网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You need to design a strategy to meet the company’s requirements for e-mail. What should you do?()
A

Configure and publish a certificate template that is suitable for S/MIME, Deploy a Group Policy object (GPO) so that a certificate that is based on this template is automatically issued to all domain users

B

Specify Group Policy objects (GPOs) and IPSec policies that require all client computers to use Kerberos authentication to connect to mail servers

C

For each mail server, acquire an SSL server certificate from a commercial CA whose root certificate is already trusted

D

Require IPSec encryption on all TCP connections that are used to send or receive e-mail messages


参考答案

参考解析
解析: 暂无解析
更多 “单选题You need to design a strategy to meet the company’s requirements for e-mail. What should you do?()A Configure and publish a certificate template that is suitable for S/MIME, Deploy a Group Policy object (GPO) so that a certificate that is based on this template is automatically issued to all domain usersB Specify Group Policy objects (GPOs) and IPSec policies that require all client computers to use Kerberos authentication to connect to mail serversC For each mail server, acquire an SSL server certificate from a commercial CA whose root certificate is already trustedD Require IPSec encryption on all TCP connections that are used to send or receive e-mail messages” 相关考题
考题 – It’s our great pleasure to have you visit our company. --_________________A、Thank you.B、Nice to meet you.C、It’s our pleasure, too.D、Wonderful.

考题 You need to recommend a strategy for the computer lab that meet the company’s technical requirements. What should you recommend?()A、Enable the loopback setting in GPO2. Enable the Enforced option in GPO1.B、Enable the Block Inheritance option on Lab OU. Enable the Enforced option in GPO1.C、Enable the loopback setting in GPO2. Disable the user configuration settings in GPO3.D、Enable the Block Inheritance option on Lab OU. Disable the user configuration settings in GPO3.

考题 You need to recommend a backup strategy for the servers in the San Francisco office. The strategy must meet the company's technical requirements    What should you include in the recommendation?()A、native-boot virtual hard disks (VHDs)B、Microsoft System Center Data Protection Manager 2010C、system restore pointsD、Windows Server Backup

考题 You need to recommend changes to the environment that meet the company’s user requirements.   What should you include in the recommendation?()A、a BranchCache in Distributed Cache modeB、a BranchCache in Hosted Cache modeC、Distributed File System (DFS) namespacesD、Distributed File System (DFS) Replication

考题 You need to design a remote access strategy for the customer support users when they work from home. Your solution must meet security requirements. What should you do?()A、Deploy an L2TP/IPsec VPN server in each call center. Configure the portable computers as L2TP VPN clientsB、Create IPSec tunnel mode connections between the customer support users home and the company’s Internet-facing routersC、Create IP packet filters on the company’s Internet-facing routers to allow the Remote Desktop Protocol (RDP).Create IPSec filters on the terminal servers to allow only connections that use RDPD、Create IP packet filters on the company’s Internet-facing routers to allow the IPSec protocols. Assign the Secure Server (Require Security) IPSec policy to the terminal servers. Assign the Client (Respond only) IPSec policy to the portable computers

考题 You need to recommend a solution for monitoring the servers. The solution must meet the  company’s technical requirements    What should you include in the recommendation?()A、Data Collector Sets (DCSs)B、event subscriptionsC、Reliability MonitorD、Windows System Resource Manager (WSRM)

考题 You need to recommend a solution for configuring the Web servers. The solution must meet the  company’s technical requirements.What should you include in the recommendations?()A、Active Directory Lightweight Directory Services (AD LDS)B、Failover ClusteringC、HTTP redirectionD、IIS Shared Configuration

考题 You need to design a security patch management strategy. Your solution must meet business and security requirements, and it must accommodate the company’s resource restrictions. What should you do?()A、Test and manually deploy updatesB、Deploy a Software Update Services (SUS) server. Test all updates and then approve them. Configure all client computers to automatically obtain updates from the serverC、Test all updates and then use a third-party utility to repackage updates in a Windows Installer file. Deploy the -.msi files by using Group PolicyD、Configure all client computers to use Automatic Updates to obtain security updates from the Windows Update Web site. Test all updates posted to the Windows Update Web site

考题 You need to recommend a solution for improving the automated deployment of servers. The solution must meet the company’s technical requirements.What should you include in the recommendation?()A、an offline domain joinB、native-boot virtual hard disks(VHDs)C、the Offline servicing of imagesD、the Online servicing of images

考题 You need to recommend a strategy for delegating administrative rights to Admin1. The strategy must support the company’s planned changes.What should you include in the recommendation?()A、the Authorization Manager snap-in on Node1 and Node2B、the Authorization Manager snap-in on the VMsC、the Network Configuration Operators local group on each VMD、the Network Configuration Operators local group on Node1 and Node2

考题 You need to recommend a solution for managing the service accounts for SQL1 and SQL2. The  solution must meet the company’s security requirements. What should you include in the recommendation?()A、a custom password filterB、a Password Settings object (PSO)C、managed service accountsD、manual password changes

考题 You need to implement an auditing strategy that will fulfill the company’s business requirements.What should you do?()A、Use C2 auditing.B、Use DML triggers.C、Use DDL triggers.D、Use event notifications.

考题 You need to recommend a security strategy for WebApp2 that meets the company’s applicaton  requirements.What should you include in the recommendation?()A、Basic authentication and connection security rulesB、Basic authentication and SSLC、Digest authentication and connection security rulesD、Digest authentication and SSL

考题 多选题You need to recommend changes to the DFS infrastructure that meet the company’s techical  requirements.   What should you recommend implementing in each branch office?()Aa DFS namespace serverBa DFS replicaCa standalone DFS namespaceDBranchCache in Distributed Cache modeEBranchCache in Hosted Cache mode

考题 单选题You need to design a strategy to meet the company’s requirements for e-mail. What should you do?()A Configure and publish a certificate template that is suitable for S/MIME, Deploy a Group Policy object (GPO) so that a certificate that is based on this template is automatically issued to all domain usersB Specify Group Policy objects (GPOs) and IPSec policies that require all client computers to use Kerberos authentication to connect to mail serversC For each mail server, acquire an SSL server certificate from a commercial CA whose root certificate is already trustedD Require IPSec encryption on all TCP connections that are used to send or receive e-mail messages

考题 单选题You need to ensure that all servers meet the company’s security requirements. Which tool should you use?()A Microsoft Baseline Security Analyzer (MBSA)B Microsoft Security Assessment Tool (MSAT)C Resultant Set of Policy (RSoP)D Security Configuration Wizard (SCW)

考题 单选题You need to recommend a strategy for the file servers that meets the company’s technical requirements.   What should you recommend?()A Implement active file screens.B Implement passive file screens.C Configure classification rules.D Configure File Server Resource Manager (FSRM) quotas.

考题 单选题Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers.  You are planning to deploy Windows 7 Enterprise to the client computers.    You need to design a zero-touch installation strategy.()A unattended installationB custom Windows 7 image on DVDC Windows Deployment Services (WDS)D Microsoft System Center Configuration Manager 2007 R2

考题 单选题You need to recommend changes to the intranet site that meet the company’s technical requirements.   What should you include in the recommendation?()A additional application poolsB additional worker processesC Failover ClusteringD Network Load Balancing (NLB)

考题 单选题You need to recommend a solution for managing the service accounts for SQL1 and SQL2. The  solution must meet the company’s security requirements. What should you include in the recommendation?()A a custom password filterB a Password Settings object (PSO)C managed service accountsD manual password changes

考题 单选题You need to recommend a solution for managing the address information of the user accounts. The solution must meet the company’s security requirements. What should you include in the recommendation?()A Active Directory delegationB Authorization ManagerC built-in security groupsD user rights assignments