考题
You need to design a method to standardize and deploy a baseline security configuration for servers. You solution must meet business requirements. What should you do?()A、Create a script that installs the Hisecdc.inf security templateB、Use a GPO to distribute and apply the Hisec.inf security templateC、Use the System Policy Editor to configure each server’s security settingsD、Use a GPO to distribute and apply a custom security template
考题
You design a Business Intelligence (BI) solution by using SQL Server 2008. You plan to design the report strategy for a new report project that will be used by a financial application. The application uses five calculations that are implemented in Microsoft .NET Framework 3.5 assemblies. The assemblies are written in the C# language and use the static methods. You need to ensure that the calculations can be used by the expressions in all reports. You also need to ensure consistency within the reports by using the least amount of development effort. What should you do?()A、 Add a reference to the assemblies in the Report Properties References tab. B、 Write the calculation logic used by the calculations by using T-SQL functions. C、 Write the code of the calculation logic into the Report Properties Custom Code tab.D、 Write the calculation logic in each report by using the mathematical functions available natively to SQL Server 2008 Reporting Services (SSRS).
考题
You need to design a security strategy for VPN2. Your solution must meet business requirements. What should you do?()A、Create and configure a new security template. Import the template into the Default Domain Policy Group Policy object (GPO)B、Install Internet Authentication Service (IAS) on RAS1. Configure VPN2 to be the RADIUS client of RAS1. Configure the remote access policy on VPN2C、Create and configure a new security template. Import the template into the local policy on VPN2D、Move VPN2 into the VPN Servers OU. Configure the remote access policy on VPN2
考题
You need to design phase one of the new authentication strategy. Your solution must meet business requirements.What should you do?()A、Install a Windows Server 2003 enterprise root CA, Configure certificate templates for autoenrollmentB、Install a Windows Server 2003 enterprise subordinate CA, Configure certificate templates for autoenrollmentC、Install a Windows Server 2003 stand-alone subordinate CA, Write a logon script for the client computers in the HR department that contains the Certreq.execommandD、Install a Windows Server 2003 stand-alone root CA,Write a logon script for the client computers in the HR department that contains the Certreq.execommand
考题
You need to recommend a backup strategy for the servers in the San Francisco office. The strategy must meet the company's technical requirements What should you include in the recommendation?()A、native-boot virtual hard disks (VHDs)B、Microsoft System Center Data Protection Manager 2010C、system restore pointsD、Windows Server Backup
考题
You need to recommend a solution for monitoring the servers. The solution must meet the company’s technical requirements What should you include in the recommendation?()A、Data Collector Sets (DCSs)B、event subscriptionsC、Reliability MonitorD、Windows System Resource Manager (WSRM)
考题
You need to recommend a process for monitoring the servers. The process must meet the company’s technical requirements. What should you include in the recommendation?()A、event subscriptionsB、Data Collector Sets (DCSs)C、Resource MonitorD、Microsoft System Center Operations Manager
考题
You need to design a security patch management strategy. Your solution must meet business and security requirements, and it must accommodate the company’s resource restrictions. What should you do?()A、Test and manually deploy updatesB、Deploy a Software Update Services (SUS) server. Test all updates and then approve them. Configure all client computers to automatically obtain updates from the serverC、Test all updates and then use a third-party utility to repackage updates in a Windows Installer file. Deploy the -.msi files by using Group PolicyD、Configure all client computers to use Automatic Updates to obtain security updates from the Windows Update Web site. Test all updates posted to the Windows Update Web site
考题
You are designing a remote access strategy to meet the business technical requirements. Which authentication mechanism should you use?()A、MS-CHAP v2.B、Internet Authentication service (IAS).C、Multilink Bandwidth Allocation Protocol (BAP).D、Remote access policies on all servers running Routing Remote Access.
考题
You need to design a remote administration solution for servers on the internal network. Your solution must meet business and security requirements. What should you do?()A、Permit administrators to use an HTTP interface to manage servers remotelyB、Permit only administrators to connect to the servers’ Telnet serviceC、Permit administrators to manage the servers by using Microsoft NetMeetingD、Require administrators to use Remote Desktop for Administration connections to manage the servers
考题
You are designing a VPN strategy to meet the business and technical requirements. Based on the current infrastructure, what is the maximum number of VPN connections that can be supported? ()A、 25B、 35C、 70D、 128E、 256
考题
You need to implement an auditing strategy that will fulfill the company’s business requirements.What should you do?()A、Use C2 auditing.B、Use DML triggers.C、Use DDL triggers.D、Use event notifications.
考题
You need to design a password policy that meets business requirements. What should you do? Select all that apply.()A、Increase the number of passwords that are rememberedB、Disable reversible encryptionC、Set the minimum password age to zero daysD、Increase the maximum password age
考题
You need to design a strategy to ensure that all servers are in compliance with the business requirements for maintaining security patches. What should you do?()A、Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the domainB、Log on to each server and run Security Configuration and Analysis to analyze the security settings by using a custom security templateC、Create a logon script to run the secedit command to analyze all servers in the domainD、Run the Microsoft Baseline Security Analyzer (MBSA) on a server to scan for Windows vulnerabilities on all servers in the domain
考题
单选题The company is evaluating using a new Active Directory domain to contain all customer user accounts. You need to design a monitoring or logging strategy that meets business and security requirements for the new Web-based ordering application. Your solution must minimize overhead on existing domain controllers and servers. What should you do?()A
Enable logon auditing in both the new and the existing domainsB
Enable logon auditing only in the existing domainC
Enable logon auditing only in the new domainD
Enable logon auditing on only the Web server
考题
单选题You are designing a VPN strategy to meet the business and technical requirements. Based on the current infrastructure, what is the maximum number of VPN connections that can be supported? ()A
25B
35C
70D
128E
256
考题
多选题You need to design a strategy to increase security for the client computers in the finance department. Which two actions should you perform?()AEnable automatic certificate enrollmentBEnforce smart card logonsCEnable Encrypting File System (EFS) for offline filesDEnable a screen saver password
考题
单选题You need to design the consolidation strategy for the Promotions and Partners databases. You want to choose a strategy that results in the best database performance while maintaining the permissions of end users in each database.What consolidation strategy should you choose?()A
Place each database in a separate instance running on SQL2.B
Place each database in a separate instance running on SQL3.C
Place both databases in a single instance running on SQL2.D
Place both databases in a single instance running on SQL3.
考题
单选题You need to design a group membership strategy for the EditorialAdmins group. What should you do?()A
Move the EditorialAdmins group to the Servers OU in the editorial departmentB
Move the members of the EditorialAdmins group to the Editorial OUC
Move the members of the EditorialAdmins group to the New York OUD
Move the EditorialAdmins group to the New York OU
考题
单选题You are designing a DNS implementing strategy to meet the business and technical requirement. Which type of zone should you use?()A
Sub ZonesB
Standard Primary ZonesC
Secondary ZonesD
Active DirectoryIntegrated Zones
考题
单选题You are designing a DNS implementing strategy to meet the business and technical requirement. Which type of zone should you use?()A
Sub ZonesB
Standard Primary ZonesC
Secondary ZonesD
Active DirectoryIntegrated Zones
考题
单选题You need to design a storage strategy that meets all business and technical requirements. What should you do?()A
Create a storage group for each office. Within each storage group, create a single databaseB
Create a storage group for each region. Within each storage group, create a single databaseC
Create a storage group for each region. Within each storage group, create separate databases for each office in that regionD
Create a single storage group. Within that storage group, create a separate database for each office