单选题You need to implement an auditing strategy that will fulfill the company’s business requirements.What should you do?()AUse C2 auditing.BUse DML triggers.CUse DDL triggers.DUse event notifications.

单选题
You need to implement an auditing strategy that will fulfill the company’s business requirements.What should you do?()
A

Use C2 auditing.

B

Use DML triggers.

C

Use DDL triggers.

D

Use event notifications.


参考解析

解析: 暂无解析

相关考题:

You are creating a Windows Forms application for a financial service provider by using the .NET Framework 3.5. You have to implement a multiple document interface (MDI) in the application to allow users to open multiple financial documents simultaneously.You need to ensure that whenever the child MDI form is created, the application displays a message in the title bar of the parent MDI that a child form has received focus.   What should you do?()A、Implement theActivated eventB、Implement the MdiChildActivate eventC、Override the OnParentVisibleChanged methodD、Override the OnParentBindingContextChanged method

The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()A、On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policyB、On all client computers, implement logon auditing for all user account logonsC、On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policyD、On all domain controllers, implement logon auditing for all user account logons

In your production database, data manipulation language (DML) operations are executed on the SALES table.You have noticed some dubious values in the SALES table during the last few days. You are able to track users, actions taken, and the time of the action for this particular period but the changes in data are not tracked.You decide to keep track of both the old data and new data in the table along with the user information.  Whataction would you take to achieve this task()A、Apply fine-grained auditing.B、Implement value-based auditing.C、Impose standard database auditing to audit object privileges.D、Impose standard database auditing to audit SQL statements.

In your production database, data manipulation language (DML) operations are executed on theSALES table. You have noticed some dubious values in the SALES table during the last few days. Youare able to track users, actions taken, and the time of the action for this particular period but the changesin data are not tracked. You decide to keep track of both the old data and new data in the table along withthe user information.  What action would you take to achieve this task()A、Apply fine-grained auditing.B、Implement value-based auditing.C、Impose standard database auditing to auditobject privileges.D、Impose standard databaseauditing to audit SQL statements.

You need to recommend a backup strategy for the servers in the San Francisco office. The strategy must meet the company's technical requirements    What should you include in the recommendation?()A、native-boot virtual hard disks (VHDs)B、Microsoft System Center Data Protection Manager 2010C、system restore pointsD、Windows Server Backup

You need to recommend a strategy for the file servers that meets the company’s technical requirements.   What should you recommend?()A、Implement active file screens.B、Implement passive file screens.C、Configure classification rules.D、Configure File Server Resource Manager (FSRM) quotas.

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB1 inthe instance. You have set the recovery model of DB1 to Full. You deploy a new process. The process modifies 10,000 records from the Accounts table at 18:00 every day. Any modification made by the process to the data must be reverted and database keeps online. You must make sure of this. So which strategy should you implement?()  A、You should implement Differential backup B、You should implement Database snapshotsC、You should implement Primary filegroup backup D、You should implement Transaction log backup

Your network contains a single Active Directory domain. You have 100 servers that run Windows   Server 2008 R2 and 5,000 client computers that run Windows 7.  You plan to deploy applications to the client computers.   You need to recommend an application deployment strategy that meets the following requirements:   èApplications must be deployed only to client computers that meet the minimum hardware requirements.   èDeployments must be scheduled to occur outside business hours.   èDetailed reports on the success or failure of the application deployments must be provided.   What should you recommend?()A、Deploy applications by using Group Policy.B、Implement Windows Server Update Services (WSUS).C、Implement Microsoft System Center Operations Manager (SCOM) 2007 R2.D、Implement Microsoft System Center Configuration Manager (SCCM) 2007 R2.

You have a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You perform a normal backup of Server1 every Saturday. You need to implement a backup strategy for Server1 to meet the following requirements: ·Minimize the time required to restore files. ·On weekdays, back up only files that have changed since the Saturday backup. Which type of backup should you perform on weekdays? ()A、copyB、dailyC、differentialD、incremental

A Windows Communication Foundation (WCF) service sends notifications when the service is started and stopped.You need to implement a client that logs these notifications. Which class should you use?()A、AnnouncementServiceB、AnnouncementClientC、DiscoveryClientD、HttpListener

Your network consists of a single Active Directory domain. All domain controllers run Windows Server  2008 R2.   You need to plan an auditing strategy that meets the following requirements: èAudits all changes to Active Directory Domain Services (AD?DS) èStores all auditing data in a central location. What should you include in your plan?()A、Configure an audit policy for the domain. Configure Event Forwarding.B、Configure an audit policy for the domain controllers. Configure Data Collector Sets.C、Implement Windows Server Resource Manager (WSRM) in managing mode.D、Implement Windows Server Resource Manager (WSRM) in accounting mode.

You have an Exchange Server 2010 organization.  You need to recommend a solution that prevents the permanent deletion of e-mail messages from themailboxes of employee who have been dismissed from the company.  What should you recommend?()A、Implement managed folders.B、Implement a legal hold for each mailbox.C、Implement a Retention Policy for each mailbox.D、Implement an Outlook Protection Rule for each mailbox.

You need to recommend a strategy to ensure that the administration of AD LDS is encrypted.  What should you include in the recommendation?()A、a server authentication certificateB、client authentication certificatesC、Digest authenticationD、Windows Integrated authentication

You need to implement an auditing strategy that will fulfill the company’s business requirements.What should you do?()A、Use C2 auditing.B、Use DML triggers.C、Use DDL triggers.D、Use event notifications.

You need to recommend a strategy for delegating administration to the consulting firm.What should you recommend?()A、Create local user accounts.B、Create domain user accounts.C、Create IIS Manager user accounts.D、Implement Active Directory Lightweight Directory Services (AD LDS).

You need to recommend a solution for promoting the RODC in the new branch office.What should you include in the recommendations?()A、Implement the Windows Search service and implement a custom iFilter.B、Implement File Server Resource Manager (FSRM) and configure file classifications.C、Implement Microsoft SharePoint Foundation 2010 and create a custom workflow.D、Implement a Distributed File System (DFS) namespace and configure folder targets.

Your SQL Server 2005 database contains a table that has 500 million rows of data. Some of the data is historical and some is current. You need to partition the data on a single server to increase performance and optimize maintenance. What should you do?()A、Implement horizontal partitioning.B、Implement vertical partitioning.C、Implement a raw partition.D、Implement distributed partitioning.

单选题Your network consists of a single Active Directory domain. You have a member server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You need to track all authentication attempts on Server1. What should you do? ()AEnable auditing of logon event events in Server1’s local policy.BEnable auditing of logon event events in the Default Domain Controller Policy.CEnable auditing of account logon event events in Server1’s local policy.DEnable auditing of account logon event events in the Default Domain Controller Policy.

单选题The company is evaluating using a new Active Directory domain to contain all customer user accounts. You need to design a monitoring or logging strategy that meets business and security requirements for the new Web-based ordering application. Your solution must minimize overhead on existing domain controllers and servers.  What should you do?()AEnable logon auditing in both the new and the existing domainsBEnable logon auditing only in the existing domainCEnable logon auditing only in the new domainDEnable logon auditing on only the Web server

单选题You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 to create a Windows Presentation Foundation (WPF) application. You plan to implement a test strategy for the application. You need to ensure that the test strategy meets the following requirements: Test data can be added to the test project without recompiling. Multiple variations of a test can be executed at run time. What should you do? ()AUse IntelliTrace.BUse data-driven tests.CCreate a single test class.DCreate a test method for each data variation.

单选题You need to recommend a Group Policy strategy for the Remote Desktop servers. What should you include in the recommendation?()Ablock inheritanceBloopback processingCsecurity filteringDWMI filtering

单选题You need to recommend a strategy to ensure that the administration of AD LDS is encrypted.  What should you include in the recommendation?()Aa server authentication certificateBclient authentication certificatesCDigest authenticationDWindows Integrated authentication

单选题The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()AOn all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policyBOn all client computers, implement logon auditing for all user account logonsCOn all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policyDOn all domain controllers, implement logon auditing for all user account logons

单选题You need to block messages from senders that do not comply sender policy framework (SPF).What do you need to implement?()AReceive connectorBSender ID FilteringCSender FilteringDSend connector

单选题You need to design a monitoring strategy to meet business requirements for data on servers in the production department. What should you do?()AUse the Microsoft Baseline Security Analyzer (MBSA) to scan for Windows vulnerabilities on all servers in the production departmentBRun Security and Configuration Analysis to analyze the security settings of all servers in the production departmentCEnable auditing for data on each server in the production department. Run System Monitor on all servers in the production department to create a counter log that tracks activity for the Objects performance objectDCreate a Group Policy Object (GPO) that enables auditing for object access and link it to the product department’s Servers OU. Enable auditing for data on each server in the production department

单选题Your network consists of a single Active Directory domain. All domain controllers run Windows Server  2008 R2.   You need to plan an auditing strategy that meets the following requirements: èAudits all changes to Active Directory Domain Services (AD?DS) èStores all auditing data in a central location. What should you include in your plan?()AConfigure an audit policy for the domain. Configure Event Forwarding.BConfigure an audit policy for the domain controllers. Configure Data Collector Sets.CImplement Windows Server Resource Manager (WSRM) in managing mode.DImplement Windows Server Resource Manager (WSRM) in accounting mode.

单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB1 inthe instance. You have set the recovery model of DB1 to Full. You deploy a new process. The process modifies 10,000 records from the Accounts table at 18:00 every day. Any modification made by the process to the data must be reverted and database keeps online. You must make sure of this. So which strategy should you implement?()AYou should implement Differential backup BYou should implement Database snapshotsCYou should implement Primary filegroup backup DYou should implement Transaction log backup

单选题You have an Exchange Server 2010 organization.  You plan to delegate Exchange administrative rights to some users in the organization.  You need to recommend a solution that tracks all changes made to the Exchange organization.  What should you include in the solution?()Aadministrator audit loggingBcircular loggingCdiagnostic loggingDWindows Security Auditing