网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()
A

Encrypt customer information when it is stored and when it is being transmitted

B

Require encrypted connections to the public Web site, which is hosted on the Web server on the perimeter network

C

Encrypt all marketing information on file servers and client computers

D

Require encrypted connections to all file servers


参考答案

参考解析
解析: 暂无解析
更多 “单选题You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()A Encrypt customer information when it is stored and when it is being transmittedB Require encrypted connections to the public Web site, which is hosted on the Web server on the perimeter networkC Encrypt all marketing information on file servers and client computersD Require encrypted connections to all file servers” 相关考题
考题 Members of Internet-based supply chains will need to evaluate their () and employ () and other electronic security tools to protect confidential data. A.security needsB.patentC.fireworkD.encryption technologies

考题 Members of Internet-based supply chains will need to evaluate their security needs and employ ()and other electronic security tools to protect confidential data. A、patentsB、passwordsC、telnetD、encryption technologies

考题 Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows Vista computers.  You are planning to deploy Windows 7 and a custom application.   You have the following requirements:   The application must be available to only a specific group of users. You must be able to monitor application usage.   You need to design a deployment method for the custom application that meets the requirements.  Which deployment method should you use in your design?()A、software installation in Group PolicyB、startup scripts in Group PolicyC、Microsoft Application Virtualization (App-V)D、baseline Windows 7 image that includes the custom application

考题 You need to design a method to standardize and deploy a baseline security configuration for servers. You solution must meet business requirements. What should you do?()A、Create a script that installs the Hisecdc.inf security templateB、Use a GPO to distribute and apply the Hisec.inf security templateC、Use the System Policy Editor to configure each server’s security settingsD、Use a GPO to distribute and apply a custom security template

考题 You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()A、Require client computers to connect to the marketing application by using a VPN connectionB、Use IPSec to encrypt communications between the servers in the New York and Atlanta officesC、Require the high security setting on Terminal Services connections to the marketing applicationD、Configure all marketing application Web pages to require SSL

考题 You are the network administrator for The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. All confidential company files are stored on a file server named TestKing1. The written company security states that all confidential data must be stored and transmitted in a secure manner. To comply with the security policy, you enable Encrypting File System (EFS) on the confidential files. You also add EFS certificates to the data decryption field (DDF) of the confidential files for the users who need to access them. While performing network monitoring, you notice that the confidential files that are stored on TestKing1 are being transmitted over the network without encryption. You must ensure that encryption is always used when the confidential files on TestKing1 are stored and transmitted over the network. What are two possible ways to accomplish this goal? ()(Each correct answer presents a complete solution. Choose two)A、Enable offline files for the confidential files that are stored on TestKing1, and select the Encrypt offline files to secure data check box on the client computers of the users who need to access the files.B、Use IPSec encryption between TestKing1 and the client computers of the users who need to access the confidential files.C、Use Server Message Block (SMB) signing between TestKing1 and the client computers of the users who need to access the confidential files.D、Disable all LM and NTLM authentication methods on TestKing1.E、Use IIS to publish the confidential files. Enable SSL on the IIS server. Open the files as a Web folder.

考题 You need to design a method to log changes that are made to servers and domain controllers. You also need to track when administrators modify local security account manager objects on servers. What should you do?()A、Enable failure audit for privilege user and object access on all servers and domain controllersB、Enable success audit for policy change and account management on all servers and domain controllersC、Enable success audit for process tracking and logon events on all servers and domain controllersD、Enable failure audit for system events and directory service access on all servers and domain controllers

考题 Your company has a single active directory domain. All servers run windows server 2008. The company network has 10 servers that perform as web servers. All confidential files are located on a server named FSS1. The company security policy states that all confidential data must be transmitted in the most secure manner. When you monitor the network, you notice that the confidential files are stored on FSS1 server are being transmitted over the network without encryption. You need to ensure that encryption is always used when the confidential files on the FSS1 server are transmitted over the network. What are two possible ways to achieve this goal? ()A、Deactivate all LM and NTLM authentication methods on the FSS1 server.B、Use IIS to publish the confidentials files. Activate SSL on the ISS server, and then open the files as a web folder.C、Use IPSec encryption between the FSS 1 server and the computers of the users who need to access the confidential files.D、Use the server messager block (SMB) signing between the FSS1 server and the computers of the users who want to access the confidential files.E、Activate offline files for the confidential files that are stored on the FSS1 server. In the folder advanced properties dialog box, select the encrypt contents to secure data option.

考题 You are planning to deploy two Windows Server 2008 R2 Hyper-V servers. You need to design the storage of VHD files for maximum security.    What should you do?()A、Store the VHD files on a dedicated NTFS volumeB、Store unencrypted VHD files on a volume that uses Windows BitLocker drive encryptionC、Encrypt the VHD files by using EFS on a volume that uses Windows BitLocker drive encryptionD、Encrypt the VHD files by using EFS on a volume that does not use Windows BitLocker drive encryption

考题 You need to design a method to address the chief information officer’s security concerns. What should you do?()A、Configure Windows Management Instrumentation (WMI) filtering options in the Default Domain Policy GPOB、Use the gpresult commandC、Use Mbsacli.exeD、Configure software restriction policy options in the Default Domain Policy GPO

考题 You are developing a custom-collection class.You need to create a method in your class. You need to ensure that the method you create in your class returns a type that is compatible with the Foreach statement. Which criterion should the method meet?()A、The method must return a type of either IEnumerator or IEnumerable.B、The method must return a type of IComparable.C、The method must explicitly contain a collection.D、The method must be the only iterator in the class.

考题 You are a database administrator for your company. A user named Susan belongs to the Windows SalesManagers group. Susan needs a Reporting Services report to display annual sales information by territory. A user named Joe reports to Susan and belongs to the Windows Sales group. He needs a report that is limited to his sales territory, but still displays the same detailed sales data that is on Susan’s report. You need to design a secure solution that meets the reporting needs of the users and that consumes the minimal amount of server resources.  What should you do?()A、Design a report for Susan that includes two data regions. One data region is used for summary sales data. The other data region is used for the detailed sales data for each sales representative. Then, design a report for Joe that displays the detailed sales data.B、Design two reports for Susan. One report includes the territory information, and one report includes the detailed sales data. Then, design a report for Joe that displays the detailed sales data for his territories.C、Design a report for Susan that includes the territory information. Then, design a report for Joe that includes detailed sales data for his territories. Finally, configure Susans report so that it includes the data in Joes report.D、Design a parameterized report for Susan that includes all territory information. Then, design a linked report for Joe that links to Susans report.

考题 Your Windows 2000 Professionally computer belongs to the contoso.com domain. You need to encrypt a compressed file named C:/data. You successfully encrypt the file but discover that it is no longer compressed.   What is the most likely cause of this problem?()A、Group Policy is preventing the compression of encrypted files.B、The file is stored on a FAT32 partition.C、Only members of the Administrators and the Power Users groups can compress and encrypt files.D、Encrypted files cannot be compressed.

考题 You need to design a method to update the content on the Web server. Your solution must meet business and security requirements. What are two possible ways to achieve this goal?()A、Use SSH to encrypt content as it is transferred to the Web server on the perimeter networkB、Install the Microsoft FrontPage Server Extensions, and use FrontPage to update contentC、Use Web Distributed Authoring and Versioning (WebDAV) over and SSL connection to the Web server to update contentD、Use FTP over an IPSec connection to transfer content to the Web serverE、Use Telnet to connect to the Web server, and then perform content changes directly on the server

考题 You need to design a method to ensure that research intellectual property remains confidential. You solution must meet security requirements. What should you do?()A、Require client computers to connect to research intellectual property through a SSL VPNB、Place SFSQL1 and ATLSQL1 on a separate virtual LAN from the internal network. Grant access to these virtual LAN segments to only the client computers that are used by authorized usersC、Require that communications between SFSQL1, SFFP1, ATLSQL1, and ATLFP1 use IPSecD、Create a separate subnet for all servers that contain research intellectual property

考题 You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()A、Encrypt customer information when it is stored and when it is being transmittedB、Require encrypted connections to the public Web site, which is hosted on the Web server on the perimeter networkC、Encrypt all marketing information on file servers and client computersD、Require encrypted connections to all file servers

考题 单选题You develop a service application named PollingService that periodically calls long-running procedures.These procedures are called from the DoWork method.You use the following service application code:   When you attempt to start the service, you receive the following error message: Could not start the PollingService service on the local computer.Error 1053: The service did not respond to the start or control request in a timely fashion. You need to modify the service application code so that the service starts properly.What should you do?()A Move the loop code into the constructor of the service class from the OnStart method.B Drag a timer component onto the design surface of the service. Move the calls to the long-running procedure from the OnStart method into the Tick event procedure of the timer, set the Enabled property of the timer to True, and call the Start method of the timer in the OnStart method.C Add a class-level System.Timers.Timer variable to the service class code. Move the call to the DoWork method into the Elapsed event procedure of the timer, set the Enabled property of the timer to True, and call the Start method of the timer in the OnStart method.D Move the loop code from the OnStart method into the DoWork method.

考题 单选题You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()A Encrypt customer information when it is stored and when it is being transmittedB Require encrypted connections to the public Web site, which is hosted on the Web server on the perimeter networkC Encrypt all marketing information on file servers and client computersD Require encrypted connections to all file servers

考题 单选题You need to design security for messages exchanged between Northwind Traders employees and its vendors. What should you do?()A Require employees to access e-mail only over connections that use SSLB Place Exchange mailbox stores on NTFS volumes. Use Encrypting File System (EFS) to encrypt the storesC Use the internal certification authority (CA) to issue certificates to all employees. Require employees to digitally sign outbound e-mailD Use the internal certification authority (CA) to issue certificates to all employees and vendors. Instruct employees and vendors to use secure MIME to encrypt all e-mail sent between them

考题 单选题You are developing a Windows Presentation Foundation (WPF) application.You need to display HTML content from a Web page on the WPF form. What should you do?()A Add a FlowDocumentReader control to the design surface. Then create a FlowDocument control.B Add a DocumentViewer control to the design surface. Then create a FixedDocument control.C Add a WebBrowser control to the design surface. Then use the Navigate method to navigate the URI object.D Add a ContentControl control to the design surface. Then reference a WebClient object to return an HTML string.

考题 单选题Your company has client computers that run Windows XP Professional.   You are planning to install Windows 7 Enterprise on the existing client computers.   You have the following requirements:   Migrate user data and operating system components.  Encrypt and password-protect the migration store.   You need to design a user state migration strategy that supports the requirements. What should you do?()A Use a hard-link migration storeB Use a compressed migration storeC Perform an offline migration by using WindowsoldD Perform an offline migration by using Windows PE

考题 单选题In your web application,you need to execute a block of code whenever the session object is first created. Which design will accomplish this goal?()A Create an HttpSessionListener class and implement the sessionInitialized method with that block ofcode.B Create an HttpSessionActivationListener class and implement the sessionCreated method with thatblock of code.C Create a Filter class, call the getSession(false) method, and if the result was null, then execute that block of code.D Create an HttpSessionListener class and implement the sessionCreated method with that block of code.

考题 多选题Your company has a single active directory domain. All servers run windows server 2008. The company network has servers that perform as web servers. All confidential files are located on a server named FSS1. The company security policy states that all confidential data must be transmitted in the most secure manner. When you monitor the network you notice that the confidential files stored on FSS1 server are being transmitted over the network without encryption. You need to ensure that encryption is always used when the confidential files on the FSS1 server are transmitted over the network. What are two possible ways to achieve this goal? ()ADeactivate all LM and NTLM authentication methods on FSS1 server.BUse IIS to publish the confidential files, activate SSL on the IIS server, and then open the files as a web folder.CUse IPsec encryption between the FSS1 server and the computers of the users who need to access the confidential files.DUse the server message block (SMB) signing between the FSS1 serve and the computers of the users who want to access the confidential files.EActivate offline files for the confidential files that are stored on the FSS1 server. In the folder advanced properties box, select the encrypt contents to secure data option.

考题 单选题You need to recommend a NAP enforcement method that meets the companyˉs security requirements. Which method should you recommend?()A 802.1XB DHCPC IPSecD VPN

考题 多选题Your company has a single Active Directory domain. All servers run Windows Server 2008. The company network has servers that perform as Web Servers. All confidential files are located on a server named FSS1. The company security policy states that all confidential data must be transmitted in the most secure manner. When you monitor the network you notice that the confidential files stored on FSS1 server are being transmitted over the network without encryption. You need to ensure that encryption is always usedwhen the confidential files on the FSS1 server are transmitted over the network. What are two possible ways to achieve this goal? ()ADeactivate all LM and NTLM authentication methods on FSS1 serverBUse IIS to publish the confidential files, activate SSL on the IIS server, and then open the files as a web folderCUse IPsec encryption between the FSS1 server and the computers of the users who need to access the confidential files.DUse the Server Message Block (SMB) signing between the FSS1 server and the computers of the users who want to access the confidential files.EActivate offline files for the confidential files that are stored on the FSS1 server. In the Folder avanced Properties box, select the Encrypt contents to secure data optiion

考题 单选题You are developing a custom-collection class.You need to create a method in your class. You need to ensure that the method you create in your class returns a type that is compatible with the Foreach statement. Which criterion should the method meet?()A The method must return a type of either IEnumerator or IEnumerable.B The method must return a type of IComparable.C The method must explicitly contain a collection.D The method must be the only iterator in the class.

考题 单选题You need to design access to e-mail by Internet users. What should you do?()A Configure front-end servers to use HTTP to communicate with back-end serversB Configure the internal firewall to allow IPSec traffic between front-end and back-end Exchange serversC Require all users to encrypt all outbound e-mail messagesD Issue digital certificates to all remote users. Require the certificates to be used when authenticating to Outlook Web Access

考题 单选题Your company has client computers that run Windows XP Professional.   You are planning to install Windows 7 Enterprise on the existing client computers.    You need to design a user state migration strategy that minimizes network bandwidth and server use when user data is being migrated.   What should you do?()A Use the Refresh Computer method and a hard-link migration store.B Use the Refresh Computer method and a compressed migration store.C Use the Replace Computer method and a hard-link migration store.D Use the Replace Computer method and a compressed migration store.