网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You need to ensure that all servers meet the company’s security requirements. Which tool should you use?()
A

Microsoft Baseline Security Analyzer (MBSA)

B

Microsoft Security Assessment Tool (MSAT)

C

Resultant Set of Policy (RSoP)

D

Security Configuration Wizard (SCW)


参考答案

参考解析
解析: 暂无解析
更多 “单选题You need to ensure that all servers meet the company’s security requirements. Which tool should you use?()A Microsoft Baseline Security Analyzer (MBSA)B Microsoft Security Assessment Tool (MSAT)C Resultant Set of Policy (RSoP)D Security Configuration Wizard (SCW)” 相关考题
考题 Every morning, you inspect your company‘s development and staging servers. You do this to ensure that the servers have the same versions of all files in your Web application.For security reasons, you can only access the staging server through FTP.You need to synchronize files from the staging server so that the staging server matches the development server.You want to achieve this goal by using the minimum amount of administrative effort.Which tool should you use?()A. FTPB. XCOPYC. the Publish Web toolD. the Copy Web tool

考题 You need to recommend a solution to ensure that all of the client computers that run Windows 7 meet the company’s security requirements.   What should you include in the recommendation?()A、Encrypted File System (EFS)B、the AppLocker Group Policy settingsC、the IPSec enforcement methodD、Windows BitLocker Drive Encryption (BitLocker)

考题 The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()A、On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policyB、On all client computers, implement logon auditing for all user account logonsC、On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policyD、On all domain controllers, implement logon auditing for all user account logons

考题 You are a security administrator for your company. All servers run Windows Server 2003. All client computers run Windows XP Professional.    You install Software Update Services (SUS) on a server named Server1. The company’s written security policy states that all updates must be tested and approved before they are installed on network computers.    You need to ensure that SUS uses the minimum amount of disk space on Server1.  What should you do?()A、 Configure Server1 to redirect client computers to the Microsoft Windows Update servers.B、 Compress the folder in which the downloaded updates are stored.C、 Configure Server1 to store only the locales that are needed.D、 Download the updates, and then delete updates that are not approved for client computers.

考题 You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed.The organization contains five Hub Transport servers.All of the Hub Transport servers are listed as source servers for a Send connector to the Internet.  You need to prevent a Hub Transport server named Hubl from sending and receiving e-mail messages from the Internet.The solution must meet the following requirements:  (1)Ensure that Mailbox servers can deliver e-mail messages to Hub1. (2)Ensure that all other Hub Transport servers can deliver e-mail messages to the Internet. What should you do on Hub1?()A、Suspend all message queues.B、Stop the Microsoft Exchange Transport service.C、Disable all Receive connectors and Send connectors.D、Stop the Microsoft Exchange Mail Submission Service.

考题 Your network contains two Exchange Server 2010 Edge Transport servers and five Exchange Server2010 Hub Transport servers.  All e-mail sent from your organization to the Internet is transferred by the Edge Transport servers. You need to recommend a security solution for the organization to meet the following requirements: .Ensure that users can send encrypted messages to any other organization on the Internet  .Ensure that all Exchange-related communication between Hub Transport servers and Edge Transport servers is encrypted What should you recommend?()A、Deploy IPsec.B、Deploy SMTP over SSL.C、Implement Domain Security.D、Implement Secure/Multipurpose Internet Mail Extensions (S/MIME).

考题 You need to recommend a backup strategy for the servers in the San Francisco office. The strategy must meet the company's technical requirements    What should you include in the recommendation?()A、native-boot virtual hard disks (VHDs)B、Microsoft System Center Data Protection Manager 2010C、system restore pointsD、Windows Server Backup

考题 Your company has two offices. All servers run Windows Server 2003 Service Pack 2 (SP2).You need to ensure that Server1 can communicate with Web servers on the Internet.  Which default gateway should you assign to Server1?()A、10.10.10.129B、10.10.11.1C、131.107.1.1D、192.168.1.1

考题 You need to recommend a solution for monitoring the servers. The solution must meet the  company’s technical requirements    What should you include in the recommendation?()A、Data Collector Sets (DCSs)B、event subscriptionsC、Reliability MonitorD、Windows System Resource Manager (WSRM)

考题 You need to recommend a process for monitoring the servers. The process must meet the  company’s technical requirements.    What should you include in the recommendation?()A、event subscriptionsB、Data Collector Sets (DCSs)C、Resource MonitorD、Microsoft System Center Operations Manager

考题 You need to recommend a solution for configuring the Web servers. The solution must meet the  company’s technical requirements.What should you include in the recommendations?()A、Active Directory Lightweight Directory Services (AD LDS)B、Failover ClusteringC、HTTP redirectionD、IIS Shared Configuration

考题 You have an Exchange Server 2010 organization.  Your company has a relationship with another company.  The partner company has an Exchange Server 2010 organization.  You need to recommend a security solution to meet the following requirements:  .Ensure that all e-mail delivery between your servers and the partner companys servers is encrypted .Ensure that all communication between your servers and the partner companys servers is authenticated What should you include in the solution?()A、Active Directory Rights Management Services (AD RMS)B、Domain SecurityC、Forms-based AuthenticationD、Secure/Multipurpose Internet Mail Extensions (S/MIME)

考题 You need to recommend a solution for improving the automated deployment of servers. The solution must meet the company’s technical requirements.What should you include in the recommendation?()A、an offline domain joinB、native-boot virtual hard disks(VHDs)C、the Offline servicing of imagesD、the Online servicing of images

考题 You need to recommend a solution for managing all of the servers. The solution must meet the  company’s technical requirements.What should you include in the recommendation?()A、Remote Server Administration Tools (RSAT)B、the Administration Tools Pack (adminpak.msi)C、the Remote Desktop Gateway (RD Gateway) role serviceD、the Remote Desktop Web Access (RD Web Access) role service

考题 You need to recommend a solution for starting the servers in the San Francisco office from Windows Recovery Environment (Windows RE). The solution must meet the company’s security requirements.   What should you include in the recommendation?()A、an iSCSI initiatorB、the Multipath I/O featureC、Wake On LAND、Windows Deployment Services (WDS)

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. You need to update six high-visibility servers with critical updates by using Windows Server Update Services (WSUS). You approve all of the updates.You need to ensure that the updates are applied within one hour.  What should you do?()A、On the WSUS server, type the gpupdate /force command at the command prompt.B、On the WSUS server, type the wuauclt /detectnow command at the command prompt.C、On each of the six servers, type the gpupdate /force command at the command prompt.D、On each of the six servers, type the wuauclt /detectnow command at the command prompt.

考题 You are the network administrator in the New York office of TestKing. The company network consists of a single Active Directory domain The New York office currently contains one Windows Server 2003 file server named TestKingA. All file servers in the New York office are in an organizational unit (OU) named New York Servers. You have been assigned the Allow - Change permission for a Group Policy object (GPO) named NYServersGPO, which is linked to the New York Servers OU. The written company security policy states that all new servers must be configured with specified predefined security settings when the servers join the domain. These settings differ slightly for the various company offices. You plan to install Windows Sever 2003, on 15 new computers, which all functions as file servers. You will need to configure the specified security settings on the new file servers. TestKingA currently has the specified security settings configured in its local security policy. You need to ensure that the security configuration of the new file servers is identical to that of TestKingA. You export a copy of TestKingA's local security policy settings to a template file. You need to configure the security settings of the new servers, and you want to use the minimum amount of administrative effort. What should you do?()A、Use the Security Configuration and Analysis tool on one of the new servers to import the template file.B、Use the default Domain Security Policy console on one of the new servers to import the template file.C、Use the Group Policy Editor console to open NYServersGPO and import the template file.D、Use the default Local Security Policy console on one of the new servers to import the template file.

考题 单选题Every morning, you inspect your company's development and staging servers. You do this to ensure that the servers have the same versions of all files in your Web application.For security reasons, you can only access the staging server through FTP.You need to synchronize files from the staging server so that the staging server matches the development server.You want to achieve this goal by using the minimum amount of administrative effort. Which tool should you use?()A FTPB XCOPYC the Publish Web toolD the Copy Web tool

考题 单选题You need to recommend a solution to ensure that all of the client computers that run Windows 7 meet the company’s security requirements.   What should you include in the recommendation?()A Encrypted File System (EFS)B the AppLocker Group Policy settingsC the IPSec enforcement methodD Windows BitLocker Drive Encryption (BitLocker)

考题 单选题You need to recommend a solution for managing all of the servers. The solution must meet the  company’s technical requirements.What should you include in the recommendation?()A Remote Server Administration Tools (RSAT)B the Administration Tools Pack (adminpak.msi)C the Remote Desktop Gateway (RD Gateway) role serviceD the Remote Desktop Web Access (RD Web Access) role service

考题 多选题You are the senior systems engineer for your company. The network consists of a single Active Directory domain.  All servers run Windows Server 2003. Client computers in the sales department run Windows NT Workstation 4.0 with the Active Directory Client Extensions software installed. All other client computers run Windows XP Professional. All servers are located in an organizational unit (OU) named Servers. All client computers are located in an OU named Desktops.   Four servers contain confidential company information that is used by users in either the finance department or the research department. Users in the sales department also store files and applications on these servers. The company’s written security policy states that for auditing purposes, all network connections to these resources must require authentication at the protocol level. The written security policy also states that all network connections to these resources must be encrypted. The company budget does not allow for the purchase of any new hardware or software. The applications and data located on these servers may not be moved to any other server in the network.   You define and assign the appropriate permissions to ensure that only authorized users can access the resources on the servers.   You now need to ensure that all connections made to these servers by the users in the finance department and in the research department meet the security guidelines stated by the written security policy. You also need to ensure that all users in the sales department can continue to access their resources.   Which two actions should you take?()ACreate a new Group Policy object (GPO) and link it to the Servers OU. Enable the Secure Server (Require Security) IPSec policy in the GPO.BCreate a new Group Policy object (GPO) and link it to the Servers OU. Enable the Server (Request Security) IPSec policy in the GPO.CCreate a new Group Policy object (GPO) and link it to the Desktops OU. Enable the Client (Respond only) IPSec policy in the GPO.DCreate a new Group Policy object (GPO). Edit the GPO to enable the Registry Policy Processing option and the IP Security Policy Processing option. Copy the GPO files to the Netlogon shared folder.EUse System Policy Editor to open the System.adm file and enable the Registry Policy Processing option and the IP Security Policy Processing option. Save the system policy as NTConfig.pol.

考题 单选题Your network contains two Exchange Server 2010 Edge Transport servers and five Exchange Server2010 Hub Transport servers.  All e-mail sent from your organization to the Internet is transferred by the Edge Transport servers. You need to recommend a security solution for the organization to meet the following requirements:.Ensure that users can send encrypted messages to any other organization on the Internet  .Ensure that all Exchange-related communication between Hub Transport servers and Edge Transportservers is encrypted What should you recommend?()A Deploy IPsec.B Deploy SMTP over SSL.C Implement Domain Security.D Implement Secure/Multipurpose Internet Mail Extensions (S/MIME).

考题 单选题You need to recommend a solution for improving the automated deployment of servers. The solution must meet the company’s technical requirements.What should you include in the recommendation?()A an offline domain joinB native-boot virtual hard disks(VHDs)C the Offline servicing of imagesD the Online servicing of images

考题 单选题You need to recommend changes to the name resolution infrastructure that meet the company’s technical requirements.   What should you recommend?()A Create a stub zone on all of the DNS servers in the branch offices.B Create a secondary zone on all of the DNS servers in the branch offices.C Move the DNS zone of the root domain to the ForestDnsZones application directory partition.  D Move the DNS zone of each branch office to the ForestDnsZones application directory partition.

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. You need to update six high-visibility servers with critical updates by using Windows Server Update Services (WSUS). You approve all of the updates. You need to ensure that the updates are applied within one hour. What should you do?()A On the WSUS server, type the gpupdate /force command at the command prompt.B On the WSUS server, type the wuauclt /detectnow command at the command prompt.C On each of the six servers, type the gpupdate /force command at the command prompt.D On each of the six servers, type the wuauclt /detectnow command at the command prompt.

考题 单选题Your company has two offices. All servers run Windows Server 2003 Service Pack 2 (SP2).You need to ensure that Server1 can communicate with Web servers on the Internet.  Which default gateway should you assign to Server1?()A 10.10.10.129B 10.10.11.1C 131.107.1.1D 192.168.1.1