单选题You need to design a strategy to meet the company’s requirements for e-mail. What should you do?()AConfigure and publish a certificate template that is suitable for S/MIME, Deploy a Group Policy object (GPO) so that a certificate that is based on this template is automatically issued to all domain usersBSpecify Group Policy objects (GPOs) and IPSec policies that require all client computers to use Kerberos authentication to connect to mail serversCFor each mail server, acquire an SSL server certificate from a commercial CA whose root certificate is already trustedDRequire IPSec encryption on all TCP connections that are used to send or receive e-mail messages

单选题
You need to design a strategy to meet the company’s requirements for e-mail. What should you do?()
A

Configure and publish a certificate template that is suitable for S/MIME, Deploy a Group Policy object (GPO) so that a certificate that is based on this template is automatically issued to all domain users

B

Specify Group Policy objects (GPOs) and IPSec policies that require all client computers to use Kerberos authentication to connect to mail servers

C

For each mail server, acquire an SSL server certificate from a commercial CA whose root certificate is already trusted

D

Require IPSec encryption on all TCP connections that are used to send or receive e-mail messages


参考解析

解析: 暂无解析

相关考题:

– It’s our great pleasure to have you visit our company. --_________________A、Thank you.B、Nice to meet you.C、It’s our pleasure, too.D、Wonderful.

You need to recommend a strategy for the computer lab that meet the company’s technical requirements. What should you recommend?()A、Enable the loopback setting in GPO2. Enable the Enforced option in GPO1.B、Enable the Block Inheritance option on Lab OU. Enable the Enforced option in GPO1.C、Enable the loopback setting in GPO2. Disable the user configuration settings in GPO3.D、Enable the Block Inheritance option on Lab OU. Disable the user configuration settings in GPO3.

You need to recommend a backup strategy for the servers in the San Francisco office. The strategy must meet the company's technical requirements    What should you include in the recommendation?()A、native-boot virtual hard disks (VHDs)B、Microsoft System Center Data Protection Manager 2010C、system restore pointsD、Windows Server Backup

You need to recommend changes to the environment that meet the company’s user requirements.   What should you include in the recommendation?()A、a BranchCache in Distributed Cache modeB、a BranchCache in Hosted Cache modeC、Distributed File System (DFS) namespacesD、Distributed File System (DFS) Replication

You need to design a remote access strategy for the customer support users when they work from home. Your solution must meet security requirements. What should you do?()A、Deploy an L2TP/IPsec VPN server in each call center. Configure the portable computers as L2TP VPN clientsB、Create IPSec tunnel mode connections between the customer support users home and the company’s Internet-facing routersC、Create IP packet filters on the company’s Internet-facing routers to allow the Remote Desktop Protocol (RDP).Create IPSec filters on the terminal servers to allow only connections that use RDPD、Create IP packet filters on the company’s Internet-facing routers to allow the IPSec protocols. Assign the Secure Server (Require Security) IPSec policy to the terminal servers. Assign the Client (Respond only) IPSec policy to the portable computers

You need to recommend a solution for monitoring the servers. The solution must meet the  company’s technical requirements    What should you include in the recommendation?()A、Data Collector Sets (DCSs)B、event subscriptionsC、Reliability MonitorD、Windows System Resource Manager (WSRM)

You need to recommend a solution for configuring the Web servers. The solution must meet the  company’s technical requirements.What should you include in the recommendations?()A、Active Directory Lightweight Directory Services (AD LDS)B、Failover ClusteringC、HTTP redirectionD、IIS Shared Configuration

You need to design a security patch management strategy. Your solution must meet business and security requirements, and it must accommodate the company’s resource restrictions. What should you do?()A、Test and manually deploy updatesB、Deploy a Software Update Services (SUS) server. Test all updates and then approve them. Configure all client computers to automatically obtain updates from the serverC、Test all updates and then use a third-party utility to repackage updates in a Windows Installer file. Deploy the -.msi files by using Group PolicyD、Configure all client computers to use Automatic Updates to obtain security updates from the Windows Update Web site. Test all updates posted to the Windows Update Web site

You need to recommend a solution for improving the automated deployment of servers. The solution must meet the company’s technical requirements.What should you include in the recommendation?()A、an offline domain joinB、native-boot virtual hard disks(VHDs)C、the Offline servicing of imagesD、the Online servicing of images

You need to recommend a strategy for delegating administrative rights to Admin1. The strategy must support the company’s planned changes.What should you include in the recommendation?()A、the Authorization Manager snap-in on Node1 and Node2B、the Authorization Manager snap-in on the VMsC、the Network Configuration Operators local group on each VMD、the Network Configuration Operators local group on Node1 and Node2

You need to recommend a solution for managing the service accounts for SQL1 and SQL2. The  solution must meet the company’s security requirements. What should you include in the recommendation?()A、a custom password filterB、a Password Settings object (PSO)C、managed service accountsD、manual password changes

You need to implement an auditing strategy that will fulfill the company’s business requirements.What should you do?()A、Use C2 auditing.B、Use DML triggers.C、Use DDL triggers.D、Use event notifications.

You need to recommend a security strategy for WebApp2 that meets the company’s applicaton  requirements.What should you include in the recommendation?()A、Basic authentication and connection security rulesB、Basic authentication and SSLC、Digest authentication and connection security rulesD、Digest authentication and SSL

多选题You need to recommend changes to the DFS infrastructure that meet the company’s techical  requirements.   What should you recommend implementing in each branch office?()Aa DFS namespace serverBa DFS replicaCa standalone DFS namespaceDBranchCache in Distributed Cache modeEBranchCache in Hosted Cache mode

单选题You need to design a strategy to meet the company’s requirements for e-mail. What should you do?()AConfigure and publish a certificate template that is suitable for S/MIME, Deploy a Group Policy object (GPO) so that a certificate that is based on this template is automatically issued to all domain usersBSpecify Group Policy objects (GPOs) and IPSec policies that require all client computers to use Kerberos authentication to connect to mail serversCFor each mail server, acquire an SSL server certificate from a commercial CA whose root certificate is already trustedDRequire IPSec encryption on all TCP connections that are used to send or receive e-mail messages

单选题You need to ensure that all servers meet the company’s security requirements. Which tool should you use?()AMicrosoft Baseline Security Analyzer (MBSA)BMicrosoft Security Assessment Tool (MSAT)CResultant Set of Policy (RSoP)DSecurity Configuration Wizard (SCW)

单选题You need to recommend a strategy for the file servers that meets the company’s technical requirements.   What should you recommend?()AImplement active file screens.BImplement passive file screens.CConfigure classification rules.DConfigure File Server Resource Manager (FSRM) quotas.

单选题Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers.  You are planning to deploy Windows 7 Enterprise to the client computers.    You need to design a zero-touch installation strategy.()Aunattended installationBcustom Windows 7 image on DVDCWindows Deployment Services (WDS)DMicrosoft System Center Configuration Manager 2007 R2

单选题You need to recommend changes to the intranet site that meet the company’s technical requirements.   What should you include in the recommendation?()Aadditional application poolsBadditional worker processesCFailover ClusteringDNetwork Load Balancing (NLB)

单选题You need to recommend a solution for managing the service accounts for SQL1 and SQL2. The  solution must meet the company’s security requirements. What should you include in the recommendation?()Aa custom password filterBa Password Settings object (PSO)Cmanaged service accountsDmanual password changes

单选题You need to recommend a solution for managing the address information of the user accounts. The solution must meet the company’s security requirements. What should you include in the recommendation?()AActive Directory delegationBAuthorization ManagerCbuilt-in security groupsDuser rights assignments