单选题You need to identify potential security threats. Which of the following security breaches might occur under the current IT and security practices?(Choose all that apply)()AA virus that infects an IT administrator’s client computer could gain domain administrator privilegesBCouriers could gain access to domain administrator privilegesCBusiness office staff could discover couriers’ passwords and use them to access couriers’ informationDAll users could use their user accounts to gain the ability to install untested security patches on their client computers

单选题
You need to identify potential security threats. Which of the following security breaches might occur under the current IT and security practices?(Choose all that apply)()
A

A virus that infects an IT administrator’s client computer could gain domain administrator privileges

B

Couriers could gain access to domain administrator privileges

C

Business office staff could discover couriers’ passwords and use them to access couriers’ information

D

All users could use their user accounts to gain the ability to install untested security patches on their client computers


参考解析

解析: 暂无解析

相关考题:

你们需要安保专家对场馆做安全评估吗?A.Do you need a security expert to value the potential danger of the region?B.Do you need a security expert to calculate the potential adventure of the area?C.Do you need a security expert to account the potential risks of the region?D.Do you need a security expert to evaluate the potential risks of the place?

Your network contains a server that has the SNMP Service installed.You need to configure the SNMP security settings on the server.Which tool should you use?() A.Local Security PolicyB.ScwC.SeceditD.Services console

We need to identify the potential problems.A: possibleB: mainC: immediateD: common

What are two characteristics of the SDM Security Audit wizard?()A、displays a screen with Fix-it check boxes to let you choose which potential security-related configuration changes to implementB、has two modes of operationinteractive and non-interactiveC、automatically enables Cisco IOS firewall and Cisco IOS IPS to secure the routerD、uses interactive dialogs and prompts to implement role-based CLIE、requires users to first identify which router interfaces connect to the inside network and which connectto the outside network

You have an Exchange Server 2010 organization.You need to identify whether an administrator has made a configuration change in the Exchange organization.What should you run?()A、Get-EventLogLevelB、Get-ExchangeServerC、Exchange Best Practices AnalyzerD、Microsoft Baseline Security Analyzer (MBSA)

You need to identify the features that will be available immediately after the domain migration to the new environment is complete. Which feature or features will be available?()A、Global group nesting.B、Universal group nesting.C、Domain local group nesting.D、Universal security groups.E、Sid history attributes.

Your company uses Windows Update to download and install security updates on client computers. When Microsoft releases a security update, you have the following requirements:   Establish which client computers require the security update.   Identify what changes will occur as a result of the security update.  Identify which applications might be affected by the security update.    You need to select the appropriate tool to detect application-compatibility issues.   What should you do?()A、Use the Inventory Collector.B、Use the Setup Analysis Tool.C、Use the Update Compatibility Evaluator.D、Use the Windows Compatibility Evaluator.

You need to identify the types of inbound traffic that should pass through the perimeter firewall while maintaining the security of the network.  Which inbound traffic should be allowed? ()A、 VPN TrafficB、 DNS TrafficC、 LDAP TrafficD、 HTTP TrafficE、 HTTPS TrafficF、 Traffic from the network address of 192.168.10/24

You are the network administrator for Test King. The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. The Default Domain Policy has been modified by importing a security template file, which contain several security settings. A server named TestKing1 cannot run a program that us functioning on other similarly configured servers. You need to find out whether additional security settings have been added to the local security policy on TestKing1. To troubleshoot, you want to use a tool to compare the current security settings on TestKing1 against the security template file in order to automatically identify any settings that might have been added to the local security policy. Which tool should you run on TestKing1?()A、Microsoft Baseline Security Analyzer (MBSA)B、Security Configuration and Analysis consoleC、gpresult.exeD、Resultant Set of Policy console in planning mode

You need to identify all failed logon attempts on the domain controllers.     What should you do()A、Run Event Viewer.B、View the Netlogon.log file.C、Run the Security Configuration Wizard.D、View the Security tab on the domain controller computer object.

You need to identify potential security threats. Which of the following security breaches might occur under the current IT and security practices?(Choose all that apply)()A、A virus that infects an IT administrator’s client computer could gain domain administrator privilegesB、Couriers could gain access to domain administrator privilegesC、Business office staff could discover couriers’ passwords and use them to access couriers’ informationD、All users could use their user accounts to gain the ability to install untested security patches on their client computers

You need to ensure that all servers meet the company’s security requirements. Which tool should you use?()A、Microsoft Baseline Security Analyzer (MBSA)B、Microsoft Security Assessment Tool (MSAT)C、Resultant Set of Policy (RSoP)D、Security Configuration Wizard (SCW)

You have a server that runs Windows Server 2003 Service Pack 2 (SP2).You need to compare the current security settings of the server to a security template. Which tool should you use?()A、Security Templates snap-in B、Group Policy Management Console C、Security Configuration and Analysis snap-in D、Microsoft Baseline Security Analyzer (MBSA)

You have a computer that runs Windows 7. You need to prevent ActiveX controls from running in WindowsInternet Explorer.  Which Internet Explorer settings should you modify?()A、ContentB、EncodingC、SafetyD、Security

单选题An administrator named Admin1 plans to deploy the planned VMs. You need to identify which servers can be converted to VMs by using physical-to-virtual machine (P2V) conversion. Which server or servers should you identify?()AHumongous2BHumongous4CHumongous3DHumongous1

多选题You need to identify the features that will be available immediately after the domain migration to the new environment is complete. Which feature or features will be available?()AGlobal group nesting.BUniversal group nesting.CDomain local group nesting.DUniversal security groups.ESid history attributes.

单选题You are the network administrator for Test King. The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. The Default Domain Policy has been modified by importing a security template file, which contain several security settings. A server named TestKing1 cannot run a program that us functioning on other similarly configured servers. You need to find out whether additional security settings have been added to the local security policy on TestKing1. To troubleshoot, you want to use a tool to compare the current security settings on TestKing1 against the security template file in order to automatically identify any settings that might have been added to the local security policy. Which tool should you run on TestKing1?()AMicrosoft Baseline Security Analyzer (MBSA)BSecurity Configuration and Analysis consoleCgpresult.exeDResultant Set of Policy console in planning mode

单选题You need to ensure that all servers meet the company’s security requirements. Which tool should you use?()AMicrosoft Baseline Security Analyzer (MBSA)BMicrosoft Security Assessment Tool (MSAT)CResultant Set of Policy (RSoP)DSecurity Configuration Wizard (SCW)

单选题You need to identify the data mining algorithm that meets the requirements of the credit department. Which algorithm should you use?()AMicrosoft ClusteringBMicrosoft Decision TreeCMicrosoft Nave BayesDMicrosoft Association

单选题You have a computer that runs Windows 7. You need to identify which hardware is required to create a system repair disc.  Which hardware should you identify?()ACD/DVD burnerBfloppy diskCtape driveDUSB disk

单选题You have an Exchange Server 2010 organization.You need to identify whether an administrator has made a configuration change in the Exchange organization.What should you run?()AGet-EventLogLevelBGet-ExchangeServerCExchange Best Practices AnalyzerDMicrosoft Baseline Security Analyzer (MBSA)

单选题You need to recommend a NAP enforcement method that meets the companyˉs security requirements. Which method should you recommend?()A802.1XBDHCPCIPSecDVPN

单选题Your network contains a server that has the SNMP Service installed.You need to configure the SNMP security settings on the server.Which tool should you use?()ALocal Security PolicyBScwCSeceditDServices console

单选题You need to design the consolidation plan for SQL1, SQL2, and SQL3. You need to identify the appropriate combination of SQL Server instances and SQL Server 2005 computers that are needed to fulfill the company’s consolidation plans and security requirements.Which combination should you use?()Aone SQL Server 2005 computer with one instanceBtwo SQL Server 2005 computers, each with two instancesCtwo SQL Server computers, one with one instance and one with three instancesDone SQL Server 2005 computer with two instances

多选题You need to identify the types of inbound traffic that should pass through the perimeter firewall while maintaining the security of the network.  Which inbound traffic should be allowed? ()AVPN TrafficBDNS TrafficCLDAP TrafficDHTTP TrafficEHTTPS TrafficFTraffic from the network address of 192.168.10/24

单选题You need to identify which tool the help desk users must use to perform administrative tasks.  Which tool should you identify?()ARemoteAppBRemote AssistanceCRemote DesktopDRemote Server Administration Tools (RSAT)

单选题You are using Windows Communication Foundation (WCF) to create a service. You need to implement a custom message-level security binding element. Which binding element should you use?()ATransport Security Binding ElementBHttps Transport Binding ElementCSsl Stream Secunty Binding ElementDWindows Stream Security Binding Element

多选题What are two characteristics of the SDM Security Audit wizard?()Adisplays a screen with Fix-it check boxes to let you choose which potential security-related configuration changes to implementBhas two modes of operationinteractive and non-interactiveCautomatically enables Cisco IOS firewall and Cisco IOS IPS to secure the routerDuses interactive dialogs and prompts to implement role-based CLIErequires users to first identify which router interfaces connect to the inside network and which connectto the outside network