单选题You are designing the settings for FinServ. You specify the permissions that will be used. You need to specify any additional settings required by the company. What should you do?()AInstall a digital certificate for Encrypting File System (EFS) on FinServBActivate failure auditing on the access to files and objectsCConfigure all firewalls to track when any packets addresses to FinServ are droppedDCreate an IPSec policy that requires IPSec encryption between FinServ and the firewall

单选题
You are designing the settings for FinServ. You specify the permissions that will be used. You need to specify any additional settings required by the company. What should you do?()
A

Install a digital certificate for Encrypting File System (EFS) on FinServ

B

Activate failure auditing on the access to files and objects

C

Configure all firewalls to track when any packets addresses to FinServ are dropped

D

Create an IPSec policy that requires IPSec encryption between FinServ and the firewall


参考解析

解析: 暂无解析

相关考题:

You are required to launch the App.exe process, and specify sample.txt as the input file.App.exe will then use the contents of sample.txt to establish the environment‘s current settings.You need to ensure that the code you use meets these requirements.What should you do?()A.B.C.D.

You have a computer that runs Windows Vista.You need to restore the default Windows Internet Explorer settings for the internal network. You want to maintain the current settings for the Internet.What should you do on the Internet Explorer Security tab?()A.AB.BC.CD.D

You are the network administrator for . All network servers run Windows Server 2003. A server named TestKing6 functions as a file server. All client computers run Windows XP Professional and are members of the domain. TestKing.com periodically hires temporary employees. You need to prepare a custom user profile for all temporary employees. You log on to a client computer as an administrator, and you configure the desktop settings. You copy the profile to a folder named //TestKing6/Profiles/Temp_profile. You rename the Ntuser.dat file in the //TestKing6/Profiles/Temp_profile folder to Ntuser.man. You create three new user accounts for the temporary employees. The user accounts are named temp_user1, temp_user2, and temp_user3. You need to configure the temporary user accounts to receive the new desktop settings that you created on TestKing6. The temporary employees must not be allowed to retain customized desktop settings? What should you do?()A、Specify a user profile path of //TestKing6/Profiles/username for each of the three user accounts.B、Specify a user profile path of //TestKing6/Profiles/username.man for each of the three user accounts.C、Specify a home folder path of //TestKing6/Profiles/username for each of the three user accounts.D、Specify a user profile path of //TestKing6/Profiles/Temp_profile for each of the three user accounts.E、Specify a user profile path of //TestKing6/Profiles/Temp_profile.man for each of the three user accounts.

If you use ALTER DISKGROUP ... ADD DISK and specify a wildcard for the discovery string, what happens to disks that are already a part of the same or another disk group?()  A、 The command fails unless you specify the FORCE option.B、 The command fails unless you specify the REUSE option.C、 The command must be reissued with a more specific discovery string.D、 The other disks, already part of the disk group,are ignored.

You are designing a strategy to ensure that VPN users are able to access all internal resources.  What should you do?()A、 Specify a static routing table entry on VPN1 for the Dallas network.B、 Specify a static routing table entry on VPN1 for the Seattle network.C、 Implement Internet Authentication Service (IAS) on VPN1.D、 Define a User Class option for Routing  Remote Access Clients on the DHCP Server.

You need to design a certificate management process for internal users. What should you do?()A、Establish a Web enrollment service for internal users to request access to resourcesB、Grant Enrollment Agent rights to usersC、Establish enrollment stations and store user certificates in a smart cardD、Create Connection Manager scripts to identify the client computer operating system, and configure Web proxy settings to specify the appropriate Web enrollment service

You are designing a remote administration solution that meets business requirements. You need to specify client or server software that will be required. What should you do?()A、Ensure that all client computers have a graphical Telnet client installedB、Ensure that all client computers have the Remote Desktop Connection client software installedC、Ensure that all server computers have RCONSOLE installed and that it is configured to start automaticallyD、Ensure that all server computers have Remote Administration (HTML) installed

You are designing a client computer upgrade strategy for Contoso.Ltd.  What should you do?()A、 Use the ldifde command to migrate user settings.B、 Use the User State Migration Tool (USMT) to Migrate user settings.C、 Create trust relationships between the Chicago domain and the San Francisco domain. Use the Active Directory Migration Tool (ADMT) to migrate user settings.D、 Create trust relationships between the forest root domain and the San Francisco domain. Use the Active Directory Migration Tool (ADMT) to migrate user settings.

You are designing the settings for FinServ. You specify the permissions that will be used. You need to specify any additional settings required by the company. What should you do?()A、Install a digital certificate for Encrypting File System (EFS) on FinServB、Activate failure auditing on the access to files and objectsC、Configure all firewalls to track when any packets addresses to FinServ are droppedD、Create an IPSec policy that requires IPSec encryption between FinServ and the firewall

You have a single Active Directory directory service domain. All servers run Windows Server 2003. You need to specify the list of applications that users are permitted to run. You create a new Group Policy object (GPO) and link it to the domain.  What should you do next?()A、 Configure Software Restriction Policies Group Policy settings.B、 Configure the Enable user control over installs Group Policy setting.C、 Assign all approved applications.D、 Publish all approved applications.

You have a computer that runs Windows 7. You need to provide standard users the ability to update thedrivers for display adapters.  What should you modify from the Local Group Policy?()A、device installation settings for the computer.B、display settings for the user.C、driver installation settings for the computer.D、driver installation settings for the user.

You discover that a particular group of settings named UserPreferences changes.You need to store the UserPreference settings to prevent affecting other applications. Which two actions should you perform?()A、Use the Properties.USerPreferences objectB、Use the Properties.Settings.Default.Userprefences objectC、Use the ConfigurationManager.AppSettings object during runtimeD、Create the settings by using Application scopeE、Create the settings by using User scope

单选题You have a single Active Directory directory service domain. All servers run Windows Server 2003. You need to specify the list of applications that users are permitted to run. You create a new Group Policy object (GPO) and link it to the domain.  What should you do next?()A Configure Software Restriction Policies Group Policy settings.B Configure the Enable user control over installs Group Policy setting.C Assign all approved applications.D Publish all approved applications.

单选题You have a hosted Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack l (SP1) installed.The organization contains a distribution group named Group1.You need to ensure that a user named User1 can review and approve all messages sent to Group1. What should you do?()AModify the Managed By list for Group1.BCreate a new journal rule and specify User1 as the journal recipient.CModify the mail flow settings for User1.DModify the mail flow settings for Group1.

多选题You discover that a particular group of settings named UserPreferences changes.You need to store the UserPreference settings to prevent affecting other applications. Which two actions should you perform?()AUse the Properties.USerPreferences objectBUse the Properties.Settings.Default.Userprefences objectCUse the ConfigurationManager.AppSettings object during runtimeDCreate the settings by using Application scopeECreate the settings by using User scope

单选题You deploy a Windows 7 Enterprise image to a computer on the network. You need to display the detailedactivation and license status of the computer.  What should you run?()AMsconfig.exe.BSlui.exe.CSlmgr.vbs and specify the dli parameter.DW.inrm.vbs and specify the id parameter.

单选题You are designing a Windows 7 virtual desktop infrastructure.You have the following requirements:   Provide access to Remote Desktop Services RemoteApp sources from multiple remote desktop servers.  Support network load balancing.  Support reconnection to existing sessions on virtual desktops.    You need to specify a design that meets the requirements.   What should you include in your design?()ARemote Desktop GatewayBRemote Desktop Connection BrokerCWindows Deployment ServicesDWindows Virtual PC and Windows XP Mode

多选题You have a single Active Directory directory service forest named contoso.com. You create baseline  security settings for a group of computers, and you store the settings in a database. You deploy thebaseline security settings. You need to confirm that the security settings on one of the computers are  applied correctly.  What are two possible commands that you can run to achieve this goal?()AseceditBgpupdateCnetdomDscwcmd

多选题You are designing a password management solution to meet the business and technical requirements.  Which two actions should you perform?hich two actions should you perform?()ADelegate the password management controls to the help desk staff.BDelegate the password management controls to the Domain Users group.CConfigure the Default Domain Policy to enforce password expiration settings.DConfigure the Default Domain Controller Policy to enforce password expiration settings.

单选题You are developing a Windows Communication Foundation (WCF) service that reads messages from a public non-transactional MSMQ queue.You need to configure the service to read messages from the failed-delivery queue.Which URI should you specify in the endpoint configuration settings of the service?()Anet.msmq://localhost/msmq$FailedMessagesBnet.msmq://localhost/msmq$DeadLetterCnet.msmq://localhost/system$DeadXactDnet.msmq://localhost/system$DeadLetter

单选题You are designing a client computer upgrade strategy for Contoso.Ltd.  What should you do?()A Use the ldifde command to migrate user settings.B Use the User State Migration Tool (USMT) to Migrate user settings.C Create trust relationships between the Chicago domain and the San Francisco domain. Use the Active Directory Migration Tool (ADMT) to migrate user settings.D Create trust relationships between the forest root domain and the San Francisco domain. Use the Active Directory Migration Tool (ADMT) to migrate user settings.

单选题You install a standalone root certification authority (CA) on a server named Server1. You need to ensure that every computer in the forest has a copy of the root CA certificate installed in the  local computers Trusted Root Certification Authorities store.   Which command should you run on Server1()Acertreq.exe and specify the -accept parameterBcertreq.exe and specify the -retrieve parameterCcertutil.exe and specify the -dspublish parameterDcertutil.exe and specify the -importcert parameter

单选题You have a Virtual Hard Disk (VHD) and a computer that runs Windows 7. The VHD has Windows 7installed. You need to start the computer from the VHD.  What should you do?()AFrom Diskpart.exe, run Select vdisk.BFrom Disk Management, modify the active partition.CRun Bootcfg.exe and specify the /default parameter.DRun Bcdedit.exe and modify the Windows Boot Manager settings.

单选题You have a computer that runs Windows Vista. The computer contains a custom application. You need toexport the user state and the settings of the custom application.  What should you do?()ARun Loadstate.exe and specify the /config parameter.BRun Scanstate.exe and specify the /genconfig parameter.CModify the miguser.xml file. Run Loadstate.exe and specify the /ui parameter.DModify the migapp.xml file. Run Scanstate.exe and specify the /i parameter.

单选题You have a computer that runs Windows 7. You run Runas and specify the /savecred parameter to start anapplication. You need to delete the stored password. What should you do?()ARun Del and specify the /p parameter.BRun Runas and specify the /noprofile parameter.CFrom Credential Manager, modify the Windows credentials.DFrom Authorization Manager, modify the Authorization Manager options.

多选题You are designing a security strategy for the infrastructure servers at the resorts.Which two actions should you perform?(Each correct answer presents part of the solution. Choose two)()APlace all infrastructure servers in subnets that cannot exchange information with the InternetBEstablish a custom security template that contains unique required settings for each combination of services that run on the infrastructure serversCUse Group Policy objects (GPOs) to apply the custom security template or templates to the Infrastructure serversDEdit the local policy settings to configure each individual server