单选题You need to design a strategy to move confidential data from research users’ client computers to ATLFP2. Your solution must meet the business requirements. What should you instruct the research users to do?()AMove the encrypted data to a folder on ATLFP2 over an IPSec connectionBMove the encrypted data to an Encrypting File System (EFS) folder on ATLFP2 over an IPSec connectionCMove the encrypted data to a new server that is not a member of the domain, and then move it to ATLFP2DMove the encrypted data to a compressed folder on ATLFP2 by using Web Distributed Authoring and Versioning (WebDAV) over SSL

单选题
You need to design a strategy to move confidential data from research users’ client computers to ATLFP2. Your solution must meet the business requirements. What should you instruct the research users to do?()
A

Move the encrypted data to a folder on ATLFP2 over an IPSec connection

B

Move the encrypted data to an Encrypting File System (EFS) folder on ATLFP2 over an IPSec connection

C

Move the encrypted data to a new server that is not a member of the domain, and then move it to ATLFP2

D

Move the encrypted data to a compressed folder on ATLFP2 by using Web Distributed Authoring and Versioning (WebDAV) over SSL


参考解析

解析: 暂无解析

相关考题:

Your data recovery strategy must meet the following requirements:·Back up all data files and folders in C:\Data.·Restore individual files and folders in C:\Data.·Ensure that data is backed up to and restored from external media.What should you do?()A.AB.BC.CD.D

Your network contains an Exchange Server 2007 Mailbox server named Server1 and an Exchange Server 2010 Mailbox server named Server2.You need to move a mailbox from Server1 to Server2.What should you do?()A、From Server1, run Move-Mailbox.B、From Server2, run Move-Mailbox.C、From Server1, run New-MoveRequest.D、From Server2, run New-MoveRequest.

Error log analysis indicates that a disk is starting to fail and will need to be replaced. The failing disk contains multiple logical volumes which span multiple disks. A free disk has been added to the failing disk’s volume group.Which of the following is the most efficient method to move the data from the failing disk to the new disk?()A、Back up the data, remove the failing disk from the volume group, then restore the data to the new disk.B、Use the migratepv command to move data from one disk to another and then remove the failing disk from the volume group.C、Use the mirrorvg command to mirror the data to the new disk, break the mirror and then remove the failing disk from the volume group.D、Create a new filesystem on the new disk and use the mv command to move the data to the new filesystem, and then remove the failing disk from the volume group.

You are the network administrator for The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. All confidential company files are stored on a file server named TestKing1. The written company security states that all confidential data must be stored and transmitted in a secure manner. To comply with the security policy, you enable Encrypting File System (EFS) on the confidential files. You also add EFS certificates to the data decryption field (DDF) of the confidential files for the users who need to access them. While performing network monitoring, you notice that the confidential files that are stored on TestKing1 are being transmitted over the network without encryption. You must ensure that encryption is always used when the confidential files on TestKing1 are stored and transmitted over the network. What are two possible ways to accomplish this goal? ()(Each correct answer presents a complete solution. Choose two)A、Enable offline files for the confidential files that are stored on TestKing1, and select the Encrypt offline files to secure data check box on the client computers of the users who need to access the files.B、Use IPSec encryption between TestKing1 and the client computers of the users who need to access the confidential files.C、Use Server Message Block (SMB) signing between TestKing1 and the client computers of the users who need to access the confidential files.D、Disable all LM and NTLM authentication methods on TestKing1.E、Use IIS to publish the confidential files. Enable SSL on the IIS server. Open the files as a Web folder.

You need to recommend a backup strategy for the servers in the San Francisco office. The strategy must meet the company's technical requirements    What should you include in the recommendation?()A、native-boot virtual hard disks (VHDs)B、Microsoft System Center Data Protection Manager 2010C、system restore pointsD、Windows Server Backup

You have a Web application that is configured for personalization. You need to access personalization data from one of the pages of the Web application by using the minimum amount of administrative effort. What should you do? ()A、Access the personalization data from the Session property of the HttpContext object.B、Access the personalization data from the Application property of the HttpContext object.C、Access the personalization data from the Cache property of the HttpContext object.D、Access the personalization data from the Profile property of the HttpContext object.

Your company has an Active Directory domain. All consultants belong to a global group named   TempWorkers. The TempWorkers group is not nested in any other groups.   You move the computer objects of three file servers to a new organizational unit named SecureServers.   These file servers contain only confidential data in shared folders.   You need to prevent members of the TempWorkers group from accessing the confidential data on the file  servers. You must achieve this goal without affecting access to other domain resources.   What should you do()A、Create a new GPO and link it to the SecureServers organizational unit. Assign the Deny access to this  computer from the network user right to the TempWorkers global group.B、Create a new GPO and link it to the domain. Assign the Deny access to this computer from the network  user right to the TempWorkers global group.C、Create a new GPO and link it to the domain. Assign the Deny log on locally user right to the  TempWorkers global group.D、Create a new GPO and link it to the SecureServers organizational unit. Assign the Deny log on locallyuser right to the TempWorkers global group.

You are evaluating the implementation of two Hyper-V hosts for the Web servers. You need to design a solution that will move the Web servers automatically between the Hyper-V hosts based on the physical resources available. Which software should you include in the design?()A、Microsoft System Center Operations ManagerB、Microsoft System Center Virtual Machine ManagerC、Microsoft System Center Data Protection ManagerD、Microsoft System Center Configuration Manager

You need to design a strategy to move confidential data from research users’ client computers to ATLFP2. Your solution must meet the business requirements. What should you instruct the research users to do?()A、Move the encrypted data to a folder on ATLFP2 over an IPSec connectionB、Move the encrypted data to an Encrypting File System (EFS) folder on ATLFP2 over an IPSec connectionC、Move the encrypted data to a new server that is not a member of the domain, and then move it to ATLFP2D、Move the encrypted data to a compressed folder on ATLFP2 by using Web Distributed Authoring and Versioning (WebDAV) over SSL

Your company has an Active Directory domain. All consultants belong to a global group named  TempWorkers. The TempWorkers group is not nested in any other groups.   You move the computer objects of three file servers to a new organizational unit named  SecureServers. These file servers contain only confidential data in shared folders.    You need to prevent members of the TempWorkers group from accessing the confidential data  on the file servers. You must achieve this goal without affecting access to other domain  resources.     What should you do()A、Create a new GPO and link it to the SecureServers organizational unit. Assign the Deny access to this computer froB、Create a new GPO and link it to the domain. Assign the Deny access to this computer from the network user right toC、Create a new GPO and link it to the domain. Assign the Deny log on locally user right to the TempWorkers global gD、Create a new GPO and link it to the SecureServers organizational unit. Assign the Deny log on locally user right to

单选题You need to design a security strategy for a remote e-mail access. What should you do?()ARequire remote users to access e-mails by using Outlook Mobile AccessBRequire Outlook Web Access users to install the secure MIME ActiveX-Control and to encrypt all messagesCOn Outlook Web Access servers that accept connections from the Internet configure IIS to require SSL for all connectionsDOn Outlook Web Access servers that accept connections from the Internet configure IIS to require Integrated Windows Authentication

单选题The /export/home file system is running out of space on c0t0d0s7. You added a new disk to the system and it is named c1t1d0. You need to move the /export/home file system to slice 7 on the new disk.  Which command is used to move the data from /export/home to the new disk after booting the server to the single-user milestone? ()A AB BC CD D

单选题You plan to deploy a distributed database application that runs on Windows Server 2008 R2. You need to design a storage strategy that meets the following requirements: èAllocates storage to servers as required   èIsolates storage traffic from the existing network   èEnsures that data is available if a single disk fails   èEnsures that data is available if a single storage controller fails What should you include in your design?()AAn iSCSI disk storage subsystem that uses Microsoft Multipath I/O. Configure a RAID?0 array.BAn iSCSI disk storage subsystem that uses Virtual Disk Service (VDS). Configure a RAID?5 array.CA Fibre Channel (FC) disk storage subsystem that uses Microsoft Multipath I/O. Configure a RAID?5  array.DA Fibre Channel(FC)disk storage subsystem that uses Virtual Disk Service(VDS).Configure a RAID?0 array.

单选题You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()AEncrypt customer information when it is stored and when it is being transmittedBRequire encrypted connections to the public Web site, which is hosted on the Web server on the perimeter networkCEncrypt all marketing information on file servers and client computersDRequire encrypted connections to all file servers

单选题Your company has client computers that run Windows XP Professional.   You are planning to install Windows 7 Enterprise on the existing client computers.   You have the following requirements:   Migrate user data and operating system components.  Encrypt and password-protect the migration store.   You need to design a user state migration strategy that supports the requirements. What should you do?()AUse a hard-link migration storeBUse a compressed migration storeCPerform an offline migration by using WindowsoldDPerform an offline migration by using Windows PE

多选题You need to design a strategy to increase security for the client computers in the finance department. Which two actions should you perform?()AEnable automatic certificate enrollmentBEnforce smart card logonsCEnable Encrypting File System (EFS) for offline filesDEnable a screen saver password

单选题You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 to create a Windows Presentation Foundation (WPF) application. You plan to implement a test strategy for the application. You need to ensure that the test strategy meets the following requirements: Test data can be added to the test project without recompiling. Multiple variations of a test can be executed at run time. What should you do? ()AUse IntelliTrace.BUse data-driven tests.CCreate a single test class.DCreate a test method for each data variation.

单选题You are creating a Windows Forms Application by using the .NET Framework 3.5.You plan to design a new control that will be used on multiple forms in the app.You need to ensure that the control meets the following requirement:   (1)It retrieves data from a MSSQL Server 2008 database instance.   (2)It uses WPF classes to display data.   (3)It uses user-customizable actions when the control is first painted on the form.    What should you do?()ACreate a new custom class for the control that is derived from the Control class.BCreate a new custom class for the control that is derived from the UserControl class.CCreate a new custom class for the control that is derived from the ContentControl class.DCreate a new custom class for the control that is derived from the ContentPresenter class.

单选题You need to design a strategy to move confidential data from research users’ client computers to ATLFP2. Your solution must meet the business requirements. What should you instruct the research users to do?()AMove the encrypted data to a folder on ATLFP2 over an IPSec connectionBMove the encrypted data to an Encrypting File System (EFS) folder on ATLFP2 over an IPSec connectionCMove the encrypted data to a new server that is not a member of the domain, and then move it to ATLFP2DMove the encrypted data to a compressed folder on ATLFP2 by using Web Distributed Authoring and Versioning (WebDAV) over SSL

多选题You are evaluating the implementation of two Hyper-V hosts for the application servers. You need to design a solution that will move the application servers automatically between the Hyper-V hosts based on the physical resources available. The solution must minimize the number of Microsoft System Center products deployed to the network. Which software should you include in the design?()AMicrosoft System Center Operations ManagerBMicrosoft System Center Virtual Machine ManagerCMicrosoft System Center Data Protection ManagerDMicrosoft System Center Configuration Manager

单选题Your company has client computers that run Windows Vista.   The company plans to upgrade the Windows Vista computers to Windows 7.   The current configuration of all client computers in your company is based on a common Windows Vista image.   Some branch offices use WAN connections to connect to the main office. You have the following requirements:   Transfer all user data from the original Windows Vista installation to the new Windows 7 installation.  Use the least amount of bandwidth while transferring the user data.  Support the same migration strategy for all offices.    You need to design a user state migration strategy that supports the requirements.   What should you do?()AUse the multicast feature of Windows Deployment Services (WDS)BUse the Deployment Image Servicing and Management (DISM) toolCUse the User State Migration Tool (USMT) and a hard-link migration storeDUse Windows PE to perform an offline migration

多选题Your company has a single Active Directory domain. All servers run Windows Server 2008. The company network has servers that perform as Web Servers. All confidential files are located on a server named FSS1. The company security policy states that all confidential data must be transmitted in the most secure manner. When you monitor the network you notice that the confidential files stored on FSS1 server are being transmitted over the network without encryption. You need to ensure that encryption is always usedwhen the confidential files on the FSS1 server are transmitted over the network. What are two possible ways to achieve this goal? ()ADeactivate all LM and NTLM authentication methods on FSS1 serverBUse IIS to publish the confidential files, activate SSL on the IIS server, and then open the files as a web folderCUse IPsec encryption between the FSS1 server and the computers of the users who need to access the confidential files.DUse the Server Message Block (SMB) signing between the FSS1 server and the computers of the users who want to access the confidential files.EActivate offline files for the confidential files that are stored on the FSS1 server. In the Folder avanced Properties box, select the Encrypt contents to secure data optiion

单选题You design a Business Intelligence (BI) solution by using SQL Server 2008. You design a SQL Server 2008 Analysis Services (SSAS) solution. Customer data is stored in the tables named CustomerDetails and CustomerContact. The solution uses the following two data sources from two different servers: ·Contoso that accesses the CustomerDetails table ·ContosoCRM that accesses the CustomerContact table You plan to create a dimension named DimCustomer to analyze customer data. You need to ensure that the DimCustomer dimension represents the tables as a snowflake schema to include attributes from the two tables. What should you do?()A Create a data source view named DsvContoso that is associated with the two data sources and add the tables to the data source view.B Create a data source view named DsvContoso that is associated with the two data sources and create a named query in the data source view to merge the tables.C Create a data source view named DsvCustomer that is associated with the Contoso data source and add the CustomerDetails table to the data source view.Create a data source view named DsvCustomerContact that is associated with the ContosoCRM data source and add the CustomerContact table to the data source view.D Create a data source view named DsvCustomer that is associated with the Contoso data source and create a named query in the data source view to select data from the CustomerDetails table.Create a data source view named DsvCustomerContact that is associated with the ContosoCRM data source and create a named query in the data source view to select data from the CustomerContact table.