单选题You need to design a PKI solution that meets business and security requirements. What should you do?()AImplement an enterprise root CA in the corp.woodgrovebank.com domain.Implement subordinate CAs in each child domain. Take the root CA offlineBImplement an enterprise root CA in the corp.woodgrovebank.com domainCImplement an enterprise root CA in each of the child domains. Take the enterprise CA in each domain offlineDImplement an enterprise root CA in the corp.woodgrovebank.com domain. Implement a stand-alone root CA in each of the child domains

单选题
You need to design a PKI solution that meets business and security requirements. What should you do?()
A

Implement an enterprise root CA in the corp.woodgrovebank.com domain.Implement subordinate CAs in each child domain. Take the root CA offline

B

Implement an enterprise root CA in the corp.woodgrovebank.com domain

C

Implement an enterprise root CA in each of the child domains. Take the enterprise CA in each domain offline

D

Implement an enterprise root CA in the corp.woodgrovebank.com domain. Implement a stand-alone root CA in each of the child domains


参考解析

解析: 暂无解析

相关考题:

Which three pre-sales Smart Design documents are available to help you implement and install a solution?()A、 Design GuideB、 Cisco Configuration AssistantC、 Implementation GuideD、 Small Business Product GuideE、 Solution ProfileF、 Application Notes

Which three post-sales Smart Design documents are available to help you better serve your customers? ()  A、 Quick Quoting ToolB、 Smart Business Communications SystemC、 Overview PresentationD、 Cisco Configuration AssistantE、 Solution ProfileF、 Small Business Product Guide

You need to design a method to standardize and deploy a baseline security configuration for servers. You solution must meet business requirements. What should you do?()A、Create a script that installs the Hisecdc.inf security templateB、Use a GPO to distribute and apply the Hisec.inf security templateC、Use the System Policy Editor to configure each server’s security settingsD、Use a GPO to distribute and apply a custom security template

You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. TestKing.com is configured to run an exchange 2010 environment.  You are planning to design the installation of numerous Mailbox servers. TestKing.com Service LevelAgreement (SLA) requires the following: * The servers need to support 1,500 concurrent connections to mailboxes.* The servers need to maintain a latency of less than 20 milliseconds. You ensure deployment success you need to ensure that your design comply with the Service LevelAgreement (SLA) of TestKing.com. What should you do?()A、The best option is to use the Exchange Server User Monitor (ExMon) tool to check if your design meets the requirements.B、The best option is to use the Exchange Server Load Generator (LoadGen) 2010 tool to check if your design meets the requirements.C、The best option is to use the Exchange Server Connectivity Analyzer (ExRCA) tool to check if your design meets the requirements.D、The best option is to use the Exchange Server Jetstress 2010 tool to check if you design meets there quirements.

You need to recommend an availability solution for Site1 that meets the company's application requirements and business goals.   What should you include in the recommendation?()A、hardware load balancingB、Network Load Balancing (NLB)C、round robin DNSD、Windows Failover Clustering

You need to design a PKI that meets business requirements. What should you do?()A、Move ATLCA1 offline and create an enterprise subordinate CA to issue certificatesB、Create a stand-alone subordinate CA to issue certificatesC、Use a qualified subordinate CAD、Configure certificate template access control lists (ACLs) on ATLCA1

You are designing a remote administration solution that meets business requirements. You need to specify client or server software that will be required. What should you do?()A、Ensure that all client computers have a graphical Telnet client installedB、Ensure that all client computers have the Remote Desktop Connection client software installedC、Ensure that all server computers have RCONSOLE installed and that it is configured to start automaticallyD、Ensure that all server computers have Remote Administration (HTML) installed

You need to recommend a monitoring solution for the file server that meets the technical  requirements.   What should you include in the recommendation?()A、Data Collector SetsB、File Server Resource Manger quotasC、File Server Resource Manger storage reportsD、NTFS disk quotas

You need to recommend a delegation solution for CA1 that meets the company’s security requirements.   What should you include in the recommendation?()A、access-based enumeration (ABE)B、Active Directory delegationC、Authorization ManagerD、role separation

You need to design a domain model that meets the company business and security requirements for controlling access to the new Web-based ordering application. What should you do?()A、Create a child OU within the existing domainB、Create a child domain of the existing domainC、Create a new domain in a new forest. Configure the new domain to trust the existing domainD、Create a new tree in the existing forest. Configure the new domain to trust the existing domain

You need to design a remote administration solution for servers on the internal network. Your solution must meet business and security requirements. What should you do?()A、Permit administrators to use an HTTP interface to manage servers remotelyB、Permit only administrators to connect to the servers’ Telnet serviceC、Permit administrators to manage the servers by using Microsoft NetMeetingD、Require administrators to use Remote Desktop for Administration connections to manage the servers

You need to recommend a management solution for Server1 that meets the company's security  requirements.   What should you include in the recommendation?()A、access-based enumeration (ABE)B、Authentication Mechanism AssuranceC、Authorization ManagerD、Hyper-V Manager

You need to recommend a file recovery solution that meets the company's technical requirements. What should you include in the recommendation?()A、Distributed File System (DFS) ReplicationB、File Server Resource Manager (FSRM) active file screensC、shadow copiesD、Windows Storage Server 2008

You need to design a password policy that meets business requirements. What should you do? Select all that apply.()A、Increase the number of passwords that are rememberedB、Disable reversible encryptionC、Set the minimum password age to zero daysD、Increase the maximum password age

单选题You are planning to deploy Windows 7.   You have a custom line-of-business application that is not compatible with Windows 7.   You need to design a solution that allows the application to run.   What should you do?()AUse the Setup Analysis Tool.BUse the Compatibility Administrator.CUse the Update Compatibility Evaluator.DUse the Windows Compatibility Evaluator.

多选题Which three pre-sales Smart Design documents are available to help you implement and install a solution?()ADesign GuideBCisco Configuration AssistantCImplementation GuideDSmall Business Product GuideESolution ProfileFApplication Notes

单选题The company is evaluating using a new Active Directory domain to contain all customer user accounts. You need to design a monitoring or logging strategy that meets business and security requirements for the new Web-based ordering application. Your solution must minimize overhead on existing domain controllers and servers.  What should you do?()AEnable logon auditing in both the new and the existing domainsBEnable logon auditing only in the existing domainCEnable logon auditing only in the new domainDEnable logon auditing on only the Web server

单选题You need to design an authentication solution for Terminal Services that meets the business requirements.What should you do?()AConfigure the terminal server to use smart cardsBConfigure IPSec to permit only Remote Desktop Protocol (RDP) connections to the terminal serverCDeny the Remote Desktop Users group access to the terminal serverDRestrict treyresearch.com users from logging on locally to the terminal server

单选题You design a Business Intelligence (BI) solution by using SQL Server 2008. The solution contains a SQL Server 2008 Analysis Services (SSAS) database. A measure group in the database contains log entries of manufacturing events. These events include accidents, machine failures, production capacity metrics, and other activities. You need to implement a data mining model that meets the following requirements: Predict the frequency of different event types. Identify short-term and long-term patterns. Which algorithm should the data mining model use?()A the Microsoft Time Series algorithmB the Microsoft Decision Trees algorithmC the Microsoft Linear Regression algorithmD the Microsoft Logistic Regression algorithm

单选题You need to design a PKI solution that meets business and security requirements. What should you do?()AImplement an enterprise root CA in the corp.woodgrovebank.com domain.Implement subordinate CAs in each child domain. Take the root CA offlineBImplement an enterprise root CA in the corp.woodgrovebank.com domainCImplement an enterprise root CA in each of the child domains. Take the enterprise CA in each domain offlineDImplement an enterprise root CA in the corp.woodgrovebank.com domain. Implement a stand-alone root CA in each of the child domains

单选题You need to design a security solution for the internally developed Web applications that meets business requirements. What should you do?()AInstall and configure a stand-alone root certification authorative (CA) that is trusted by all company client computers. Issue encryption certificates to all developersBInstall and configure root certification authority (CA) that is trusted by all company client computers. Issue code-signing certificates to all developersCPurchase a root certification from a trusted commercial certification authority (CA). Install the root certificated on all developers’ computersDPurchase a code-signing certificate from a trusted commercial certification authority (CA). Install the certificate on all company client computers

单选题You need to recommend an access solution for the users in the sales department that meets the  museum's technical requirements.    What should you include in the recommendation?()ABranchCache in Distributed Cache modeBBranchCache in Hosted Cache modeCoffline filesDtransparent caching

单选题You need to recommend a solution for the Web server content that meets the company’s technical requirements.   What should you include in the recommendation?()ADistributed File System (DFS) ReplicationBfolder redirectionCHTTP redirectionDIIS Shared Configuration