单选题You need to provide users in the research department access to different functions of the Web-based research application based on individual user roles. What should you do?()AUse Windows directory service mapper and enable Microsoft .NET Passport authenticationBCreate authorization rules and scopes by using Authorization ManagerCUse one-to-many client certificate mappingDDefine permissions by using access control lists (ACLs)

单选题
You need to provide users in the research department access to different functions of the Web-based research application based on individual user roles. What should you do?()
A

Use Windows directory service mapper and enable Microsoft .NET Passport authentication

B

Create authorization rules and scopes by using Authorization Manager

C

Use one-to-many client certificate mapping

D

Define permissions by using access control lists (ACLs)


参考解析

解析: 暂无解析

相关考题:

You are the administrator of a Windows 2000 network. You need to store secured files for your company's accounting and legal departments on a Windows 2000 Professional computer.You want to accomplish the following goals:1. Enable users in both departments to access their own files from the network2. Enable users in the accounting department to view the legal accounting department's documents3. Prevent users in the legal department from being able to view the accounting department's documents4. Enable managers within the company to access and modify both the accounting and the legal department's filesYou take the following actions:1. Create two shared folders named Accounting and Legal2. Create three groups named Accounting, Legal, and Management3. Allow the Accounting group modify permission on the Accounting folder4. Allow the Legal group modify permission on the Legal folders.5. Allow the Management group modify permission on both the Accounting and Legal folders.Which result or results do these actions produce? (Choose all that apply)A.Users in both departments can access to their own files from the network.B.Users in the accounting department can view the legal department's documents.C.Users in the legal department cannot view the accounting department's documents.D.Company managers can access and modify both departments' files.

What are two indicators that a customer should consider the installation of a Wireless LAN Controller? ()A、need one access pointB、want to provide unsecured wireless accessC、need between two and three access pointsD、want to provide employee wireless accessE、need more than four access pointsF、want to provide guest wireless access

What is the goal of the borderless network architecture?()A、to provide users with A single device that permits access to information anywhereB、to provide users with the same productivity and access to information no matter where are or which device they useC、to eliminate the need for border security and firewallsD、to provide companies with A way to extend their security and control over employees on the internet

What is the goal of the borderless network architecture?()A、to provide users withA single device that permits access to information anywhereB、to provide users with the same productivity and access to information no matter where are or which device they useC、to eliminate the need for border security and firewallsD、to provide companies withA way to extend their security and control over employees on the internet

You administer a Windows 2000 Professional desktop computer. TKPrinter1 is a printer used by the engineering and research departments. The printer is shared from the Windows 2000 Professional computer that you administer. The engineering department frequently prints documents that are several pages in length, which takes a long time to print. Users in the research department who have small files to print often must wait a long time for their jobs to print. You want to reduce the time it takes for the user in research department to print their files. You want to accomplish this with the least amount of administrative effort.  What should you do?()A、Monitor the print queue, and raise the priority of all the print jobs that are sent by users who are not members of the engineering department.B、Delete the old printer. Add a new printer, and set the priority to a higher value. Pause the print queue only when the engineering print jobs are printing.C、Configure the priority of TKPrinter1 to 50. Add a new printer, and set the priority to 1. For the new printer, deny Print permission for users in the engineering department.D、Configure the priority of TKPrinter1 to 50. Add a new printer, and set the priority to 70. For the new printer, deny Print permission for users in the engineering department.

You are the network administrator for Testking.com. The network consists of a single Active Directory domain named testking.com. The sales department is hiring employees. An OU named TestKingSales is created to hold objects for the new sales department users. Each sales department user has a portable computer. Each portable computer runs Windows XP Professional. The sales department users are responsible for joining their portable computers to the domain. You need to ensure that the computer accounts for the Sales department user's portable computers are created in the TestKingSales OU. You need to achieve this goal without granting any unnecessary permissions. What should you do?()A、Assign the sales department users the Allow - Read permissions for the Computer container.B、Configure the sales department users' user accounts to be trusted for delegationC、Prestage the computer accounts in the TestKingSales OU for the sales department users' portable computers.D、Assign the sales depertment users the Allow - Create all Child Objects permission for the TestKingSales OU.

Your network consists of Windows XP computers. All computers are joined to a single Active  Directory directory service domain and located in a single Active Directory site. You create a new Group  Policy object (GPO) and link it to the site. The policy configures default screensaver settings. User  accounts of users in the research department are located in an organizational unit (OU) named Research.  You need to allow users in the research department to configure a different screensaver setting on their  computers.  What should you do?()A、 Move the user accounts of users in the research department to the Users container.B、 Configure a local security policy on all computers in the research department to allow users to modify their screensaver settings.C、 Add users in the research department to a domain group. Allow the group the Apply Group Policy permission for the GPO.D、 Add users in the research department to a domain group. Deny the group the Apply Group Policy permission to the GPO.

You have an Exchange Server 2010 organization.  You plan to deploy a public folder access solution to meet the following requirements: .Users in the legal department must be able to send e-mail messages to public folders  .Users in the legal department must not be able to read documents in the public folders by using OutlookWeb App (OWA) You need to recommend changes to public folder access that meet the company requirements. What should you recommend?()A、mail-enabled public folders and Editor permissionsB、mail-enabled public folders and Contributor permissionsC、OWA segmentation and Reviewer permissionsD、OWA segmentation and Send As permissions

You need to provide users in the research department access to different functions of the Web-based research application based on individual user roles. What should you do?()A、Use Windows directory service mapper and enable Microsoft .NET Passport authenticationB、Create authorization rules and scopes by using Authorization ManagerC、Use one-to-many client certificate mappingD、Define permissions by using access control lists (ACLs)

You are the enterprise administrator for an Exchange Server 2010 organization. All users run Microsoft Office Outlook 2010.  You are designing a sharing solution for your organization and a partner organization. The partner organization also uses Exchange Server 2010.  You need to recommend a strategy for sharing information with the partner organization to meet thefollowing requirements: .Provide cross-organizational access to user contacts  .Provide cross-organizational access to free/busy information What should you recommend?()A、Creating cross-forest trustsB、Implementing Federated SharingC、Implementing Microsoft Identify Lifecycle Manager (ILM) 2007D、Running the Microsoft Exchange Inter-Organization Replication tool

You are the network administrator for Among other duties you administer a Windows 2003 server named TestKingB. You install Terminal Services on TestKingB. You add users from the TestKing support department to the Power Users group and to the Remote Desktop Users group on TestKingB. You notice that TestKingB is periodically unavailable. You open Event Viewer on TestKingB and discover that the server was restarted accidentally by users in the TestKing support department. You need to ensure that users in the TestKing support department can establish a Terminal Services session and can manage local user accounts on TestKingB. However, they should not have the ability to restart TestKingB. Which action or actions should you perform? Select all that apply.()A、Remove the TestKing Support department user accounts from the Power Users group.B、Remove the TestKing Support department user accounts from the Remote Desktop Users group.C、Remove the Power Users group from the Shut down the system user right.D、Add the Power Users group to the Deny log on locally user right.E、Modify the permission on the RDP-Tcp connection by using Terminal Services Configuration. Assign the Power Users group the Deny - Full Control permission

You are the network administrator for ExamSheet.  Computers on your network run Windows 2000 Professional, Windows NT Workstation 4.0 and Windows 98. Ten Windows 2000 Professional computers are located in the research department. These computers contain highly confidential information. You want the 10 Windows 2000 Professional computers to be able to communicate only with other Windows 2000 computers.  What should you do?()A、On the research computers use the Local Computer Policy to disable theAccess this computer  from the networkoption.B、Use Security Configuration and Analysis to apply the Highly Secure security template to the research computers.C、Add the users of the research computers to the Power Users group on each computer.D、On the research computers configure the security settings to prevent anonymous access.

You are the network administrator for ExamSheet.net. You administer ExamSheet’s Windows 2000 network. Computers on the network run Windows 2000 Professional, Windows NT Workstation 4.0 and Windows 98. Ten Windows 2000 Professional computers are located in the research department. The users of the Windows 2000 Professional computers run legacy applications which are not certified for Windows 2000. These applications will not run for those users who only have User rights on the computers. You want to uniformly grant the users of these computers with the least possible administrative rights and still allow them to run the applications. What should you do? ()A、On the research computers user the Local Computer Policy to disable theAccess this computer  from the networkoption.B、Apply the Compatws.inf security template to the research computers.C、Apply the Hisecws.inf security template to the research computers.D、On the research computers configure the computer default security settings to prevent anonymous access.

Which result or results do these actions produce?()A、Users in both departments can access their files from the network.B、Users in the accounting department can view the legal department’s documents.C、Users in the legal department cannot view the accounting department’s documents.D、Company managers can access and modify both departments’ files.

You have an Exchange Server 2010 organization.  You need to recommend a mailbox storage management solution for your organization to meet thefollowing requirements: .Apply quota limits for users by department.Automatically apply quota limits for new users What should you recommend?()A、A storage group for each department.B、A mailbox database for each department.C、An organizational unit for each department.D、A managed folder mailbox policy for each department.

Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2008 R2. All domain controllers run Windows Server 2008 R2.   A corporate policy requires that the users from the research department have higher levels of account and password security than other users in the domain.   You need to recommend a solution that meets the requirements of the corporate policy. Your solution must minimize hardware and software costs. What should you recommend?()A、Create a new Active Directory site. Deploy a Group Policy object (GPO) to the site.B、Create a new Password Settings Object (PSO) for the research department’s usersC、Create a new organizational unit (OU) named Research in the existing domain. Deploy a Group Policy object (GPO) to the Research OU.D、Create a new domain in the forest.Add the research department’s user accounts to the new domain.Configure a new security policy in the new domain.

You are the administrator of a Windows 2000 network. You need to store secured files for your company’s Accounting and Legal departments on a Windows 2000 Professional computer. You want to accomplish the following goals:  • Enable users in both departments to access their own files from the network  • Enable users in the Accounting department to view the Legal department’s documents  • Prevent users in the Legal department from being able to view the Accounting department’s    documents  • Enable managers within the company to access and modify both the Accounting and the Legal   department’s files You take the following actions:   • Create two shared folders named Accounting and Legal  • Create three groups named Accounting, Legal, and Management  • Allow the Accounting group Modify permission on the Accounting folder  • Allow the Accounting group Read permissions on the Legal folders.  • Allow the Management group Modify permission on both the Accounting and Legal folders.   Which result or results do these actions produce?()A、Users in both departments can access to their own files from the network.B、Users in the Accounting department can view the Legal department’s documents.C、Users in the Legal department cannot view the Accounting department’s documents.D、Company managers can access and modify both departments’ files.

You have a server that runs Windows Server 2008. The server has the Terminal Services Gateway (TS Gateway) role service installed.  You need to provide a security group access to the TS Gateway server. What should you do?()A、Add the security group to the Remote Desktop Users group.B、Add the security group to the TS Web Access Computers group.C、Create and configure a Resource Authorization Policy.D、Create and configure a Connection Authorization Policy.

You are the desktop administrator for your company. All users in the network have Windows XP Professional computers. Users in the research department have dual-processor computers. Users in the research department report that when they run 16-bit Windows programs, their computer performance becomes very slow. You use System Monitor to monitor the users’ computers. You discover that when the users are running their 16-bit applications, one processor shows a sustained utilization of more than 90 percent while the other processor only shows utilization of less than 10 percent. You need to improve application performance for the users in the research department. What should you do?()A、Configure each application to run in a separate memory space.B、Configure each application to run in AboveNormal priority class.C、For each application, set the compatibility mode to Windows 95.  D、Configure processor affinity for each application to allow it to run on both processors.

单选题What is the goal of the borderless network architecture?()Ato provide users withA single device that permits access to information anywhereBto provide users with the same productivity and access to information no matter where are or which device they useCto eliminate the need for border security and firewallsDto provide companies withA way to extend their security and control over employees on the internet

单选题You have an Exchange Server 2010 organization.  You need to recommend a mailbox storage management solution for your organization to meet thefollowing requirements: .Apply quota limits for users by department.Automatically apply quota limits for new users What should you recommend?()AA storage group for each department.BA mailbox database for each department.CAn organizational unit for each department.DA managed folder mailbox policy for each department.

多选题You are the senior systems engineer for your company. The network consists of a single Active Directory domain.  All servers run Windows Server 2003. Client computers in the sales department run Windows NT Workstation 4.0 with the Active Directory Client Extensions software installed. All other client computers run Windows XP Professional. All servers are located in an organizational unit (OU) named Servers. All client computers are located in an OU named Desktops.   Four servers contain confidential company information that is used by users in either the finance department or the research department. Users in the sales department also store files and applications on these servers. The company’s written security policy states that for auditing purposes, all network connections to these resources must require authentication at the protocol level. The written security policy also states that all network connections to these resources must be encrypted. The company budget does not allow for the purchase of any new hardware or software. The applications and data located on these servers may not be moved to any other server in the network.   You define and assign the appropriate permissions to ensure that only authorized users can access the resources on the servers.   You now need to ensure that all connections made to these servers by the users in the finance department and in the research department meet the security guidelines stated by the written security policy. You also need to ensure that all users in the sales department can continue to access their resources.   Which two actions should you take?()ACreate a new Group Policy object (GPO) and link it to the Servers OU. Enable the Secure Server (Require Security) IPSec policy in the GPO.BCreate a new Group Policy object (GPO) and link it to the Servers OU. Enable the Server (Request Security) IPSec policy in the GPO.CCreate a new Group Policy object (GPO) and link it to the Desktops OU. Enable the Client (Respond only) IPSec policy in the GPO.DCreate a new Group Policy object (GPO). Edit the GPO to enable the Registry Policy Processing option and the IP Security Policy Processing option. Copy the GPO files to the Netlogon shared folder.EUse System Policy Editor to open the System.adm file and enable the Registry Policy Processing option and the IP Security Policy Processing option. Save the system policy as NTConfig.pol.

多选题You are the administrator of a Windows 2000 network. You need to store secured files for your company’s Accounting and Legal departments on a Windows 2000 Professional computer. You want to accomplish the following goals:  • Enable users in both departments to access their own files from the network  • Enable users in the Accounting department to view the Legal department’s documents  • Prevent users in the Legal department from being able to view the Accounting department’s    documents  • Enable managers within the company to access and modify both the Accounting and the Legal   department’s files You take the following actions:   • Create two shared folders named Accounting and Legal  • Create three groups named Accounting, Legal, and Management  • Allow the Accounting group Modify permission on the Accounting folder  • Allow the Accounting group Read permissions on the Legal folders.  • Allow the Management group Modify permission on both the Accounting and Legal folders.   Which result or results do these actions produce?()AUsers in both departments can access to their own files from the network.BUsers in the Accounting department can view the Legal department’s documents.CUsers in the Legal department cannot view the Accounting department’s documents.DCompany managers can access and modify both departments’ files.

单选题You need to recommend an access solution for the users in the sales department that meets the  museum's technical requirements.    What should you include in the recommendation?()ABranchCache in Distributed Cache modeBBranchCache in Hosted Cache modeCoffline filesDtransparent caching

单选题You deploy your companys Internet Web site. You need to deny anonymous access to the Web site, allowing only authenticated users. Which code segment should you use?()Aauthorization allow users=?/ /authorizationBauthorization deny users=?/ /authorizationCauthorization deny users=*//authorizationDauthorization allow users=*/ /authorization

单选题What is the goal of the borderless network architecture?()Ato provide users with A single device that permits access to information anywhereBto provide users with the same productivity and access to information no matter where are or which device they useCto eliminate the need for border security and firewallsDto provide companies with A way to extend their security and control over employees on the internet