单选题You need to design a strategy to ensure that all servers are in compliance with the business requirements for maintaining security patches. What should you do?()ALog on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the domainBLog on to each server and run Security Configuration and Analysis to analyze the security settings by using a custom security templateCCreate a logon script to run the secedit command to analyze all servers in the domainDRun the Microsoft Baseline Security Analyzer (MBSA) on a server to scan for Windows vulnerabilities on all servers in the domain

单选题
You need to design a strategy to ensure that all servers are in compliance with the business requirements for maintaining security patches. What should you do?()
A

Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the domain

B

Log on to each server and run Security Configuration and Analysis to analyze the security settings by using a custom security template

C

Create a logon script to run the secedit command to analyze all servers in the domain

D

Run the Microsoft Baseline Security Analyzer (MBSA) on a server to scan for Windows vulnerabilities on all servers in the domain


参考解析

解析: 暂无解析

相关考题:

Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2008 R2. All servers run Windows Server 2008 R2.   A corporate security policy requires complex passwords for user accounts that have administrator  privileges. You need to design a strategy that meets the following requirements: èEnsures that administrators use complex passwords   èMinimizes the number of servers required to support the solution What should you include in your design?()A、Implement Network Access Protection (NAP).B、Implement Active Directory Rights Management Services (AD RMS).C、Create a new Password Settings Object (PSO) for administrator accounts.D、Create a new child domain in the forest. Move all non-administrator accounts to the new domain.Configure a complex password policy in the root domain.

You need to design desktop and security settings for the client computers in the Seattle call center. Your solution must be implemented by using the minimum amount of administrative effort.Which two actions should you perform?()A、On each client computer in the call center, configure a local policy that lists only authorized programs in the Allowed Windows Programs listB、Using NTFS permissions, assign the Deny – Read permission for all unauthorized executable files to the client computer domain accountsC、Design a Group Policy object (GPO) that enforces a software restriction policy on all client computers in the call centerD、Design a Group Policy object (GPO) that implements an IPSec policy on all client computers in the call center. Ensure that the IPSec policy rejects connections to any Web servers that the company does not operate

You design a Business Intelligence (BI) solution by using SQL Server 2008. You plan to design the report strategy for a new report project that will be used by a financial application. The application uses five calculations that are implemented in Microsoft .NET Framework 3.5 assemblies. The assemblies are written in the C# language and use the static methods. You need to ensure that the calculations can be used by the expressions in all reports. You also need to ensure consistency within the reports by using the least amount of development effort. What should you do?()A、 Add a reference to the assemblies in the Report Properties References tab. B、 Write the calculation logic used by the calculations by using T-SQL functions. C、 Write the code of the calculation logic into the Report Properties Custom Code tab.D、 Write the calculation logic in each report by using the mathematical functions available natively to SQL Server 2008 Reporting Services (SSRS).

You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. TestKing.com is configured to run an exchange 2010 environment.  You are planning to design the installation of numerous Mailbox servers. TestKing.com Service LevelAgreement (SLA) requires the following: * The servers need to support 1,500 concurrent connections to mailboxes.* The servers need to maintain a latency of less than 20 milliseconds. You ensure deployment success you need to ensure that your design comply with the Service LevelAgreement (SLA) of TestKing.com. What should you do?()A、The best option is to use the Exchange Server User Monitor (ExMon) tool to check if your design meets the requirements.B、The best option is to use the Exchange Server Load Generator (LoadGen) 2010 tool to check if your design meets the requirements.C、The best option is to use the Exchange Server Connectivity Analyzer (ExRCA) tool to check if your design meets the requirements.D、The best option is to use the Exchange Server Jetstress 2010 tool to check if you design meets there quirements.

You need to design a strategy for moving the mailboxes from the Exchanges server at the Paris branch office to the Exchange server at the main office. What should you do?()A、Use the Exchange Task Wizard to migrate all the mailboxes to the Exchange 2003 serverB、Use the Exchange Mailbox Merge Wizard (Exmerge0 to migrate all the mailboxes to the Exchange 2003 serverC、Use the Exchange Server Migration Wizard to migrate all the mailboxes to the Exchange 2003 serverD、Export the contents of each mailbox to a .pst file. Create a new mailbox on the Exchange 2003 servers for each existing mailbox. Import the .pst file contents into each new mailbox

You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains 50 application servers that run Windows Server 2003.   The security configuration of the application servers is not uniform. The application servers were deployed by local administrators who configured the settings for each of the application servers differently based on their knowledge and skills. The application servers are configured with different authentication methods, audit settings, and account policy settings.   The security team recently completed a new network security design. The design includes a baseline configuration for security settings on all servers. The baseline security settings use the Hisecws.inf predefined security template. The design also requires modified settings for servers in an application role. These settings include system service startup requirements, renaming the administrator account, and more stringent account lockout policies. The security team created a security template named Application.inf that contains the modified settings.   You need to plan the deployment of the new security design. You need to ensure that all security settings for the application servers are standardized, and that after the deployment, the security settings on all application servers meet the design requirements.   What should you do? ()A、 Apply the Setup security.inf template first, the Hisecws.inf template next, and then the Application.inf template.B、 Apply the Application.inf template and then the Hisecws.inf template.C、 Apply the Application.inf template first, the Setup security.inf template next, and then the Hisecws.inf template.D、 Apply the Setup security.inf template and then the Application.inf template.

You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()A、Require client computers to connect to the marketing application by using a VPN connectionB、Use IPSec to encrypt communications between the servers in the New York and Atlanta officesC、Require the high security setting on Terminal Services connections to the marketing applicationD、Configure all marketing application Web pages to require SSL

You need to design a method to log changes that are made to servers and domain controllers. You also need to track when administrators modify local security account manager objects on servers. What should you do?()A、Enable failure audit for privilege user and object access on all servers and domain controllersB、Enable success audit for policy change and account management on all servers and domain controllersC、Enable success audit for process tracking and logon events on all servers and domain controllersD、Enable failure audit for system events and directory service access on all servers and domain controllers

You need to design a security strategy for the DHCP servers in the Seattle office. Which two actions should you perform?()A、Disable all unnecessary services on each DHCP serverB、Modify the discretionary access control lists (DACLs) in Active Directory so that only members of the Enterprise Admins security group can authorize additional DHCP serversC、Use an IPSec policy that allows only the packets necessary for DHCP and domain membership for each DHCP serverD、Install a digital certificate for SSL on each DHCP server

Your network includes Windows Server 2008 R2 Hyper-V servers. You are configuring the servers in a failover cluster that will host highly available virtual machines (HAVMs).  You plan to manage the servers in the cluster by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to design a storage solution for the cluster that allows you to migrate virtual machines (VMs) into and out of the cluster by using SAN migration.  Which two actions should you include in your design?()A、Enable the automount feature on each node in the clusterB、Install a Virtual Disk Service (VDS) hardware provider on each node in the clusterC、Place all VMs on a single Cluster Shared Volume (CSV)D、Place all VMs on a dedicated logical unit number (LUN)

You have an Exchange Server 2010 organization.  Your company has a relationship with another company.  The partner company has an Exchange Server 2010 organization.  You need to recommend a security solution to meet the following requirements:  .Ensure that all e-mail delivery between your servers and the partner companys servers is encrypted .Ensure that all communication between your servers and the partner companys servers is authenticated What should you include in the solution?()A、Active Directory Rights Management Services (AD RMS)B、Domain SecurityC、Forms-based AuthenticationD、Secure/Multipurpose Internet Mail Extensions (S/MIME)

You are designing a Windows Server 2008 R2 Hyper-V environment. Your design includes a failover cluster that supports live migration. You need to ensure that the network supports this design. What should you do?()A、Use two iSCSI host bus adaptersB、Use two Fibre Channel host bus adaptersC、Place the physical host servers on the same TCP/IP subnetD、Place the physical host servers on different TCP/IP subnets

You need to design a strategy for migrating to the mailboxes from Exchange Server 5.5 to Exchange Server 2003. What should you do?()A、Use the Exchange Migration Wizard to migrate all the mailboxes to the Exchange 2003 ServersB、Use the Exchange Mailbox Merge Wizard (Exmerge) to migrate all the mailboxes to use the Exchange 2003 serversC、Use the Exchange Server Migration Wizard to migrate all the mailboxes to the Exchange 2003 ServersD、Export the contents of each mailbox to a .pst file. Create a new mailbox on the Exchange 2003 servers for each existing mailbox. Import the .pst file contents into each new mailbox

You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. You need to update six high-visibility servers with critical updates by using Windows Server Update Services (WSUS). You approve all of the updates.You need to ensure that the updates are applied within one hour.  What should you do?()A、On the WSUS server, type the gpupdate /force command at the command prompt.B、On the WSUS server, type the wuauclt /detectnow command at the command prompt.C、On each of the six servers, type the gpupdate /force command at the command prompt.D、On each of the six servers, type the wuauclt /detectnow command at the command prompt.

You need to design a strategy to ensure that all servers are in compliance with the business requirements for maintaining security patches. What should you do?()A、Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the domainB、Log on to each server and run Security Configuration and Analysis to analyze the security settings by using a custom security templateC、Create a logon script to run the secedit command to analyze all servers in the domainD、Run the Microsoft Baseline Security Analyzer (MBSA) on a server to scan for Windows vulnerabilities on all servers in the domain

单选题You need to design a security strategy for a remote e-mail access. What should you do?()ARequire remote users to access e-mails by using Outlook Mobile AccessBRequire Outlook Web Access users to install the secure MIME ActiveX-Control and to encrypt all messagesCOn Outlook Web Access servers that accept connections from the Internet configure IIS to require SSL for all connectionsDOn Outlook Web Access servers that accept connections from the Internet configure IIS to require Integrated Windows Authentication

单选题You need to design a method to configure the servers in the development department to meet the requirements of the chief information officer. What should you do?()AUse error reporting on all servers in the development department to report errors for a custom applicationBConfigure all servers in the development department so that they do not require the CTRL+ALT+DELTE keys to pressed in order to log on interactively to the serverCCreate a Group Policy object (GPO) and link it to the development department’s Servers OU. Configure the GPO with an interactive logon policy to display a message for users who attempt to log onDConfigure the screen saver on all servers in the development department to require a password

单选题You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()AEncrypt customer information when it is stored and when it is being transmittedBRequire encrypted connections to the public Web site, which is hosted on the Web server on the perimeter networkCEncrypt all marketing information on file servers and client computersDRequire encrypted connections to all file servers

单选题The company is evaluating using a new Active Directory domain to contain all customer user accounts. You need to design a monitoring or logging strategy that meets business and security requirements for the new Web-based ordering application. Your solution must minimize overhead on existing domain controllers and servers.  What should you do?()AEnable logon auditing in both the new and the existing domainsBEnable logon auditing only in the existing domainCEnable logon auditing only in the new domainDEnable logon auditing on only the Web server

单选题You need to ensure that all servers meet the company’s security requirements. Which tool should you use?()AMicrosoft Baseline Security Analyzer (MBSA)BMicrosoft Security Assessment Tool (MSAT)CResultant Set of Policy (RSoP)DSecurity Configuration Wizard (SCW)

单选题You need to recommend a Group Policy strategy for the Remote Desktop servers. What should you include in the recommendation?()Ablock inheritanceBloopback processingCsecurity filteringDWMI filtering

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains 50 application servers that run Windows Server 2003.   The security configuration of the application servers is not uniform. The application servers were deployed by local administrators who configured the settings for each of the application servers differently based on their knowledge and skills. The application servers are configured with different authentication methods, audit settings, and account policy settings.   The security team recently completed a new network security design. The design includes a baseline configuration for security settings on all servers. The baseline security settings use the Hisecws.inf predefined security template. The design also requires modified settings for servers in an application role. These settings include system service startup requirements, renaming the administrator account, and more stringent account lockout policies. The security team created a security template named Application.inf that contains the modified settings.   You need to plan the deployment of the new security design. You need to ensure that all security settings for the application servers are standardized, and that after the deployment, the security settings on all application servers meet the design requirements.   What should you do? ()A Apply the Setup security.inf template first, the Hisecws.inf template next, and then the Application.inf template.B Apply the Application.inf template and then the Hisecws.inf template.C Apply the Application.inf template first, the Setup security.inf template next, and then the Hisecws.inf template.D Apply the Setup security.inf template and then the Application.inf template.

单选题You design a Business Intelligence (BI) solution by using SQL Server 2008. You plan to design the report strategy for a new report project that will be used by a financial application. The application uses five calculations that are implemented in Microsoft .NET Framework 3.5 assemblies. The assemblies are written in the C# language and use the static methods. You need to ensure that the calculations can be used by the expressions in all reports. You also need to ensure consistency within the reports by using the least amount of development effort. What should you do?()A Add a reference to the assemblies in the Report Properties References tab. B Write the calculation logic used by the calculations by using T-SQL functions. C Write the code of the calculation logic into the Report Properties Custom Code tab.D Write the calculation logic in each report by using the mathematical functions available natively to SQL Server 2008 Reporting Services (SSRS).

单选题You need to design a group membership strategy for the EditorialAdmins group. What should you do?()AMove the EditorialAdmins group to the Servers OU in the editorial departmentBMove the members of the EditorialAdmins group to the Editorial OUCMove the members of the EditorialAdmins group to the New York OUDMove the EditorialAdmins group to the New York OU

单选题You need to design a monitoring strategy to meet business requirements for data on servers in the production department. What should you do?()AUse the Microsoft Baseline Security Analyzer (MBSA) to scan for Windows vulnerabilities on all servers in the production departmentBRun Security and Configuration Analysis to analyze the security settings of all servers in the production departmentCEnable auditing for data on each server in the production department. Run System Monitor on all servers in the production department to create a counter log that tracks activity for the Objects performance objectDCreate a Group Policy Object (GPO) that enables auditing for object access and link it to the product department’s Servers OU. Enable auditing for data on each server in the production department

多选题You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all client computers run Windows XP Professional. You are required to implement a backup strategy for all five servers on the network. You use the Backup Utility to schedule nightly backup jobs. You create a domain user account named BackupSvc, and add it to the local Backup Operators group on all file servers. The scheduled backup jobs will use BackupSvc to log on to the network Nightly backups occur successfully for six weeks. Then, nightly backups fail on all servers. When you examine the event log of one server, you discover that the password for BackupSvc is expired. You reset the password and select the Password never expires option for BackupSvc. The next day, you discover that the previous night's backup failed on all file servers. You need to ensure that the next night's backup is successful. Which two actions should you perform? (Each correct answer presents part of the solution.() Choose two)AStop and restart every file server.BStop and restart the backup application on every file server.CChange the password for the backup job on every file server.DIn Active Directory Users and Computers, increase the value of the Account lockout threshold option.EUnlock the BackupSvc account.