单选题You need to design a certificate management process for internal users. What should you do?()AEstablish a Web enrollment service for internal users to request access to resourcesBGrant Enrollment Agent rights to usersCEstablish enrollment stations and store user certificates in a smart cardDCreate Connection Manager scripts to identify the client computer operating system, and configure Web proxy settings to specify the appropriate Web enrollment service

单选题
You need to design a certificate management process for internal users. What should you do?()
A

Establish a Web enrollment service for internal users to request access to resources

B

Grant Enrollment Agent rights to users

C

Establish enrollment stations and store user certificates in a smart card

D

Create Connection Manager scripts to identify the client computer operating system, and configure Web proxy settings to specify the appropriate Web enrollment service


参考解析

解析: 暂无解析

相关考题:

Overlapping activities on a project, such as design and construction, is referred to as:A.Fast trackingB.Risk conversion.C.Parallel management.D.Process improvement.E.Synchronous manufacturing

(b) Analyse how effective project management could have further improved both the process and the outcomesof the website re-design project. (10 marks)

The purpose of systems analysis phase is to build a logical model of the new system. The first step is( ), where you investigate business processes and document what the new system must do to satisfy users. This step continues the investigation that began during the( ). You use the fact-finding results to build business models, data and process models, and object models. The deliverable for the systems analysis phase is the( ), which describes management and user requirements, costs and benefits, and outlines alternative development strategies. The purpose of the systems design phase is to create a physical model that will satisfy all documented requirements for the system. During the systems design phase, you need to determine the( ), which programmers will use to transform the logical design into program modules and code. The deliverable for this phase is the( ), which is presented to management and users for review and approval.A.System logical modelingB.use case modelingC.requirements modelingD.application modeling A.systems planning phaseB.systems modeling phaseC.systems analysis phaseD.systems design phase A.system charterB.system scope definitionC.system blueprintD.system requirement document A.application architectureB.system data modelC.system process modelD.implement environment A.system architecture descriptionB.system design specificationC.system technique architectureD.physical deployment architecture

IT Service Design (SD)provides good-practice guidance on the design of IT services,processes,and other aspects of service management effort .()does not belong to the main activities of service design process. A. Service catalogue designB. Release and deployment managementC. Service cost assessmentD. Service level design

The purpose of the systems analysis phase is to build a logical model of the new system.The first step is(71),where you investigate business processes and document what the new system must do to satisfy users. This step continues the investigation that began during the(72). You use the fact-finding results to build business models,data and process models,and object models. The deliverable for the systems analysis phase is the(73),which describes management and user requirements,costs and benefits,and outlines alternative development strategies.The purpose of the systems design phase is to create a physical model that will satisfy all documented requirements for the system. During the systems design phase,you need to determine the(74),which programmers will use to transform the logical design into program modules and code. The deliverable for this phase is the(75),which is presented to management and users for review and approval.A.system charterB.system scope definitionC.system blueprintD.system requirements document

The purpose of the systems analysis phase is to build a logical model of the new system.The first step is(71),where you investigate business processes and document what the new system must do to satisfy users. This step continues the investigation that began during the(72). You use the fact-finding results to build business models,data and process models,and object models. The deliverable for the systems analysis phase is the(73),which describes management and user requirements,costs and benefits,and outlines alternative development strategies.The purpose of the systems design phase is to create a physical model that will satisfy all documented requirements for the system. During the systems design phase,you need to determine the(74),which programmers will use to transform the logical design into program modules and code. The deliverable for this phase is the(75),which is presented to management and users for review and approval.A.systems planning phaseB.systems modeling phaseC.systems analysis phaseD.systems design phase

The purpose of the systems analysis phase is to build a logical model of the new system.The first step is(71),where you investigate business processes and document what the new system must do to satisfy users. This step continues the investigation that began during the(72). You use the fact-finding results to build business models,data and process models,and object models. The deliverable for the systems analysis phase is the(73),which describes management and user requirements,costs and benefits,and outlines alternative development strategies.The purpose of the systems design phase is to create a physical model that will satisfy all documented requirements for the system. During the systems design phase,you need to determine the(74),which programmers will use to transform the logical design into program modules and code. The deliverable for this phase is the(75),which is presented to management and users for review and approval.A.application architectureB.system datA.modelC.system process modelD.implement environment

You have an Exchange Server 2010 organization.You need to ensure that you can install the Exchange Server 2010 administration tools on a desktop computer that runs Windows 7. What should you install first?()A、IIS 6 Management Console Microsoft .NET Framework 3.5.1B、IIS 6 Metabase Remote Server Administration ToolsC、Internet Explorer 8 Windows Process Activation ServiceD、Management Service Microsoft Message Queue (MSMQ) Server

Your company’s network includes client computers that run Windows 7. You design a wireless network to use Extensible Authentication Protocol-Transport Level Security (EAP-TLS).   The Network Policy Server has a certificate installed.   Client computers are unable to connect to the wireless access points.    You need to enable client computers to connect to the wireless network.   What should you do?()A、Configure client computers to use Protected Extensible Authentication Protocol-Microsoft Challenge Handshake Authentication Protocol version 2 (PEAP-MS-CHAP v2).B、Configure client computers to use Protected Extensible Authentication Protocol-Transport Layer Security (PEAP-TLS).C、Install a certificate in the Trusted Root Certification Authorities certificate store.D、Install a certificate in the Third-Party Root Certification Authorities certificate store.

You need to design a certificate management process for internal users. What should you do?()A、Establish a Web enrollment service for internal users to request access to resourcesB、Grant Enrollment Agent rights to usersC、Establish enrollment stations and store user certificates in a smart cardD、Create Connection Manager scripts to identify the client computer operating system, and configure Web proxy settings to specify the appropriate Web enrollment service

You need to design a remote access solution for the mobile sales users in the litwareinc.com domain. Which two actions should you perform?()A、Configure autoenrollment for user certificates and computer certificatesB、Configure Web enrollment for user certificates and computer certificatesC、Configure a Certificate Services hierarchy in the litwareinc.com domainD、Configure qualified subordination between the litwareinc.com and the contoso.com domainsE、Configure PEAP authentication on the remote access servers

You need to design a PKI that meets business requirements. What should you do?()A、Move ATLCA1 offline and create an enterprise subordinate CA to issue certificatesB、Create a stand-alone subordinate CA to issue certificatesC、Use a qualified subordinate CAD、Configure certificate template access control lists (ACLs) on ATLCA1

You need to design a method to log changes that are made to servers and domain controllers. You also need to track when administrators modify local security account manager objects on servers. What should you do?()A、Enable failure audit for privilege user and object access on all servers and domain controllersB、Enable success audit for policy change and account management on all servers and domain controllersC、Enable success audit for process tracking and logon events on all servers and domain controllersD、Enable failure audit for system events and directory service access on all servers and domain controllers

You need to design a method to address the chief information officer’s security concerns. What should you do?()A、Configure Windows Management Instrumentation (WMI) filtering options in the Default Domain Policy GPOB、Use the gpresult commandC、Use Mbsacli.exeD、Configure software restriction policy options in the Default Domain Policy GPO

You have an enterprise subordinate certification authority (CA). You have a custom Version 3  certificate template.     Users can enroll for certificates based on the custom certificate template by using the Certificates  console.     The certificate template is unavailable for Web enrollment. You need to ensure that the certificate  template is available on the Web enrollment pages.     What should you do()A、Run certutil.exe -pulse.B、Run certutil.exe -installcert.C、Change the certificate template to a Version 2 certificate template.D、On the certificate template, assign the Autoenroll permission to the users.

You create a Microsoft ASP.NET application by using the Microsoft .NET Framework version 3.5. The application uses Session objects. You are modifying the application to run on a Web farm. You need to ensure that the application can access the Session objects from all the servers in the Web farm. You also need to ensure that when any server in the Web farm restarts or stops responding, the Session objects are not lost.  What should you do?()A、Use the InProc Session Management mode to store session data in the ASP.NET worker process. B、Use the SQLServer Session Management mode to store session data in a common Microsoft SQL Server 2005 database. C、Use the SQLServer Session Management mode to store session data in an individual database for each Web server in the Web farm. D、Use the StateServer Session Management mode to store session data in a common State Server process on a Web server in the Web farm.

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a management data warehouse that uses the data collector to collect performance data. You intend to maintain the management data. You want to implement a data collection process. The process can gather and upload data in the management data warehouse on different schedules.  What process should you implement?() A、You should create a cached data collectionB、You should create an on-demand non-cached data collection C、You should create a scheduled non-cached data collection D、You should create two different SQL Agent jobs that are scheduled stimultaneously

You have an enterprise subordinate certification authority (CA). You have a custom certificate  template that has a key length of 1,024 bits. The template is enabled for autoenrollment.     You increase the template key length to 2,048 bits.   You need to ensure that all current certificate holders automatically enroll for a certificate that  uses the new template.     Which console should you use()A、Active Directory Administrative CenterB、Certification AuthorityC、Certificate TemplatesD、Group Policy Management

You are designing the loan application process for the customer terminals. You need to design a Transact-SQL stored procedure that fulfills the business and technical requirements. Which type of Transact-SQL stored procedure should you use?()A、one that uses an internal SQL Server Web service endpointB、one that runs a SQL Server Integration Services (SSIS) packageC、one that uses Service BrokerD、one that runs a user-defined function

Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.You have received instructions from the CIO to use a wildcard certificate for Outlook Anywhere.You now need to set up the Exchange Server 2010 organization for the wildcard certificate. What should you do?()A、The best option is to change the RPC virtual directory from the Internet Information Services (IIS) Manager.B、The best option is to change the properties of the WEB Outlook Provider from the Exchange Management Shell.C、The best option is to change the RPC virtual directory from the Autodiscover virtual directory.D、The best option is to change the properties of the EXPR Outlook Provider from the Exchange Management Shell.

You work as the exchange administrator at TestKing.com. The TestKing.com network contains anExchange Server 2010 Organization. You are responsible for managing the Exchange network forTestKing.com. You are in the process of enabling journaling within the TestKing.com organization. During the course ofday you receive an instruction form the CIO to stop administrators form reading classified e-mailmessages that is sent between senior management. What should you do?()A、Your best option would be to deploy an X.509 certificate from an enterprise certification authority (CA)to all senior management.B、Your best option would be to deploy Active Directory Rights Management Services (AD RMS)Templates.C、Your best option would be to deploy an X.509 certificate from a trusted third-party certification authority(CA) to all senior management.D、Your best option would be to deploy Active Directory Rights Management Services (AD RMS)Templates.Thereafter Transport Protection Rules should be created.

You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()A、Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computersB、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersC、Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersD、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers

You are the network administrator for your company. The network contains a single Active Directory domain. All computers on the network are members of the domain. All domain controllers run Windows Server 2003.   You are planning a public key infrastructure (PKI). The PKI design documents for your company specify that certificates that users request to encrypt files must have a validity period of two years.   The validity period of a Basic EFS certificate is one year. In the Certificates Templates console, you attempt to change the validity period for the Basic EFS certificate template. However, the console does not allow you to change the value.  You need to ensure that you can change the value of the validity period of the certificate that users request to encrypt files. What should you do?  ()A、 Install an enterprise certification authority (CA) in each domain.B、 Assign the Domain Admins group the Allow - Full Control permission for the Basic EFS certificate template.C、 Create a duplicate of the Basic EFS certificate template. Enable the new template for issuing certificate authorities.D、 Instruct users to connect to the certification authority (CA) Web enrollment pages to request a Basic EFS certificate.

单选题You are the network administrator for your company. The network contains a single Active Directory domain. All computers on the network are members of the domain. All domain controllers run Windows Server 2003.   You are planning a public key infrastructure (PKI). The PKI design documents for your company specify that certificates that users request to encrypt files must have a validity period of two years.   The validity period of a Basic EFS certificate is one year. In the Certificates Templates console, you attempt to change the validity period for the Basic EFS certificate template. However, the console does not allow you to change the value.  You need to ensure that you can change the value of the validity period of the certificate that users request to encrypt files. What should you do?  ()A Install an enterprise certification authority (CA) in each domain.B Assign the Domain Admins group the Allow - Full Control permission for the Basic EFS certificate template.C Create a duplicate of the Basic EFS certificate template. Enable the new template for issuing certificate authorities.D Instruct users to connect to the certification authority (CA) Web enrollment pages to request a Basic EFS certificate.

单选题You need to design a strategy to meet the company’s requirements for e-mail. What should you do?()AConfigure and publish a certificate template that is suitable for S/MIME, Deploy a Group Policy object (GPO) so that a certificate that is based on this template is automatically issued to all domain usersBSpecify Group Policy objects (GPOs) and IPSec policies that require all client computers to use Kerberos authentication to connect to mail serversCFor each mail server, acquire an SSL server certificate from a commercial CA whose root certificate is already trustedDRequire IPSec encryption on all TCP connections that are used to send or receive e-mail messages

多选题You need to design a strategy to increase security for the client computers in the finance department. Which two actions should you perform?()AEnable automatic certificate enrollmentBEnforce smart card logonsCEnable Encrypting File System (EFS) for offline filesDEnable a screen saver password

单选题You have an enterprise subordinate certification authority (CA).   You have a custom certificate template that has a key length of 1,024 bits. The template is enabled for  autoenrollment.   You increase the template key length to 2,048 bits.   You need to ensure that all current certificate holders automatically enroll for a certificate that uses the  new template.   Which console should you use()AActive Directory Administrative CenterBCertification AuthorityCCertificate TemplatesDGroup Policy Management

单选题You purchase a wildcard certificate.You plan to use the certificate for Outlook Anywhere. You need to configure an Exchange organization to use the certificate.What should you do first?()AFrom the Exchange Management Shell, modify the properties of the WEB Outlook Provider.BFrom the Exchange Management Shell, modify the properties of the EXPR Outlook Provider.CFrom the Internet Information Services (IIS) Manager, modify the properties of the RPC virtual directory.DFrom the Internet Information Services (IIS) Manager, modify the properties of the Autodiscover virtual directory.