单选题You need to design a method to enable remote encryption on Server5. What should you do?()AConfigure the editor’s user account properties to enable Store password using reversible encryptionBConfigure the editor’s user account properties to enable Use DES encryption for this accountCConfigure the Local Security Policy on Server to enable the System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing security policyDConfigure the Server5 computer account properties to enable Trust computer for delegation

单选题
You need to design a method to enable remote encryption on Server5. What should you do?()
A

Configure the editor’s user account properties to enable Store password using reversible encryption

B

Configure the editor’s user account properties to enable Use DES encryption for this account

C

Configure the Local Security Policy on Server to enable the System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing security policy

D

Configure the Server5 computer account properties to enable Trust computer for delegation


参考解析

解析: 暂无解析

相关考题:

You are the domain administrator for TestKing‘s Active Directory domain. Allservers run Windows Server 2003. All client computers run Windows XPProfessional.A newly installed server was added to your domain. You need to administer thisserver remotely from your client computer.You need to configure the new server to ensure that it can be administeredremotely.What should you do?()A. Install Terminal Server Licensing. Restart the server.B. Modify the system properties for the server. Enable Remote Desktop for the server by selecting the Allow users to connect remotely to this system check box.C. Start the Remote Access Connection Manager service and then configure the service to start automatically.D. Modify your user account properties to enable you to connect to the terminal server

You are the network administrator for All servers run Windows Server 2003.You manage a server named Testking2. IIS is installed on Testking2. Testking2 hosts TestKing‘s public Web site.You need to configure Testking2 to allow remote administration of all Web sites. In addition, you must be able to view the system and application event logs remotely.The remote administration must be done by using a Web browser. The procedure for remote administration must be encrypted.What should you do?()A. Enable Remote Desktop.B. Install the Remote Administration (HTML) Windows component.C. Install the Remote Desktop Web Connection Windows component.D. Configure the startup type of the Telnet service to Automatic and start the Telnet service.

You are deploying an ASP.NET Web application to a remote server. You need to choose a deployment method that will ensure that all IIS settings, in addition to the Web content, will deploy to the remote server. Which deployment method should you choose?()A、the XCOPY command-line toolB、the Copy Web Site toolC、the Web Deployment toolD、the Publish Web Site utility

You need to design a method to standardize and deploy a baseline security configuration for servers. You solution must meet business requirements. What should you do?()A、Create a script that installs the Hisecdc.inf security templateB、Use a GPO to distribute and apply the Hisec.inf security templateC、Use the System Policy Editor to configure each server’s security settingsD、Use a GPO to distribute and apply a custom security template

You need to connect to your computer by using the Remote Desktop Connection client.  Which two actions should you perform?()A、Enable Remote Desktop in the System Properties dialog box.B、Enable Remote Assistance in the System Properties dialog box.C、Enable the Remote Desktop exception in Microsoft Windows Firewall.D、Enable the Remote Assistance exception in Microsoft Windows Firewall.E、Enable the Remote Administration exception in Windows Firewall.

You need to design a method to log changes that are made to servers and domain controllers. You also need to track when administrators modify local security account manager objects on servers. What should you do?()A、Enable failure audit for privilege user and object access on all servers and domain controllersB、Enable success audit for policy change and account management on all servers and domain controllersC、Enable success audit for process tracking and logon events on all servers and domain controllersD、Enable failure audit for system events and directory service access on all servers and domain controllers

You need to design a strategy to increase security for the client computers in the finance department. Which two actions should you perform?()A、Enable automatic certificate enrollmentB、Enforce smart card logonsC、Enable Encrypting File System (EFS) for offline filesD、Enable a screen saver password

You need to design a method to address the chief information officer’s security concerns. What should you do?()A、Configure Windows Management Instrumentation (WMI) filtering options in the Default Domain Policy GPOB、Use the gpresult commandC、Use Mbsacli.exeD、Configure software restriction policy options in the Default Domain Policy GPO

You need to design an e-mail access strategy for remote users. What should you do? () A、 Instruct remote users to connect to their e-mail by using RPCB、 Instruct remote users to connect to Outlook Web Access by using only HTTPSC、 Instruct remote users to connect to the company network by using PPTP connectionsD、 Instruct remote users to connectd to their e-mail by using RPC over HTTP Configure the HTTP servers to require encryption.

You are an enterprise administrator for Cer-tech .com. The company runs Windows Server 2008 on all theservers on the network. The company has many remote users One of the servers on the network calledServer01 has the Terminal Services Gateway (TS Gateway) role installed on it. The remote users of thecompany need to connect remotely to desktop computers located in their offices through the gateway. Toensure secure connection to the gateway, you created a security group named RemoteUsersGrp1 for theremote users who need to connect to computers in their offices. Which of the following options would youchoose to enable the remote users to connect to the TS Gateway? ()A、Create a resource authorization policy.B、Create a client authorization policy.C、Create a Group Policy object enable the Set TS Gateway authentication method properties to Ask forcredentials,use Basic protocol.D、Add the RemoteUsersGrp1 security group and enable Device redirection.

You need to configure Microsoft Windows Firewall to allow technicians to remotely control your computer.  Which exception should you enable? ()A、Remote Registry ServiceB、Remote AssistanceC、Remote AdministrationD、Remote Service Management

You have a server that runs the Terminal Services Gateway (TS Gateway) role service. Users need to connect remotely through the gateway to desktop computers located in their offices.  You create a security group named Remote1 for the users who need to connect to computers in their offices.  You need to enable the users to connect to the TS Gateway. What should you do?()A、Add the Remote1 security group to the local remote desktop users group on the TS Gateway server.B、Create a client authorization policy. Add the Remote1 security group and enable Device redirection.C、Create a resource authorization policy. Add the Remote1 security group and enable Users to connect to any resource.D、Create a Group Policy object and enable the Set TS Gateway authentication method properties to Ask for credentials, use Basic protocol. Apply the policy to the TS Gateway server.

You need to design a method to enable remote encryption on Server5. What should you do?()A、Configure the editor’s user account properties to enable Store password using reversible encryptionB、Configure the editor’s user account properties to enable Use DES encryption for this accountC、Configure the Local Security Policy on Server to enable the System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing security policyD、Configure the Server5 computer account properties to enable Trust computer for delegation

Your company runs Remote Desktop Services. You have a Remote Desktop Session Host (RD Session Host) se rver. You enable Microsoft Word as a RemoteApp application on the RD Session Host server. You need to ensure that the RemoteApp application opens when a user double - clicks a Word (.docx) file on a client computer. Which two actions should you perform?()A、Create a Windows Installer (.msi) file.B、Create a Remote Desktop Protocol (.rdp) file.C、In the properties of the RemoteApp application, enable the Allow any command - line arguments setting.D、Enable the Associate client extensions for this program with the RemoteApp program setting for the file.

You want to configure your Windows 2000 Professional computer to remotely access your company's Windows 2000 Routing and Remote Access server. You configure a VPN connection. For security purposes, you configure the VPN connection to use MS-CHAP v2 only and to require encryption. You also configure TCP/IP to obtain an IP address automatically, to enable IPSec, and to set IPSec to Secure Server.  When you try to connect, you receive the following error message, "The encryption attempt failed because no valid certificate was found."  What should you do to connect to the server? ()A、Enable the VPN connection to use MS-CHAP.B、Change the data encryption setting toOptional Encryption.C、Specify a TCP/IP address in theNetworkproperties.D、Change the IPSec policy setting toClient.

You are designing a Windows 7 virtual desktop infrastructure.You have the following requirements:   Provide access to Remote Desktop Services RemoteApp sources from multiple remote desktop servers.  Support network load balancing.  Support reconnection to existing sessions on virtual desktops.    You need to specify a design that meets the requirements.   What should you include in your design?()A、Remote Desktop GatewayB、Remote Desktop Connection BrokerC、Windows Deployment ServicesD、Windows Virtual PC and Windows XP Mode

You are the network administrator for Company.You need to connect to Company’s network from your Windows 2000 Professional computer at home.You have a DSL line that is used for Internet connectivity. You create an L2TP virtual private network(VPN) connection and are able to connect successfully to Company’s network. While connected toCompany’s network, you are unable to access the Internet.You want to be able to access the Internet while connected to Company’s network.How should you configure the connection properties?()A、Configure the DSL connection to use PPTP instead of L2TP. B、Enable Internet Connection Sharing for the DSL connection properties. C、CLEAR THE Use default gateway on remote network check box. D、Clear the Require data encryption check box.

You have a computer that runs Windows XP Professional Service Pack 2 (SP2). A remote user has a computer that runs Windows XP Professional SP2. The remote user experiences several errors while attempting to install an application. You need to remotely observe the actions the user performs. What should you do first?() A、Instruct the user to send you a Remote Assistance invitation. B、Instruct the user to start the Remote Desktop Help Session Manager service.C、At the command prompt, establish a telnet session to the user's computer. D、Enable a Remote Desktop and establish a Remote Desktop Connection. Log on by using the local administrator account.

You receive a remote assistance request. It expires before you are able to accept it. You need to increase the amount of time you have to accept remote assistance requests.  What should you do?()A、Decrease the account lockout duration in the local security policy.B、Temporarily enable the Remote Administration exception in Microsoft Windows Firewall.C、Set the maximum amount of time an invitation can remain open to 12 hours.D、Enable the Remote Desktop (less secure) option and add yourself to the Remote Desktop Users group.

单选题You need to design an access control strategy for the Payment folder for the Sales Managers group. What should you do?()AUse IPSec in transport modeBUse Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV)CUse PEAP-EAP-TLSDUse Encrypting File System (EFS) remote encryption

单选题You are deploying an ASP.NET Web application to a remote server. You need to choose a deployment method that will ensure that all IIS settings, in addition to the Web content, will deploy to the remote server. Which deployment method should you choose?()Athe XCOPY command-line toolBthe Copy Web Site toolCthe Web Deployment toolDthe Publish Web Site utility

单选题You want to configure your Windows 2000 Professional computer to remotely access your company’s Windows 2000 routing and remote access server. You configure a VPN connection. For security purposes, you configure the VPN connection to use MS-CHAP v2 only and to require encryption. You also configure TCP/IP to obtain an IP address automatically, to enable IPSec, and to set IPSec to secure server. When you try to connect, you receive the following error message, “The encryption attempt failed because no valid certificate was found.” What should you do to connect to the server? ()AEnable the VPN connection to use MS-CHAP.BChange the data encryption setting to Optional Encryption.CSpecify a TCP/IP address in the network properties.DChange the IPSec policy setting to Client.

单选题You are designing a Windows 7 virtual desktop infrastructure.You have the following requirements:   Provide access to Remote Desktop Services RemoteApp sources from multiple remote desktop servers.  Support network load balancing.  Support reconnection to existing sessions on virtual desktops.    You need to specify a design that meets the requirements.   What should you include in your design?()ARemote Desktop GatewayBRemote Desktop Connection BrokerCWindows Deployment ServicesDWindows Virtual PC and Windows XP Mode

单选题You need to include a disclaimer to all sent messages in your organization. Some of the users require message encryption.How do you make sure that disclaimer can be included in encrypted messages?()AInstruct the users to use IRM encryption method onlyBInstruct the users to use S/MIME encryption method onlyCUsing command New-ExchangeCertificate cmdletDUsing the Set-ExchangeServer cmdlet

单选题You receive a remote assistance request. It expires before you are able to accept it. You need to increase the amount of time you have to accept remote assistance requests.  What should you do?()ADecrease the account lockout duration in the local security policy.BTemporarily enable the Remote Administration exception in Microsoft Windows Firewall.CSet the maximum amount of time an invitation can remain open to 12 hours.DEnable the Remote Desktop (less secure) option and add yourself to the Remote Desktop Users group.

单选题You need to recommend a NAP enforcement method that meets the companyˉs security requirements. Which method should you recommend?()A802.1XBDHCPCIPSecDVPN

单选题You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()AConfigure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addressesBConfigure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points useCCreate a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networksDCreate a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks

多选题You are the network administrator for your company. All servers run Windows Server 2003.   You configure the Routing and Remote Access service on a server named Server2. Server2 is connected to a modem pool and supports eight simultaneous inbound connections. You instruct remote users to dial in to Server2 from their home computers.The company’s written business policy states that the only client computer operating systems that should be supported for dial-up access are Windows 95, Windows 98, Windows 2000 Professional, and Windows XP Professional.You need to configure the remote access policy to support the most secure authentication methods possible. You want to enable only the necessary authentication methods based on the supported client computers that will be connecting.   Which authentication method or methods should you enable?()APAPBSPAPCCHAPDMS-CHAP Version 1EMS-CHAP Version 2