单选题You need to design a method to monitor the security configuration of the IIS server to meet the requirements in the written security policy. What should you do?()ALog on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the IIS server computer accountBRun the Microsoft Baseline Security Analyzer (MBSA) on the IIS server and scan for vulnerabilities in Windows and IIS checksCRun Security Configuration and Analysis to analyze the IIS server’s security settings by using a custom security templateDOn the IIS server, run the gpresult command from a command prompt and analyze the output

单选题
You need to design a method to monitor the security configuration of the IIS server to meet the requirements in the written security policy. What should you do?()
A

Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the IIS server computer account

B

Run the Microsoft Baseline Security Analyzer (MBSA) on the IIS server and scan for vulnerabilities in Windows and IIS checks

C

Run Security Configuration and Analysis to analyze the IIS server’s security settings by using a custom security template

D

On the IIS server, run the gpresult command from a command prompt and analyze the output


参考解析

解析: 暂无解析

相关考题:

你们需要安保专家对场馆做安全评估吗?A.Do you need a security expert to value the potential danger of the region?B.Do you need a security expert to calculate the potential adventure of the area?C.Do you need a security expert to account the potential risks of the region?D.Do you need a security expert to evaluate the potential risks of the place?

Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows Vista computers.  You are planning to deploy Windows 7 and a custom application.   You have the following requirements:   The application must be available to only a specific group of users. You must be able to monitor application usage.   You need to design a deployment method for the custom application that meets the requirements.  Which deployment method should you use in your design?()A、software installation in Group PolicyB、startup scripts in Group PolicyC、Microsoft Application Virtualization (App-V)D、baseline Windows 7 image that includes the custom application

The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()A、On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policyB、On all client computers, implement logon auditing for all user account logonsC、On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policyD、On all domain controllers, implement logon auditing for all user account logons

You need to design the retrieval of advertising statistics without compromising security. What should you do?()A、Design a Notification Services solution that sends the advertising statistics to specified subscribers by e-mail.B、Design a SQL Server Web service that runs a stored procedure to return the statistics on a call from the advertisers application.C、Design a Database Mail solution that sends the advertising statistics to e-mail addresses that are specified in a table.D、Design a stored procedure to return the statistics on a call from the advertisers application.E、Design a user-defined function to return the statistics on a call from the advertisers application.

You need to design a method to standardize and deploy a baseline security configuration for servers. You solution must meet business requirements. What should you do?()A、Create a script that installs the Hisecdc.inf security templateB、Use a GPO to distribute and apply the Hisec.inf security templateC、Use the System Policy Editor to configure each server’s security settingsD、Use a GPO to distribute and apply a custom security template

You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. TestKing.com is configured to run an exchange 2010 environment.  You are planning to design the installation of numerous Mailbox servers. TestKing.com Service LevelAgreement (SLA) requires the following: * The servers need to support 1,500 concurrent connections to mailboxes.* The servers need to maintain a latency of less than 20 milliseconds. You ensure deployment success you need to ensure that your design comply with the Service LevelAgreement (SLA) of TestKing.com. What should you do?()A、The best option is to use the Exchange Server User Monitor (ExMon) tool to check if your design meets the requirements.B、The best option is to use the Exchange Server Load Generator (LoadGen) 2010 tool to check if your design meets the requirements.C、The best option is to use the Exchange Server Connectivity Analyzer (ExRCA) tool to check if your design meets the requirements.D、The best option is to use the Exchange Server Jetstress 2010 tool to check if you design meets there quirements.

You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains 50 application servers that run Windows Server 2003.   The security configuration of the application servers is not uniform. The application servers were deployed by local administrators who configured the settings for each of the application servers differently based on their knowledge and skills. The application servers are configured with different authentication methods, audit settings, and account policy settings.   The security team recently completed a new network security design. The design includes a baseline configuration for security settings on all servers. The baseline security settings use the Hisecws.inf predefined security template. The design also requires modified settings for servers in an application role. These settings include system service startup requirements, renaming the administrator account, and more stringent account lockout policies. The security team created a security template named Application.inf that contains the modified settings.   You need to plan the deployment of the new security design. You need to ensure that all security settings for the application servers are standardized, and that after the deployment, the security settings on all application servers meet the design requirements.   What should you do? ()A、 Apply the Setup security.inf template first, the Hisecws.inf template next, and then the Application.inf template.B、 Apply the Application.inf template and then the Hisecws.inf template.C、 Apply the Application.inf template first, the Setup security.inf template next, and then the Hisecws.inf template.D、 Apply the Setup security.inf template and then the Application.inf template.

You need to design a method to allow the new-ideas-testking.com Web site to function in accordance with security and business requirements.  What should you do?()A、Require a PPTP VPN for all connections to the Web serverB、Require that traffic between Web browsers and the Web server uses an L2TP/IPSec tunnelC、Require that traffic between Web browsers and the Web server uses SSLD、Require certificate mappings between the Web server and Active Directory

You need to design a method to log changes that are made to servers and domain controllers. You also need to track when administrators modify local security account manager objects on servers. What should you do?()A、Enable failure audit for privilege user and object access on all servers and domain controllersB、Enable success audit for policy change and account management on all servers and domain controllersC、Enable success audit for process tracking and logon events on all servers and domain controllersD、Enable failure audit for system events and directory service access on all servers and domain controllers

You create Microsoft Windows-based applications.  You create an application that requires users to be authenticated by a domain controller.  The application contains a series of processor intensive method calls that require different database connections. A bug is reported during testing.  The bug description states that the application hangs during one of the processor-intensive calls more than 50 percent of the times when the method is executed.  Your unit test for the same method was successful.You need to reproduce the bug.   Which two factors should you ascertain from the tester?()A、 Security credentials of the logged on userB、 Code access security settingsC、 Hardware settingsD、 Network settingsE、 Database settings

You need to design a method to address the chief information officer’s security concerns. What should you do?()A、Configure Windows Management Instrumentation (WMI) filtering options in the Default Domain Policy GPOB、Use the gpresult commandC、Use Mbsacli.exeD、Configure software restriction policy options in the Default Domain Policy GPO

You are developing a custom-collection class.You need to create a method in your class. You need to ensure that the method you create in your class returns a type that is compatible with the Foreach statement. Which criterion should the method meet?()A、The method must return a type of either IEnumerator or IEnumerable.B、The method must return a type of IComparable.C、The method must explicitly contain a collection.D、The method must be the only iterator in the class.

You are the network administrator for TestKing. Your network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all 200 client computers run Windows XP Professional. Software Update Services (SUS) is installed with default settings on a server named TestKing5. You discover that a critical security update for Internet Explorer is not installed on any client computer. You verify that the update was downloaded from the Internet to TestKing5. You also verify that more recent security updates are installed. You need to investigate the cause of this problem. You will use the SUS administration console on TestKing5. Which data should you evaluate? ()(Choose two)A、The security update in the synchronization log.B、The security update in the approval log.C、The status of Internet Explorer 5.5x in the Monitor Server window.D、The status of Internet Explorer 6.x in the Monitor Server window.

Your network contains a DNS server that has a reverse lookup zone for all of your network segments. You have a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). An IP security policy is assigned to Server1. You verify IPSec traffic and see that the current security associations display only by IP address. You need to view the fully qualified domain names for all security associations.  What should you do?()A、From the DNS console, add Server1 as a name server.B、From the DNS console, change dynamic updates to Secure only.C、From IP Security Monitor on Server1, enable DNS name resolution.D、From IP Security Monitor on Server1, create a new taskpad view.

You need to design a method to enable remote encryption on Server5. What should you do?()A、Configure the editor’s user account properties to enable Store password using reversible encryptionB、Configure the editor’s user account properties to enable Use DES encryption for this accountC、Configure the Local Security Policy on Server to enable the System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing security policyD、Configure the Server5 computer account properties to enable Trust computer for delegation

Your network contains a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). Server1 has IPSec enabled.  Several users report that they cannot connect to Server1. You need to see how many IPSec connection attempts failed due to authentication failures.  What should you do?()A、From IP Security Monitor, view the Main Mode Statistics.B、From Microsoft Baseline Security Analyzer, scan Server1.C、From the Security event log, view the events from the IPSec source.D、From System Monitor, add the IPSec V4 Driver : Active Security Associations counter.

You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()A、Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computersB、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersC、Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersD、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers

You need to design a strategy to ensure that all servers are in compliance with the business requirements for maintaining security patches. What should you do?()A、Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the domainB、Log on to each server and run Security Configuration and Analysis to analyze the security settings by using a custom security templateC、Create a logon script to run the secedit command to analyze all servers in the domainD、Run the Microsoft Baseline Security Analyzer (MBSA) on a server to scan for Windows vulnerabilities on all servers in the domain

单选题You are developing a Windows Presentation Foundation (WPF) application.You need to display HTML content from a Web page on the WPF form. What should you do?()AAdd a FlowDocumentReader control to the design surface. Then create a FlowDocument control.BAdd a DocumentViewer control to the design surface. Then create a FixedDocument control.CAdd a WebBrowser control to the design surface. Then use the Navigate method to navigate the URI object.DAdd a ContentControl control to the design surface. Then reference a WebClient object to return an HTML string.

单选题You need to design a method to deploy security configuration settings to servers. What should you do?()ARun the Resultant Set of Policy wizard with a Windows Management Instrumentation (WMI) filter on each department’s Server OUBLog on to each server and use local policy to configure and manage the security settingsCCreate a customer security template. Log on to a domain controller and run the seceditcommand to import the security templateDCreate a customer security template. Create a GPO and import the security template. Link the GPO to each department’s Server OU

多选题You need to design a strategy to increase security for the client computers in the finance department. Which two actions should you perform?()AEnable automatic certificate enrollmentBEnforce smart card logonsCEnable Encrypting File System (EFS) for offline filesDEnable a screen saver password

单选题The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()AOn all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policyBOn all client computers, implement logon auditing for all user account logonsCOn all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policyDOn all domain controllers, implement logon auditing for all user account logons

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains 50 application servers that run Windows Server 2003.   The security configuration of the application servers is not uniform. The application servers were deployed by local administrators who configured the settings for each of the application servers differently based on their knowledge and skills. The application servers are configured with different authentication methods, audit settings, and account policy settings.   The security team recently completed a new network security design. The design includes a baseline configuration for security settings on all servers. The baseline security settings use the Hisecws.inf predefined security template. The design also requires modified settings for servers in an application role. These settings include system service startup requirements, renaming the administrator account, and more stringent account lockout policies. The security team created a security template named Application.inf that contains the modified settings.   You need to plan the deployment of the new security design. You need to ensure that all security settings for the application servers are standardized, and that after the deployment, the security settings on all application servers meet the design requirements.   What should you do? ()A Apply the Setup security.inf template first, the Hisecws.inf template next, and then the Application.inf template.B Apply the Application.inf template and then the Hisecws.inf template.C Apply the Application.inf template first, the Setup security.inf template next, and then the Hisecws.inf template.D Apply the Setup security.inf template and then the Application.inf template.

单选题You need to recommend a NAP enforcement method that meets the companyˉs security requirements. Which method should you recommend?()A802.1XBDHCPCIPSecDVPN

单选题You need to design a monitoring strategy to meet business requirements for data on servers in the production department. What should you do?()AUse the Microsoft Baseline Security Analyzer (MBSA) to scan for Windows vulnerabilities on all servers in the production departmentBRun Security and Configuration Analysis to analyze the security settings of all servers in the production departmentCEnable auditing for data on each server in the production department. Run System Monitor on all servers in the production department to create a counter log that tracks activity for the Objects performance objectDCreate a Group Policy Object (GPO) that enables auditing for object access and link it to the product department’s Servers OU. Enable auditing for data on each server in the production department

单选题You need to design a method to monitor the security configuration of the IIS server to meet the requirements in the written security policy. What should you do?()ALog on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the IIS server computer accountBRun the Microsoft Baseline Security Analyzer (MBSA) on the IIS server and scan for vulnerabilities in Windows and IIS checksCRun Security Configuration and Analysis to analyze the IIS server’s security settings by using a custom security templateDOn the IIS server, run the gpresult command from a command prompt and analyze the output

单选题You are developing a custom-collection class.You need to create a method in your class. You need to ensure that the method you create in your class returns a type that is compatible with the Foreach statement. Which criterion should the method meet?()AThe method must return a type of either IEnumerator or IEnumerable.BThe method must return a type of IComparable.CThe method must explicitly contain a collection.DThe method must be the only iterator in the class.

单选题Your company has client computers that run Windows XP Professional.   You are planning to install Windows 7 Enterprise on the existing client computers.    You need to design a user state migration strategy that minimizes network bandwidth and server use when user data is being migrated.   What should you do?()AUse the Refresh Computer method and a hard-link migration store.BUse the Refresh Computer method and a compressed migration store.CUse the Replace Computer method and a hard-link migration store.DUse the Replace Computer method and a compressed migration store.