多选题You need to design a password policy that meets business requirements. What should you do? Select all that apply.()AIncrease the number of passwords that are rememberedBDisable reversible encryptionCSet the minimum password age to zero daysDIncrease the maximum password age
多选题
You need to design a password policy that meets business requirements. What should you do? Select all that apply.()
A
Increase the number of passwords that are remembered
B
Disable reversible encryption
C
Set the minimum password age to zero days
D
Increase the maximum password age
参考解析
解析:
暂无解析
相关考题:
Which statement is correct about defining an Infranet Enforcer for use as a RADIUS Client? () A. You do not need to configure a RADIUS client policy.B. You must know the exact model number of the Infranet Enforcer.C. You must specify the NACN password of the device in the RADIUS client policy.D. You do not need to designate a location group to which the Infranet Enforcer will belong.
Which statement is correct about defining an Infranet Enforcer for use as a RADIUS Client? ()A、You do not need to configure a RADIUS client policy.B、You must know the exact model number of the Infranet Enforcer.C、You must specify the NACN password of the device in the RADIUS client policy.D、You do not need to designate a location group to which the Infranet Enforcer will belong.
Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2008 R2. All servers run Windows Server 2008 R2. A corporate security policy requires complex passwords for user accounts that have administrator privileges. You need to design a strategy that meets the following requirements: èEnsures that administrators use complex passwords èMinimizes the number of servers required to support the solution What should you include in your design?()A、Implement Network Access Protection (NAP).B、Implement Active Directory Rights Management Services (AD RMS).C、Create a new Password Settings Object (PSO) for administrator accounts.D、Create a new child domain in the forest. Move all non-administrator accounts to the new domain.Configure a complex password policy in the root domain.
You need to design a method to standardize and deploy a baseline security configuration for servers. You solution must meet business requirements. What should you do?()A、Create a script that installs the Hisecdc.inf security templateB、Use a GPO to distribute and apply the Hisec.inf security templateC、Use the System Policy Editor to configure each server’s security settingsD、Use a GPO to distribute and apply a custom security template
You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. TestKing.com is configured to run an exchange 2010 environment. You are planning to design the installation of numerous Mailbox servers. TestKing.com Service LevelAgreement (SLA) requires the following: * The servers need to support 1,500 concurrent connections to mailboxes.* The servers need to maintain a latency of less than 20 milliseconds. You ensure deployment success you need to ensure that your design comply with the Service LevelAgreement (SLA) of TestKing.com. What should you do?()A、The best option is to use the Exchange Server User Monitor (ExMon) tool to check if your design meets the requirements.B、The best option is to use the Exchange Server Load Generator (LoadGen) 2010 tool to check if your design meets the requirements.C、The best option is to use the Exchange Server Connectivity Analyzer (ExRCA) tool to check if your design meets the requirements.D、The best option is to use the Exchange Server Jetstress 2010 tool to check if you design meets there quirements.
You need to design a security strategy for VPN2. Your solution must meet business requirements. What should you do?()A、Create and configure a new security template. Import the template into the Default Domain Policy Group Policy object (GPO)B、Install Internet Authentication Service (IAS) on RAS1. Configure VPN2 to be the RADIUS client of RAS1. Configure the remote access policy on VPN2C、Create and configure a new security template. Import the template into the local policy on VPN2D、Move VPN2 into the VPN Servers OU. Configure the remote access policy on VPN2
You need to recommend an availability solution for Site1 that meets the company's application requirements and business goals. What should you include in the recommendation?()A、hardware load balancingB、Network Load Balancing (NLB)C、round robin DNSD、Windows Failover Clustering
You need to design a PKI that meets business requirements. What should you do?()A、Move ATLCA1 offline and create an enterprise subordinate CA to issue certificatesB、Create a stand-alone subordinate CA to issue certificatesC、Use a qualified subordinate CAD、Configure certificate template access control lists (ACLs) on ATLCA1
You need to design a method to implement account policies that meets the requirements in the written security policy. What should you do?()A、Create a GPO and link it to the New York OU, to the Denver OU, and to the Dallas OU.Configure the GPO with the required account policy settingsB、On all computers in the domain, configure the Local Security Policy7 with the required account policy settingsC、Configure the Default Domain Policy GPO with the required account policy settingsD、Configure the Default Domain Controllers Policy GPO with the required account policy settings
You need to design a method to address the chief information officer’s security concerns. What should you do?()A、Configure Windows Management Instrumentation (WMI) filtering options in the Default Domain Policy GPOB、Use the gpresult commandC、Use Mbsacli.exeD、Configure software restriction policy options in the Default Domain Policy GPO
You deploy mobile devices that run Microsoft Windows Mobile 5.0. Company security policy requires an authentication process that is stronger than a user name and password combination. You need to ensure that Microsoft ActiveSync sessions use an authentication process that meets the company security policy. What should you do?()A、Deploy a two-factor authentication process.B、Deploy a single-factor authentication process.C、Deploy a simple PIN policy for the Windows Mobilebased devices.D、Deploy a complex PIN policy for the Windows Mobilebased devices.
You need to recommend a BitLocker recovery method that meets the company’s technical requirements. Which recovery method should you recommend?()A、a data recovery agentB、a recovery keyC、a recovery password printed and stored in a secure locationD、a recovery password stored in Active Directory
You need to design a domain model that meets the company business and security requirements for controlling access to the new Web-based ordering application. What should you do?()A、Create a child OU within the existing domainB、Create a child domain of the existing domainC、Create a new domain in a new forest. Configure the new domain to trust the existing domainD、Create a new tree in the existing forest. Configure the new domain to trust the existing domain
You create a Password Settings object (PSO). You need to apply the PSO to a domain user named User1. What should you do()A、Modify the properties of the PSO.B、Modify the account options of the User1 account.C、Modify the security settings of the User1 account.D、Modify the password policy of the Default Domain Policy Group Policy object (GPO).
You are the network administrator for The network consists of a single Activev Directory domain named . All network servers run Windows Server 2003. purchases a new server to test applications in a stand-alone environment. The company's written security policy states that if a user attempts to log on by using an incorrect password three times in 30 minutes, the account is locked out. An administrator must unlock the account. You discover that users of the new server who have accounts that are locked out can log on again after 30 minutes. You need to ensure that the new server meets the requirements of the written security policy. What should you do?()A、Set the Reset account lockout counter after policy to 1.B、Set the Reset account lockout counter after policy to 99999.C、Set the Account lockout duration policy to 0.D、Set the Account lockout duration policy to 99999
You need to recommend a strategy for managing Windows Firewall that meets the companys technical requirements. What should you include in the recommendation?()A、domain-based Group Policy objects (GPOs)B、local Group Policy objects (GPOs)C、Starter Group Policy objects (GPOs)D、System Starter Group Policy objects (GPOs)
You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()A、Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computersB、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersC、Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersD、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers
You need to design a password policy that meets business requirements. What should you do? Select all that apply.()A、Increase the number of passwords that are rememberedB、Disable reversible encryptionC、Set the minimum password age to zero daysD、Increase the maximum password age
单选题You need to create a Password Settings object (PSO). Which tool should you use()AActive Directory Users and ComputersBADSI EditCGroup Policy Management ConsoleDNtdsutil
单选题You need to recommend a BitLocker recovery method that meets the company’s technical requirements. Which recovery method should you recommend?()Aa data recovery agentBa recovery keyCa recovery password printed and stored in a secure locationDa recovery password stored in Active Directory
单选题Your network contains an Active Directory domain. The domain contains a group named Group1. The minimum password lenght for the domain is set to six characters. you need to ensure that the passwords for all users in Group1 are at least 10 characters long. All other users must be able to use passwords that are six characters long. What should you do first()ARun the New-ADFineGrainedPasswordPolicy cmdlet.BRun the Add-ADFineGrainedPasswordPolicySubject cmdlet.CFrom the Default Domain Policy, modify the password policy.DFrom the Default Domain Controller Policy, modify the password policy.
单选题You need to design a software usage policy for the employees of Southbridge Video. The policy must meet business requirements. What should you do?()AConfigure the software restriction policy in the Default Domain Policy Group Policy object (GPO)BCreate a new connection object by using the Connection Manager Administration Kit (CMAK), and install the new connection object on all client computersCCreate and configure a local security policy on both of the ISA server computersDConfigure the Internet Explorer settings in the Default Domain Policy Group Policy object (GPO)
单选题You are planning to upgrade Internet Explorer. You have the following requirements: Create a report that identifies which computers are successfully upgraded. Do not install additional software on the client computers. You need to design a deployment method that meets the requirements. What should you do?()AUse Internet Explorer Administration Kit (IEAK) and Group Policy.BUse Microsoft System Center Configuration Manager.CUse Windows Server Update Services (WSUS).DUse Microsoft System Center Essentials.
单选题You need to design an authentication solution for Terminal Services that meets the business requirements.What should you do?()AConfigure the terminal server to use smart cardsBConfigure IPSec to permit only Remote Desktop Protocol (RDP) connections to the terminal serverCDeny the Remote Desktop Users group access to the terminal serverDRestrict treyresearch.com users from logging on locally to the terminal server
多选题You are designing a password management solution to meet the business and technical requirements. Which two actions should you perform?hich two actions should you perform?()ADelegate the password management controls to the help desk staff.BDelegate the password management controls to the Domain Users group.CConfigure the Default Domain Policy to enforce password expiration settings.DConfigure the Default Domain Controller Policy to enforce password expiration settings.
单选题You need to recommend a solution for managing Group Policy that meets the company’s technical requirements. What should you recommend?()AImplement a central store.BUpgrade DC3 to Windows Server 2008 R2.CCreate starter Group Policy objects (GPOs).DDeploy Advanced Group Policy Management (AGPM).
单选题You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()ADesign a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computersBDesign a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersCDesign a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersDDesign a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers