考题
You discover audit log entries that report attempts to log on to your computer. You need to be notified of all logon attempts that occur on your computer.What should you do?()
A.AB.BC.CD.D
考题
As part of your design, you are evaluating whether a second-level organizational unit (OU) structure is required. Which factor necessitates the need for a second-level OU structure?()A、 Audit policy settingsB、 Software deployment needsC、 Client operating systems in useD、 Delegation of administrative authority
考题
You design a Business Intelligence (BI) solution by using SQL Server 2008. You plan to design the report strategy for a new report project that will be used by a financial application. The application uses five calculations that are implemented in Microsoft .NET Framework 3.5 assemblies. The assemblies are written in the C# language and use the static methods. You need to ensure that the calculations can be used by the expressions in all reports. You also need to ensure consistency within the reports by using the least amount of development effort. What should you do?()A、 Add a reference to the assemblies in the Report Properties References tab. B、 Write the calculation logic used by the calculations by using T-SQL functions. C、 Write the code of the calculation logic into the Report Properties Custom Code tab.D、 Write the calculation logic in each report by using the mathematical functions available natively to SQL Server 2008 Reporting Services (SSRS).
考题
You need to design an audit strategy for Southbridge Video. Your solution must meet business requirements.What should you do?()A、Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPOB、Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPOC、Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPOD、Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPO
考题
You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()A、Require client computers to connect to the marketing application by using a VPN connectionB、Use IPSec to encrypt communications between the servers in the New York and Atlanta officesC、Require the high security setting on Terminal Services connections to the marketing applicationD、Configure all marketing application Web pages to require SSL
考题
You need to design a method to log changes that are made to servers and domain controllers. You also need to track when administrators modify local security account manager objects on servers. What should you do?()A、Enable failure audit for privilege user and object access on all servers and domain controllersB、Enable success audit for policy change and account management on all servers and domain controllersC、Enable success audit for process tracking and logon events on all servers and domain controllersD、Enable failure audit for system events and directory service access on all servers and domain controllers
考题
You need to design an e-mail access strategy for remote users. What should you do? () A、 Instruct remote users to connect to their e-mail by using RPCB、 Instruct remote users to connect to Outlook Web Access by using only HTTPSC、 Instruct remote users to connect to the company network by using PPTP connectionsD、 Instruct remote users to connectd to their e-mail by using RPC over HTTP Configure the HTTP servers to require encryption.
考题
Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2008 R2. You need to plan an auditing strategy that meets the following requirements: èAudits all changes to Active Directory Domain Services (AD?DS) èStores all auditing data in a central location. What should you include in your plan?()A、Configure an audit policy for the domain. Configure Event Forwarding.B、Configure an audit policy for the domain controllers. Configure Data Collector Sets.C、Implement Windows Server Resource Manager (WSRM) in managing mode.D、Implement Windows Server Resource Manager (WSRM) in accounting mode.
考题
You are configuring a Windows Server 2008 R2 Hyper-V server. You need to audit changes to Hyper-V roles and authorization rights. Which file should you audit?()A、AzMan.mscB、Initial Store.xmlC、machine.configD、Web.config
考题
Your company has a single Active Directory Domain Services (AD DS) domain with Windows Server 2008 R2 member servers and 1,000 Windows 7 client computers. You are designing the deployment of a custom application. You have the following requirements: The application must be available to only users who need it. Minimize network traffic during deployment. You need to design a deployment strategy that meets the requirements. Which deployment method should you use?()A、RemoteApp and Desktop ConnectionsB、software installation in Group PolicyC、Microsoft Application Virtualization (App-V)D、Microsoft System Center Configuration Manager 2007
考题
You need to recommend a strategy to ensure that the administration of AD LDS is encrypted. What should you include in the recommendation?()A、a server authentication certificateB、client authentication certificatesC、Digest authenticationD、Windows Integrated authentication
考题
As part of your design, you are evaluating whether a second-level organizational unit (OU) structure is required. Which factor necessitates the need for a second-level OU structure?()A、Audit policy settingsB、Software deployment needs C、Client operating systems in useD、Delegation of administrative authority
考题
You need to identify each help desk user who bypasses the new corporate security policy. What should you do?()A、Configure Audit Special Logon and define Special Groups.B、Configure Audit Other Privilege Use Events and define Special Groups.C、Configure Audit Sensitive Privilege Use and configure auditing for the HelpDesk group.D、Configure Audit Object Access and modify the auditing settings for the HelpDesk group.
考题
You need to recommend a configuration design for the new VMs. The design must ensure that operating systems can be deployed to the new VMs. What should you include in the recommendation?()A、virtual machine queue (VMQ)B、Virtual Machine ChimneyC、a synthetic network adapterD、an emulated network adapter
考题
You need to design a strategy to ensure that all servers are in compliance with the business requirements for maintaining security patches. What should you do?()A、Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the domainB、Log on to each server and run Security Configuration and Analysis to analyze the security settings by using a custom security templateC、Create a logon script to run the secedit command to analyze all servers in the domainD、Run the Microsoft Baseline Security Analyzer (MBSA) on a server to scan for Windows vulnerabilities on all servers in the domain
考题
单选题You are configuring a Windows Server 2008 R2 Hyper-V server. You need to audit changes to Hyper-V roles and authorization rights. Which file should you audit?()A
AzMan.mscB
Initial Store.xmlC
machine.configD
Web.config
考题
单选题You need to design an access control strategy for the Payment folder for the Sales Managers group. What should you do?()A
Use IPSec in transport modeB
Use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV)C
Use PEAP-EAP-TLSD
Use Encrypting File System (EFS) remote encryption
考题
单选题You need to design a software usage policy for the employees of Southbridge Video. The policy must meet business requirements. What should you do?()A
Configure the software restriction policy in the Default Domain Policy Group Policy object (GPO)B
Create a new connection object by using the Connection Manager Administration Kit (CMAK), and install the new connection object on all client computersC
Create and configure a local security policy on both of the ISA server computersD
Configure the Internet Explorer settings in the Default Domain Policy Group Policy object (GPO)
考题
单选题Your company has client computers that run Windows XP Professional. You are planning to install Windows 7 Enterprise on the existing client computers. You have the following requirements: Migrate user data and operating system components. Encrypt and password-protect the migration store. You need to design a user state migration strategy that supports the requirements. What should you do?()A
Use a hard-link migration storeB
Use a compressed migration storeC
Perform an offline migration by using WindowsoldD
Perform an offline migration by using Windows PE
考题
多选题You need to design a strategy to increase security for the client computers in the finance department. Which two actions should you perform?()AEnable automatic certificate enrollmentBEnforce smart card logonsCEnable Encrypting File System (EFS) for offline filesDEnable a screen saver password
考题
单选题You need to recommend a Group Policy strategy for the Remote Desktop servers. What should you include in the recommendation?()A
block inheritanceB
loopback processingC
security filteringD
WMI filtering
考题
单选题You need to design a patch management strategy for Southbridge Video. Your solution must meet business requirements. What should you do?()A
Configure all client computers to use Automatic Updates to obtain security patches from the Windows Update Web site. Test and install all patchesB
Configure a batch file to download security patches daily. Distribute the security patches by using a.zap file and the Default Domain Policy Group Policy object (GPO)C
Deploy a Software Update Services (SUS) server. Test all security patches and then approve them. Configure all client computers to automatically obtain updates from the serverD
Configure a batch file to download security patches daily. Manually install the security patches on all computers
考题
单选题Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers. You are planning to deploy Windows 7 Enterprise to the client computers. You need to design a zero-touch installation strategy.()A
unattended installationB
custom Windows 7 image on DVDC
Windows Deployment Services (WDS)D
Microsoft System Center Configuration Manager 2007 R2
考题
单选题You need to design the consolidation strategy for the Promotions and Partners databases. You want to choose a strategy that results in the best database performance while maintaining the permissions of end users in each database.What consolidation strategy should you choose?()A
Place each database in a separate instance running on SQL2.B
Place each database in a separate instance running on SQL3.C
Place both databases in a single instance running on SQL2.D
Place both databases in a single instance running on SQL3.
考题
单选题You are designing a strategy for migrating domain user accounts to the new Windows Server 2003 Active Directory environment. You want to identify the minimum number of trust relationships that need to be manually created to perform this operation. Which design should you use? ()A
one external trust relationshipB
two external trust relationshipsC
six external trust relationshipsD
twelve external trust relationshipsE
one two-way cross-forest trust relationship
考题
单选题You design a Business Intelligence (BI) solution by using SQL Server 2008. You plan to design the report strategy for a new report project that will be used by a financial application. The application uses five calculations that are implemented in Microsoft .NET Framework 3.5 assemblies. The assemblies are written in the C# language and use the static methods. You need to ensure that the calculations can be used by the expressions in all reports. You also need to ensure consistency within the reports by using the least amount of development effort. What should you do?()A
Add a reference to the assemblies in the Report Properties References tab. B
Write the calculation logic used by the calculations by using T-SQL functions. C
Write the code of the calculation logic into the Report Properties Custom Code tab.D
Write the calculation logic in each report by using the mathematical functions available natively to SQL Server 2008 Reporting Services (SSRS).
考题
单选题You need to design a group membership strategy for the EditorialAdmins group. What should you do?()A
Move the EditorialAdmins group to the Servers OU in the editorial departmentB
Move the members of the EditorialAdmins group to the Editorial OUC
Move the members of the EditorialAdmins group to the New York OUD
Move the EditorialAdmins group to the New York OU
考题
单选题As part of your design, you are evaluating whether a second-level organizational unit (OU) structure is required. Which factor necessitates the need for a second-level OU structure?()A
Audit policy settingsB
Software deployment needsC
Client operating systems in useD
Delegation of administrative authority