网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Client Security Solution,客户端安全解决方案。可以做以下哪些工作()

  • A、文件和文件夹加密
  • B、数字证书安全接管
  • C、无线网络加密
  • D、对R&R备份数据加密

参考答案

更多 “Client Security Solution,客户端安全解决方案。可以做以下哪些工作()A、文件和文件夹加密B、数字证书安全接管C、无线网络加密D、对RR备份数据加密” 相关考题
考题 One solution to major security problems is ______, which are frequently installed to fix known security holes.A.patchesB.compensationsC.complementsD.additions

考题 One solution to major security problems is(71), which are frequently installed to fix known security holes。A.additionsB.compensationsC.patchesD.complements

考题 Which two statements regarding firewall user authentication client groups are true?() (Choose two.) A. A client group is a list of clients associated with a group.B. A client group is a list of groups associated with a client.C. Client groups are referenced in security policy in the same manner in which individual clients are referenced.D. Client groups are used to simplify configuration by enabling firewall user authentication without security policy.

考题 You are the domain administrator for TestKing‘s Active Directory domain named All client computers run Windows XP Professional.You need to implement a solution for managing security updates on client computers. You plan to use a Windows Server 2003 computer to manage security updates. Your solution for managing security updates must meet the following requirements:1. You must not purchase additional software or licences.2. Security updates must be installed automatically.3. You must be able to control which updates are available to install.4. Security updates must synchronize automatically with the latest updates offered by Microsoft.You need to implement a solution for managing security updates that meets the requirements.What should you do?()A. Publish the security updates by using a Group Policy object (GPO). Assign the GPO to the client computers that require updatesB. Install Software Update Services (SUS). Configure the SUS software to synchronize daily with Microsoft. Use Group Policy to configure the appropriate Windows Update settings on the client computers.C. Install Microsoft Internet Security and Acceleration (ISA) Server on a Windows Server 2003 computer.D. Create a process to run Windows Update on all client computers.

考题 LVCC(Lenovo Virtual Cloud Client Solution)是由联想自主研发的终端到云端一体化的企业云计算解决方案。 A.错误B.正确

考题 Which two statements regarding firewall user authentication client groups are true?() (Choose two.)A、A client group is a list of clients associated with a group.B、A client group is a list of groups associated with a client.C、Client groups are referenced in security policy in the same manner in which individual clients are referenced.D、Client groups are used to simplify configuration by enabling firewall user authentication without security policy.

考题 You need to recommend a solution to ensure that all of the client computers that run Windows 7 meet the company’s security requirements.   What should you include in the recommendation?()A、Encrypted File System (EFS)B、the AppLocker Group Policy settingsC、the IPSec enforcement methodD、Windows BitLocker Drive Encryption (BitLocker)

考题 Your company has a single Active Directory directory service domain. All servers in your environment run Windows Server 2003. Client computers run Windows XP or Windows Vista. You plan to create a security update scan procedure for client computers. You need to choose a security tool that supports all the client computers.  Which tool should you choose? ()A、 UrlScan Security ToolB、 Enterprise Scan Tool (EST)C、 Malicious Removal Tool (MRT)D、 Microsoft Baseline Security Analyzer (MBSA)

考题 LVCC(Lenovo Virtual Cloud Client Solution)是由联想自主研发的终端到云端一体化的企业云计算解决方案。

考题 What is an ideal Cisco solution to protect a campus network and services from potential security breaches?()A、Cisco Security Device ManagerB、Cisco Security AgentC、Cisco VPN ClientD、Cisco Intrusion Detection System

考题 Which two statements regarding firewall user authentication client groups are true?()A、Individual clients are configured under client groups in the configuration hierarchy.B、Client groups are configured under individual clients in the configuration hierarchy.C、Client groups are referenced in security policy in the same manner in which individual clients are referenced.D、Client groups are used to simplify configuration by enabling firewall user authentication without security policy.

考题 You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()A、Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access pointB、Configure IEEE 802.1x authentication with smart cardsC、Configure the wireless network to use Wired Equivalent Privacy (WEP)D、Install and configure an Internet Authentication Service (IAS) server

考题 You need to design a security patch management strategy. Your solution must meet business and security requirements, and it must accommodate the company’s resource restrictions. What should you do?()A、Test and manually deploy updatesB、Deploy a Software Update Services (SUS) server. Test all updates and then approve them. Configure all client computers to automatically obtain updates from the serverC、Test all updates and then use a third-party utility to repackage updates in a Windows Installer file. Deploy the -.msi files by using Group PolicyD、Configure all client computers to use Automatic Updates to obtain security updates from the Windows Update Web site. Test all updates posted to the Windows Update Web site

考题 Your company has an Active Directory forest named contoso.com.  You plan to deploy an Exchange Server 2010 organization that will contain two servers.  Each server will have the Client Access server role, the Hub Transport server role, and the Mailbox serverrole installed.  You plan to add both servers to a database availability group (DAG).  You need to recommend a high-availability solution for the Client Access server role.  Your solution must ensure that users are not prompted to authenticate if a Client Access server becomesunavailable.  What should you recommend?()A、Create and configure a Client Access server array, and then install a hardware load balancer.B、Create and configure a Client Access server array, and then install Windows Network Load Balancingon both servers.C、Deploy Microsoft Internet Security and Acceleration (ISA) Server 2006, and then implement DNS round robin.D、Deploy Microsoft Internet Security and Acceleration (ISA) Server 2006, and then install Windows Network Load Balancing.

考题 You have an Exchange 2010 organization.  Your companys security policy states that all connections to Outlook Web App (OWA) must use smartcard authentication.  You need to recommend a solution to meet the security policy requirements.  Which two possible ways to achieve this goal should you recommend?()A、Require certificate-based authentication for all Internet-facing Client Access servers.B、Require Windows Integrated Authentication for all Internet-facing Client Access servers.C、Deploy an Edge Transport server, and then disable Windows Integrated Authentication.D、Deploy a server that runs Microsoft Internet Security and Acceleration (ISA) Server,and then  enableKerberos constrained delegation.

考题 You have an Exchange Server 2010 organization.  Your companys security policy states that users must not be able to encrypt e-mail messages by usingOutlook Web App (OWA).  You need to recommend a client access solution that meets the requirements of the security policy.  What should you include in the solution?()A、managed folder mailbox policiesB、multiple OWA virtual directoriesC、OWA segmentationD、WebReady Document Viewing

考题 Your company has client computers that run Windows Vista and client computers that run Windows 7.   The client computers connect directly to the Microsoft Update Web site once per week and automatically install all available security updates.  Microsoft releases a security update for Windows 7.   You have the following requirements:   Create a report of all Windows 7 computers that are currently connected to the network and that do not have the security update installed. Use the least amount of administrative effort.  You need to manage the software update process to meet the requirements.   What should you do?()A、 Deploy Microsoft Windows Server Update Services (WSUS). Approve the security update for installation,and forcea detection cycle on the client computers.B、 Deploy Microsoft Windows Server Update Services (WSUS). Approve the security update for detection, and force adetection cycle on the client computers.C、 Use the Microsoft Baseline Security Analyzer (MBSA) to scan the client computers.Configure MBSA to use the Microsoft Update site catalog.D、 Use the Microsoft Baseline Configuration Analyzer (MBCA) to scan the client computers.

考题 You need to recommend a solution for managing administrative rights for the branch office client computers. The solution must meet the companys technical requirements.What should you recommend configuring?()A、Account Policies by using GPOsB、Local Users and Groups by using Group Policy preferencesC、Restricted Groups by using GPOsD、Security Options by using Group Policy preferences

考题 You need to recommend a solution for the USB storage devices on the client computers.The solution must meet the company’s security requirements. What should you include in the recommendation?()A、Encrypted File System (EFS)B、the AppLocker Group Policy settingsC、the Enhanced Storage Access settingsD、Windows BitLocker Drive Encryption (BitLocker)

考题 单选题You need to recommend a solution to ensure that all of the client computers that run Windows 7 meet the company’s security requirements.   What should you include in the recommendation?()A Encrypted File System (EFS)B the AppLocker Group Policy settingsC the IPSec enforcement methodD Windows BitLocker Drive Encryption (BitLocker)

考题 单选题What action should you be prepared to take when verifying a security solution?()A having alternative addressing and VLAN schemesB having a rollback plan in case of unwanted or unexpected resultsC running a test script against all possible security threats to insure that the solution will mitigate all potential threatsD isolating and testing each security domain individually to insure that the security design will meet overall requirements when placed into production as an entire system

考题 单选题You need to design a patch management strategy for Southbridge Video. Your solution must meet business requirements. What should you do?()A Configure all client computers to use Automatic Updates to obtain security patches from the Windows Update Web site. Test and install all patchesB Configure a batch file to download security patches daily. Distribute the security patches by using a.zap file and the Default Domain Policy Group Policy object (GPO)C Deploy a Software Update Services (SUS) server. Test all security patches and then approve them. Configure all client computers to automatically obtain updates from the serverD Configure a batch file to download security patches daily. Manually install the security patches on all computers

考题 单选题You develop a Windows Communication Foundation (WCF) service that uses basic authentication for client credentials. This service is currently configured to use message security. The service is hosted on a server in workgroup mode.Users report that their passwords are stolen when they use public computers.You need to ensure that messages are secure and users are authenticated.You prevent the service from being called over HTTP through Microsoft Internet Information Services (IIS) configuration. What should you do next?()A Use the transport security mode and specify None for transport client credential type.B Use the transportWithMessageCredential security mode and specify Basic for the transport client credential type.C Use the message security mode and specify Basic for the transport client credential type.D Use the transportWithMessageCredential security mode and specify None for the transport client credential type.

考题 单选题Your network contains an Active Directory domain. All client computers run Windows XP Service Pack 3 (SP3). The domain contains a member server named Server1 that runs Windows Server 2008 R2. On Server1, you create a connection security rule that requires authentication for inbound and outbound connections. You configure the connection security rule to use Kerberos authentication. You need to ensure that the client computers can connect to Server1. The solution must ensure that all connections to Server1 are encrypted. What should you do?()A From the Windows Firewall with Advanced Security console, create an inbound rule on Server1.B From the Windows Firewall with Advanced Security console, create an outbound rule on Server1.C From a Group Policy object (GPO), enable the Client (Respond Only) IPSec policy on all client computers.D From a Group Policy object (GPO), configure the Network Security: LDAP client signing requirements policy setting for all client computers.

考题 单选题You need to recommend a solution for managing the address information of the user accounts. The solution must meet the company’s security requirements. What should you include in the recommendation?()A Active Directory delegationB Authorization ManagerC built-in security groupsD user rights assignments

考题 单选题You need to recommend a solution for the USB storage devices on the client computers.The solution must meet the company’s security requirements. What should you include in the recommendation?()A Encrypted File System (EFS)B the AppLocker Group Policy settingsC the Enhanced Storage Access settingsD Windows BitLocker Drive Encryption (BitLocker)

考题 单选题You need to improve the company’s security patch management process. Your solution must meet existing business requirements and it cannot increase the number of employees or unnecessarily increase ongoing administrative effort. What should you do?()A Provide all users with the ability to access and use the Windows Update Web siteB Upgrade all client computers to either Windows 2000 Professional or Windows XP Professional. Implement Software Update Services (SUS)C Upgrade all client computers to either Windows 2000 Professional or Windows XP Professional.Make all users members of the Power Users group on their client computersD Install the Active Directory Client Extensions on all Windows 95, Windows 98, and Windows NT Workstation 4.0 computers. Manually download all security patches to a Distributed File System (DFS) replica. Instruct all users to use the DFS replica to install security patchesE Install the Active Directory Client Extensions on all Windows 95, Windows 98, and Windows NT Workstation 4.0 computers. Install a Software Update Services (SUS) server and make all users local administrators on their client computers