多选题You are designing a password management solution to meet the business and technical requirements.  Which two actions should you perform?hich two actions should you perform?()ADelegate the password management controls to the help desk staff.BDelegate the password management controls to the Domain Users group.CConfigure the Default Domain Policy to enforce password expiration settings.DConfigure the Default Domain Controller Policy to enforce password expiration settings.

多选题
You are designing a password management solution to meet the business and technical requirements.  Which two actions should you perform?hich two actions should you perform?()
A

Delegate the password management controls to the help desk staff.

B

Delegate the password management controls to the Domain Users group.

C

Configure the Default Domain Policy to enforce password expiration settings.

D

Configure the Default Domain Controller Policy to enforce password expiration settings.


参考解析

解析: 暂无解析

相关考题:

You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()A、IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsB、a list of the customer requirementsC、detailed security device specificationsD、results from pilot network testing

You are designing the placement of the PDC emulator role to meet the business and technical requirements. In which location should you place the PDC emulator role?()A、Los AngelesB、ParisC、SydneyD、LisbonE、Barcelona

You need to recommend a solution for monitoring the servers. The solution must meet the  company’s technical requirements    What should you include in the recommendation?()A、Data Collector Sets (DCSs)B、event subscriptionsC、Reliability MonitorD、Windows System Resource Manager (WSRM)

You are designing an IP addressing strategy for your VPN solution. How many public addresses should you use?()A、1B、25C、50D、255

You are designing the Active Directory infrastructure to meet the business and technical requirements. You run ADSizer, and find that it provides a solution that contains only one domain controller for Amsterdam.  What should you do?()A、 Place at least two domain controllers in Amsterdam.B、 Configure the domain controller as a bridgehead server.C、 Configure the domain controller as a global catalog server.D、 Distribute the users among sites in ADSizer and recalculate the number of domain controllers.

You have an Exchange Server 2010 organization.  You need to recommend a mailbox storage management solution for your organization to meet thefollowing requirements: .Apply quota limits for users by department.Automatically apply quota limits for new users What should you recommend?()A、A storage group for each department.B、A mailbox database for each department.C、An organizational unit for each department.D、A managed folder mailbox policy for each department.

You need to recommend a solution for managing the service accounts for SQL1 and SQL2. The  solution must meet the company’s security requirements. What should you include in the recommendation?()A、a custom password filterB、a Password Settings object (PSO)C、managed service accountsD、manual password changes

You are designing an access control strategy for WEB2. Your solution must meet business requirements. What should you do?()A、Install the Terminal Services Advanced Client Web client on WEB2B、Modify the Winreg registry key on WEB2C、Install the RPC over HTTP service on WEB2D、Modify the RestrictAnonymous registry key on WEB2

You have an Exchange Server 2010 organization.  Company policy states that a copy of a users mailbox must be kept for one year after the user leaves thecompany.  All user accounts are in an organizational unit (OU) named OU1.  A compliance administrator plans to export the mailboxes to personal folders.  You need to recommend a solution that allows the compliance administrator to meet the requirements ofthe company policy.  What should you include in the solution?()A、a new management role assignmentB、delegated permissions to OU1C、managed folder mailbox policiesD、new Personal Archives

单选题You are designing the placement of the PDC emulator role to meet the business and technical requirements. In which location should you place the PDC emulator role?()ALos AngelesBParisCSydneyDLisbonEBarcelona

单选题You are designing the placement of the PDC emulator role to meet the business and technical requirements.  In which location should you place the PDC emulator role?()A Los AngelesB ParisC SydneyD LisbonE Barcelona

单选题You need to create a Password Settings object (PSO).     Which tool should you use()AActive Directory Users and ComputersBADSI EditCGroup Policy Management ConsoleDNtdsutil

单选题You are designing a forest structure to meet the business and technical requirements.  How many forests should you create?()A OneB TwoC ThreeD Four

单选题You are designing a forest structure to meet the business and technical requirements. How many forests should you create?()AOneBTwoCThreeDFour

单选题You are designing a DHCP solution to meet the business and technical requirements. What should you do?()AIncrease the default lease time on all DHCP servers.BSplit all address ranges across multiple DHCP servers.CConfigure duplicate scopes on at least two DHCP servers.  DForce client computers to obtain an IP address from Automatic Private IP Addressing (APIPA).

单选题You have an Exchange Server 2010 organization.  You need to recommend a mailbox storage management solution for your organization to meet thefollowing requirements: .Apply quota limits for users by department.Automatically apply quota limits for new users What should you recommend?()AA storage group for each department.BA mailbox database for each department.CAn organizational unit for each department.DA managed folder mailbox policy for each department.

单选题You need to recommend a solution for controlling access to the Internet.The solution must meet the museum’s security polic. What should you include in the recommendation?()AFile Server Resource Manager (FSRM) file screens and Group Policy objects (GPOs)BMicrosoft Forefront Threat Management Gateway (TMG) 2010CMicrosoft Forefront Unified Access Gateway (UAG) 2010DWindows Firewall with Advanced Security and Group Policy objects (GPOs)

单选题You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()Aa list of applications currently in use in the networkBIP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsCdetailed security device specificationsDresults from pilot network testing

单选题You are designing a DNS implementing strategy to meet the business and technical requirement. Which type of zone should you use?()ASub ZonesBStandard Primary ZonesCSecondary ZonesDActive DirectoryIntegrated Zones

单选题You need to recommend a solution for managing the service accounts for SQL1 and SQL2. The  solution must meet the company’s security requirements. What should you include in the recommendation?()Aa custom password filterBa Password Settings object (PSO)Cmanaged service accountsDmanual password changes

单选题You are designing a DHCP solution to meet the business and technical requirements.  What should you do?()A Increase the default lease time on all DHCP servers.B Split all address ranges across multiple DHCP servers.C Configure duplicate scopes on at least two DHCP servers.D Force client computers to obtain an IP address from Automatic Private IP Addressing (APIPA).