You encrypt your files to ensure the security of the files. You want to make a backup copy of the files and maintain their security settings. You have the option of backing up to either the network or floppy disk.  What should you do?()A、Copy the files to a network share on an NTFS volume and do nothing further.B、Copy the files to a network share on a FAT 32 volume and do nothing further.C、Copy the files to a floppy disk that has been formatted by using Windows 2000 Professional. D、Place the files in an encrypted folder, and then copy the folder to floppy disk.

You encrypt your files to ensure the security of the files. You want to make a backup copy of the files and maintain their security settings. You have the option of backing up to either the network or floppy disk.  What should you do?()

  • A、Copy the files to a network share on an NTFS volume and do nothing further.
  • B、Copy the files to a network share on a FAT 32 volume and do nothing further.
  • C、Copy the files to a floppy disk that has been formatted by using Windows 2000 Professional. 
  • D、Place the files in an encrypted folder, and then copy the folder to floppy disk.

相关考题:

You opened the encryption wallet and then issued the following command:Then you closed the wallet. Later, you issued the following command to create the EMPLOYEES table in the SECURESPACE tablespace and you use the NO SALT option for the EMPID column.What is the outcome?()A. It creates the table and encrypts the data in it.B. It generates an error because the wallet is closed.C. It creates the table but does not encrypt the data in it.D. It generates an error because the NO SALT option cannot be used with the ENCRYPT option.

USER_DATA is a nonencrypted tablespace that contains a set of tables with data. You want to convert all existing data in the USER_DATA tablespace and the new data into the encrypted format.Which methodswould you use to achieve this?()A. Use Data Pump to transfer the existing data to a new encrypted tablespaceB. Use ALTER TABLE MOVE to transfer the existing data to a new encrypted tablespaceC. Use CREATE TABLE AS SELECT to transfer the existing data to a new encrypted tablespaceD. Enable row movement for each table to be encrypted and then use ALTER TABLESPACE to encrypt the tablespaceE. Encrypt the USER_DATA tablespace using the ALTER TABLESPACE statement so that all the data in the tablespace is automatically encrypted

You created an encrypted tablespace:You then closed the encryption wallet because you were advised that this is secure.Later in the day, you attempt to create the EMPLOYEES table in the SECURESPACE tablespace with the SALT option on the EMPLOYEE column.Which is true about the result?()A. It creates the table successfully but does not encrypt any inserted data in the EMPNAME column because the wallet must be opened to encrypt columns with SALT.B. It generates an error when creating the table because the wallet is closed.C. It creates the table successfully, and encrypts any inserted data in the EMPNAME column because the wallet needs to be open only for tablespace creation.D. It generates error when creating the table, because the salt option cannot be used with encrypted tablespaces.

You have a firewall enforcer protecting sensitive internal resources in a data center. The network traversed by endpoint traffic is semi-trusted, so you need to encrypt the traffic between the endpoints accessing the resources and the firewall enforcer.Which type of policies provide this level of protection?()A. resource access policiesB. Host Enforcer policiesC. source IP enforcement policiesD. IPsec enforcement policies

打开审计开关的操作是什么()。A、ENABLE_AUDIT=0B、ENABLE_ENCRYPT=0C、ENABLE_AUDIT=1D、ENABLE_ENCRYPT=1

You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()A、Require client computers to connect to the marketing application by using a VPN connectionB、Use IPSec to encrypt communications between the servers in the New York and Atlanta officesC、Require the high security setting on Terminal Services connections to the marketing applicationD、Configure all marketing application Web pages to require SSL

You need to configure a computer to encrypt all inbound connections by using IPSec. What should you do?()A、From Network and Sharing Center, click Connect to a network.B、From Network and Sharing Center, click Set up a new connection or network.C、From Windows Firewall with Advanced Security, click Inbound Rules and then click New Rule.D、From Windows Firewall with Advanced Security, click Connection Security Rules and then click NewRule.

You have a computer that runs Windows 7 Professional. A removable drive is attached to the computer.You need to protect data on the removable drive by using BitLocker To Go.  What should you do first? ()A、Upgrade the computer to Windows 7 Enterprise.B、Install all Windows Updates for Windows 7 Professional.C、Issue a digital certificate for the Encrypting File System (EFS).D、Select the Encrypt contents to secure data checkbox from the properties on the removable drive.

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB1 in the instance. VIP customer data of the company are stored in DB1. The customers access their profile data by using a Web application. You must ensure the security of the customer data, that is to say, even if the backup media is lost, you must guarantee that data files, log files and subsequent backups and so on are as safe as possible.  So what action should you perform to achieve this goal?()A、For both the CustomerDB database and the master database, enable Transparent Database Encryption B、You should use the built-in encryption functions to encrypt the sensitive data at the cell Ievel C、You should make the CustomerDB database accessible only through stored procedures and functions. D、For the CustomerDB database, enable Transparent Database Encryption and back up the transaction log.

You are planning to deploy two Windows Server 2008 R2 Hyper-V servers. You need to design the storage of VHD files for maximum security.    What should you do?()A、Store the VHD files on a dedicated NTFS volumeB、Store unencrypted VHD files on a volume that uses Windows BitLocker drive encryptionC、Encrypt the VHD files by using EFS on a volume that uses Windows BitLocker drive encryptionD、Encrypt the VHD files by using EFS on a volume that does not use Windows BitLocker drive encryption

Your Windows 2000 Professionally computer belongs to the contoso.com domain. You need to encrypt a compressed file named C:/data. You successfully encrypt the file but discover that it is no longer compressed.   What is the most likely cause of this problem?()A、Group Policy is preventing the compression of encrypted files.B、The file is stored on a FAT32 partition.C、Only members of the Administrators and the Power Users groups can compress and encrypt files.D、Encrypted files cannot be compressed.

You have an Exchange Server 2010 organization.  Your companys security policy states that users must not be able to encrypt e-mail messages by usingOutlook Web App (OWA).  You need to recommend a client access solution that meets the requirements of the security policy.  What should you include in the solution?()A、managed folder mailbox policiesB、multiple OWA virtual directoriesC、OWA segmentationD、WebReady Document Viewing

You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()A、Encrypt customer information when it is stored and when it is being transmittedB、Require encrypted connections to the public Web site, which is hosted on the Web server on the perimeter networkC、Encrypt all marketing information on file servers and client computersD、Require encrypted connections to all file servers

You are the network administrator for your company. The network contains a single Active Directory domain. All computers on the network are members of the domain. All domain controllers run Windows Server 2003.   You are planning a public key infrastructure (PKI). The PKI design documents for your company specify that certificates that users request to encrypt files must have a validity period of two years.   The validity period of a Basic EFS certificate is one year. In the Certificates Templates console, you attempt to change the validity period for the Basic EFS certificate template. However, the console does not allow you to change the value.  You need to ensure that you can change the value of the validity period of the certificate that users request to encrypt files. What should you do?  ()A、 Install an enterprise certification authority (CA) in each domain.B、 Assign the Domain Admins group the Allow - Full Control permission for the Basic EFS certificate template.C、 Create a duplicate of the Basic EFS certificate template. Enable the new template for issuing certificate authorities.D、 Instruct users to connect to the certification authority (CA) Web enrollment pages to request a Basic EFS certificate.

单选题You are the network administrator for your company. The network contains a single Active Directory domain. All computers on the network are members of the domain. All domain controllers run Windows Server 2003.   You are planning a public key infrastructure (PKI). The PKI design documents for your company specify that certificates that users request to encrypt files must have a validity period of two years.   The validity period of a Basic EFS certificate is one year. In the Certificates Templates console, you attempt to change the validity period for the Basic EFS certificate template. However, the console does not allow you to change the value.  You need to ensure that you can change the value of the validity period of the certificate that users request to encrypt files. What should you do?  ()A Install an enterprise certification authority (CA) in each domain.B Assign the Domain Admins group the Allow - Full Control permission for the Basic EFS certificate template.C Create a duplicate of the Basic EFS certificate template. Enable the new template for issuing certificate authorities.D Instruct users to connect to the certification authority (CA) Web enrollment pages to request a Basic EFS certificate.

单选题You need to design a security strategy for a remote e-mail access. What should you do?()ARequire remote users to access e-mails by using Outlook Mobile AccessBRequire Outlook Web Access users to install the secure MIME ActiveX-Control and to encrypt all messagesCOn Outlook Web Access servers that accept connections from the Internet configure IIS to require SSL for all connectionsDOn Outlook Web Access servers that accept connections from the Internet configure IIS to require Integrated Windows Authentication

单选题You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()AEncrypt customer information when it is stored and when it is being transmittedBRequire encrypted connections to the public Web site, which is hosted on the Web server on the perimeter networkCEncrypt all marketing information on file servers and client computersDRequire encrypted connections to all file servers

单选题You need to design security for messages exchanged between Northwind Traders employees and its vendors. What should you do?()ARequire employees to access e-mail only over connections that use SSLBPlace Exchange mailbox stores on NTFS volumes. Use Encrypting File System (EFS) to encrypt the storesCUse the internal certification authority (CA) to issue certificates to all employees. Require employees to digitally sign outbound e-mailDUse the internal certification authority (CA) to issue certificates to all employees and vendors. Instruct employees and vendors to use secure MIME to encrypt all e-mail sent between them

单选题You manage a computer running Windows 2000 Professional that belongs to a workgroup. You create a new user account (Tony) on that computer that is not a member of the Administrators group. You log on using the new account. You create a file with notepad in a folder that is on a volume formatted with NTFS. You encrypt the file. You give another user account defined on that computer, Luis the permission to take ownership of the file. Luis logs on using the account and takes ownership. However, she receives an error message reporting that access is denied when she tries to open the file. What can you do to allow Luis to open the file?()AInstruct Luis to decrypt the file before she tries to open it.BLog on with the account Tony and decrypt the file.CMove the file to a folder that is not encrypted on a different volume that is formatted with NTFS.DMove the file to a folder that is not encrypted on the same volume.

单选题You encrypt three files to ensure the security of the files. You want to make a backup copy of these three files and maintain their security settings. You have the option of backing up to either the network or a floppy disk. What should you do?()ACopy the files to a network share on an NTFS volume. Do nothing further.BCopy the files to a network share on a FAT32 volume. Do nothing further.CCopy the files to a floppy disk that has been formatted by using Win2000 Professional. Do nothing further.DPlace the files in an encrypted folder. Then copy the folder to a floppy disk.

单选题A user in your company network needs to encrypt a folder that is on her Windows 2000 Professional computer. Her computer has two drives: Drive C and Drive D. The folder that needs to be encrypted is located on Drive D. When the user attempts to encrypt the folder, no option for encryption can be found in the folder properties. What should you do to enable the user to encrypt the folder? ()ALog on to her computer as an administrator, and then run the cipher/e command.BInstruct the user to run the chipper/e command.CLog on to her computer as an administrator, and then run the Secedit/enforce command.DInstruct the user to run the Secedit/enforce command.ELog on to her computer as an administrator, and then run the Convert d:/FS:NTFS command.

单选题You have a firewall enforcer protecting sensitive internal resources in a data center. The network traversed by endpoint traffic is semi-trusted, so you need to encrypt the traffic between the endpoints accessing the resources and the firewall enforcer.Which type of policies provide this level of protection?()Aresource access policiesBHost Enforcer policiesCsource IP enforcement policiesDIPsec enforcement policies

单选题You opened the encryption wallet and then issued the following command:   SQLCREATE TABLESPACE securespace DATAFILE ’/home/user/oradata/secure01.dbf’ SIZE 150M  ENCRYPTION USING ’3DES168’ DEFAULT STORAGE(ENCRYPT);   Then you closed the wallet. Later, you issued the following command to create theEMPLOYEES table in the SECURESPACE tablespace and you use the NO SALT option for the EMPID column.  What is the outcome?()A It creates the table and encrypts the data in it.B It generates an error because the wallet is closed.C It creates the table but does not encrypt the data in it.D It generates an error because the NO SALT option cannot be used with the ENCRYPT option.

单选题You need to design access to e-mail by Internet users. What should you do?()AConfigure front-end servers to use HTTP to communicate with back-end serversBConfigure the internal firewall to allow IPSec traffic between front-end and back-end Exchange serversCRequire all users to encrypt all outbound e-mail messagesDIssue digital certificates to all remote users. Require the certificates to be used when authenticating to Outlook Web Access

单选题You created an encrypted tablespace: You then closed the encryption wallet because you were advised that this is secure. Later in the day, you attempt to create the EMPLOYEES table in the SECURESPACE tablespace with the SALT option on the EMPLOYEE column. Which is true about the result?()AIt creates the table successfully but does not encrypt any inserted data in the EMPNAME column because the wallet must be opened to encrypt columns with SALT.BIt generates an error when creating the table because the wallet is closed.CIt creates the table successfully, and encrypts any inserted data in the EMPNAME column because the wallet needs to be open only for tablespace creation.DIt generates error when creating the table, because the salt option cannot be used with encrypted tablespaces.

单选题You are the administrator of a computer named Computer1 that runs Windows 7. Several users shareComputer1. The users plan to encrypt files on the computer. You need to ensure that you can access allencrypted files on the computer.  What should you do first?()AAt a command prompt, run Cipher.exe.BAt a command prompt, run Certutil.exe.CFrom the local computer policy, modify the User Rights Assignment.DFrom User Accounts, run the Manage your file encryption certificates wizard.

多选题Which of the following protocols encrypt communication?()AHTTPSBTELNETCSMTPDDNSESSH