单选题Which of the following is the MOST effective method to restrict staff members from accessing a service on a company server?()AImplement ACLs.BDisable accounts for staff members who do not require server access.CImplement anti-spam software on the server.DImplement anti-virus software on the server.

单选题
Which of the following is the MOST effective method to restrict staff members from accessing a service on a company server?()
A

Implement ACLs.

B

Disable accounts for staff members who do not require server access.

C

Implement anti-spam software on the server.

D

Implement anti-virus software on the server.


参考解析

解析: 暂无解析

相关考题:

Which of the following is the MOST effective method to restrict staff members from accessing a service on a company server?() A. Implement ACLs.B. Disable accounts for staff members who do not require server access.C. Implement anti-spam software on the server.D. Implement anti-virus software on the server.

Which implement phase service component consists of explaining the benefits and limitations of purchased support options to a customer and ensuring that the customer understands operational processes and responsibilities? Select exactly 1 answer(s) from the following:()。A、Staging and System MigrationB、Post Implementation Support Handoff MeetingC、Detailed Design DevelopmentD、Staff Training

Which is the MOST important consideration before making a change to a server?()A、Explore the ramification of the change before implementation.B、Determine the service level agreement in place before implementation.C、Review the equipment disposal procedures and policies before implementation.D、Notify all staff members of the planned system outage before implementation.

Which of the following groups should staff accounts be placed in, if the staff is required to perform most but not all maintenance tasks on a Windows PC?()A、Power UsersB、UserC、AdministratorD、Guest

Which of the following is the BEST way to allow web software through the server firewall?()A、Implement an application exception.B、Implement an access control list (ACL).C、Open the corporate firewall to allow port 80.D、Implement port blocking on port 80.

Which of the following is the MOST important consideration before making a change to a server?()A、Explore the ramification of the change before implementation.B、Determine the service level agreement in place before implementation.C、Review the equipment disposal procedures and policies before implementation.D、Notify all staff members of the planned system outage before implementation.

Which of the following is the BEST reason to implement a firewall on a server?()A、To watch for bandwidth issuesB、To protect the server from all trafficC、To block certain traffic by portsD、To monitor certain malicious traffic

An email server has been installed; however, the staff reports that they are unable to receive email from external email addresses, but they can email each other.  Which of the following is the MOST likely reason for this?()A、 The company firewall is blocking SMTP ports.B、 The DHCP server is misconfigured.C、 The DNS server is only resolving internal name spaces.D、 The email server should be configured to resolve names by IP addresses.

Which of the following is the MOST effective method to restrict staff members from accessing a service on a company server?()A、Implement ACLs.B、Disable accounts for staff members who do not require server access.C、Implement anti-spam software on the server.D、Implement anti-virus software on the server.

A staff member reports that they cannot access the shared folder on the network; however, other staff members are reporting that they can access the shared folder. Which of the following is the BEST way to identify the problem?()A、The administrator should monitor all traffic between the staff member and the server.B、The administrator should reconfigure the RAID configuration to allow more space.C、The administrator should map a drive using the net use command.D、The administrator should allow the staff member to use a USB drive.

Which of the following is MOST likely the reason a technician would implement software RAID for a SOHO environment?()A、CPU efficiencyB、High availabilityC、High redundancyD、Cost effective

A customer who is reducing their technical staff has requested an Intel server proposal from various vendors. Which of the following is most relevant to this proposal?()A、Systems ManagementB、Grid ComputingC、Advanced Energy Manager (AEM)D、Remote KVM

All client computers on your company network run Windows 7 and are members of a Windows Server 2008 R2 domain. The RD department staff are local administrators on their computers and are members of the RD global security group. A new version of a business software application is available on the network. You plan to apply an AppLocker security policy to the RD group. You need to ensure that members of the RD group are not allowed to upgrade the software. What should you do?()A、Create an Audit only restriction based on the version of the software.B、Create an Audit only restriction based on the publisher of the software.C、Create an Enforce rule restriction based on the version of the software.D、Create an Enforce rule restriction based on the publisher of the software.

You have a server that runs Windows Server 2008. The server has the Web Server (IIS) server role installed.   The server contains a Web site that is configured to use only Windows Authentication. You have a security group named Group1 that contains several user accounts.  You need to prevent the members of Group1 from accessing a Web site. You must not prevent other users from accessing the Web site.  Which Web site feature should you configure?()A、AuthenticationB、Authorization RulesC、IIS Manager PermissionsD、SSL Settings

单选题Which is the MOST important consideration before making a change to a server?()AExplore the ramification of the change before implementation.BDetermine the service level agreement in place before implementation.CReview the equipment disposal procedures and policies before implementation.DNotify all staff members of the planned system outage before implementation.

单选题Which of the following is the MOST effective method to restrict staff members from accessing a service on a company server?()A Implement ACLs.B Disable accounts for staff members who do not require server access.C Implement anti-spam software on the server.D Implement anti-virus software on the server.

问答题Practice 5  ● The company you work for has decided to join a scheme in which members of staff exchange places for six months with people from other companies overseas.  ● The Chief Executive has asked you to suggest which members of staff should be the first to take part in this scheme and why.  ● Write your proposal for the Chief Executive:  ● suggesting which members of staff should be chosen and why they are suitable  ● describing what their current responsibilities are  ● explaining what these staff could learn from the exchange scheme  ● outlining the benefits to the company as a whole of its participation in the scheme.  ● Write 250~300 words on the separate answer paper provided.

单选题All client computers on your company network run Windows 7 and are members of a Windows Server 2008 R2 domain. The RD department staff are local administrators on their computers and are members of the RD global security group. A new version of a business software application is available on the network. You plan to apply an AppLocker security policy to the RD group. You need to ensure that members of the RD group are not allowed to upgrade the software. What should you do?()ACreate an Audit only restriction based on the version of the software.BCreate an Audit only restriction based on the publisher of the software.CCreate an Enforce rule restriction based on the version of the software.DCreate an Enforce rule restriction based on the publisher of the software.

单选题Which of the following groups should staff accounts be placed in, if the staff is required to perform most but not all maintenance tasks on a Windows PC?()APower UsersBUserCAdministratorDGuest

单选题An email server has been installed; however, the staff reports that they are unable to receive email from external email addresses, but they can email each other.  Which of the following is the MOST likely reason for this?()A The company firewall is blocking SMTP ports.B The DHCP server is misconfigured.C The DNS server is only resolving internal name spaces.D The email server should be configured to resolve names by IP addresses.

单选题Which of the following is the MOST effective method to restrict staff members from accessing a service on a company server?()AImplement ACLs.BDisable accounts for staff members who do not require server access.CImplement anti-spam software on the server.DImplement anti-virus software on the server.

单选题A staff member reports that they cannot access the shared folder on the network; however, other staff members are reporting that they can access the shared folder. Which of the following is the BEST way to identify the problem?()AThe administrator should monitor all traffic between the staff member and the server.BThe administrator should reconfigure the RAID configuration to allow more space.CThe administrator should map a drive using the net use command.DThe administrator should allow the staff member to use a USB drive.

单选题You have a server that runs Windows Server 2008. The server has the Web Server (IIS) server role installed.   The server contains a Web site that is configured to use only Windows Authentication. You have a security group named Group1 that contains several user accounts.  You need to prevent the members of Group1 from accessing a Web site. You must not prevent other users from accessing the Web site.  Which Web site feature should you configure?()AAuthenticationBAuthorization RulesCIIS Manager PermissionsDSSL Settings

单选题A customer who is reducing their technical staff has requested an Intel server proposal from various vendors.  Which of the following is most relevant to this proposal?()AGrid Computing BActive Energy ManagerCRemote KVM DSystems Management

单选题Which of the following is the MOST important consideration before making a change to a server?()AExplore the ramification of the change before implementation.BDetermine the service level agreement in place before implementation.CReview the equipment disposal procedures and policies before implementation.DNotify all staff members of the planned system outage before implementation.

单选题Which of the following is MOST likely the reason a technician would implement software RAID for a SOHO environment?()ACPU efficiencyBHigh availabilityCHigh redundancyDCost effective

单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The server hasthe Web Server (IIS) server role installed. The server contains a Web site that is configured to use onlyWindows Authentication. You have a security group named Group1 that contains several user accounts.Now you receive an order from the company management. According to the company requirement, youhave to prevent the members of Group1 from accessing a Web site. But you are not allowed prevent otherusers from accessing the Web site. Which Web site feature should you configure?()AYou should configure SSL SettingsBYou should configure AuthenticationCYou should configure Authorization RulesDYou should configure IIS Manager Permissions

单选题Which of the following is the MOST important consideration before making a change to a server?()A Explore the ramification of the change before implementation.B Determine the service level agreement in place before implementation.C Review the equipment disposal procedures and policies before implementation.D Notify all staff members of the planned system outage before implementation.