单选题You need to design a security solution for the internally developed Web applications that meets business requirements. What should you do?()AInstall and configure a stand-alone root certification authorative (CA) that is trusted by all company client computers. Issue encryption certificates to all developersBInstall and configure root certification authority (CA) that is trusted by all company client computers. Issue code-signing certificates to all developersCPurchase a root certification from a trusted commercial certification authority (CA). Install the root certificated on all developers’ computersDPurchase a code-signing certificate from a trusted commercial certification authority (CA). Install the certificate on all company client computers

单选题
You need to design a security solution for the internally developed Web applications that meets business requirements. What should you do?()
A

Install and configure a stand-alone root certification authorative (CA) that is trusted by all company client computers. Issue encryption certificates to all developers

B

Install and configure root certification authority (CA) that is trusted by all company client computers. Issue code-signing certificates to all developers

C

Purchase a root certification from a trusted commercial certification authority (CA). Install the root certificated on all developers’ computers

D

Purchase a code-signing certificate from a trusted commercial certification authority (CA). Install the certificate on all company client computers


参考解析

解析: 暂无解析

相关考题:

You are the domain administrator for TestKing‘s Active Directory domain named All client computers run Windows XP Professional.You need to implement a solution for managing security updates on client computers. You plan to use a Windows Server 2003 computer to manage security updates. Your solution for managing security updates must meet the following requirements:1. You must not purchase additional software or licences.2. Security updates must be installed automatically.3. You must be able to control which updates are available to install.4. Security updates must synchronize automatically with the latest updates offered by Microsoft.You need to implement a solution for managing security updates that meets the requirements.What should you do?()A. Publish the security updates by using a Group Policy object (GPO). Assign the GPO to the client computers that require updatesB. Install Software Update Services (SUS). Configure the SUS software to synchronize daily with Microsoft. Use Group Policy to configure the appropriate Windows Update settings on the client computers.C. Install Microsoft Internet Security and Acceleration (ISA) Server on a Windows Server 2003 computer.D. Create a process to run Windows Update on all client computers.

When creating a network security solution, which two pieces of information should you have previously obtained to assist in designing the solution? ()A、a list of existing network applications currently in use on the networkB、network audit results to uncover any potential security holesC、a planned Layer 2 design solutionD、a proof-of-concept planE、device configuration templates

You need to design the retrieval of advertising statistics without compromising security. What should you do?()A、Design a Notification Services solution that sends the advertising statistics to specified subscribers by e-mail.B、Design a SQL Server Web service that runs a stored procedure to return the statistics on a call from the advertisers application.C、Design a Database Mail solution that sends the advertising statistics to e-mail addresses that are specified in a table.D、Design a stored procedure to return the statistics on a call from the advertisers application.E、Design a user-defined function to return the statistics on a call from the advertisers application.

You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()A、IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsB、a list of the customer requirementsC、detailed security device specificationsD、results from pilot network testing

You need to design a method to standardize and deploy a baseline security configuration for servers. You solution must meet business requirements. What should you do?()A、Create a script that installs the Hisecdc.inf security templateB、Use a GPO to distribute and apply the Hisec.inf security templateC、Use the System Policy Editor to configure each server’s security settingsD、Use a GPO to distribute and apply a custom security template

You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()A、Require client computers to connect to the marketing application by using a VPN connectionB、Use IPSec to encrypt communications between the servers in the New York and Atlanta officesC、Require the high security setting on Terminal Services connections to the marketing applicationD、Configure all marketing application Web pages to require SSL

You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()A、Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access pointB、Configure IEEE 802.1x authentication with smart cardsC、Configure the wireless network to use Wired Equivalent Privacy (WEP)D、Install and configure an Internet Authentication Service (IAS) server

You have an Exchange Server 2010 organization.  You have a global security group named Legal that contains all the members of your companys legaldepartment.  The companys security policy states that the Legal group must be able to search all mailboxes for e-mailmessages that contain specific keywords.  You need to recommend a solution for the organization that complies with the security policy.  What should you include in the solution?()A、a Discovery Management role groupB、a legal holdC、administrator audit loggingD、Mailbox journaling

You need to recommend a solution for configuring the Automatic Updates settings on the VMs.   What should you include in the recommendation?()A、block inheritanceB、loopback processingC、security filteringD、WMI filtering

You have an Exchange Server 2010 organization.  Your companys security policy states that users must not be able to encrypt e-mail messages by usingOutlook Web App (OWA).  You need to recommend a client access solution that meets the requirements of the security policy.  What should you include in the solution?()A、managed folder mailbox policiesB、multiple OWA virtual directoriesC、OWA segmentationD、WebReady Document Viewing

You need to design a remote administration solution for servers on the internal network. Your solution must meet business and security requirements. What should you do?()A、Permit administrators to use an HTTP interface to manage servers remotelyB、Permit only administrators to connect to the servers’ Telnet serviceC、Permit administrators to manage the servers by using Microsoft NetMeetingD、Require administrators to use Remote Desktop for Administration connections to manage the servers

You need to recommend a solution for managing the service accounts for SQL1 and SQL2. The  solution must meet the company’s security requirements. What should you include in the recommendation?()A、a custom password filterB、a Password Settings object (PSO)C、managed service accountsD、manual password changes

单选题What action should you be prepared to take when verifying a security solution?()Ahaving alternative addressing and VLAN schemesBhaving a rollback plan in case of unwanted or unexpected resultsCrunning a test script against all possible security threats to insure that the solution will mitigate all potential threatsDisolating and testing each security domain individually to insure that the security design will meet overall requirements when placed into production as an entire system

单选题You need to design a patch management strategy for Southbridge Video. Your solution must meet business requirements. What should you do?()AConfigure all client computers to use Automatic Updates to obtain security patches from the Windows Update Web site. Test and install all patchesBConfigure a batch file to download security patches daily. Distribute the security patches by using a.zap file and the Default Domain Policy Group Policy object (GPO)CDeploy a Software Update Services (SUS) server. Test all security patches and then approve them. Configure all client computers to automatically obtain updates from the serverDConfigure a batch file to download security patches daily. Manually install the security patches on all computers

单选题You need to design a security solution for the internally developed Web applications that meets business requirements. What should you do?()AInstall and configure a stand-alone root certification authorative (CA) that is trusted by all company client computers. Issue encryption certificates to all developersBInstall and configure root certification authority (CA) that is trusted by all company client computers. Issue code-signing certificates to all developersCPurchase a root certification from a trusted commercial certification authority (CA). Install the root certificated on all developers’ computersDPurchase a code-signing certificate from a trusted commercial certification authority (CA). Install the certificate on all company client computers

单选题You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()Aa list of applications currently in use in the networkBIP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsCdetailed security device specificationsDresults from pilot network testing

单选题You need to recommend an administrative solution for the local support technicians in the satellite offices. The solution must meet the companys security requirements.What should you include in the recommendation?()AActive Directory delegationBAdministrator Role SeparationCmanaged service accountsDRestricted Groups

单选题You have an Exchange Server 2010 organization.  You plan to delegate Exchange administrative rights to some users in the organization.  You need to recommend a solution that tracks all changes made to the Exchange organization.  What should you include in the solution?()Aadministrator audit loggingBcircular loggingCdiagnostic loggingDWindows Security Auditing

单选题You need to recommend a solution for managing the service accounts for SQL1 and SQL2. The  solution must meet the company’s security requirements. What should you include in the recommendation?()Aa custom password filterBa Password Settings object (PSO)Cmanaged service accountsDmanual password changes

单选题You need to recommend a solution for managing the address information of the user accounts. The solution must meet the company’s security requirements. What should you include in the recommendation?()AActive Directory delegationBAuthorization ManagerCbuilt-in security groupsDuser rights assignments

单选题You need to design a security solution for WEB1. Your solution must address the chief information officer’s concerns. What should you do?()AEnable Web distributed Authoring and Versioning (WebDAV) components on WEB1BInstall and configure the URLScan ISAPI filter on WEB1CInstall a computer certificate on WEB1, and enable the Server (Request Security) IPSec policy on WEB1DConfigure the Web site redirection option on the properties of WEB1 in the Internet Service Manager console

单选题You need to recommend a solution that enables User1 to perform the required actions on the Hyper-V server.What should you include in the recommendation?()AActive Directory delegationBAuthorization Manager role assignmentClocal security groups on the Hyper-V serverDlocal security groups on the VMs

多选题When creating a network security solution, which two pieces of information should you have previously obtained to assist in designing the solution? ()Aa list of existing network applications currently in use on the networkBnetwork audit results to uncover any potential security holesCa planned Layer 2 design solutionDa proof-of-concept planEdevice configuration templates