单选题You need to design a method to configure the servers in the development department to meet the requirements of the chief information officer. What should you do?()AUse error reporting on all servers in the development department to report errors for a custom applicationBConfigure all servers in the development department so that they do not require the CTRL+ALT+DELTE keys to pressed in order to log on interactively to the serverCCreate a Group Policy object (GPO) and link it to the development department’s Servers OU. Configure the GPO with an interactive logon policy to display a message for users who attempt to log onDConfigure the screen saver on all servers in the development department to require a password

单选题
You need to design a method to configure the servers in the development department to meet the requirements of the chief information officer. What should you do?()
A

Use error reporting on all servers in the development department to report errors for a custom application

B

Configure all servers in the development department so that they do not require the CTRL+ALT+DELTE keys to pressed in order to log on interactively to the server

C

Create a Group Policy object (GPO) and link it to the development department’s Servers OU. Configure the GPO with an interactive logon policy to display a message for users who attempt to log on

D

Configure the screen saver on all servers in the development department to require a password


参考解析

解析: 暂无解析

相关考题:

You have two servers that run windows server 2008 named server1 and server2. You install WSUS on both servers. You need to configure WSUS on server1 to receive updates from server2. What should you do on server1?()A.Configure a proxy server.B.Configure a upstream server.C.Create a new replica group.D.Create a new computer group.

Your company has deployed network access protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP what should you do?()A、Configure all access points as RADIUS clients to the remediation servers.B、Configure all access points as RADIUS clients to the network Policy Server (NPS).C、Create a network policy that defines remote access server as a network connection method.D、Create a network policy that specifies EAP-TLS as the only available authentication method.

You need to design a method to standardize and deploy a baseline security configuration for servers. You solution must meet business requirements. What should you do?()A、Create a script that installs the Hisecdc.inf security templateB、Use a GPO to distribute and apply the Hisec.inf security templateC、Use the System Policy Editor to configure each server’s security settingsD、Use a GPO to distribute and apply a custom security template

You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()A、Require client computers to connect to the marketing application by using a VPN connectionB、Use IPSec to encrypt communications between the servers in the New York and Atlanta officesC、Require the high security setting on Terminal Services connections to the marketing applicationD、Configure all marketing application Web pages to require SSL

You need to design a remote access solution for the mobile sales users in the litwareinc.com domain. Which two actions should you perform?()A、Configure autoenrollment for user certificates and computer certificatesB、Configure Web enrollment for user certificates and computer certificatesC、Configure a Certificate Services hierarchy in the litwareinc.com domainD、Configure qualified subordination between the litwareinc.com and the contoso.com domainsE、Configure PEAP authentication on the remote access servers

Your network consists of a single Active Directory site that includes two network segments. Thenetwork segments connect by using a router that is RFC 1542 compliant. You plan to use Windows Deployment Services (WDS) to deploy Windows Server 2008 R2 servers. All new servers support Pre-Boot Execution Environment (PXE).  You need to design a deployment strategy to meet the following requirements: èSupport Windows Server?2008 R2   èDeploy the servers by using WDS in both network segments èMinimize the number of servers used to support WDS What should you include in your design?() A、Deploy one server. Install WDS and DHCP on the server. Configure the IP Helper tables on therouterbetween the network segments.B、Deploy two servers. Install WDS and DHCP on both servers. Place one server on each of the network segments. Configure both servers to support DHCP option 60.C、Deploy two servers. Install WDS and DHCP on both servers. Place one server on each of the network segments. Configure both servers to support DHCP option 252.D、Deploy two servers. Install WDS and DHCP on one server. Install DHCP on the other server. Place one server on each of the network segments. Configure both servers to support DHCP option60.

You need to design a method to log changes that are made to servers and domain controllers. You also need to track when administrators modify local security account manager objects on servers. What should you do?()A、Enable failure audit for privilege user and object access on all servers and domain controllersB、Enable success audit for policy change and account management on all servers and domain controllersC、Enable success audit for process tracking and logon events on all servers and domain controllersD、Enable failure audit for system events and directory service access on all servers and domain controllers

You need to design a method to address the chief information officer’s security concerns. What should you do?()A、Configure Windows Management Instrumentation (WMI) filtering options in the Default Domain Policy GPOB、Use the gpresult commandC、Use Mbsacli.exeD、Configure software restriction policy options in the Default Domain Policy GPO

You need to design a Windows Server Update Services (WSUS) infrastructure that meets the  following requirements:   èThe updates must be distributed from a central location.   èAll computers must continue to receive updates in the event that a server fails. What should you include in your design?()A、Configure two WSUS servers in a Microsoft SQL Server 2008 failover cluster. Configure each WSUS  server to use a local database.B、Configure a single WSUS server to use multiple downstream servers. Configure each WSUS server touse a RAID 1 mirror and a local database.C、Configure a single WSUS server to use multiple downstream servers. Configure each WSUS server to  use a RAID 5 array and a local database.D、Configure a Microsoft SQL Server 2008 failover cluster. Configure two WSUS servers in a Network Load Balancing cluster. Configure WSUS to use the remote SQL Server 2008 database instance.

Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  What should you do?()A、Configure all access points as RADIUS clients to the Remediation Servers.B、Configure all access points as RADIUS clients to the Network Policy Server (NPS).C、Create a Network Policy that defines Remote Access Server as a network connection method.D、Create a Network Policy that specifies EAP-TLS as the only available authentication method.

Your company has four DNS servers that run Windows Server 2008. Each server has a static IP address. You need to prevent DHCP from assigning the addresses of the DNS servers to DHCP clients. What should you do? ()A、 Create a new scope for the DNS servers.B、 Create a reservation for the DHCP serverC、 Configure the 005 Name Servers scope optionD、 Configure an exclusion that contains the IP addresses of the four DNS servers

You have two servers that run Windows Server 2008 named Server1 and Server2. You install WSUS on both servers. You need to configure WSUS on Server1 to receive updates from Server2. What should you do on Server1? ()A、 Configure a proxy serverB、 Configure a upstream serverC、 Create a new replica groupD、 Create a new computer group

You need to design a method to enable remote encryption on Server5. What should you do?()A、Configure the editor’s user account properties to enable Store password using reversible encryptionB、Configure the editor’s user account properties to enable Use DES encryption for this accountC、Configure the Local Security Policy on Server to enable the System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing security policyD、Configure the Server5 computer account properties to enable Trust computer for delegation

You plan to deploy a distributed database application that runs on multiple Windows Server 2008 R2  servers.   You need to design a storage strategy that meets the following requirements: èAllocates storage to servers as required  èUses the existing network infrastructure èUses standard Windows management tools   èEnsures that data is available if a single disk fails What should you include in your design?()A、An iSCSI disk storage subsystem that supports Microsoft Multipath I/O. Configure the storage  subsystem as a RAID?0 array.B、An iSCSI disk storage subsystem that supports Virtual Disk Service (VDS). Configure the storageubsystem as a RAID?5 array.C、A Fibre Channel (FC) disk storage subsystem that supports Microsoft Multipath I/O. Configure the  storage subsystem as a RAID?0 array.D、A Fibre Channel(FC)disk storage subsystem that supports the Virtual Disk Service(VDS).Configure  the storage subsystem as a RAID?5 array.

You need to design the Exchange 2003 server configuration for remote e-mail access. What should you do?()A、Configure the front-end servers in each branch office to be members of a new Active Directory siteB、Configure the back-end servers to have server encryption certificates issued by a commercial certification authority (CA)C、Configure two back-end servers to be members of a Network Load Balancing cluster. Configure Network Load Balancing for inbound RPC connectionsD、Configure multiple front-end servers in each branch office to be members of a Network Load Balancing cluster. Configure Network Load Balancing for inbound HTTPS connections

You have 10 servers that run Windows Server 2008. The servers have the Web Server (IIS) server role installed. The servers are members of a Web server farm. The servers host the same Web site. You need to configure the servers to meet the following requirements:  Allow changes to the Web server configurations that are made on one server to be made on all servers in the farm.  Minimize administrative effort to perform the configuration changes. What should you do?()A、On all servers, configure the Shared Configuration settings.B、On one server, configure the Shared Configuration setting.C、On one server, create a scheduled task that copies the Intepub folder to the other servers.D、Create a DFS Namespace. On each server configure the Inetpub folder as the target of the DFS Namespace.

You need to design access to e-mail by Internet users. What should you do?()A、Configure front-end servers to use HTTP to communicate with back-end serversB、Configure the internal firewall to allow IPSec traffic between front-end and back-end Exchange serversC、Require all users to encrypt all outbound e-mail messagesD、Issue digital certificates to all remote users. Require the certificates to be used when authenticating to Outlook Web Access

You need to design a method to configure the servers in the development department to meet the requirements of the chief information officer. What should you do?()A、Use error reporting on all servers in the development department to report errors for a custom applicationB、Configure all servers in the development department so that they do not require the CTRL+ALT+DELTE keys to pressed in order to log on interactively to the serverC、Create a Group Policy object (GPO) and link it to the development department’s Servers OU. Configure the GPO with an interactive logon policy to display a message for users who attempt to log onD、Configure the screen saver on all servers in the development department to require a password

单选题You need to design a method to implement account policies that meets the requirements in the written security policy. What should you do?()ACreate a GPO and link it to the New York OU, to the Denver OU, and to the Dallas OU.Configure the GPO with the required account policy settingsBOn all computers in the domain, configure the Local Security Policy7 with the required account policy settingsCConfigure the Default Domain Policy GPO with the required account policy settingsDConfigure the Default Domain Controllers Policy GPO with the required account policy settings

单选题You need to design a security strategy for a remote e-mail access. What should you do?()ARequire remote users to access e-mails by using Outlook Mobile AccessBRequire Outlook Web Access users to install the secure MIME ActiveX-Control and to encrypt all messagesCOn Outlook Web Access servers that accept connections from the Internet configure IIS to require SSL for all connectionsDOn Outlook Web Access servers that accept connections from the Internet configure IIS to require Integrated Windows Authentication

单选题You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()AEncrypt customer information when it is stored and when it is being transmittedBRequire encrypted connections to the public Web site, which is hosted on the Web server on the perimeter networkCEncrypt all marketing information on file servers and client computersDRequire encrypted connections to all file servers

单选题You need to design a method to deploy security configuration settings to servers. What should you do?()ARun the Resultant Set of Policy wizard with a Windows Management Instrumentation (WMI) filter on each department’s Server OUBLog on to each server and use local policy to configure and manage the security settingsCCreate a customer security template. Log on to a domain controller and run the seceditcommand to import the security templateDCreate a customer security template. Create a GPO and import the security template. Link the GPO to each department’s Server OU

单选题You need to design the Exchange 2003 server configuration for remote e-mail access. What should you do?()AConfigure the front-end servers in each branch office to be members of a new Active Directory siteBConfigure the back-end servers to have server encryption certificates issued by a commercial certification authority (CA)CConfigure two back-end servers to be members of a Network Load Balancing cluster. Configure Network Load Balancing for inbound RPC connectionsDConfigure multiple front-end servers in each branch office to be members of a Network Load Balancing cluster. Configure Network Load Balancing for inbound HTTPS connections

单选题You need to recommend an update management strategy for the Chicago campus that meets the  company’s technical requirements. What should you recommend?()ADeploy a WSUS server in replica mode,and then configure the servers reporting rollup settingsBDeploy a WSUS server in replica mode,and then configure the serverse-mail notification settings.CDeploy a WSUS server in autonomous mode,and then configure the servers reporting rollup settingsDDeploy a WSUS server in autonomous mode,and then configure the servers e-mail notification  settings.

单选题You need to design a remote access authentication strategy that will allow users in the IT department to remotely connect to the network. Your solution must meet security requirements. What should you do?()AInstall Internet Authentication Services (IAS) on a server in the den.corp.woodgrovebank.com domain. Configure the VPN servers as RADIUS clientsBInstall Internet Authentication Services (IAS) on a stand-alone server in the Denver extranet. Create local user accounts for the IT personnel on the IAS server. Configure the VPN servers as RADIUS clientsCCreate a remote access policy on each of the VPN servers. Configure the policy to use the den.corp.woodgrovebank.com to authenticate remote access users. Configure the policy to require L2TP to establish a connectionDCreate a remote access policy on each of the VPN servers. Create local user accounts for the IT personnel on the VPN servers. Configure the policy to use the VPN servers’ local accounts database to authenticate users. Configure the policy to require L2TP to establish a connection

单选题You need to design a Windows Server Update Services (WSUS) infrastructure that meets the  following requirements:   èThe updates must be distributed from a central location.   èAll computers must continue to receive updates in the event that a server fails. What should you include in your design?()AConfigure two WSUS servers in a Microsoft SQL Server 2008 failover cluster. Configure each WSUS  server to use a local database.BConfigure a single WSUS server to use multiple downstream servers. Configure each WSUS server touse a RAID 1 mirror and a local database.CConfigure a single WSUS server to use multiple downstream servers. Configure each WSUS server to  use a RAID 5 array and a local database.DConfigure a Microsoft SQL Server 2008 failover cluster. Configure two WSUS servers in a Network Load Balancing cluster. Configure WSUS to use the remote SQL Server 2008 database instance.

单选题You have two servers that run Windows Server 2008 named Server1 and Server2. You install WSUS on both servers. You need to configure WSUS on Server1 to receive updates from Server2. What should you do on Server1? ()A Configure a proxy serverB Configure a upstream serverC Create a new replica groupD Create a new computer group