单选题You encrypt your files to ensure the security of the files. You want to make a backup copy of the files and maintain their security settings. You have the option of backing up to either the network or floppy disk.  What should you do?()ACopy the files to a network share on an NTFS volume and do nothing further.BCopy the files to a network share on a FAT 32 volume and do nothing further.CCopy the files to a floppy disk that has been formatted by using Windows 2000 Professional. DPlace the files in an encrypted folder, and then copy the folder to floppy disk.

单选题
You encrypt your files to ensure the security of the files. You want to make a backup copy of the files and maintain their security settings. You have the option of backing up to either the network or floppy disk.  What should you do?()
A

Copy the files to a network share on an NTFS volume and do nothing further.

B

Copy the files to a network share on a FAT 32 volume and do nothing further.

C

Copy the files to a floppy disk that has been formatted by using Windows 2000 Professional. 

D

Place the files in an encrypted folder, and then copy the folder to floppy disk.


参考解析

解析: Encryption security settings are retained when an encrypted file is moved or copied to an NTFS volume.

相关考题:

Every morning, you inspect your company‘s development and staging servers. You do this to ensure that the servers have the same versions of all files in your Web application.For security reasons, you can only access the staging server through FTP.You need to synchronize files from the staging server so that the staging server matches the development server.You want to achieve this goal by using the minimum amount of administrative effort.Which tool should you use?()A. FTPB. XCOPYC. the Publish Web toolD. the Copy Web tool

You have a share on your local computer. This share contains some sensitive applications in theform of .exe files. You want to audit the users who are trying to execute these programs. What should you do?()A、Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.B、Turn on auditing for objects in the Local Security Policy and Select 'Object Access'.C、Use Windows Explorer to turn on auditing for the specific files. D、Have the administrator for domains log you on as an administrator and enable auditing for a  specific file.E、Turn on auditing for objects in the Local Security Policy and Select 'Account Management'.F、Allow only one account at a time to log on to your shared folder. Check the event viewer to  see who logged on.

You are the network administrator for The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. All confidential company files are stored on a file server named TestKing1. The written company security states that all confidential data must be stored and transmitted in a secure manner. To comply with the security policy, you enable Encrypting File System (EFS) on the confidential files. You also add EFS certificates to the data decryption field (DDF) of the confidential files for the users who need to access them. While performing network monitoring, you notice that the confidential files that are stored on TestKing1 are being transmitted over the network without encryption. You must ensure that encryption is always used when the confidential files on TestKing1 are stored and transmitted over the network. What are two possible ways to accomplish this goal? ()(Each correct answer presents a complete solution. Choose two)A、Enable offline files for the confidential files that are stored on TestKing1, and select the Encrypt offline files to secure data check box on the client computers of the users who need to access the files.B、Use IPSec encryption between TestKing1 and the client computers of the users who need to access the confidential files.C、Use Server Message Block (SMB) signing between TestKing1 and the client computers of the users who need to access the confidential files.D、Disable all LM and NTLM authentication methods on TestKing1.E、Use IIS to publish the confidential files. Enable SSL on the IIS server. Open the files as a Web folder.

You upgrade all client computers in your network to Windows 2000 Professional. Then you apply the basicwk.inf security template to the computers. Now, none of the users can run the company’s database application. What should you do?()A、Apply the compactws.inf security template to the computers.B、Delete the basicwk.inf security template file from the computers.C、Use the system policy editor to configure a new security policy for the database application.D、For each user account, allow read permission to the database application and in associated files.

Your company has a single active directory domain. All servers run windows server 2008. The company network has 10 servers that perform as web servers. All confidential files are located on a server named FSS1. The company security policy states that all confidential data must be transmitted in the most secure manner. When you monitor the network, you notice that the confidential files are stored on FSS1 server are being transmitted over the network without encryption. You need to ensure that encryption is always used when the confidential files on the FSS1 server are transmitted over the network. What are two possible ways to achieve this goal? ()A、Deactivate all LM and NTLM authentication methods on the FSS1 server.B、Use IIS to publish the confidentials files. Activate SSL on the ISS server, and then open the files as a web folder.C、Use IPSec encryption between the FSS 1 server and the computers of the users who need to access the confidential files.D、Use the server messager block (SMB) signing between the FSS1 server and the computers of the users who want to access the confidential files.E、Activate offline files for the confidential files that are stored on the FSS1 server. In the folder advanced properties dialog box, select the encrypt contents to secure data option.

You are planning to deploy two Windows Server 2008 R2 Hyper-V servers. You need to design the storage of VHD files for maximum security.    What should you do?()A、Store the VHD files on a dedicated NTFS volumeB、Store unencrypted VHD files on a volume that uses Windows BitLocker drive encryptionC、Encrypt the VHD files by using EFS on a volume that uses Windows BitLocker drive encryptionD、Encrypt the VHD files by using EFS on a volume that does not use Windows BitLocker drive encryption

You are a help desk technician for your company. All users have Windows XP Professional computers. Ten users run a custom application named Finance on their computers. Finance stores user passwords in a file named Passwords.ini. By default, the Passwords.ini file is stored in a folder named C:/Winnt/App1.  The location and name of the file can be changed by an administrator. Each Passwords.ini file is unique. Each computer contains a single logical drive, which is drive C and is formatted as NTFS. In order to comply with a new company security policy, you need to ensure that the Passwords.ini files are encrypted. What should you do?()A、In the properties of the C:/Winnt/App1 folder, use Windows Explorer to select the option to encrypt the contents of the folder. Accept the default settings on the Confirm Attributes Changes dialog box. B、Ask a network administrator to share a new encrypted folder named PassFiles on a network server and to permit users to read the files contained within the folder. Copy the Passwords.ini file from each computer into the PassFiles folder. On each computer, configure Finance to use the Passwords.ini file in the PassFiles folder.C、Create a folder named C:/Files. Copy the Passwords.ini file to the C:/Files folder. In the properties of the C:/Files folder, select the option to encrypt the contents of the folder. Accept the default settings on the Confirm Attributes Changes dialog box. Configure Finance to use the C:/Files/Passwords.ini file. D、Create a folder named C:/Files. Move the Passwords.ini file to the C:/Files folder. Instruct the user of each computer to open the properties of the C:/Files folder and select the option to encrypt the contents of the folder. Accept the default settings on the Confirm Attributes Changes dialog box. Configure Finance to use the C:/Files/Passwords.ini file.

Your computer is part of a workgroup. You share files with other users on the network. You configure exceptions in Microsoft Windows Firewall to allow file sharing. Users report that they are unable to connect to your computer.  You need to ensure that other users are able to access only the shared files.  What should you do? ()A、Restart the Workstation service on your computer.B、Change all of your TCP port exceptions to UDP port exceptions.C、Ensure parental controls are not configured to block file sharing.D、Clear the Block all incoming connections check box in Windows Firewall.

Your Windows 2000 Professionally computer belongs to the contoso.com domain. You need to encrypt a compressed file named C:/data. You successfully encrypt the file but discover that it is no longer compressed.   What is the most likely cause of this problem?()A、Group Policy is preventing the compression of encrypted files.B、The file is stored on a FAT32 partition.C、Only members of the Administrators and the Power Users groups can compress and encrypt files.D、Encrypted files cannot be compressed.

You are a security administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.   The company occasionally experiences downtime because of malicious lnternet worms that arrive as Microsoft Visual Basic Scripting Edition (VBS) files. You examine several client computers and discover that VBS files are downloaded by using Microsoft Outlook,instant messaging,or peer-to-peer file sharing programs.    You need to prevent users from running VBS files regardless of how they arrive on client computers.  What should you do?()A、 Use a software restriction policy to disable all unauthorized scripts.B、 Use an Administrative Template to ensure that Outlook and lnternet Explorer are in the Restricted Sites security zonC、 Use a centralized logon script to rename the Wscript.exe file on each computer to contain a nonexecutable extensioD、 Use a file system security policy to assign the Deny - Execute permission for the Wscript.exe file.

You are the administrator of your company’s network. A user named Peter runs Windows 2000 Professional on his portable computer. Peter wants to be able to work at home on files that were created in the office on the company network. Prior to logging off the network and leaving the office, Peter enables offline files. Peter wants to automatically download all the opened files to his computer and he should not manually define the offline files. What setting you will do in caching option? ()A、Enable file and print sharing. Peter will be able to access his files at home immediatelyB、Synchronize all offline files. Peter will be able to access his files at home immediatelyC、In the cache settings, you should define the manual caching for documentsD、In the cache settings, you should define the automatic caching for documentsE、In the cache settings, you should define the automatic caching for programs.

You encrypt your files to ensure the security of the files. You want to make a backup copy of the files and maintain their security settings. You have the option of backing up to either the network or floppy disk.  What should you do?()A、Copy the files to a network share on an NTFS volume and do nothing further.B、Copy the files to a network share on a FAT 32 volume and do nothing further.C、Copy the files to a floppy disk that has been formatted by using Windows 2000 Professional. D、Place the files in an encrypted folder, and then copy the folder to floppy disk.

You want to configure your Windows 2000 Professional portable computer to use offline files. The files that you want to access offline include a large project file and some smaller personal files. Your portable computer is configured to connect to the network by using the dial up connection at scheduled times during day to automatically download your e-mail messages. You do not want to synchronize the project file when you connect to the network using the dial-up connection. What you should do?()A、Configure the Synchronization Settings to perform a quick synchronization. B、Configure the Synchronization Settings to ask you before synchronizing items. C、Configure the Synchronization Settings to synchronize the project file only when using the LAN connection. Set synchronization for the personal files for both the LAN connection and your dial-up connection. D、Set the synchronization settings to synchronize the project file only when you log off the network. Set synchronization for the personnel files for both the LAN and dialup connection for logging on and logging off.

You have a share on your local computer. Someone has been intentionally damaging your files.  You want to be able to know which account is doing this. What do you do? ()A、Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'. B、Turn on auditing for objects in the Local Security Policy and Select 'Object Access'. C、Use Windows Explorer to turn on auditing for the specific files. D、Have the administrator for domains log you on as an administrator and enable auditing for a  specific file. E、Turn on auditing for objects in the Local Security Policy and Select 'Account Management'. F、Allow only one account at a time to log on to your shared folder. Check the event viewer to  see who logged on.

多选题Your company has a single Active Directory domain. All servers run Windows Server 2008. The company network has 10 servers that perform as Web servers. All confidential files are located on a server named  FSS1. The company security policy states that all confidential data must be transmitted in the most securemanner. When you monitor the network, you notice that the confidential files are stored on the FSS1 server are being transmitted over the network without encryption. You need to ensure taht encryption is always used when the confidential files on the FSS1 server are transmitted over the network. What are two possible ways to achieve this goal?()ADeactivate all LM and NTLM authentication methods on the FSS1 serverBUse IIS to publish the confidentials files. activate SSL on the ISS server, and then open the files as a web folder.CUse IPSec encryption between the FSS1 server and the computers of the users who need to access the confidential filesDUse the Server Message Block (SMB) signing between the FSS1 server and the computers of the users who want to access the confidential files.EActivate offline files for the confidential files that are stored on the FSS1 server. In the Folder Advanced.Properties dialog box, select the Encrypt contents to secure data option.

单选题Your network contains a domain controller that runs Windows Server 2008 R2.  You need to change the location of the Active Directory log files.   Which tool should you use()ADsamainBDsmgmtCDsmoveDNtdsutil

多选题You have a share on your local computer. Someone has been intentionally damaging your files.  You want to be able to know which account is doing this. What do you do? ()ATurn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.BTurn on auditing for objects in the Local Security Policy and Select 'Object Access'.CUse Windows Explorer to turn on auditing for the specific files.DHave the administrator for domains log you on as an administrator and enable auditing for a  specific file.ETurn on auditing for objects in the Local Security Policy and Select 'Account Management'.FAllow only one account at a time to log on to your shared folder. Check the event viewer to  see who logged on.

单选题Every morning, you inspect your company's development and staging servers. You do this to ensure that the servers have the same versions of all files in your Web application.For security reasons, you can only access the staging server through FTP.You need to synchronize files from the staging server so that the staging server matches the development server.You want to achieve this goal by using the minimum amount of administrative effort. Which tool should you use?()AFTPBXCOPYCthe Publish Web toolDthe Copy Web tool

单选题You encrypt three files to ensure the security of the files. You want to make a backup copy of these three files and maintain their security settings. You have the option of backing up to either the network or a floppy disk. What should you do?()ACopy the files to a network share on an NTFS volume. Do nothing further.BCopy the files to a network share on a FAT32 volume. Do nothing further.CCopy the files to a floppy disk that has been formatted by using Win2000 Professional. Do nothing further.DPlace the files in an encrypted folder. Then copy the folder to a floppy disk.

单选题You have a share on your local computer. This share contains some sensitive applications in theform of .exe files. You want to audit the users who are trying to execute these programs. What should you do?()ATurn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.BTurn on auditing for objects in the Local Security Policy and Select 'Object Access'.CUse Windows Explorer to turn on auditing for the specific files. DHave the administrator for domains log you on as an administrator and enable auditing for a  specific file.ETurn on auditing for objects in the Local Security Policy and Select 'Account Management'.FAllow only one account at a time to log on to your shared folder. Check the event viewer to  see who logged on.

多选题You configure your Windows 2000 Professional portable computer to redirect your My Documents folder to your home folder. You want to ensure that you can access all of your files in you’re my Documents folder when you are not connected to the network. What should you do?()AUse Windows Explorer to enable offline files.BUse Windows Explorer to create shortcut to access offline files folder as desktop.CUse Windows Explorer to configure the properties of your home folder to be available offline.DUse synchronization manager to configure your home folder to be available offline.ECreate a shortcut in my network places to access your home folder.

单选题You are a security administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.   The company occasionally experiences downtime because of malicious lnternet worms that arrive as Microsoft Visual Basic Scripting Edition (VBS) files. You examine several client computers and discover that VBS files are downloaded by using Microsoft Outlook,instant messaging,or peer-to-peer file sharing programs.    You need to prevent users from running VBS files regardless of how they arrive on client computers.  What should you do?()A Use a software restriction policy to disable all unauthorized scripts.B Use an Administrative Template to ensure that Outlook and lnternet Explorer are in the Restricted Sites security zonC Use a centralized logon script to rename the Wscript.exe file on each computer to contain a nonexecutable extensioD Use a file system security policy to assign the Deny - Execute permission for the Wscript.exe file.

单选题Your computer is part of a workgroup. You share files with other users on the network. You configure exceptions in Microsoft Windows Firewall to allow file sharing. Users report that they are unable to connect to your computer.  You need to ensure that other users are able to access only the shared files.  What should you do? ()ARestart the Workstation service on your computer.BChange all of your TCP port exceptions to UDP port exceptions.CEnsure parental controls are not configured to block file sharing.DClear the Block all incoming connections check box in Windows Firewall.

单选题You are operating your database in NOARCHIVELOG mode. Your most recent backup includes a copy of all of the data files and the control files taken when the current log sequence number was 45. You experience disk failure on the drive on which your SYSTEM tablespace data files are stored. At the time of the failure, the current log sequence number is 98. Which files should you restore to recover from the loss of the SYSTEM tablespace data files?()AOnly the data files.BAll of the data files and the control files.COnly the data files belonging to the SYSTEM tablespace.DOnly the data files belonging to the SYSTEM tablespace and the control files.

单选题Your company uses a Windows 2008 Enterprise certificate authority (CA) to issue certificates. You need to implement key archival. What should you do()AArchive the private key on the server.BApply the Hisecdc security template to the domain controllers.CConfigure the certificate for automatic enrollment for the computers that store encrypted files.DInstall an Enterprise Subordinate CA and issue a user certificate to users of the encrypted files.

单选题You configure a new file server that runs Windows Server 2008. Users access shared files on the file server. Users report that they are unable to access the shared files. The TCP/IP properties for the file server are configured as shown in the following exhibit.(exhibit not there again wtf!) You need to ensure that users are able to access the shared files. How should you configure the TCP/IP properties in the file server?()AConfigure a static IP addressBConfigure the default gatewayCConfigure the DNS server addressDAdd the domain to the DNS suffix on the network interface

单选题Your network has client computers that run Windows 7 Enterprise.   You plan to deploy new administrative template policy settings by using custom ADMX files.   You create the custom ADMX files, and you save them on a network share. You start Group Policy Object Editor (GPO Editor).   The custom ADMX files are not available in the Group Policy editing session.   You need to ensure that the ADMX files are available to the GPO Editor.   What should you do?()ASet the network share permissions to grant all Windows 7 users Read access for the share.BCopy the ADMX files to the central store,and then restart the GPO Editor.CCopy the ADMX files to the %systemroot%/inf folder on each Windows 7 computer,and then restart the GPO EditorDCopy the ADMX files to the %systemroot%/system32 folder on each Windows 7 computer,and then restart the GPO Editor.

单选题You are the administrator of a computer named Computer1 that runs Windows 7. Several users shareComputer1. The users plan to encrypt files on the computer. You need to ensure that you can access allencrypted files on the computer.  What should you do first?()AAt a command prompt, run Cipher.exe.BAt a command prompt, run Certutil.exe.CFrom the local computer policy, modify the User Rights Assignment.DFrom User Accounts, run the Manage your file encryption certificates wizard.