网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
You need to ensure that the company’s standard password policy is enforced for all logins that areused to access SQL Server 2005.Which two actions should you perform?()
A

Set the appropriate local password policies for all computers on which SQL Server is installed.

B

Set the server authentication mode of all SQL Server instances to Windows Authentication mode.

C

Install all instances of SQL Server 2005 on computers that run Windows Server 2003 or later.

D

Create SQL Server logins that have CHECK_POLICY enabled.


参考答案

参考解析
解析: 暂无解析
更多 “多选题You need to ensure that the company’s standard password policy is enforced for all logins that areused to access SQL Server 2005.Which two actions should you perform?()ASet the appropriate local password policies for all computers on which SQL Server is installed.BSet the server authentication mode of all SQL Server instances to Windows Authentication mode.CInstall all instances of SQL Server 2005 on computers that run Windows Server 2003 or later.DCreate SQL Server logins that have CHECK_POLICY enabled.” 相关考题
考题 You create a Web application for your company‘s intranet. You want to enable users to customize their versions of the intranet home page. You create sections of content as Web Parts. You need to ensure that users can customize content at any time.Which two code segments should you use?()A.B.C.D.

考题 You administer your company‘s network. All client computers run Microsoft Windows Vista. A standard user reports that they are unable to install an application. You need to install the applicatin.What should you do?()A.AB.BC.CD.D

考题 You need to recommend a solution to ensure that all of the client computers that run Windows 7 meet the company’s security requirements.   What should you include in the recommendation?()A、Encrypted File System (EFS)B、the AppLocker Group Policy settingsC、the IPSec enforcement methodD、Windows BitLocker Drive Encryption (BitLocker)

考题 . Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). You create a new domain user account named User1 and assign the account a password of P@ssw0rd. On the new account, you enable the User must change password at next logon option. A week later, you discover that User1 is still using the password P@ssw0rd to log on to the domain. You need to ensure that User1 is forced to use a different password the next time she changes her password. What should you do first? ()A、In the Default Domain Policy, select Enforce password history.B、In the Default Domain Policy, select Passwords must meet complexity requirements.C、From the User’s account properties, select Account is sensitive and cannot be delegated.D、From the User’s account properties, select Store password using reversible encryption.

考题 Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). You create a new domain user account named User1 and assign the account a password of P@ssw0rd. On the new account, you enable the User must change password at next logon option. A week later, you discover that User1 is still using the password P@ssw0rd to log on to the domain. You need to ensure that User1 is forced to use a different password the next time she changes her password. What should you do first? ()A、In the Default Domain Policy, select Enforce password history.B、In the Default Domain Policy, select Passwords must meet complexity requirements.C、From the User’s account properties, select Account is sensitive and cannot be delegated.D、From the User’s account properties, select Store password using reversible encryption.

考题 Your portable computer is in sleep mode. When you resume work on the portable computer, you are not prompted for a password.  You need to ensure that you are prompted for a password each time the portable computer recovers from sleep mode.  What should you do?()A、Configure the computer to hibernate when not in use.B、In the current power plan settings, configure the computer to require a password when recovering from sleep mode.C、Configure the computer to use the High Performance power plan.D、Configure the screen saver settings to require a password on resumption of work.

考题 You deploy mobile devices that run Microsoft Windows Mobile 5.0 with Microsoft Messaging and Security Feature Pack. A server that runs Microsoft Exchange Server 2003 Service Pack 2 is configured by using the default installation settings.   Company security policy requires a complex password for unlocking the Windows Mobilebased devices.   You need to ensure that the Windows Mobilebased devices that perform Microsoft ActiveSync synchronization meet the company security policy.   Which two actions should you perform?()A、Enter all mobile device users in the Exceptions list.B、Enable the Require both numbers and letters option.C、Enable the Allow access to devices that do not fully support password settings option.D、Enable the Minimum password length (characters) option. Configure a value of 6 or greater.

考题 Your company has a main office and a branch office.  The network contains an Active Directory domain.   The main office contains a writable domain controller named DC1. The branch office contains a read-only  domain controller (RODC) named DC2.   You discover that the password of an administrator named Admin1 is cached on DC2.  You need to prevent Admin1s password from being cached on DC2.   What should you do()A、Modify the NTDS Site Settings.B、Modify the properties of the domain.C、Create a Password Setting object (PSO).D、Modify the properties of DC2s computer account.

考题 Your company has a main office and a branch office. The branch office has an Active Directory  site that contains a read-only domain controller (RODC).   A user from the branch office reports that his account is locked out. From a writable domain  controller in the main office, you discover that the user’s account is not locked out.     You need to ensure that the user can log on to the domain.     What should you do()A、Modify the Password Replication Policy.B、Reset the password of the user account.C、Run the Knowledge Consistency Checker (KCC) on the RODC.D、Restore network communication between the branch office and the main office.

考题 Your company has a main office and a branch office You deploy a read-only domain controller (RODC) that runs Microsoft Windows Server 2008 to the branch office You need to ensure that users at the branch office are able to log on to the domain by using the RODC What should you do()A、Add another RODC to the branch officeB、Configure a new bridgehead server in the main officeC、Configure the Password Replication Policy on the RODCD、Decrease the replication interval for all connection objects by using the Actrve Directory Sites and Services console

考题 You have an Exchange Server 2010 organization.  Your company has a relationship with another company.  The partner company has an Exchange Server 2010 organization.  You need to recommend a security solution to meet the following requirements:  .Ensure that all e-mail delivery between your servers and the partner companys servers is encrypted .Ensure that all communication between your servers and the partner companys servers is authenticated What should you include in the solution?()A、Active Directory Rights Management Services (AD RMS)B、Domain SecurityC、Forms-based AuthenticationD、Secure/Multipurpose Internet Mail Extensions (S/MIME)

考题 Your company’s network has client computers that run Windows 7.    When a user attempts to log on to the domain from a computer named Client1,she receives the following message:   The system cannot log you on to this domain because the system’s computer account in its primary domain is missing or the password on that account is incorrect.  You need to ensure that the user can log on to the domain from Client1.   What should you do?()A、Disjoin and rejoin Client1 to the domain.B、Add the computer account for Client1 to the Domain Computers Active Directory group.C、Reset the account password for Client1 through Active Directory Users and Computers.D、Reset the account password for the user through Active Directory Users and Computers.

考题 You deploy mobile devices that run Microsoft Windows Mobile 5.0.   Company security policy requires an authentication process that is stronger than a user name and password combination.   You need to ensure that Microsoft ActiveSync sessions use an authentication process that meets the company security policy.   What should you do?()A、Deploy a two-factor authentication process.B、Deploy a single-factor authentication process.C、Deploy a simple PIN policy for the Windows Mobilebased devices.D、Deploy a complex PIN policy for the Windows Mobilebased devices.

考题 You need to recommend a BitLocker recovery method that meets the company’s technical requirements.   Which recovery method should you recommend?()A、a data recovery agentB、a recovery keyC、a recovery password printed and stored in a secure locationD、a recovery password stored in Active Directory

考题 You need to recommend a solution for managing the service accounts for SQL1 and SQL2. The  solution must meet the company’s security requirements. What should you include in the recommendation?()A、a custom password filterB、a Password Settings object (PSO)C、managed service accountsD、manual password changes

考题 You create 200 new user accounts. The users are located in six different sites. New users report that they receive the following error message when they try to log on: "The username or password is incorrect." You confirm that the user accounts exist and are enabled. You also confirm that the user name and password information supplied are correct. You need to identify the cause of the failure. You also need to ensure that the new users are able to log on Which utility should you run()A、RsdiagB、RstoolsC、RepadminD、Active Directory Domains and Trusts

考题 You have an Exchange Server 2010 organization.You need to ensure that all users in the organization can view the availability of a company projector.What should you create for the projector?()A、a distribution groupB、a mailboxC、a mail-enabled contactD、a sharing policy

考题 单选题You need to recommend a BitLocker recovery method that meets the company’s technical requirements.   Which recovery method should you recommend?()A a data recovery agentB a recovery keyC a recovery password printed and stored in a secure locationD a recovery password stored in Active Directory

考题 单选题You need to ensure that all servers meet the company’s security requirements. Which tool should you use?()A Microsoft Baseline Security Analyzer (MBSA)B Microsoft Security Assessment Tool (MSAT)C Resultant Set of Policy (RSoP)D Security Configuration Wizard (SCW)

考题 单选题You need to recommend a solution to ensure that all of the client computers that run Windows 7 meet the company’s security requirements.   What should you include in the recommendation?()A Encrypted File System (EFS)B the AppLocker Group Policy settingsC the IPSec enforcement methodD Windows BitLocker Drive Encryption (BitLocker)

考题 单选题A standard user named User1 has a computer that runs Windows 7. You need to ensure that User1 can runWindows Easy Transfer.  What should you do?()A Disable User Account Control (UAC).B Add User1 to the Administrators group.C Configure User1 to have a complex password.D Copy the support folder from the Windows 7 installation media to the local hard disk drive.

考题 单选题You deploy mobile devices that run Microsoft Windows Mobile 5.0.   A Windows Mobilebased device user forgets the PIN for the device.   You need to ensure that the user can unlock the device.   What should you do?()A Change the password for the domain user account of the user.B Perform a hard reset of the user’s Windows Mobilebased device.C Perform a soft reset of the user’s Windows Mobilebased device.D Connect the Windows Mobilebased device to the desktop computer of the user and change the password of the local user account of the user.

考题 单选题You need to recommend a solution for managing the service accounts for SQL1 and SQL2. The  solution must meet the company’s security requirements. What should you include in the recommendation?()A a custom password filterB a Password Settings object (PSO)C managed service accountsD manual password changes

考题 单选题Your portable computer is in sleep mode. When you resume work on the portable computer, you are not prompted for a password.  You need to ensure that you are prompted for a password each time the portable computer recovers from sleep mode.  What should you do?()A Configure the computer to hibernate when not in use.B In the current power plan settings, configure the computer to require a password when recovering from sleep mode.C Configure the computer to use the High Performance power plan.D Configure the screen saver settings to require a password on resumption of work.