单选题You need to define an authentication system for the main office database administrators. The setup should require the minimum amount of administrative effort. The authentication environment must fulfill the company’s security requirements.What should you do?()ACreate a SQL Server login with Windows Authentication for each main office database administrator.Add all of these logins to the db_owner role in each database.BCreate a SQL Server login with SQL Server Authentication for each main office database administrator.Add all of these logins to the sysadmin role.CCreate a Windows global group named DBAdmins. Add each main office database administrator’s Windows user account to the Windows DBAdmins group.Create a SQL Server login with Windows Authentication for the group.Add the group to the serveradmin fixed server role.DAdd each main office database administrator’s Windows user account to the Windows SQLManagersgroup.

单选题
You need to define an authentication system for the main office database administrators. The setup should require the minimum amount of administrative effort. The authentication environment must fulfill the company’s security requirements.What should you do?()
A

Create a SQL Server login with Windows Authentication for each main office database administrator.Add all of these logins to the db_owner role in each database.

B

Create a SQL Server login with SQL Server Authentication for each main office database administrator.Add all of these logins to the sysadmin role.

C

Create a Windows global group named DBAdmins. Add each main office database administrator’s Windows user account to the Windows DBAdmins group.Create a SQL Server login with Windows Authentication for the group.Add the group to the serveradmin fixed server role.

D

Add each main office database administrator’s Windows user account to the Windows SQLManagersgroup.


参考解析

解析: 暂无解析

相关考题:

A Windows Communication Foundation (WCF) service is hosted in Microsoft Internet Information Services (IIS). You are preparing the configuration file for production deployment. You need to set up tracing so that an administrator can adjust the System.ServiceModel trace level without causing the ASP.NET host application domain to restart. You need to ensure that tracing is turned off by default.What should you do?()A.B.C.D.

Your company has a main office and 15 branch offices. The company has a single Active Directory domain. All servers run Windows Server 2008 R2.You need to ensure that the VPN connections between the main office and the branch offices meet the following requirements: All data must be encrypted by using end-to-end encryption. The VPN connection must use computer-level authentication. User names and passwords cannot be used for authentication. What should you do?()A. Configure an IPsec connection to use tunnel mode and preshared key authentication.B. Configure a PPTP connection to use version 2 of the MS-CHAP v2 authentication.C. Configure a L2TP/IPsec connection to use the EAP-TLS authentication.D. Configure a L2TP/IPsec connection to use version 2 of the MS-CHAP v2 authentication.

You define a multiple-row subquery in the WHERE clause of an SQL query with a comparison operator "=". What happens when the main query is executed? () A. The main query executes with the first value returned by the subquery.B. The main query executes with the last value returned by the subquery.C. The main query executes with all the values returned by the subquery.D. The main query fails because the multiple-row subquery cannot be used with the comparison operator.E. You cannot define a multiple-row subquery in the WHERE clause of a SQL query.

In order to log()the system you have to type in your password.A、inB、onC、in toD、off to

Your company has a Microsoft Hyper-V Server 2008 R2 environment. You need to manually back up a child partition while it is turned off. Which two elements should you back up?()A、the system stateB、the InitialStore.xml fileC、the child .vhd filesD、the child .xml configuration file

How do you define the authentication method that will be used with AAA?()A、With the method aaa commandB、With the method commandC、With a method listD、With a method statement

You are running Linux 2.0.36 and you need to add a USB mouse to your system. Which of the following statements is true?()A、 You need to rebuild the kernel.B、 You need to upgrade the kernelC、 You need to load the USB modules for your existing modular kernel.D、 USB support is not available in Linux.

You create a master-detail form. The users need to be able to exit the form quickly, adhering to default transaction processing, regardless of the cursor location. You believe you can achieve this using a Key-Exit trigger. What do you need to do to implement this request? ()A、Define a Key-Exit trigger for all the blocks in the form.  B、In the Object Navigator, highlight all the items and define a Key-Exit trigger. C、Define a Key-Exit trigger on the primary key item in the master block.D、No additional key-trigger definition is necessary.

You define a multiple-row subquery in the WHERE clause of an SQL query with a comparison operator "=".What happens when the main query is executed?()A、The main query executes with the first value returned by the subquery.B、The main query executes with the last value returned by the subquery.C、The main query executes with all the values returned by the subquery.D、The main query fails because the multiple-row subquery cannot be used with the comparison operator.E、You cannot define a multiple-row subquery in the WHERE clause of a SQL query.

You need to recommend a solution for users in the branch office to access files in the main office.   What should you include in the recommendation?()A、a BranchCache server that operates in Distributed Cache modeB、a BranchCache server that operates in Hosted Cache modeC、a domain-based Distributed File System (DFS) namespace and DFS ReplicationD、a standalone Distributed File System (DFS) namespace and DFS Replication

Your company has a main office and 10 branch offices. You have an Exchange Server 2010 organization.  All Exchange servers are installed on virtual machines.  You need to create a monitoring plan for the Exchange servers that meets the following requirements:.Identify Exchange server errors .Provide alerts when Exchange services are stopped .Produce statistical analysis and reporting Which tool should you include in the plan?()A、Microsoft System Center Service ManagerB、Microsoft System Center Operations ManagerC、Microsoft System Center Configuration ManagerD、Microsoft System Center Virtual Machine Manager

You need to define an authentication system for the main office database administrators. The setup should require the minimum amount of administrative effort. The authentication environment must fulfill the company’s security requirements.What should you do?()A、Create a SQL Server login with Windows Authentication for each main office database administrator.Add all of these logins to the db_owner role in each database.B、Create a SQL Server login with SQL Server Authentication for each main office database administrator.Add all of these logins to the sysadmin role.C、Create a Windows global group named DBAdmins. Add each main office database administrator’s Windows user account to the Windows DBAdmins group.Create a SQL Server login with Windows Authentication for the group.Add the group to the serveradmin fixed server role.D、Add each main office database administrator’s Windows user account to the Windows SQLManagersgroup.

You are moving a Windows Communication Foundation (WCF) service into production. You need to be able to monitor the health of the service. You only want to enable all performance counter instances exposed by the ServiceModelService counter group. Which element should you add to the system.serviceModel section in the application configuration file?()A、diagnostics performancecounters="ServiceOnly"B、diagnostics performancecounters="Off" wmiproviderenabled="true"C、diagnostics performancecounters="All"D、diagnostics wmiproviderenabled="true"

You need to recommend a strategy to ensure that the administration of AD LDS is encrypted.  What should you include in the recommendation?()A、a server authentication certificateB、client authentication certificatesC、Digest authenticationD、Windows Integrated authentication

You need to recommend a security strategy for WebApp2 that meets the company’s applicaton  requirements.What should you include in the recommendation?()A、Basic authentication and connection security rulesB、Basic authentication and SSLC、Digest authentication and connection security rulesD、Digest authentication and SSL

单选题You are running Linux 2.0.36 and you need to add a USB mouse to your system. Which of the following statements is true?()A You need to rebuild the kernel.B You need to upgrade the kernelC You need to load the USB modules for your existing modular kernel.D USB support is not available in Linux.

单选题You need to implement an authentication method on SQL4. The TravelOnline database will be accessed through a Web services application. You need to make the authentication method as secure as possible.What should you do?()ACreate an HTTP endpoint with NTLM authentication, and create a service principal name (SPN).BCreate an HTTP endpoint with digest authentication, and create a service principal name (SPN).CCreate an HTTP endpoint with integrated authentication, and create a service principal name (SPN).DCreate an HTTP endpoint with Kerberos authentication.

单选题You have a computer that runs Windows 7. The computer has System Protection enabled. You need toretain only the last System Protection snapshot of the computer. All other snapshots must be deleted.  Whatshould you do?()ARun Disk Cleanup for Programs and Features.BRun Disk Cleanup for System Restore and Shadow Copies.CFrom the System Protection Restore settings, select Turn off System Restore.DFrom the System Protection Restore settings, select Only restore previous versions of files.

单选题You are moving a Windows Communication Foundation (WCF) service into production. You need to be able to monitor the health of the service. You only want to enable all performance counter instances exposed by the ServiceModelService counter group. Which element should you add to the system.serviceModel section in the application configuration file?()Adiagnostics performancecounters=ServiceOnlyBdiagnostics performancecounters=Off wmiproviderenabled=trueCdiagnostics performancecounters=AllDdiagnostics wmiproviderenabled=true

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The company has a main office in San Francisco and branch offices in Paris and Bogota. Each branch office contains a Windows Server 2003 domain controller. All client computers run Windows XP Professional.   Users in the Bogota office report intermittent problems authenticating to the domain. You suspect that a specific client computer is causing the problem.   You need to capture the authentication event details on the domain controller in the Bogota office so that you can find out the IP address of the client computer that is the source of the problem.   What should you do?  ()A Configure System Monitor to monitor the authentication events.B Configure Performance Logs and Alerts with a counter log to record the authentication events.C Configure Network Monitor to record the authentication events.D Configure Performance Logs and Alerts with an alert to trigger on authentication events.

单选题You need to recommend changes to the file server on the main campus that meet the company’s technical requirements.   What should you include in the recommendation?()AEncrypting File System (EFS)  BNTFS permissions  CSyskey  DWindows BitLocker Drive Encryption (BitLocker)

单选题You need to recommend a strategy to ensure that the administration of AD LDS is encrypted.  What should you include in the recommendation?()Aa server authentication certificateBclient authentication certificatesCDigest authenticationDWindows Integrated authentication

单选题Your company has a main office and 15 branch offices. The company has a single Active Directory domain. All servers run Windows Server 2008 R2.You need to ensure that the VPN connections between the main office and the branch offices meet the following requirements: ?¤All data must be encrypted by using en-to-end encryption. ?¤The VPN connection must use compute-level authentication. ?¤User names and passwords cannot be used for authentication What should you do?()AConfigure an IPsec connection to use tunnel mode and preshared key authentication.BConfigure a PPTP connection to use version 2 of the MS-CHAP v2 authentication.CConfigure a L2TP/IPsec connection to use the EAP-TLS authentication.DConfigure a L2TP/IPsec connection to use version 2 of the MS-CHAP v2 authentication.

单选题You need to recommend a solution for users in the branch office to access files in the main office.   What should you include in the recommendation?()Aa BranchCache server that operates in Distributed Cache modeBa BranchCache server that operates in Hosted Cache modeCa domain-based Distributed File System (DFS) namespace and DFS ReplicationDa standalone Distributed File System (DFS) namespace and DFS Replication

单选题How do you define the authentication method that will be used with AAA?()AWith the method aaa commandBWith the method commandCWith a method listDWith a method statement

多选题Your company has a Microsoft Hyper-V Server 2008 R2 environment. You need to manually back up a child partition while it is turned off. Which two elements should you back up?()Athe system stateBthe InitialStore.xml fileCthe child .vhd filesDthe child .xml configuration file

单选题Your network consists of an Active Directory Domain Services (AD DS) forest with 1,000 client computers that run Windows XP.   Nine hundred of the computers are on the local area network.   One hundred computers are portable computers that connect to the main office only once every few months.  You are planning to deploy Windows 7.  You need to generate a report of the software that is installed on all client computers.    You need this information as soon as possible.  What should you use?()AMicrosoft System Center EssentialsBMicrosoft Desktop Optimization PackCMicrosoft System Center Operations ManagerDMicrosoft System Center Data Protection Manager

单选题You are a network administrator for your company. The company has a main office and one branch office. The network consists of a single Active Directory domain. All servers run Windows Server 2003.   The company needs to connect the main office network and the branch office network by using Routing and Remote Access servers at each office. The networks will be connected by a VPN connection over the Internet.   The company’s written security policy includes the following requirements for VPN connections over the Internet:  All data must be encrypted with end-to-end encryption.  VPN connection authentication must be at the computer level.   Credential information must not be transmitted over the Internet as part of the authentication process.   You need to configure security for VPN connection between the main office and the branch office. You need to comply with the written security policy.   What should you do?  ()A Use a PPTP connection with EAP-TLS authentication.B Use a PPTP connection with MS-CHAP v2 authentication.C Use an L2TP connection with EAP-TLS authentication.D Use an L2TP connection with MS-CHAP v2 authentication.