatives apply

Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows Vista computers.  You are planning to deploy Windows 7 and a custom application.   You have the following requirements:   The application must be available to only a specific group of users. You must be able to monitor application usage.   You need to design a deployment method for the custom application that meets the requirements.  Which deployment method should you use in your design?()A、software installation in Group PolicyB、startup scripts in Group PolicyC、Microsoft Application Virtualization (App-V)D、baseline Windows 7 image that includes the custom application

You are creating a Windows Forms application for a financial service provider by using the .NET Framework 3.5. You have to implement a multiple document interface (MDI) in the application to allow users to open multiple financial documents simultaneously.You need to ensure that whenever the child MDI form is created, the application displays a message in the title bar of the parent MDI that a child form has received focus.   What should you do?()A、Implement theActivated eventB、Implement the MdiChildActivate eventC、Override the OnParentVisibleChanged methodD、Override the OnParentBindingContextChanged method

The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()A、On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policyB、On all client computers, implement logon auditing for all user account logonsC、On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policyD、On all domain controllers, implement logon auditing for all user account logons

You need to design a PKI solution that meets business and security requirements. What should you do?()A、Implement an enterprise root CA in the corp.woodgrovebank.com domain.Implement subordinate CAs in each child domain. Take the root CA offlineB、Implement an enterprise root CA in the corp.woodgrovebank.com domainC、Implement an enterprise root CA in each of the child domains. Take the enterprise CA in each domain offlineD、Implement an enterprise root CA in the corp.woodgrovebank.com domain. Implement a stand-alone root CA in each of the child domains

You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains 50 application servers that run Windows Server 2003.   The security configuration of the application servers is not uniform. The application servers were deployed by local administrators who configured the settings for each of the application servers differently based on their knowledge and skills. The application servers are configured with different authentication methods, audit settings, and account policy settings.   The security team recently completed a new network security design. The design includes a baseline configuration for security settings on all servers. The baseline security settings use the Hisecws.inf predefined security template. The design also requires modified settings for servers in an application role. These settings include system service startup requirements, renaming the administrator account, and more stringent account lockout policies. The security team created a security template named Application.inf that contains the modified settings.   You need to plan the deployment of the new security design. You need to ensure that all security settings for the application servers are standardized, and that after the deployment, the security settings on all application servers meet the design requirements.   What should you do? ()A、 Apply the Setup security.inf template first, the Hisecws.inf template next, and then the Application.inf template.B、 Apply the Application.inf template and then the Hisecws.inf template.C、 Apply the Application.inf template first, the Setup security.inf template next, and then the Hisecws.inf template.D、 Apply the Setup security.inf template and then the Application.inf template.

You need to design a method to implement account policies that meets the requirements in the written security policy. What should you do?()A、Create a GPO and link it to the New York OU, to the Denver OU, and to the Dallas OU.Configure the GPO with the required account policy settingsB、On all computers in the domain, configure the Local Security Policy7 with the required account policy settingsC、Configure the Default Domain Policy GPO with the required account policy settingsD、Configure the Default Domain Controllers Policy GPO with the required account policy settings

You need to design a method to log changes that are made to servers and domain controllers. You also need to track when administrators modify local security account manager objects on servers. What should you do?()A、Enable failure audit for privilege user and object access on all servers and domain controllersB、Enable success audit for policy change and account management on all servers and domain controllersC、Enable success audit for process tracking and logon events on all servers and domain controllersD、Enable failure audit for system events and directory service access on all servers and domain controllers

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is an internal application which uses Analysis Services and Reporting Services. You use the application on the basis of SQL Server 2008. According to the requirement of company security policy, the surface area for all the deployed components of SQL Server 2008 should be configured. You have to implement the security policy and devise a method to evaluate the security policy against other database servers. What should you do?()  A、You should create policies based on the appropriate facets. Apply the policies against a server group. The server group includes the database servers that need to be configured B、You should create a Transact-SQL script based on the sp_configure stored procedure. Use a configuration server to run the script against a server group that includes the database servers that need to be configured C、You should edit the RSReportServer.config configuration file. Distribute the file to all database servers that need to be configured D、You should analyze your database servers by using the SQL Server Best Practices Analyzer (BPA). Implement the recommendations of the BPA

You need to design a method to address the chief information officer’s security concerns. What should you do?()A、Configure Windows Management Instrumentation (WMI) filtering options in the Default Domain Policy GPOB、Use the gpresult commandC、Use Mbsacli.exeD、Configure software restriction policy options in the Default Domain Policy GPO

You are developing a custom-collection class.You need to create a method in your class. You need to ensure that the method you create in your class returns a type that is compatible with the Foreach statement. Which criterion should the method meet?()A、The method must return a type of either IEnumerator or IEnumerable.B、The method must return a type of IComparable.C、The method must explicitly contain a collection.D、The method must be the only iterator in the class.

You need to design a method to enable remote encryption on Server5. What should you do?()A、Configure the editor’s user account properties to enable Store password using reversible encryptionB、Configure the editor’s user account properties to enable Use DES encryption for this accountC、Configure the Local Security Policy on Server to enable the System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing security policyD、Configure the Server5 computer account properties to enable Trust computer for delegation

You need to recommend a solution for managing administrative rights for the branch office client computers. The solution must meet the companys technical requirements.What should you recommend configuring?()A、Account Policies by using GPOsB、Local Users and Groups by using Group Policy preferencesC、Restricted Groups by using GPOsD、Security Options by using Group Policy preferences

You need to design a hosting service option for customers who want to access their databases by using their own Active Directory domain accounts. What should you do?()A、Design a hosting service option that duplicates each customer’s domain user account as SQL Serverlogin account.B、Design a hosting service option that provides VPN-based connectivity from each customer’s network tothe SQL Server computer that hosts that customer’s daabase or databases.C、Design a hosting service option that provides a dedicated server to each customer.Join that server to that customer’s Active Directory domainD、Design a hosting service option that configures a unique instance of SQL Server 2005 for each customer.Configure that instance to use Integrated Windows authentication.

You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()A、Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computersB、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersC、Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersD、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers

单选题You need to implement an authentication method on SQL4. The TravelOnline database will be accessed through a Web services application. You need to make the authentication method as secure as possible.What should you do?()ACreate an HTTP endpoint with NTLM authentication, and create a service principal name (SPN).BCreate an HTTP endpoint with digest authentication, and create a service principal name (SPN).CCreate an HTTP endpoint with integrated authentication, and create a service principal name (SPN).DCreate an HTTP endpoint with Kerberos authentication.

单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is an internal application which uses Analysis Services and Reporting Services. You use the application on the basis of SQL Server 2008. According to the requirement of company security policy, the surface area for all the deployed components of SQL Server 2008 should be configured. You have to implement the security policy and devise a method to evaluate the security policy against other database servers. What should you do?()AYou should create policies based on the appropriate facets. Apply the policies against a server group. The server group includes the database servers that need to be configured BYou should create a Transact-SQL script based on the sp_configure stored procedure. Use a configuration server to run the script against a server group that includes the database servers that need to be configured CYou should edit the RSReportServer.config configuration file. Distribute the file to all database servers that need to be configured DYou should analyze your database servers by using the SQL Server Best Practices Analyzer (BPA). Implement the recommendations of the BPA

单选题You need to implement a solution for the branch office file servers that meets the company's technical requirements.   What should you implement on the branch office file servers?()AFile Server Resource Manager (FSRM) quotasBNetwork Policy Server (NPS) connection request policiesCNTFS disk quotasDWindows System Resource Manager (WSRM) resource allocation policies

单选题You are developing a Windows Presentation Foundation (WPF) application.You need to display HTML content from a Web page on the WPF form. What should you do?()AAdd a FlowDocumentReader control to the design surface. Then create a FlowDocument control.BAdd a DocumentViewer control to the design surface. Then create a FixedDocument control.CAdd a WebBrowser control to the design surface. Then use the Navigate method to navigate the URI object.DAdd a ContentControl control to the design surface. Then reference a WebClient object to return an HTML string.

多选题You are implementing an ASP.NET Web application. Users will authenticate to the application with an ID. The application will allow new users to register for an account. The application will generate an ID for the user based on the users full name. You need to implement this registration functionality. Which two actions should you perform?()AConfigure the SqlMembershipProvider in the web.config file.BConfigure the SqlProfileProvider in the web.config file.CCreate an ASP.NET page that contains a default CreateUserWizard control to create a new user account.DCreate an ASP.NET page that contains a custom form that collects the user information and then uses the Membership.CreateUser method to create a new user account.

单选题In your web application,you need to execute a block of code whenever the session object is first created. Which design will accomplish this goal?()ACreate an HttpSessionListener class and implement the sessionInitialized method with that block ofcode.BCreate an HttpSessionActivationListener class and implement the sessionCreated method with thatblock of code.CCreate a Filter class, call the getSession(false) method, and if the result was null, then execute that block of code.DCreate an HttpSessionListener class and implement the sessionCreated method with that block of code.

单选题You are creating a Windows Communication Foundation (WCF) service that implements operations in a RESTful manner.You need to add a delete operation. You implement the delete method as follows. string void DeleteItems(string id);You need to configure WCF to call this method when the client calls the service with the HTTP DELETE operation. What should you do?()A Add the WebInvoke(UriTemplate = /Items/{id},Method=DELETE) attribute to the operation.B Add the HttpDelete attribute to the operation.C Replace the string parameter with a RemovedActivityAction parameter.D Replace the return type with RemovedActivityAction.

单选题You are creating a Windows Communication Foundation (WCF) service that implements operations in a RESTful manner. You need to add a delete operation. You implement the delete method as follows:void DeleteItems(string id);You need to configure WCF to call this method when the client calls the service with the HTTP DELETE operation. What should you do?()AAdd the WebInvoke(UriTemplate=/Items/{id}, Method=DELETE) attribute to the operationBAdd the HttpDelete atribute to the operationCReplace the string parameter with a RemovedActivityAction parameterDReplace the return type with RemovedActivityAction.

单选题The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()AOn all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policyBOn all client computers, implement logon auditing for all user account logonsCOn all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policyDOn all domain controllers, implement logon auditing for all user account logons

单选题You are developing an ASP.NET Dynamic Data Web application. Boolean fields must display as Yes or No instead of as a check box. You replace the markup in the default Boolean field template with the following markup.You need to implement the code that displays Yes or No. Which method of the FieldTemplateUserControl class should you override in the BooleanField class?()AOnLoadBConstructCOnDataBindingDSaveControlState

单选题You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()ADesign a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computersBDesign a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersCDesign a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersDDesign a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers

单选题You need to implement a high availability design in the Company routed network.  Which protocol  allows for the automatic selection and simultaneous use of multiple available gateways as well as  automatic failover between those gateways?()A VRRPB GLBPC IRDPD HSRPE None of the other alternatives apply