单选题You are designing a security strategy for the public Web server. You solution must address the chief security officer’s concerns. What should you do?()AInstall a Web server certificate on WEB1BEnable Internet Connection Firewalll (ICF) on WEB1CConfigure IIS on WEB1 to operate in IIS 5.0 isolation modeDInstall and configure the URLScan ISAPI filer on WEB1
单选题
You are designing a security strategy for the public Web server. You solution must address the chief security officer’s concerns. What should you do?()
A
Install a Web server certificate on WEB1
B
Enable Internet Connection Firewalll (ICF) on WEB1
C
Configure IIS on WEB1 to operate in IIS 5.0 isolation mode
D
Install and configure the URLScan ISAPI filer on WEB1
参考解析
解析:
暂无解析
相关考题:
You are designing a strategy to ensure that all employees have Internet access. For each branch office, what should you do?()A、 Configure a DNS server to function as caching-only serversB、 Configure Internet Connection sharing on terminal servers.C、 Install and configure an Internet Security and Acceleration (ISA) Server ComputerD、 Install and configure a server running Routing and Remote Acess to function as a VPN server
You are designing a strategy to allow users to have remote access to internal resources. Which service or services should you allow on the public interface of the NAT Server?()A、HTTPB、LDAPC、POP3D、SMTPE、VPN Gateway
You are designing the NetBIOS domain naming strategy for the company. Which NetBIOS domain name or names should you use?()A、eastB、westC、quebecD、newyorkE、northamericaF、wideworldimporters
You are designing an IP addressing strategy for your VPN solution. How many public addresses should you use?()A、1B、25C、50D、255
You are designing a strategy to meet the security and financial requirements related to the Manifest application. What should you do? ()A、 Configure a VPN server in Sydney.B、 Configure a VPN server in each branch office.C、 Configure a dial-up server in SydneyD、 Configure a dial-up server in each branch office.
Your company named Contoso, Ltd. has a Web server named WEB1. The Web server runs Windows Server 2008. The fully qualified domain name of WEB1 is web1.contoso.com. The public DNS server has an alias record named owa.contoso.com that maps to web1.contoso.com. Users access WEB1 from the Internet by using http://owa.contoso.com. The new company security policy states that the owa.contoso.com site must be available for Internet users only through secure HTTP (HTTPS) protocol. The security policy also states that users must not get security warnings when they connect to the site. You need to request a certificate from a public certification authority (CA). Which Common Name should you use?()A、Contoso, Ltd.B、owa.contoso.comC、WEB1D、web1.contoso.com
You are designing a strategy to perform inplace upgrade of domain controller in Boston and San Diego. Which method should you use?()A、adprepB、sysprepC、Answer FileD、Remote Installtion Services (RIS)
You are designing an access control strategy for WEB2. Your solution must meet business requirements. What should you do?()A、Install the Terminal Services Advanced Client Web client on WEB2B、Modify the Winreg registry key on WEB2C、Install the RPC over HTTP service on WEB2D、Modify the RestrictAnonymous registry key on WEB2
You are designing a security strategy for the public Web server. You solution must address the chief security officer’s concerns. What should you do?()A、Install a Web server certificate on WEB1B、Enable Internet Connection Firewalll (ICF) on WEB1C、Configure IIS on WEB1 to operate in IIS 5.0 isolation modeD、Install and configure the URLScan ISAPI filer on WEB1
You need to recommend a security strategy for WebApp2 that meets the company’s applicaton requirements.What should you include in the recommendation?()A、Basic authentication and connection security rulesB、Basic authentication and SSLC、Digest authentication and connection security rulesD、Digest authentication and SSL
Your environment includes multiple Windows Server 2008 R2 Hyper-V servers. You are designing an administrative strategy for virtual machines (VMs). You need to ensure that members of the Security Compliance Active Directory Domain Services (AD DS) security group can monitor failed logon events on the VMs. What should you do?()A、Add the Security Compliance group to the local administrators group of each VMB、Add the Security Compliance group to the local administrators group of each Hyper-V serverC、In the InitialStore.xml file of each VM, define an access policy for the Security Compliance groupD、in the InitialStore.xml file of each Hyper-V server, define an access policy for the Security Compliance group
单选题Your company named Contoso, Ltd. has a Web server named WEB1. The Web server runs Windows Server 2008. The fully qualified domain name of WEB1 is web1.contoso.com. The public DNS server has an alias record named owa.contoso.com that maps to web1.contoso.com. Users access WEB1 from the Internet by using http://owa.contoso.com. The new company security policy states that the owa.contoso.com site must be available for Internet users only through secure HTTP (HTTPS) protocol. The security policy also states that users must not get security warnings when they connect to the site. You need to request a certificate from a public certification authority (CA). Which Common Name should you use?()AContoso, Ltd.Bowa.contoso.comCWEB1Dweb1.contoso.com
单选题You are designing a strategy to meet the security and financial requirements related to the Manifest application. What should you do? ()A Configure a VPN server in Sydney.B Configure a VPN server in each branch office.C Configure a dial-up server in SydneyD Configure a dial-up server in each branch office.
单选题You are designing a strategy to ensure that all employees have Internet access. For each branch office, what should you do?()AConfigure a DNS server to function as caching-only servers.BConfigure Internet Connection sharing on terminal servers.CInstall and configure an Internet Security and Acceleration (ISA) Server Computer.DInstall and configure a server running Routing and Remote Acess to function as a VPN server.
单选题You are designing a strategy to allow users to have remote access to internal resources. Which service or services should you allow on the public interface of the NAT Server?()AHTTPBLDAPCPOP3DSMTPEVPN Gateway
单选题You are designing a new NETBIOS naming strategy for the corporate environment. Which domain name should you use?()A adB woodgroveadC woodgrovebankD woodgrovebank.com
单选题Your environment includes multiple Windows Server 2008 R2 Hyper-V servers. You are designing an administrative strategy for virtual machines (VMs). You need to ensure that members of the Security Compliance Active Directory Domain Services (AD DS) security group can monitor failed logon events on the VMs. What should you do?()AAdd the Security Compliance group to the local administrators group of each VMBAdd the Security Compliance group to the local administrators group of each Hyper-V serverCIn the InitialStore.xml file of each VM, define an access policy for the Security Compliance groupDin the InitialStore.xml file of each Hyper-V server, define an access policy for the Security Compliance group
单选题You are designing a strategy to allow users to have remote access to internal resources. Which service or services should you allow on the public interface of the NAT Server?()A HTTPB LDAPC POP3D SMTPE VPN Gateway
单选题You are designing a DNS implementing strategy to meet the business and technical requirement. Which type of zone should you use?()ASub ZonesBStandard Primary ZonesCSecondary ZonesDActive DirectoryIntegrated Zones
多选题You are designing the NetBIOS domain naming strategy for the company. Which NetBIOS domain name or names should you use?()AeastBwestCquebecDnewyorkEnorthamericaFwideworldimporters
单选题You are designing an IP addressing strategy for your VPN solution. How many public addresses should you use?()A1B25C50D255
多选题You are designing a security strategy for the infrastructure servers at the resorts.Which two actions should you perform?(Each correct answer presents part of the solution. Choose two)()APlace all infrastructure servers in subnets that cannot exchange information with the InternetBEstablish a custom security template that contains unique required settings for each combination of services that run on the infrastructure serversCUse Group Policy objects (GPOs) to apply the custom security template or templates to the Infrastructure serversDEdit the local policy settings to configure each individual server
单选题You are designing a new NETBIOS naming strategy for the corporate environment. Which domain name should you use?()AadBwoodgroveadCwoodgrovebankDwoodgrovebank.com
单选题You are designing a strategy to enable the ATC application to successfully resolve computer names. Which name resolution method should you use?()A DNSB WINSC Hosts fileD Lmhosts file
单选题You are designing a strategy to ensure that all employees have Internet access. For each branch office, what should you do?()A Configure a DNS server to function as caching-only serversB Configure Internet Connection sharing on terminal servers.C Install and configure an Internet Security and Acceleration (ISA) Server ComputerD Install and configure a server running Routing and Remote Acess to function as a VPN server