多选题You are designing a strategy of enforce the corporate security policy. Which action or actions should you perform?()AConfigure a password policy that requires strong passwordsBConfigure a password policy that requires all users to change their passwords once a month.CAllow users in the branch offices to log on between the hours of 8:00 AM and 5:00 PM, Monday through Friday.DAllow users in the retail outlets to log on between the hours of 6:00 AM and 11:00 PM, daily.EEnable a policy that forces users to log off when their logon hours expire.

多选题
You are designing a strategy of enforce the corporate security policy. Which action or actions should you perform?()
A

Configure a password policy that requires strong passwords

B

Configure a password policy that requires all users to change their passwords once a month.

C

Allow users in the branch offices to log on between the hours of 8:00 AM and 5:00 PM, Monday through Friday.

D

Allow users in the retail outlets to log on between the hours of 6:00 AM and 11:00 PM, daily.

E

Enable a policy that forces users to log off when their logon hours expire.


参考解析

解析: 暂无解析

相关考题:

You are designing a strategy to allow users to have remote access to internal resources. Which service or services should you allow on the public interface of the NAT Server?()A、HTTPB、LDAPC、POP3D、SMTPE、VPN Gateway

You are designing a Windows Azure application.   Corporate policy dictates that you must retain all application logs.   You need to recommend an approach for complying with the corporate policy.  What should you recommend?()A、 Perform on-demand transfers.B、 Configure scheduled transfers.C、 Configure a diagnostic trace listener.D、 Increase the diagnostics buffer quotas.

You are designing the NetBIOS domain naming strategy for the company. Which NetBIOS domain name or names should you use?()A、eastB、westC、quebecD、newyorkE、northamericaF、wideworldimporters

You are designing an IP addressing strategy for your VPN solution. How many public addresses should you use?()A、1B、25C、50D、255

You are designing a strategy to ensure that DNS queries always take the most efficient route to get resolved.  Which action or actions should you perform?()A、 Configure conditional forwarding on the corporate DNS servers to point the development DNS servers.B、 Configure conditional forwarding on the development DNS servers to point the corporate DNS servers.C、 Configure conditional forwarding on the perimeter network DNS servers to point the corporate and development DNS servers.D、 Configure forwarding on the corporate and development DNS servers to point the perimeter network DNS servers.E、 Disable root hints on the perimeter network DNS Servers.

You are designing a strategy to perform inplace upgrade of domain controller in Boston and San Diego. Which method should you use?()A、adprepB、sysprepC、Answer FileD、Remote Installtion Services (RIS)

You are designing a DNS implementation strategy for the network.  Which two zone types should you use?()A、Reverse lookup zonesB、Standard primary zonesC、Standard secondary zonesD、Active Directory-integrated zones

You are designing a security strategy for users who need remote access to the corporate network. What should you do?()A、Configure Internet Authentication Service (IAS) for accounting.B、Configure the server running Routing and Remote Access to support L2TP.C、Configure the server running Routing and Remote Access to restrict dial-in traffic to the NewApp servers only.D、Create a separate account for remote access users. Configure these accounts to access the NewApp server only.

单选题You are designing a security strategy for users who need remote access to the corporate network.  What should you do?()A Configure Internet Authentication Service (IAS) for accounting.B Configure the server running Routing and Remote Access to support L2TP.C Configure the server running Routing and Remote Access to restrict dial-in traffic to the NewApp servers only.D Create a separate account for remote access users. Configure these accounts to access the NewApp server only.

单选题You are designing a Windows Azure application.   Corporate policy dictates that you must retain all application logs.   You need to recommend an approach for complying with the corporate policy.  What should you recommend?()A Perform on-demand transfers.B Configure scheduled transfers.C Configure a diagnostic trace listener.D Increase the diagnostics buffer quotas.

多选题You are designing a password management solution to meet the business and technical requirements.  Which two actions should you perform?hich two actions should you perform?()ADelegate the password management controls to the help desk staff.BDelegate the password management controls to the Domain Users group.CConfigure the Default Domain Policy to enforce password expiration settings.DConfigure the Default Domain Controller Policy to enforce password expiration settings.

单选题You are designing a new NETBIOS naming strategy for the corporate environment.  Which domain name should you use?()A adB woodgroveadC woodgrovebankD woodgrovebank.com

单选题You are designing a DNS implementing strategy to meet the business and technical requirement.  Which type of zone should you use?()A Sub ZonesB Standard Primary ZonesC Secondary ZonesD Active DirectoryIntegrated Zones

多选题You are designing the NetBIOS domain naming strategy for the company. Which NetBIOS domain name or names should you use?()AeastBwestCquebecDnewyorkEnorthamericaFwideworldimporters

多选题You are designing a NetBIOS naming strategy for the internal domain. What are two possible NetBIOS domain names you can use to achieve your goal?()AadBdallasCinternalDexternalEResearch

单选题You are designing an IP addressing strategy for your VPN solution. How many public addresses should you use?()A1B25C50D255

单选题You are designing a new NETBIOS naming strategy for the corporate environment. Which domain name should you use?()AadBwoodgroveadCwoodgrovebankDwoodgrovebank.com