单选题Which should be the key driver for a company security policy’s creation, implementation and enforcement?()A the business knowledge of the IT staffB the technical knowledge of the IT staffC the company’s business objectivesD the company’s network topologyE the IT future directions

单选题
Which should be the key driver for a company security policy’s creation, implementation and enforcement?()
A

 the business knowledge of the IT staff

B

 the technical knowledge of the IT staff

C

 the company’s business objectives

D

 the company’s network topology

E

 the IT future directions


参考解析

解析: 暂无解析

相关考题:

What's up?____________ A.I won't tell youB.The ABC company is suing usC.It's noe of your business

Directions:The following isan introduction of a company.After reading it, you should give brief answers to the five questions ( No.56 to No. 60) that follow. The answers(in not more than 3 words)should be written after the corresponding numbers on the Answer Sheet.Ditis Hong Kong Ltd is a manufacturer of security products and peripheral equipment, knowledge-based company. All of our managers has high technical education and fluently spoken English, Chinese, Japanese and Russian. We major in professional digital security products. Our products with advanced technology, stable performance, cost-effective, stylish design, excellent quality, has won the trust of customers and a wide range of popular.Being a professional manufacturer of security products, we value Innovation, Dedication and Superiority, and satisfy our customers by adding new designs and features to our products according to customers needs.Our service knowledge is second to none. We really appreciate your business and hope to deal with you again.We sincerely welcome customers to visit and give us your advice.41.What kind of company is Ditis Hong Kong Ltd?Ditis Hong Kong Ltd is a manufacturer of ________ and peripheral equipment, knowledge-based company.42. What’s the educational background of the managers in Ditis Hong Kong Ltd?All of our managers has ________________.43. What’s the major products of the company?They major in ______________ products.44. How can the company satisfy its customers?It satisfies its customers by adding ____________to our products according to customers needs45. How about the service and knowledge of the company?Our service knowledge is ___________.

Which of the following is NOT an element in a business card?A: Giver’s nameB: Company affiliationC: Contact informationD: Photo

It is essential for ________ to give a complete description of damage and shortage in the discharging report.A.the office staffB.the terminal staffC.the ship's crewD.the insurance company

You need to recommend a solution to ensure that all of the client computers that run Windows 7 meet the company’s security requirements.   What should you include in the recommendation?()A、Encrypted File System (EFS)B、the AppLocker Group Policy settingsC、the IPSec enforcement methodD、Windows BitLocker Drive Encryption (BitLocker)

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services,and configuring aweb services infrastructure. There is an Active Directory domain in your company. The company has aserver which is named S01. S01 has the Terminal Services server role and the TS Web Access role service installed. The company has a server named S02 that runs ISA Server 2006. The company deploysthe Terminal Services Gateway (TS Gateway) role on a new server named S03. The company wants to useISA as the SSL endpoint for Terminal Server connections. You have to configure the TS Gateway role onS03 to use ISA 2006 on S02. What action should you perform?()A、A self-signed SSL certificate should be exported from S03 and the SSL certificate should be installedon S02. The ISA service on S02 should be configured to use the SSL certificate from S03.B、The TS Gateway should be configured to use SSL HTTPS-HTTP bridging.C、The Terminal Services Connection Authorization Policy Store on S03 should be configured to use S02as the Central Network Policy Server.D、The SSL certificate should be exported from S02 and the SSL certificate should be installed on S03.The TS Gateway should be configured to use the SSL certificate from S02.

The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()A、On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policyB、On all client computers, implement logon auditing for all user account logonsC、On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policyD、On all domain controllers, implement logon auditing for all user account logons

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a server named S01 that runs Windows Server 2008 and Hyper-V inyour company. Three virtual machines are hosted on S01. According to the requirement of company policy,the virtual machines must not connect to the company network. All of the virtual machines need to beconfigured to connect to each other. You must meet the company policy. Which should you do?()A、The Connection should be set to Host for the network interface card.B、The Connection should be set to None for the network interface card.C、You should choose the Not connected option for each virtual machine.D、The Enable virtual LAN identification option should be enabled for each virtual machine.

You need to recommend a NAP enforcement method that meets the companyˉs security requirements. Which method should you recommend?()A、802.1XB、DHCPC、IPSecD、VPN

An administrator is implementing a new data retention program for the company. Which of the following is the MOST important consideration as the new program is created? ()A、 Awareness of company policy requirementsB、 Differentiating between archiving and backup processesC、 Awareness of potential legal requirementsD、 Ensuring that the backups for the retention program cover key business areas

Which should be the key driver for a company security policy’s creation, implementation and enforcement?()A、 the business knowledge of the IT staffB、 the technical knowledge of the IT staffC、 the company’s business objectivesD、 the company’s network topologyE、 the IT future directions

Which of the following documents should always be kept up-to-date after any major changes aremade to a network backbone?()A、Network diagramB、Performance baselineC、Network security procedureD、Company policy

You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently configured a user named Rory Allen as a Delegate for a user named Dean Austin.During the course of the business week you receive instruction from Company.com to ensurethat Rory Allen is able to add Dean Austin in the from field when sending messages whilst ensuring messages which contain Dean Austin in the From field should display Dean Austin s the message sender when the recipient receive the messages.  What should you do?()A、You should consider having a Sharing policy created.You should then have Rory Allen granted Modify permission to Dean Austin’s mailbox.B、You should consider having a Sharing policy created.You should then have Rory Allen granted Full Mailbox permission to Dean Austin’s mailbox.C、You should consider having Rory Allen removed as a delegate.You should then have Rory Allen granted Send As permission to Dean Austin’s Mailbox.D、You should consider having Rory Allen removed as a delegate.You should then have Rory Allen granted Send on Behalf permission to Dean Austin’s mailbox.

You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to prevent the network user named Rory Allen from downloading attachments which are larger than 50 KB when making use of Exchange ActiveSync whilst ensuring your solution affects no other users. What should you do?()A、You should consider having the properties of Rory Allen’s mailbox modified.B、You should consider having the properties if the default Exchange ActiveSync Mailbox policy modified.C、You should consider having a new ActiveSynce Device Access rule created.D、You should consider having a new Exchange ActiveSync Mailbox policy created.

You need to ensure that all servers meet the company’s security requirements. Which tool should you use?()A、Microsoft Baseline Security Analyzer (MBSA)B、Microsoft Security Assessment Tool (MSAT)C、Resultant Set of Policy (RSoP)D、Security Configuration Wizard (SCW)

单选题You need to recommend a solution to ensure that all of the client computers that run Windows 7 meet the company’s security requirements.   What should you include in the recommendation?()AEncrypted File System (EFS)Bthe AppLocker Group Policy settingsCthe IPSec enforcement methodDWindows BitLocker Drive Encryption (BitLocker)

单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently attempted the creation of a new address list based on the network user’s country attribute but discovered that the attribute is not available in the New Address List Wizard.During the course of the business week you receive instruction from Company.com to create a new address list based on the network user’s country. What should you do?()AYou should consider having a new dynamic distribution group created and run the New Address List wizard from the Exchange Management Console (EMC).BYou should consider having the properties of the All Users Address list modified and run the New Address List wizard from the Exchange Management Console (EMC).CYou should consider having the Set-AddressList cmdlet run from the Exchange Management Shell.DYou should consider having the New-AddressList cmdlet run from the Exchange Management Shell.

单选题You need to recommend a NAP enforcement method that meets the companyˉs security requirements. Which method should you recommend?()A802.1XBDHCPCIPSecDVPN

单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently configured a user named Rory Allen as a Delegate for a user named Dean Austin.During the course of the business week you receive instruction from Company.com to ensurethat Rory Allen is able to add Dean Austin in the from field when sending messages whilst ensuring messages which contain Dean Austin in the From field should display Dean Austin s the message sender when the recipient receive the messages.  What should you do?()AYou should consider having a Sharing policy created.You should then have Rory Allen granted Modify permission to Dean Austin’s mailbox.BYou should consider having a Sharing policy created.You should then have Rory Allen granted Full Mailbox permission to Dean Austin’s mailbox.CYou should consider having Rory Allen removed as a delegate.You should then have Rory Allen granted Send As permission to Dean Austin’s Mailbox.DYou should consider having Rory Allen removed as a delegate.You should then have Rory Allen granted Send on Behalf permission to Dean Austin’s mailbox.

单选题The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()AOn all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policyBOn all client computers, implement logon auditing for all user account logonsCOn all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policyDOn all domain controllers, implement logon auditing for all user account logons

单选题You need to ensure that all servers meet the company’s security requirements. Which tool should you use?()AMicrosoft Baseline Security Analyzer (MBSA)BMicrosoft Security Assessment Tool (MSAT)CResultant Set of Policy (RSoP)DSecurity Configuration Wizard (SCW)

多选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a server named S01 that runs Windows Server 2008 and Hyper-V inyour company. Three virtual machines are hosted on S01. According to the requirement of company policy,the virtual machines must not connect to the company network. All of the virtual machines need to beconfigured to connect to each other. You must meet the company policy. Which should you do?()AThe Connection should be set to Host for the network interface card.BThe Connection should be set to None for the network interface card.CYou should choose the Not connected option for each virtual machine.DThe Enable virtual LAN identification option should be enabled for each virtual machine.

单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to prevent the network user named Rory Allen from downloading attachments which are larger than 50 KB when making use of Exchange ActiveSync whilst ensuring your solution affects no other users. What should you do?()AYou should consider having the properties of Rory Allen’s mailbox modified.BYou should consider having the properties if the default Exchange ActiveSync Mailbox policy modified.CYou should consider having a new ActiveSynce Device Access rule created.DYou should consider having a new Exchange ActiveSync Mailbox policy created.

单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services,and configuring aweb services infrastructure. There is an Active Directory domain in your company. The company has aserver which is named S01. S01 has the Terminal Services server role and the TS Web Access role service installed. The company has a server named S02 that runs ISA Server 2006. The company deploysthe Terminal Services Gateway (TS Gateway) role on a new server named S03. The company wants to useISA as the SSL endpoint for Terminal Server connections. You have to configure the TS Gateway role onS03 to use ISA 2006 on S02. What action should you perform?()AA self-signed SSL certificate should be exported from S03 and the SSL certificate should be installedon S02. The ISA service on S02 should be configured to use the SSL certificate from S03.BThe TS Gateway should be configured to use SSL HTTPS-HTTP bridging.CThe Terminal Services Connection Authorization Policy Store on S03 should be configured to use S02as the Central Network Policy Server.DThe SSL certificate should be exported from S02 and the SSL certificate should be installed on S03.The TS Gateway should be configured to use the SSL certificate from S02.

单选题In the author’s opinion, which of the following is vital for a company to be successful?ASpecialized knowledge.BHighly-skilled staff.CExceptional talent.DTeamwork skills.

单选题Where does the first passage likely appear?AIn a corporate promotional newsletterBIn a letter to the company's managementCIn a company's annual financial reportDIn the business section of a newspaper

单选题In those early days, the boy company's()business was model railways and cars.AusefulBfullCeasyDcore