单选题You need to design phase one of the new authentication strategy。你的设计必须符合他们的要求,你该怎么做?()A安装一个Windows Server 2003企业根CA、配置验证的证书模版B安装一个Windows Server 2003企业从属CA、配置验证的证书模版C安装一个Windows Server 2003独立从属CA、为HR部门创建一个包含Certreq.exe命令的登陆脚本D安装一个Windows Server 2003独立根CA、为HR部门创建一个包含Certreq.exe命令的登陆脚本
单选题
You need to design phase one of the new authentication strategy。你的设计必须符合他们的要求,你该怎么做?()
A
安装一个Windows Server 2003企业根CA、配置验证的证书模版
B
安装一个Windows Server 2003企业从属CA、配置验证的证书模版
C
安装一个Windows Server 2003独立从属CA、为HR部门创建一个包含Certreq.exe命令的登陆脚本
D
安装一个Windows Server 2003独立根CA、为HR部门创建一个包含Certreq.exe命令的登陆脚本
参考解析
解析:
暂无解析
相关考题:
Development is a structured design methodology that proceeds in a sequence from one phase to the next.A.WaterfallB.PhasedC.PrototypingD.Parallel
The purpose of systems analysis phase is to build a logical model of the new system. The first step is( ), where you investigate business processes and document what the new system must do to satisfy users. This step continues the investigation that began during the( ). You use the fact-finding results to build business models, data and process models, and object models. The deliverable for the systems analysis phase is the( ), which describes management and user requirements, costs and benefits, and outlines alternative development strategies. The purpose of the systems design phase is to create a physical model that will satisfy all documented requirements for the system. During the systems design phase, you need to determine the( ), which programmers will use to transform the logical design into program modules and code. The deliverable for this phase is the( ), which is presented to management and users for review and approval.A.System logical modelingB.use case modelingC.requirements modelingD.application modeling A.systems planning phaseB.systems modeling phaseC.systems analysis phaseD.systems design phase A.system charterB.system scope definitionC.system blueprintD.system requirement document A.application architectureB.system data modelC.system process modelD.implement environment A.system architecture descriptionB.system design specificationC.system technique architectureD.physical deployment architecture
The purpose of the systems analysis phase is to build a logical model of the new system.The first step is(71),where you investigate business processes and document what the new system must do to satisfy users. This step continues the investigation that began during the(72). You use the fact-finding results to build business models,data and process models,and object models. The deliverable for the systems analysis phase is the(73),which describes management and user requirements,costs and benefits,and outlines alternative development strategies.The purpose of the systems design phase is to create a physical model that will satisfy all documented requirements for the system. During the systems design phase,you need to determine the(74),which programmers will use to transform the logical design into program modules and code. The deliverable for this phase is the(75),which is presented to management and users for review and approval.A.system charterB.system scope definitionC.system blueprintD.system requirements document
The purpose of the systems analysis phase is to build a logical model of the new system.The first step is(71),where you investigate business processes and document what the new system must do to satisfy users. This step continues the investigation that began during the(72). You use the fact-finding results to build business models,data and process models,and object models. The deliverable for the systems analysis phase is the(73),which describes management and user requirements,costs and benefits,and outlines alternative development strategies.The purpose of the systems design phase is to create a physical model that will satisfy all documented requirements for the system. During the systems design phase,you need to determine the(74),which programmers will use to transform the logical design into program modules and code. The deliverable for this phase is the(75),which is presented to management and users for review and approval.A.systems planning phaseB.systems modeling phaseC.systems analysis phaseD.systems design phase
The purpose of the systems analysis phase is to build a logical model of the new system.The first step is(71),where you investigate business processes and document what the new system must do to satisfy users. This step continues the investigation that began during the(72). You use the fact-finding results to build business models,data and process models,and object models. The deliverable for the systems analysis phase is the(73),which describes management and user requirements,costs and benefits,and outlines alternative development strategies.The purpose of the systems design phase is to create a physical model that will satisfy all documented requirements for the system. During the systems design phase,you need to determine the(74),which programmers will use to transform the logical design into program modules and code. The deliverable for this phase is the(75),which is presented to management and users for review and approval.A.system architecture descriptionB.system design specificationC.system technique architectureD.physical deployment architecture
Which of the following options lists the steps in PPP session establishment in the correct order?()A、Optional authentication phase, link establishment phase, network layer protocol phase.B、Network layer protocol phase, link establishment phase, optional authentication phase.C、Network layer protocol phase, optional authentication phase, link establishment phase.D、Link establishment phase, network layer protocol phase, optional authentication phase.E、Link establishment phase, optional authentication phase, network layer protocol phase.F、Optional authentication phase, network layer protocol phase, link establishment phase.
Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Microsoft Office Outlook 2007 to connect to their mailboxes.RPC over HTTP and Auto discover are configured on Microsoft Office Outlook 2007. A new Company.com security policy requires that the employees connected to the domain does not need authentication when using Outlook Anywhere.However, those not connected t the domain needs to be authentication when using Outlook Anywhere.The employees need to comply with the new Company.com security policy. What should you do?()A、You should consider using Basic authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.B、You should consider using NTLM authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.C、You should consider using NTLM authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.D、You should consider using Basic authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.
You need to design phase one of the new authentication strategy. Your solution must meet business requirements.What should you do?()A、Install a Windows Server 2003 enterprise root CA, Configure certificate templates for autoenrollmentB、Install a Windows Server 2003 enterprise subordinate CA, Configure certificate templates for autoenrollmentC、Install a Windows Server 2003 stand-alone subordinate CA, Write a logon script for the client computers in the HR department that contains the Certreq.execommandD、Install a Windows Server 2003 stand-alone root CA,Write a logon script for the client computers in the HR department that contains the Certreq.execommand
You need to design phase one of the new authentication strategy。你的设计必须符合他们的要求,你该怎么做?()A、安装一个Windows Server 2003企业根CA、配置验证的证书模版B、安装一个Windows Server 2003企业从属CA、配置验证的证书模版C、安装一个Windows Server 2003独立从属CA、为HR部门创建一个包含Certreq.exe命令的登陆脚本D、安装一个Windows Server 2003独立根CA、为HR部门创建一个包含Certreq.exe命令的登陆脚本
You need to design the consolidation plan for SQL1, SQL2, and SQL3. You need to identify the appropriate combination of SQL Server instances and SQL Server 2005 computers that are needed to fulfill the company’s consolidation plans and security requirements.Which combination should you use?()A、one SQL Server 2005 computer with one instanceB、two SQL Server 2005 computers, each with two instancesC、two SQL Server computers, one with one instance and one with three instancesD、one SQL Server 2005 computer with two instances
You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()A、Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access pointB、Configure IEEE 802.1x authentication with smart cardsC、Configure the wireless network to use Wired Equivalent Privacy (WEP)D、Install and configure an Internet Authentication Service (IAS) server
You are designing the placement of the global catalog servers. You want to use the minimum number of global catalog servers that are required. Which design should you use?()A、One global catalog server in New York.B、Two global catalog servers in New York.C、One global catalog server in Chicago and one global catalog server in New York.D、Two global catalog servers in Chicago and two global catalog servers in New York.E、One global catalog server in Chicago, one global catalog server in New York, and one global catalog server in Boston.
You need to design a domain model that meets the company business and security requirements for controlling access to the new Web-based ordering application. What should you do?()A、Create a child OU within the existing domainB、Create a child domain of the existing domainC、Create a new domain in a new forest. Configure the new domain to trust the existing domainD、Create a new tree in the existing forest. Configure the new domain to trust the existing domain
You are designing the loan application process for the customer terminals. You need to design a Transact-SQL stored procedure that fulfills the business and technical requirements. Which type of Transact-SQL stored procedure should you use?()A、one that uses an internal SQL Server Web service endpointB、one that runs a SQL Server Integration Services (SSIS) packageC、one that uses Service BrokerD、one that runs a user-defined function
You are designing a strategy for migrating domain user accounts to the new Windows Server 2003 Active Directory environment. You want to identify the minimum number of trust relationships that need to be manually created to perform this operation. Which design should you use?()A、one external trust relationshipB、two external trust relationshipsC、six external trust relationshipsD、twelve external trust relationshipsE、one two-way cross-forest trust relationship
Your network contains one Active Directory domain. You have a member server named Server1 that runs Windows Server 2008 R2. The server has the Routing and Remote Access Services role service installed.You implement Network Access Protection (NAP) for the domain.You need to configure the Point-to-Point Protocol (PPP) authentication method on Server1. Which authentication method should you use?()A、Challenge Handshake Authentication Protocol (CHAP)B、Extensible Authentication Protocol (EAP)C、Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2)D、Password Authentication Protocol (PAP)
You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()A、Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computersB、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersC、Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersD、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers
You need to recommend a configuration design for the new VMs. The design must ensure that operating systems can be deployed to the new VMs. What should you include in the recommendation?()A、virtual machine queue (VMQ)B、Virtual Machine ChimneyC、a synthetic network adapterD、an emulated network adapter
单选题You are designing the placement of the global catalog servers. You want to use the minimum number of global catalog servers that are required. Which design should you use?()A One global catalog server in New York.B Two global catalog servers in New York.C One global catalog server in Chicago and one global catalog server in New York.D Two global catalog servers in Chicago and two global catalog servers in New York.E One global catalog server in Chicago, one global catalog server in New York, and one global catalog server in Boston.
单选题You need to recommend a configuration design for the new VMs. The design must ensure that operating systems can be deployed to the new VMs. What should you include in the recommendation?()Avirtual machine queue (VMQ)BVirtual Machine ChimneyCa synthetic network adapterDan emulated network adapter
单选题You are designing the placement of the global catalog servers. You want to use the minimum number of global catalog servers that are required. Which design should you use?()AOne global catalog server in New York.BTwo global catalog servers in New York.COne global catalog server in Chicago and one global catalog server in New York.DTwo global catalog servers in Chicago and two global catalog servers in New York.EOne global catalog server in Chicago, one global catalog server in New York, and one global catalog server in Boston.
单选题Which of the following options lists the steps in PPP session establishment in the correct order?()AOptional authentication phase, link establishment phase, network layer protocol phase.BNetwork layer protocol phase, link establishment phase, optional authentication phase.CNetwork layer protocol phase, optional authentication phase, link establishment phase.DLink establishment phase, network layer protocol phase, optional authentication phase.ELink establishment phase, optional authentication phase, network layer protocol phase.FOptional authentication phase, network layer protocol phase, link establishment phase.
单选题—What do you think of his new design?—It’s of even ______practical value than the old one. He’s just a bookworm!AgreaterBgreatClessDlittle
单选题You are designing a strategy for migrating domain user accounts to the new Windows Server 2003 Active Directory environment. You want to identify the minimum number of trust relationships that need to be manually created to perform this operation. Which design should you use? ()A one external trust relationshipB two external trust relationshipsC six external trust relationshipsD twelve external trust relationshipsE one two-way cross-forest trust relationship
多选题You are the systems engineer for your company. The network consists of three physical networks connected by hardware-based routers. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional. Each physical network contains at least one domain controller and at least one DNS server. One physical network contains a Microsoft Internet Security and Acceleration (ISA) Server array that provides Internet access for the entire company. The network also contains a certificate server. Company management wants to ensure that all data is encrypted on the network and that all computers transmitting data on the network are authenticated. You decide to implement IPSec on all computers on the network. You edit the Default Domain Policy Group Policy object (GPO) to apply the Secure Server (Require Security) IPSec policy. Users immediately report that they cannot access resources located in remote networks. You investigate and discover that all packets are being dropped by the routers. You also discover that Active Directory replication is not functioning between domain controllers in different networks. You need to revise your design and implementation to allow computers to communicate across the entire network. You also need to ensure that the authentication keys are stored encrypted. Which two actions should you take?()AConfigure the routers to use IPSec and a preshared key for authentication.BConfigure the routers to use IPSec and a certificate for authentication.CConfigure the routers to use IPSec and Kerberos for authenticationDReconfigure the GPOs to require a preshared key for IPSec authentication.EReconfigure the GPOs to require a certificate for IPSec authentication.
单选题You need to design a group membership strategy for the EditorialAdmins group. What should you do?()AMove the EditorialAdmins group to the Servers OU in the editorial departmentBMove the members of the EditorialAdmins group to the Editorial OUCMove the members of the EditorialAdmins group to the New York OUDMove the EditorialAdmins group to the New York OU
单选题You need to design the consolidation plan for SQL1, SQL2, and SQL3. You need to identify the appropriate combination of SQL Server instances and SQL Server 2005 computers that are needed to fulfill the company’s consolidation plans and security requirements.Which combination should you use?()Aone SQL Server 2005 computer with one instanceBtwo SQL Server 2005 computers, each with two instancesCtwo SQL Server computers, one with one instance and one with three instancesDone SQL Server 2005 computer with two instances