单选题You need to design security for messages exchanged between Northwind Traders employees and its vendors. What should you do?()ARequire employees to access e-mail only over connections that use SSLBPlace Exchange mailbox stores on NTFS volumes. Use Encrypting File System (EFS) to encrypt the storesCUse the internal certification authority (CA) to issue certificates to all employees. Require employees to digitally sign outbound e-mailDUse the internal certification authority (CA) to issue certificates to all employees and vendors. Instruct employees and vendors to use secure MIME to encrypt all e-mail sent between them
单选题
You need to design security for messages exchanged between Northwind Traders employees and its vendors. What should you do?()
A
Require employees to access e-mail only over connections that use SSL
B
Place Exchange mailbox stores on NTFS volumes. Use Encrypting File System (EFS) to encrypt the stores
C
Use the internal certification authority (CA) to issue certificates to all employees. Require employees to digitally sign outbound e-mail
D
Use the internal certification authority (CA) to issue certificates to all employees and vendors. Instruct employees and vendors to use secure MIME to encrypt all e-mail sent between them
参考解析
解析:
暂无解析
相关考题:
你们需要安保专家对场馆做安全评估吗?A.Do you need a security expert to value the potential danger of the region?B.Do you need a security expert to calculate the potential adventure of the area?C.Do you need a security expert to account the potential risks of the region?D.Do you need a security expert to evaluate the potential risks of the place?
A Windows Communication Foundation (WCF) solution uses two services to manage a shopping cart. Service A processes messages containing line items that total between $0 and $500. Service B processes messages containing line items that total more than $500. All messages are of equal importance to the business logic. You need to route incoming messages to the appropriate services by using WCF routing. Which two message filters should you add to the router? (Each correct answer presents part of the solution. Choose two.)()A.a message filter with a priority of 100 that will forward messages that total between $0 and $500 to Service AB.a message filter with a priority of 0 that will forward messages that total between $0 and $500 to Service AC.a message filter with a priority of 0 that will forward all messages to Service BD.a message filter with a priority of 100 that will forward all messages to Service B
Your Windows Communication Foundation (WCF) client application uses HTTP to communicate with the service.You need to enable message logging and include all security information such as tokens and nonces in logged messages.What should you do?()A.B.C.D.
You need to implement a high availability design in the Company routed network. Which protocol allows for the automatic selection and simultaneous use of multiple available gateways as well as automatic failover between those gateways?()A、 VRRPB、 GLBPC、 IRDPD、 HSRPE、 None of the other alternatives apply
You need to design the retrieval of advertising statistics without compromising security. What should you do?()A、Design a Notification Services solution that sends the advertising statistics to specified subscribers by e-mail.B、Design a SQL Server Web service that runs a stored procedure to return the statistics on a call from the advertisers application.C、Design a Database Mail solution that sends the advertising statistics to e-mail addresses that are specified in a table.D、Design a stored procedure to return the statistics on a call from the advertisers application.E、Design a user-defined function to return the statistics on a call from the advertisers application.
You need to design a method to standardize and deploy a baseline security configuration for servers. You solution must meet business requirements. What should you do?()A、Create a script that installs the Hisecdc.inf security templateB、Use a GPO to distribute and apply the Hisec.inf security templateC、Use the System Policy Editor to configure each server’s security settingsD、Use a GPO to distribute and apply a custom security template
You have an Exchange Server 2010 organization and an Active Directory Rights Management Services(AD RMS) server. All users access their mailboxes by using Outlook Web App (OWA). You need to plan a security solution for the organization to meet the following requirements:.Secure messages by using administrator-defined templates .Ensure that e-mail messages sent by users can be stored in an encrypted format What should you include in the plan?()A、a legal holdB、Domain SecurityC、Outlook Protection RulesD、Secure/Multipurpose Internet Mail Extensions (S/MIME)
You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains 50 application servers that run Windows Server 2003. The security configuration of the application servers is not uniform. The application servers were deployed by local administrators who configured the settings for each of the application servers differently based on their knowledge and skills. The application servers are configured with different authentication methods, audit settings, and account policy settings. The security team recently completed a new network security design. The design includes a baseline configuration for security settings on all servers. The baseline security settings use the Hisecws.inf predefined security template. The design also requires modified settings for servers in an application role. These settings include system service startup requirements, renaming the administrator account, and more stringent account lockout policies. The security team created a security template named Application.inf that contains the modified settings. You need to plan the deployment of the new security design. You need to ensure that all security settings for the application servers are standardized, and that after the deployment, the security settings on all application servers meet the design requirements. What should you do? ()A、 Apply the Setup security.inf template first, the Hisecws.inf template next, and then the Application.inf template.B、 Apply the Application.inf template and then the Hisecws.inf template.C、 Apply the Application.inf template first, the Setup security.inf template next, and then the Hisecws.inf template.D、 Apply the Setup security.inf template and then the Application.inf template.
Your network contains two Exchange Server 2010 Edge Transport servers and five Exchange Server2010 Hub Transport servers. All e-mail sent from your organization to the Internet is transferred by the Edge Transport servers. You need to recommend a security solution for the organization to meet the following requirements: .Ensure that users can send encrypted messages to any other organization on the Internet .Ensure that all Exchange-related communication between Hub Transport servers and Edge Transport servers is encrypted What should you recommend?()A、Deploy IPsec.B、Deploy SMTP over SSL.C、Implement Domain Security.D、Implement Secure/Multipurpose Internet Mail Extensions (S/MIME).
You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()A、Require client computers to connect to the marketing application by using a VPN connectionB、Use IPSec to encrypt communications between the servers in the New York and Atlanta officesC、Require the high security setting on Terminal Services connections to the marketing applicationD、Configure all marketing application Web pages to require SSL
You need to design a method to allow the new-ideas-testking.com Web site to function in accordance with security and business requirements. What should you do?()A、Require a PPTP VPN for all connections to the Web serverB、Require that traffic between Web browsers and the Web server uses an L2TP/IPSec tunnelC、Require that traffic between Web browsers and the Web server uses SSLD、Require certificate mappings between the Web server and Active Directory
You need to design a method to address the chief information officer’s security concerns. What should you do?()A、Configure Windows Management Instrumentation (WMI) filtering options in the Default Domain Policy GPOB、Use the gpresult commandC、Use Mbsacli.exeD、Configure software restriction policy options in the Default Domain Policy GPO
You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()A、Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access pointB、Configure IEEE 802.1x authentication with smart cardsC、Configure the wireless network to use Wired Equivalent Privacy (WEP)D、Install and configure an Internet Authentication Service (IAS) server
You are evaluating the implementation of two Hyper-V hosts for the Web servers. You need to design a solution that will move the Web servers automatically between the Hyper-V hosts based on the physical resources available. Which software should you include in the design?()A、Microsoft System Center Operations ManagerB、Microsoft System Center Virtual Machine ManagerC、Microsoft System Center Data Protection ManagerD、Microsoft System Center Configuration Manager
You have an Exchange Server 2010 organization for a company named Contoso, Ltd. Contoso has the following security policy: .Messages that contain the word budget cannot be sent to external recipients .Messages that contain the name Northwind Traders must be sent to the legal department automaticallyYou need to recommend a solution to meet the security policy. What should you recommend?()A、Create two transport rules.B、Create two message classifications.C、Create one transport rule and configure a legal hold.D、Create one message classification and configure a legal hold.
You have an Exchange Server 2010 organization. Your companys security policy states that users must not be able to encrypt e-mail messages by usingOutlook Web App (OWA). You need to recommend a client access solution that meets the requirements of the security policy. What should you include in the solution?()A、managed folder mailbox policiesB、multiple OWA virtual directoriesC、OWA segmentationD、WebReady Document Viewing
You are creating a Windows Communication Foundation (WCF) service. You have the following requirements: Messages must be sent over TCP The service must support transactions. Messages must be encoded using a binary encoding Messages must be secured using Windows stream-based security.You need to implement a custom binding for the service. In which order should the binding stack be configured?()A、tcp Transport, windows Stream Security, transaction Flow, binary Message EncodingB、transaction Flow, binary Message Encoding, windows Stream Security, tcp TransportC、windows Stream Security, tcp Transport, binary Message Encoding, transaction FlowD、binary Message Encoding, transaction Flow, tcp Transport, windows Stream Security
You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()A、Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computersB、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersC、Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersD、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers
You need to design a strategy to ensure that all servers are in compliance with the business requirements for maintaining security patches. What should you do?()A、Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the domainB、Log on to each server and run Security Configuration and Analysis to analyze the security settings by using a custom security templateC、Create a logon script to run the secedit command to analyze all servers in the domainD、Run the Microsoft Baseline Security Analyzer (MBSA) on a server to scan for Windows vulnerabilities on all servers in the domain
多选题You are designing a service that will use the Windows Azure AppFabric Service Bus. You need to recommend an approach for controlling access to the service by using the Windows Azure AppFabric Access Control Service. Which two actions should you recommend?()AConfigure the service to not require authentication.BConfigure the service to require a relay access token.CSpecify message security for all communications between clients and the service.DSpecify transport security for allcommunications between clients and the service.
多选题You need to design a strategy to increase security for the client computers in the finance department. Which two actions should you perform?()AEnable automatic certificate enrollmentBEnforce smart card logonsCEnable Encrypting File System (EFS) for offline filesDEnable a screen saver password
单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains 50 application servers that run Windows Server 2003. The security configuration of the application servers is not uniform. The application servers were deployed by local administrators who configured the settings for each of the application servers differently based on their knowledge and skills. The application servers are configured with different authentication methods, audit settings, and account policy settings. The security team recently completed a new network security design. The design includes a baseline configuration for security settings on all servers. The baseline security settings use the Hisecws.inf predefined security template. The design also requires modified settings for servers in an application role. These settings include system service startup requirements, renaming the administrator account, and more stringent account lockout policies. The security team created a security template named Application.inf that contains the modified settings. You need to plan the deployment of the new security design. You need to ensure that all security settings for the application servers are standardized, and that after the deployment, the security settings on all application servers meet the design requirements. What should you do? ()A Apply the Setup security.inf template first, the Hisecws.inf template next, and then the Application.inf template.B Apply the Application.inf template and then the Hisecws.inf template.C Apply the Application.inf template first, the Setup security.inf template next, and then the Hisecws.inf template.D Apply the Setup security.inf template and then the Application.inf template.
单选题You need to design a method to monitor the security configuration of the IIS server to meet the requirements in the written security policy. What should you do?()ALog on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the IIS server computer accountBRun the Microsoft Baseline Security Analyzer (MBSA) on the IIS server and scan for vulnerabilities in Windows and IIS checksCRun Security Configuration and Analysis to analyze the IIS server’s security settings by using a custom security templateDOn the IIS server, run the gpresult command from a command prompt and analyze the output
单选题You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()ADesign a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computersBDesign a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersCDesign a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersDDesign a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers
单选题You are designing an application that will interact with non-Windows applications over unreliable connections. Each non-Windows application will have its own security token. You need to recommend an approach for non-Windows applications to retrieve messages. What should you recommend?()A Retrieve messages from a Windows Azure Queue.B Retrieve messages from Windows Azure Table storage.C Retrieve messages from a blob storage container that has a private access policy.D Retrieve messages from the Windows Azure AppFabric Service Bus message buffer.