网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You need to design a PKI for the Northwind Traders internal network. What should you do?()
A

Add an enterprise root CA to the northwindtraders.com domain. Configure cross-certification between the northwindtraders.com domain and the boston.northwindtraders.com domain

B

Add an enterprise subordinate issuing CA to the northwindtraders.com domain. Configure qualified subordination for the enterprise subordinate issuing CA in Boston

C

Add enterprise subordinate issuing CAs to the New York, Boston, and Seattle LANs. Configure qualified subordinations for each enterprise subordinate issuing CA

D

Add a stand-alone commercial issuing CA to only the northwindtraders.com domain. Configure cross-certification between the commercial CA and the boston.northwindtraders.com domain


参考答案

参考解析
解析: 暂无解析
更多 “单选题You need to design a PKI for the Northwind Traders internal network. What should you do?()A Add an enterprise root CA to the northwindtraders.com domain. Configure cross-certification between the northwindtraders.com domain and the boston.northwindtraders.com domainB Add an enterprise subordinate issuing CA to the northwindtraders.com domain. Configure qualified subordination for the enterprise subordinate issuing CA in BostonC Add enterprise subordinate issuing CAs to the New York, Boston, and Seattle LANs. Configure qualified subordinations for each enterprise subordinate issuing CAD Add a stand-alone commercial issuing CA to only the northwindtraders.com domain. Configure cross-certification between the commercial CA and the boston.northwindtraders.com domain” 相关考题
考题 Would you find out how many parts you need to design a well-structured answer to why should I hire you?A.2 parts.B.3 parts.C.5 parts.D.4 parts.

考题 You have a class C network, and you need to design it for 5 usable subnets with each subnet handling a minimum of 18 hosts each. Which of the following network masks should you use?A.225.225.224.0.B.225.225.240.0.C.225.225.255.0.D.255.255.255.224E.225.225.255.240

考题 You have a computer that runs Windows Vista.You need to restore the default Windows Internet Explorer settings for the internal network. You want to maintain the current settings for the Internet.What should you do on the Internet Explorer Security tab?()A.AB.BC.CD.D

考题 You are developing a Windows Presentation Foundation (WPF) application for a travel reservation systemYou need to ensure that users can select a range of travel dates.What should you do ?() A. Add single DatePicker control to the design surfaceB. Add single Calendar control to the design surfaceC. Add single MediaElement control to the design surface to display a calendarD. Add the appropriate Windows Forms references to the project references. Add a single Windows Forms DateTimePicker control to the design surface

考题 You have an Exchange Server 2010 organization.You need to prevent internal users from sending messages that contains the phrase °Company Confidentia?± to external use.What should you create?()A、a Transport ruleB、a managed folder mailbox policyC、a message classificationD、a Send connector

考题 You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. TestKing.com is configured to run an exchange 2010 environment.  You are planning to design the installation of numerous Mailbox servers. TestKing.com Service LevelAgreement (SLA) requires the following: * The servers need to support 1,500 concurrent connections to mailboxes.* The servers need to maintain a latency of less than 20 milliseconds. You ensure deployment success you need to ensure that your design comply with the Service LevelAgreement (SLA) of TestKing.com. What should you do?()A、The best option is to use the Exchange Server User Monitor (ExMon) tool to check if your design meets the requirements.B、The best option is to use the Exchange Server Load Generator (LoadGen) 2010 tool to check if your design meets the requirements.C、The best option is to use the Exchange Server Connectivity Analyzer (ExRCA) tool to check if your design meets the requirements.D、The best option is to use the Exchange Server Jetstress 2010 tool to check if you design meets there quirements.

考题 You need to design a certificate management process for internal users. What should you do?()A、Establish a Web enrollment service for internal users to request access to resourcesB、Grant Enrollment Agent rights to usersC、Establish enrollment stations and store user certificates in a smart cardD、Create Connection Manager scripts to identify the client computer operating system, and configure Web proxy settings to specify the appropriate Web enrollment service

考题 You need to design a PKI that meets business requirements. What should you do?()A、Move ATLCA1 offline and create an enterprise subordinate CA to issue certificatesB、Create a stand-alone subordinate CA to issue certificatesC、Use a qualified subordinate CAD、Configure certificate template access control lists (ACLs) on ATLCA1

考题 You have an Exchange Server 2010 organization named contoso.com.All users configure internal and external Out Of Office messages.You need to ensure that internal Out Of Office messages are sent to senders from the fabrikam.com domain. What should you create and configure?()A、a new accepted domainB、a new Receive connectorC、a new remote domainD、a new Send connector

考题 You are developing a Windows Forms Application by using the .NET Framework 3.5.You plan to design a composite custom control for the application. You include a ListBox control has a property that provides the item count of  the ListBox control. You need to ensure that the property cannot be accessed at design time. Which attribute should you use?()A、[Bindable(false)]B、[DesignOnly(false)]C、[EditorBrowsable(EditorBrowsableState.Never)]D、[Browsable(false)]

考题 Your company’s organization is authoritative for the contoso.com domai.Your network contains a Windows Server 2008 R2 certification authority (CA).You have an Exchange Server 2010 server named Server1.Server1 has the Client Access, Hub Transport, and Mailbox server roles installed. You plan to create a Federated Sharing relationship between your company and another company named Northwind Traders.Northwind Traders has an internal root CA.You need to install a certificate that can be used to create the federated trust.The solution must minimize costs. What should you do from Server1?()A、Generate a self-signed certificate.B、Request a Computer certificate from the contoso.com CAC、Create a computer certificate request and submit the request to a third-party trusted CAD、Create a computer certificate request and submit the request to the Northwind Traders CA

考题 You are developing a Windows Presentation Foundation (WPF) application for a travel reservation system You need to ensure that users can select a range of travel dates. What should you do ?()A、Add single DatePicker control to the design surfaceB、Add single Calendar control to the design surfaceC、Add single MediaElement control to the design surface to display a calendarD、Add the appropriate Windows Forms references to the project references. Add a single Windows Forms DateTimePicker control to the design surface

考题 You have an Exchange Server 2010 organization.You discover that messages sent to the Internet include internal Exchange routing information in the message header.You need to prevent internal routing information from being sent to external recipients. What should you do?()A、Create a new remote domain.B、Modify the permissions of the Send connector.C、Modify the properties of the sender reputation feature.D、Enable domain security on the default Receive connector.

考题 You have an Exchange Server 2010 organization for a company named Contoso, Ltd. Contoso has the following security policy:  .Messages that contain the word budget cannot be sent to external recipients .Messages that contain the name Northwind Traders must be sent to the legal department automaticallyYou need to recommend a solution to meet the security policy.  What should you recommend?()A、Create two transport rules.B、Create two message classifications.C、Create one transport rule and configure a legal hold.D、Create one message classification and configure a legal hold.

考题 You need to design a method to ensure that research intellectual property remains confidential. You solution must meet security requirements. What should you do?()A、Require client computers to connect to research intellectual property through a SSL VPNB、Place SFSQL1 and ATLSQL1 on a separate virtual LAN from the internal network. Grant access to these virtual LAN segments to only the client computers that are used by authorized usersC、Require that communications between SFSQL1, SFFP1, ATLSQL1, and ATLFP1 use IPSecD、Create a separate subnet for all servers that contain research intellectual property

考题 You are designing the loan application process for the customer terminals. You need to design a Transact-SQL stored procedure that fulfills the business and technical requirements. Which type of Transact-SQL stored procedure should you use?()A、one that uses an internal SQL Server Web service endpointB、one that runs a SQL Server Integration Services (SSIS) packageC、one that uses Service BrokerD、one that runs a user-defined function

考题 You need to design a remote administration solution for servers on the internal network. Your solution must meet business and security requirements. What should you do?()A、Permit administrators to use an HTTP interface to manage servers remotelyB、Permit only administrators to connect to the servers’ Telnet serviceC、Permit administrators to manage the servers by using Microsoft NetMeetingD、Require administrators to use Remote Desktop for Administration connections to manage the servers

考题 You need to recommend a configuration design for the new VMs. The design must ensure that operating systems can be deployed to the new VMs. What should you include in the recommendation?()A、virtual machine queue (VMQ)B、Virtual Machine ChimneyC、a synthetic network adapterD、an emulated network adapter

考题 单选题You need to recommend a configuration design for the new VMs. The design must ensure that operating systems can be deployed to the new VMs. What should you include in the recommendation?()A virtual machine queue (VMQ)B Virtual Machine ChimneyC a synthetic network adapterD an emulated network adapter

考题 单选题You need to design security for messages exchanged between Northwind Traders employees and its vendors. What should you do?()A Require employees to access e-mail only over connections that use SSLB Place Exchange mailbox stores on NTFS volumes. Use Encrypting File System (EFS) to encrypt the storesC Use the internal certification authority (CA) to issue certificates to all employees. Require employees to digitally sign outbound e-mailD Use the internal certification authority (CA) to issue certificates to all employees and vendors. Instruct employees and vendors to use secure MIME to encrypt all e-mail sent between them

考题 单选题You are developing a Windows Presentation Foundation (WPF) application.You need to display HTML content from a Web page on the WPF form. What should you do?()A Add a FlowDocumentReader control to the design surface. Then create a FlowDocument control.B Add a DocumentViewer control to the design surface. Then create a FixedDocument control.C Add a WebBrowser control to the design surface. Then use the Navigate method to navigate the URI object.D Add a ContentControl control to the design surface. Then reference a WebClient object to return an HTML string.

考题 单选题You are developing a Windows Forms Application by using the .NET Framework 3.5.You plan to design a composite custom control for the application. You include a ListBox control has a property that provides the item count of  the ListBox control. You need to ensure that the property cannot be accessed at design time. Which attribute should you use?()A [Bindable(false)]B [DesignOnly(false)]C [EditorBrowsable(EditorBrowsableState.Never)]D [Browsable(false)]

考题 单选题You are developing a Windows Presentation Foundation (WPF) application. You need to display HTML content from a Web Page on the WPF form. What should you do?()A Add a FlowDocumentReader control to the design surface. Then create a FlowDocument control.B Add a ContentControl control to the design surface. The reference a WebClient object to return an HTML string.C Add a DocumentViewer control to the design surface. The create a FixedDocument control.

考题 单选题You have an Exchange Server 2010 organization named contoso.com.All users configure internal and external Out Of Office messages.You need to ensure that internal Out Of Office messages are sent to senders from the fabrikam.com domain. What should you create and configure?()A a new accepted domainB a new Receive connectorC a new remote domainD a new Send connector

考题 单选题You need to design a PKI for Litware, Inc. What should you do?()A Add one offline stand-alone root certificate authority(CA).Add two online enterprise subordinate CAsB Add one online stand-alone root certification authority(CA).Add two online enterprise subordinate CAsC Add one online enterprise root certification authority CA).Add one offline enterprise subordinate CAD Add one online enterprise root certification authority(CA).Add two online enterprise subordinate CAs

考题 多选题You need to design an access control strategy for the external and intranet Web sites. Which two actions should you perform?()AEnable SSL on the external Web site by using a Microsoft cryptographic service provider (CSP)BEnable Microsoft .NET Passport authentication on the external Web site. Use Passport Level 0 with SSL on the external Web siteCEnable SSL on the external Web site by using a commercial digital certificateDEnable SSL on the intranet Web site by using an internal server certificateEEnable SSL on the external Web site by using an internal server certificate

考题 单选题You need to design access to e-mail by Internet users. What should you do?()A Configure front-end servers to use HTTP to communicate with back-end serversB Configure the internal firewall to allow IPSec traffic between front-end and back-end Exchange serversC Require all users to encrypt all outbound e-mail messagesD Issue digital certificates to all remote users. Require the certificates to be used when authenticating to Outlook Web Access