单选题You need to design an access control solution for customer information. Your solution must meet security requirements.What should you do?()AConfigure the Web site to require SSL connections. Configure the Web site to require client certificates. Enable and configure client certificate mapping on the Web siteBConfigure the Web site to require SSL connections. Disable anonymous access to the Web site.Assign the Allow – Read  permission to the customer user accounts for the folder that contains the Web site filesCConfigure the Web site to use only Microsoft .NET Passport authentication. Specify the den.corp.woodgrovebank.com domain as the default domain for .NET Passport authentication.Configure a custom local IPSec policy on the Web servers to require IPSec communicationsDConfigure the Web site to use only Windows Integrated authentication. Configure a custom local IPSec policy on the Web servers to require IPSec communications. Configure the IPSec policy to use certificate-based authentication and encryption

单选题
You need to design an access control solution for customer information. Your solution must meet security requirements.What should you do?()
A

Configure the Web site to require SSL connections. Configure the Web site to require client certificates. Enable and configure client certificate mapping on the Web site

B

Configure the Web site to require SSL connections. Disable anonymous access to the Web site.Assign the Allow – Read  permission to the customer user accounts for the folder that contains the Web site files

C

Configure the Web site to use only Microsoft .NET Passport authentication. Specify the den.corp.woodgrovebank.com domain as the default domain for .NET Passport authentication.Configure a custom local IPSec policy on the Web servers to require IPSec communications

D

Configure the Web site to use only Windows Integrated authentication. Configure a custom local IPSec policy on the Web servers to require IPSec communications. Configure the IPSec policy to use certificate-based authentication and encryption


参考解析

解析: 暂无解析

相关考题:

You are developing a Windows Presentation Foundation (WPF) application for a travel reservation systemYou need to ensure that users can select a range of travel dates.What should you do ?() A. Add single DatePicker control to the design surfaceB. Add single Calendar control to the design surfaceC. Add single MediaElement control to the design surface to display a calendarD. Add the appropriate Windows Forms references to the project references. Add a single Windows Forms DateTimePicker control to the design surface

What is one reason you might recommend a solution using only autonomous access points to a customer? ()A、 The customer requires Layer 3 roaming.B、 The customer requires immediate wire line integration with a catalyst 6500 switch.C、 The customer needs an outdoor-ready access point.D、 The customer wants the option to migrate to LWAPP.

Upon announcement,the specific details surrounding the Virtual I/O Server requirements and performance are still being defined.  The customer has engaged IBM to provide a server consolidation solution and would like to take advantage of the VIO Server benefits. How should the pSeries technical specialist best address this?()A、Design the solution and present it confidently so the customer does not question it.B、Design the solution and ensure the customer understands the unknowns with the new technology.C、Explain to the customer that the VIO Server does not benefit them when doing server consolidation so it has not been configured.D、Explain to the customer that the details surrounding the VIO Server have not been clearly defined so designing a solution is premature.

A customer is interested in obtaining an AIX solution from IBM.  They have two primary global requirements:   ? Availability (although HACMP is not required)   ? Low cost   Which of the following approaches should the pSeries technical specialist use to meet the customer’s requirements and ensure customer satisfaction?()A、Design the least-cost solution to prevent the competition from winning the business.B、Design a disaster recovery (DR) solution and convince the customer why DR is important to their business.C、Use the HACMP specialist to design the solution and include HA SmoothStart services as part of the proposal.D、Design a solution with redundant parts and explain to the customer the incremental cost associated with the redundancy.

You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()A、Require client computers to connect to the marketing application by using a VPN connectionB、Use IPSec to encrypt communications between the servers in the New York and Atlanta officesC、Require the high security setting on Terminal Services connections to the marketing applicationD、Configure all marketing application Web pages to require SSL

You need to design a remote access solution for the mobile sales users in the litwareinc.com domain. Which two actions should you perform?()A、Configure autoenrollment for user certificates and computer certificatesB、Configure Web enrollment for user certificates and computer certificatesC、Configure a Certificate Services hierarchy in the litwareinc.com domainD、Configure qualified subordination between the litwareinc.com and the contoso.com domainsE、Configure PEAP authentication on the remote access servers

You need to design a PKI that meets business requirements. What should you do?()A、Move ATLCA1 offline and create an enterprise subordinate CA to issue certificatesB、Create a stand-alone subordinate CA to issue certificatesC、Use a qualified subordinate CAD、Configure certificate template access control lists (ACLs) on ATLCA1

You need to design an access control solution for customer information. Your solution must meet security requirements.What should you do?()A、Configure the Web site to require SSL connections. Configure the Web site to require client certificates. Enable and configure client certificate mapping on the Web siteB、Configure the Web site to require SSL connections. Disable anonymous access to the Web site.Assign the Allow – Read  permission to the customer user accounts for the folder that contains the Web site filesC、Configure the Web site to use only Microsoft .NET Passport authentication. Specify the den.corp.woodgrovebank.com domain as the default domain for .NET Passport authentication.Configure a custom local IPSec policy on the Web servers to require IPSec communicationsD、Configure the Web site to use only Windows Integrated authentication. Configure a custom local IPSec policy on the Web servers to require IPSec communications. Configure the IPSec policy to use certificate-based authentication and encryption

You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()A、Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access pointB、Configure IEEE 802.1x authentication with smart cardsC、Configure the wireless network to use Wired Equivalent Privacy (WEP)D、Install and configure an Internet Authentication Service (IAS) server

You are developing a Windows Forms Application by using the .NET Framework 3.5.You plan to design a composite custom control for the application. You include a ListBox control has a property that provides the item count of  the ListBox control. You need to ensure that the property cannot be accessed at design time. Which attribute should you use?()A、[Bindable(false)]B、[DesignOnly(false)]C、[EditorBrowsable(EditorBrowsableState.Never)]D、[Browsable(false)]

You are developing a Windows Presentation Foundation (WPF) application for a travel reservation system You need to ensure that users can select a range of travel dates. What should you do ?()A、Add single DatePicker control to the design surfaceB、Add single Calendar control to the design surfaceC、Add single MediaElement control to the design surface to display a calendarD、Add the appropriate Windows Forms references to the project references. Add a single Windows Forms DateTimePicker control to the design surface

You have an Exchange Server 2010 organization.  The organization contains a global security group named Group1.  You plan to deploy a monitoring solution for the Exchange servers in your organization.  You need to recommend a solution that allows members of Group1 to monitor the performance ofExchange Server 2010 servers.  Your solution must prevent members of Group1 from modifying the configurations of the ExchangesServer 2010 organization.  What should you include in the solution?()A、Delegation of Control WizardB、Federation TrustsC、Reliability MonitorD、Role Based Access Control (RBAC)

Your network contains an Exchange Server 2010 server.  You need to plan a mailbox sharing solution for the organization to meets the following requirements: .Ensure that assistants can read and modify the e-mail messages of their managers .Ensure that assistants can impersonate their managers when they send e-mail messages  What should you include in the plan?()A、Full Access and Send As permissionsB、Full Access and send on behalf of permissionsC、Role Based Access Control (RBAC) assignments and Send As permissionsD、Role Based Access Control (RBAC) assignments and send on behalf of permissions

You design a SQL Server 2008 Reporting Services (SSRS) solution. You create a report by using Microsoft Visual Studio .NET 2008. The report contains the following components: A dataset named Customer that lists all active customers and their details. The dataset accepts no parameters. A dataset named SalesHistory that lists all sales transactions for a specified time period and accepts year and month as parameters. You need to ensure that a summary of sales transactions is displayed for each customer after the customer details. Which component should you add to the report? ()A、 ListB、 TableC、 MatrixD、 Subreport

You need to design a hosting service option for customers who want to access their databases by using their own Active Directory domain accounts. What should you do?()A、Design a hosting service option that duplicates each customer’s domain user account as SQL Serverlogin account.B、Design a hosting service option that provides VPN-based connectivity from each customer’s network tothe SQL Server computer that hosts that customer’s daabase or databases.C、Design a hosting service option that provides a dedicated server to each customer.Join that server to that customer’s Active Directory domainD、Design a hosting service option that configures a unique instance of SQL Server 2005 for each customer.Configure that instance to use Integrated Windows authentication.

You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()A、Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computersB、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersC、Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersD、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers

单选题You need to design a security strategy for a remote e-mail access. What should you do?()ARequire remote users to access e-mails by using Outlook Mobile AccessBRequire Outlook Web Access users to install the secure MIME ActiveX-Control and to encrypt all messagesCOn Outlook Web Access servers that accept connections from the Internet configure IIS to require SSL for all connectionsDOn Outlook Web Access servers that accept connections from the Internet configure IIS to require Integrated Windows Authentication

单选题You design a SQL Server 2008 Reporting Services (SSRS) solution. You create a report by using Microsoft Visual Studio .NET 2008. The report contains the following components: A dataset named Customer that lists all active customers and their details. The dataset accepts no parameters. A dataset named SalesHistory that lists all sales transactions for a specified time period and accepts year and month as parameters. You need to ensure that a summary of sales transactions is displayed for each customer after the customer details. Which component should you add to the report? ()A ListB TableC MatrixD Subreport

单选题You are developing a Windows Presentation Foundation (WPF) application.You need to display HTML content from a Web page on the WPF form. What should you do?()AAdd a FlowDocumentReader control to the design surface. Then create a FlowDocument control.BAdd a DocumentViewer control to the design surface. Then create a FixedDocument control.CAdd a WebBrowser control to the design surface. Then use the Navigate method to navigate the URI object.DAdd a ContentControl control to the design surface. Then reference a WebClient object to return an HTML string.

单选题You are developing a Windows Forms Application by using the .NET Framework 3.5.You plan to design a composite custom control for the application. You include a ListBox control has a property that provides the item count of  the ListBox control. You need to ensure that the property cannot be accessed at design time. Which attribute should you use?()A[Bindable(false)]B[DesignOnly(false)]C[EditorBrowsable(EditorBrowsableState.Never)]D[Browsable(false)]

多选题As the Company wireless administrator, you required to be knowledgeable about the wireless LAN  components.  Which two statements about these components are true? ()AIn the autonomous access point solution, control is provided by the WLAN controller.BIn the lightweight access point solution, WLAN management is provided by the WLAN Control  System (WCS).CIn the autonomous access point solution, control is provided by the WDS (Wireless Domain  Services).DCisco Aironet autonomous access points cannot be supported by the Cisco Unified Wireless  Network.EIi the lightweight access point solution, WLAN management is provided by the WLAN Solution  Engine (WLSE).FCisco Aironet lightweight access points cannot be supported by the Cisco Unified Wireless  Network.

单选题You are developing a Windows Presentation Foundation (WPF) application. You need to display HTML content from a Web Page on the WPF form. What should you do?()AAdd a FlowDocumentReader control to the design surface. Then create a FlowDocument control.BAdd a ContentControl control to the design surface. The reference a WebClient object to return an HTML string.CAdd a DocumentViewer control to the design surface. The create a FixedDocument control.

单选题What is one reason you might recommend a solution using only autonomous access points to a customer? ()A The customer requires Layer 3 roaming.B The customer requires immediate wire line integration with a catalyst 6500 switch.C The customer needs an outdoor-ready access point.D The customer wants the option to migrate to LWAPP.

单选题You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()AConfigure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addressesBConfigure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points useCCreate a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networksDCreate a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks

单选题What is the correct stage in the sales process for a Pre-Sales Technical  Delivery Assessment (TDA)? ()ABefore the first solution design meeting with the customerBAfter the solution design proposal is submitted to manufacturing for reviewCOnce the customer has supplied the solution design specifications to the sales teamDAfter the solution design is completed and before the proposal is submitted to the customer