单选题You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()AConfigure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addressesBConfigure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points useCCreate a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networksDCreate a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks

单选题
You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()
A

Configure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addresses

B

Configure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points use

C

Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networks

D

Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks


参考解析

解析: 暂无解析

相关考题:

You are writing a method to compress an array of bytes.The array is passed to the method in a parameter named document.You need to compress the incoming array of bytes and return the result as an array of bytes.Which code segment should you use?()A.B.C.D.

You are creating a Windows Communication Foundation (WCF) service that implements operations in a RESTful manner. You need to add a delete operation. You implement the delete method as follows:void DeleteItems(string id);You need to configure WCF to call this method when the client calls the service with the HTTP DELETE operation. What should you do?()A. Add the WebInvoke(UriTemplate=/Items/{id}, Method=DELETE) attribute to the operationB. Add the HttpDelete atribute to the operationC. Replace the string parameter with a RemovedActivityAction parameterD. Replace the return type with RemovedActivityAction.

36. We ___________ keep the new traffic law and learn how to protect ourselves.A.may.B.shouldC.canD.need

You need to design router redundancy on the Company network.  Which three protocols could be  chosen for IP routing redundancy to protect against first-hop router failure?()A、 GLBPB、 ICMPC、 MSTPD、 HSRPE、 VRRPF、 NHRP

Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows Vista computers.  You are planning to deploy Windows 7 and a custom application.   You have the following requirements:   The application must be available to only a specific group of users. You must be able to monitor application usage.   You need to design a deployment method for the custom application that meets the requirements.  Which deployment method should you use in your design?()A、software installation in Group PolicyB、startup scripts in Group PolicyC、Microsoft Application Virtualization (App-V)D、baseline Windows 7 image that includes the custom application

You need to design a method to standardize and deploy a baseline security configuration for servers. You solution must meet business requirements. What should you do?()A、Create a script that installs the Hisecdc.inf security templateB、Use a GPO to distribute and apply the Hisec.inf security templateC、Use the System Policy Editor to configure each server’s security settingsD、Use a GPO to distribute and apply a custom security template

You need to design a method to allow the new-ideas-testking.com Web site to function in accordance with security and business requirements.  What should you do?()A、Require a PPTP VPN for all connections to the Web serverB、Require that traffic between Web browsers and the Web server uses an L2TP/IPSec tunnelC、Require that traffic between Web browsers and the Web server uses SSLD、Require certificate mappings between the Web server and Active Directory

You need to design a method to log changes that are made to servers and domain controllers. You also need to track when administrators modify local security account manager objects on servers. What should you do?()A、Enable failure audit for privilege user and object access on all servers and domain controllersB、Enable success audit for policy change and account management on all servers and domain controllersC、Enable success audit for process tracking and logon events on all servers and domain controllersD、Enable failure audit for system events and directory service access on all servers and domain controllers

You need to design a method to address the chief information officer’s security concerns. What should you do?()A、Configure Windows Management Instrumentation (WMI) filtering options in the Default Domain Policy GPOB、Use the gpresult commandC、Use Mbsacli.exeD、Configure software restriction policy options in the Default Domain Policy GPO

You are developing a custom-collection class.You need to create a method in your class. You need to ensure that the method you create in your class returns a type that is compatible with the Foreach statement. Which criterion should the method meet?()A、The method must return a type of either IEnumerator or IEnumerable.B、The method must return a type of IComparable.C、The method must explicitly contain a collection.D、The method must be the only iterator in the class.

Your company has a single Active Directory Domain Services (AD DS) domain with Windows Server 2008 R2 member servers and 1,000 Windows 7 client computers. You are designing the deployment of a custom application.   You have the following requirements:   The application must be available to only users who need it. Minimize network traffic during deployment.   You need to design a deployment strategy that meets the requirements.   Which deployment method should you use?()A、RemoteApp and Desktop ConnectionsB、software installation in Group PolicyC、Microsoft Application Virtualization (App-V)D、Microsoft System Center Configuration Manager 2007

You are developing an ASP.NET Web page that will display the median value from a sequence of integer values. You need to create an extension method to compute the median value. Which interface should you add the extension method to?()A、 IComparerTB、 IEnumerableTC、 IEnumeratorT  D、 IEqualityComparerT

You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()A、Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computersB、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersC、Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersD、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers

单选题You develop a service application named PollingService that periodically calls long-running procedures.These procedures are called from the DoWork method.You use the following service application code:   When you attempt to start the service, you receive the following error message: Could not start the PollingService service on the local computer.Error 1053: The service did not respond to the start or control request in a timely fashion. You need to modify the service application code so that the service starts properly.What should you do?()A Move the loop code into the constructor of the service class from the OnStart method.B Drag a timer component onto the design surface of the service. Move the calls to the long-running procedure from the OnStart method into the Tick event procedure of the timer, set the Enabled property of the timer to True, and call the Start method of the timer in the OnStart method.C Add a class-level System.Timers.Timer variable to the service class code. Move the call to the DoWork method into the Elapsed event procedure of the timer, set the Enabled property of the timer to True, and call the Start method of the timer in the OnStart method.D Move the loop code from the OnStart method into the DoWork method.

单选题You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()AEncrypt customer information when it is stored and when it is being transmittedBRequire encrypted connections to the public Web site, which is hosted on the Web server on the perimeter networkCEncrypt all marketing information on file servers and client computersDRequire encrypted connections to all file servers

单选题You are developing a Windows Presentation Foundation (WPF) application.You need to display HTML content from a Web page on the WPF form. What should you do?()AAdd a FlowDocumentReader control to the design surface. Then create a FlowDocument control.BAdd a DocumentViewer control to the design surface. Then create a FixedDocument control.CAdd a WebBrowser control to the design surface. Then use the Navigate method to navigate the URI object.DAdd a ContentControl control to the design surface. Then reference a WebClient object to return an HTML string.

单选题Your company has client computers that run Windows XP Professional.   You are planning to install Windows 7 Enterprise on the existing client computers.   You have the following requirements:   Migrate user data and operating system components.  Encrypt and password-protect the migration store.   You need to design a user state migration strategy that supports the requirements. What should you do?()AUse a hard-link migration storeBUse a compressed migration storeCPerform an offline migration by using WindowsoldDPerform an offline migration by using Windows PE

单选题You are planning to upgrade Internet Explorer.   You have the following requirements:   Create a report that identifies which computers are successfully upgraded. Do not install additional software on the client computers.   You need to design a deployment method that meets the requirements.   What should you do?()AUse Internet Explorer Administration Kit (IEAK) and Group Policy.BUse Microsoft System Center Configuration Manager.CUse Windows Server Update Services (WSUS).DUse Microsoft System Center Essentials.

单选题In your web application,you need to execute a block of code whenever the session object is first created. Which design will accomplish this goal?()ACreate an HttpSessionListener class and implement the sessionInitialized method with that block ofcode.BCreate an HttpSessionActivationListener class and implement the sessionCreated method with thatblock of code.CCreate a Filter class, call the getSession(false) method, and if the result was null, then execute that block of code.DCreate an HttpSessionListener class and implement the sessionCreated method with that block of code.

单选题You are developing an ASP.NET Web page that will display the median value from a sequence of integer values. You need to create an extension method to compute the median value. Which interface should you add the extension method to?()A IComparerTB IEnumerableTC IEnumeratorT  D IEqualityComparerT

单选题You are creating a Windows Communication Foundation (WCF) service that implements operations in a RESTful manner.You need to add a delete operation. You implement the delete method as follows. string void DeleteItems(string id);You need to configure WCF to call this method when the client calls the service with the HTTP DELETE operation. What should you do?()A Add the WebInvoke(UriTemplate = /Items/{id},Method=DELETE) attribute to the operation.B Add the HttpDelete attribute to the operation.C Replace the string parameter with a RemovedActivityAction parameter.D Replace the return type with RemovedActivityAction.

单选题You are creating a Windows Communication Foundation (WCF) service that implements operations in a RESTful manner. You need to add a delete operation. You implement the delete method as follows:void DeleteItems(string id);You need to configure WCF to call this method when the client calls the service with the HTTP DELETE operation. What should you do?()AAdd the WebInvoke(UriTemplate=/Items/{id}, Method=DELETE) attribute to the operationBAdd the HttpDelete atribute to the operationCReplace the string parameter with a RemovedActivityAction parameterDReplace the return type with RemovedActivityAction.

多选题You need to design router redundancy on the Company network.  Which three protocols could be  chosen for IP routing redundancy to protect against first-hop router failure?()AGLBPBICMPCMSTPDHSRPEVRRPFNHRP

单选题You need to recommend a NAP enforcement method that meets the companyˉs security requirements. Which method should you recommend?()A802.1XBDHCPCIPSecDVPN

单选题You are developing a custom-collection class.You need to create a method in your class. You need to ensure that the method you create in your class returns a type that is compatible with the Foreach statement. Which criterion should the method meet?()AThe method must return a type of either IEnumerator or IEnumerable.BThe method must return a type of IComparable.CThe method must explicitly contain a collection.DThe method must be the only iterator in the class.

单选题Your company has client computers that run Windows XP Professional.   You are planning to install Windows 7 Enterprise on the existing client computers.    You need to design a user state migration strategy that minimizes network bandwidth and server use when user data is being migrated.   What should you do?()AUse the Refresh Computer method and a hard-link migration store.BUse the Refresh Computer method and a compressed migration store.CUse the Replace Computer method and a hard-link migration store.DUse the Replace Computer method and a compressed migration store.

单选题You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()ADesign a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computersBDesign a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersCDesign a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersDDesign a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers