网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
You are tasked with designing a security solution for your network. What information should be gathered prior to designing the solution?()
A
IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats
B
a list of the customer requirements
C
detailed security device specifications
D
results from pilot network testing
参考答案
参考解析
解析:
暂无解析
更多 “单选题You are tasked with designing a security solution for your network. What information should be gathered prior to designing the solution?()A IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsB a list of the customer requirementsC detailed security device specificationsD results from pilot network testing” 相关考题
考题
You are the domain administrator for TestKing‘s Active Directory domain named All client computers run Windows XP Professional.You need to implement a solution for managing security updates on client computers. You plan to use a Windows Server 2003 computer to manage security updates. Your solution for managing security updates must meet the following requirements:1. You must not purchase additional software or licences.2. Security updates must be installed automatically.3. You must be able to control which updates are available to install.4. Security updates must synchronize automatically with the latest updates offered by Microsoft.You need to implement a solution for managing security updates that meets the requirements.What should you do?()A. Publish the security updates by using a Group Policy object (GPO). Assign the GPO to the client computers that require updatesB. Install Software Update Services (SUS). Configure the SUS software to synchronize daily with Microsoft. Use Group Policy to configure the appropriate Windows Update settings on the client computers.C. Install Microsoft Internet Security and Acceleration (ISA) Server on a Windows Server 2003 computer.D. Create a process to run Windows Update on all client computers.
考题
When creating a network security solution, which two pieces of information should you have previously obtained to assist in designing the solution? ()A、a list of existing network applications currently in use on the networkB、network audit results to uncover any potential security holesC、a planned Layer 2 design solutionD、a proof-of-concept planE、device configuration templates
考题
You are tasked with designing a security solution for your network. What information should be gathered prior to designing the solution?()A、IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsB、a list of the customer requirementsC、detailed security device specificationsD、results from pilot network testing
考题
Which two are needed components when designing and implementing a security solution?()A、detailed VLAN informationB、an incident response planC、results of testing the new network configurationD、an existing hierarchical network topologyE、a security policy for your organization
考题
You have been tasked with performing an update to the IDP attack database. Which three requirements areincluded as part of this task?()A、The IDP security package must be installed after it is downloaded.B、The device must be rebooted to complete the update.C、The device must be connected to a network.D、An IDP license must be installed on your device.E、You must be logged in as the root user
考题
You are designing an IP addressing strategy for your VPN solution. How many public addresses should you use?()A、1B、25C、50D、255
考题
You have an Exchange Server 2010 organization. The organization contains a global security group named Group1. You plan to deploy a monitoring solution for the Exchange servers in your organization. You need to recommend a solution that allows members of Group1 to monitor the performance ofExchange Server 2010 servers. Your solution must prevent members of Group1 from modifying the configurations of the ExchangesServer 2010 organization. What should you include in the solution?()A、Delegation of Control WizardB、Federation TrustsC、Reliability MonitorD、Role Based Access Control (RBAC)
考题
You have an Exchange Server 2010 organization. Your company has a relationship with another company. The partner company has an Exchange Server 2010 organization. You need to recommend a security solution to meet the following requirements: .Ensure that all e-mail delivery between your servers and the partner companys servers is encrypted .Ensure that all communication between your servers and the partner companys servers is authenticated What should you include in the solution?()A、Active Directory Rights Management Services (AD RMS)B、Domain SecurityC、Forms-based AuthenticationD、Secure/Multipurpose Internet Mail Extensions (S/MIME)
考题
You have an Exchange Server 2010 organization that consists of 50 Exchange Server 2010 servers. Your companys security policy states that approved Exchange and Windows Server patches and securityupdates must be applied to all Exchange servers within one week of being released. You need to recommend a patch management solution that meets the following requirements: .Allow administrators to manually approve patches and security updates .Allow only the installation of approved patches and security updates .Minimize the administrative effort to deploy patches .Minimize the deployment costs What should you include in the solution?()A、Microsoft UpdateB、Microsoft System Center Configuration ManagerC、Windows Server Update ServicesD、Windows Update
考题
You have an Exchange Server 2010 organization. You have a global security group named Legal that contains all the members of your companys legaldepartment. The companys security policy states that the Legal group must be able to search all mailboxes for e-mailmessages that contain specific keywords. You need to recommend a solution for the organization that complies with the security policy. What should you include in the solution?()A、a Discovery Management role groupB、a legal holdC、administrator audit loggingD、Mailbox journaling
考题
You have an Exchange Server 2010 organization. Your companys security policy states that users must not be able to encrypt e-mail messages by usingOutlook Web App (OWA). You need to recommend a client access solution that meets the requirements of the security policy. What should you include in the solution?()A、managed folder mailbox policiesB、multiple OWA virtual directoriesC、OWA segmentationD、WebReady Document Viewing
考题
You are designing a security strategy for the public Web server. You solution must address the chief security officer’s concerns. What should you do?()A、Install a Web server certificate on WEB1B、Enable Internet Connection Firewalll (ICF) on WEB1C、Configure IIS on WEB1 to operate in IIS 5.0 isolation modeD、Install and configure the URLScan ISAPI filer on WEB1
考题
You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. The organization consists of 40 servers is configured to run Exchange Server 2010. A new TestKing.com security policy requires that approved server patches of Exchange and Windows aswell as security updates be applied to servers within seven days of it being released. During the course of day you receive an instruction from management to: * Ensure that only approved patches and security updates are installed. * Ensure that only administrators are allowed to approve patches and security updates manually. * Ensure that the deployment casts is reduced. * Ensure that the administrative effort of deploying patched is reduced. You are instructed to recommend a solution that will comply with the set criteria. What should you do?()A、You should recommend that Microsoft System Center Configuration Manager be included in your solution.B、You should recommend that Windows Update be included in your solution.C、You should recommend that Windows Server Update Services be included in your solution.D、You should recommend that Microsoft Update be included in your solution.
考题
You are employed as the exchange administrator at TestKing.com. The TestKing.com network containsan Exchange Server 2010 Organization. TestKing.com has its headquarters in Chicago and a branchoffice in Dallas. TestKing.com has a global security group named TestFinance. TestFinance contains all the users in theFinance department. A new TestKing.com policy state that TestFinance have the nesessary permissons tosearch the mailboxes for e-mail messages containing certain words. The CIO wants you to recommend asolution that will comply with the new policy. What should you do?()A、Your solution should include a finance hold.B、Your solution should include mailbox journaling.C、Your solution should include a Discovery Management role group.D、Your solution should include administrator audit logging.
考题
单选题You are designing an IP addressing strategy for your VPN solution. How many public addresses should you use?()A
1B
25C
50D
255
考题
单选题You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. The organization consists of 40 servers is configured to run Exchange Server 2010. A new TestKing.com security policy requires that approved server patches of Exchange and Windows aswell as security updates be applied to servers within seven days of it being released. During the course of day you receive an instruction from management to: * Ensure that only approved patches and security updates are installed. * Ensure that only administrators are allowed to approve patches and security updates manually. * Ensure that the deployment casts is reduced. * Ensure that the administrative effort of deploying patched is reduced. You are instructed to recommend a solution that will comply with the set criteria. What should you do?()A
You should recommend that Microsoft System Center Configuration Manager be included in your solution.B
You should recommend that Windows Update be included in your solution.C
You should recommend that Windows Server Update Services be included in your solution.D
You should recommend that Microsoft Update be included in your solution.
考题
单选题You are tasked with designing a security solution for your network. What information should be gathered prior to designing the solution?()A
a list of applications currently in use in the networkB
IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsC
detailed security device specificationsD
results from pilot network testing
考题
单选题You are designing an IP addressing strategy for your VPN solution. How many public addresses should you use?()A
1B
25C
50D
255
考题
多选题You are designing a security strategy for the infrastructure servers at the resorts.Which two actions should you perform?(Each correct answer presents part of the solution. Choose two)()APlace all infrastructure servers in subnets that cannot exchange information with the InternetBEstablish a custom security template that contains unique required settings for each combination of services that run on the infrastructure serversCUse Group Policy objects (GPOs) to apply the custom security template or templates to the Infrastructure serversDEdit the local policy settings to configure each individual server
考题
多选题Which two are needed components when designing and implementing a security solution?()Adetailed VLAN informationBan incident response planCresults of testing the new network configurationDan existing hierarchical network topologyEa security policy for your organization
考题
多选题When creating a network security solution, which two pieces of information should you have previously obtained to assist in designing the solution? ()Aa list of existing network applications currently in use on the networkBnetwork audit results to uncover any potential security holesCa planned Layer 2 design solutionDa proof-of-concept planEdevice configuration templates
热门标签
最新试卷