网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You need to design an access control strategy for resources that are located in the extranet for partners and for internal users. Your solution must meet business and security requirements. What should you do?()
A

Create a new child domain named extranet.corp.woodgrovebank.com in the existing forest. Create user accounts for users from partner companies in the new child domain. Create shortcut trusts in which the child domain trusts every domain in the forest

B

Create a new forest and domain named extranet.woodgrovebank.com. Create user accounts for users from partner companies in the new domain. Create a one-way forest trust relationship in which the extranet forest trusts the company forest

C

Create a new forest and domain named extranet.woodgrovebank.com. Create user accounts for users from partner companies in the new domain. Create an external trust relationship in which the extranet domain trusts the den.corp.woodgrovebank.com domain

D

Create a child domain of the den.corp.woodgrovebank.com domain for the extranet. Create user accounts for users from partner companies in the new child domain. Create an external trust relationship in which the forest root domain trusts the extranet domain


参考答案

参考解析
解析: 暂无解析
更多 “单选题You need to design an access control strategy for resources that are located in the extranet for partners and for internal users. Your solution must meet business and security requirements. What should you do?()A Create a new child domain named extranet.corp.woodgrovebank.com in the existing forest. Create user accounts for users from partner companies in the new child domain. Create shortcut trusts in which the child domain trusts every domain in the forestB Create a new forest and domain named extranet.woodgrovebank.com. Create user accounts for users from partner companies in the new domain. Create a one-way forest trust relationship in which the extranet forest trusts the company forestC Create a new forest and domain named extranet.woodgrovebank.com. Create user accounts for users from partner companies in the new domain. Create an external trust relationship in which the extranet domain trusts the den.corp.woodgrovebank.com domainD Create a child domain of the den.corp.woodgrovebank.com domain for the extranet. Create user accounts for users from partner companies in the new child domain. Create an external trust relationship in which the forest root domain trusts the extranet domain” 相关考题
考题 Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()A. Session-Export policies on the Junos Pulse Secure Access ServiceB. Session-Export policies on the Junos Pulse Access Control ServiceC. Session-Import policies on the Junos Pulse Secure Access ServiceD. Session-Import policies on the Junos Pulse Access Control ServiceE. Resource access policies on the Junos Pulse Access Control Service

考题 You are receiving reports of possible unauthorized access to resources protected by a firewall enforcer running the Junos OS. You want to verity which users are currently accessing resources through the enforcer.Which command should you use to verify user access on the enforcer?()A. show services unified-access-control authentication-tableB. show auth tableC. show services unified-access-control policiesD. show services unified-access-control captive-portal

考题 Your computer is unable to access external names or IP addresses. You need to connect to external Internet resources.What should you do first?() A.AB.BC.CD.D

考题 You are developing a Windows Presentation Foundation (WPF) application for a travel reservation systemYou need to ensure that users can select a range of travel dates.What should you do ?() A. Add single DatePicker control to the design surfaceB. Add single Calendar control to the design surfaceC. Add single MediaElement control to the design surface to display a calendarD. Add the appropriate Windows Forms references to the project references. Add a single Windows Forms DateTimePicker control to the design surface

考题 You are designing a strategy to allow users to have remote access to internal resources. Which service or services should you allow on the public interface of the NAT Server?()A、HTTPB、LDAPC、POP3D、SMTPE、VPN Gateway

考题 You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()A、Require client computers to connect to the marketing application by using a VPN connectionB、Use IPSec to encrypt communications between the servers in the New York and Atlanta officesC、Require the high security setting on Terminal Services connections to the marketing applicationD、Configure all marketing application Web pages to require SSL

考题 You need to design a PKI that meets business requirements. What should you do?()A、Move ATLCA1 offline and create an enterprise subordinate CA to issue certificatesB、Create a stand-alone subordinate CA to issue certificatesC、Use a qualified subordinate CAD、Configure certificate template access control lists (ACLs) on ATLCA1

考题 You need to design a security strategy for the DHCP servers in the Seattle office. Which two actions should you perform?()A、Disable all unnecessary services on each DHCP serverB、Modify the discretionary access control lists (DACLs) in Active Directory so that only members of the Enterprise Admins security group can authorize additional DHCP serversC、Use an IPSec policy that allows only the packets necessary for DHCP and domain membership for each DHCP serverD、Install a digital certificate for SSL on each DHCP server

考题 You need to design an e-mail access strategy for remote users. What should you do? () A、 Instruct remote users to connect to their e-mail by using RPCB、 Instruct remote users to connect to Outlook Web Access by using only HTTPSC、 Instruct remote users to connect to the company network by using PPTP connectionsD、 Instruct remote users to connectd to their e-mail by using RPC over HTTP Configure the HTTP servers to require encryption.

考题 You are developing a Windows Forms Application by using the .NET Framework 3.5.You plan to design a composite custom control for the application. You include a ListBox control has a property that provides the item count of  the ListBox control. You need to ensure that the property cannot be accessed at design time. Which attribute should you use?()A、[Bindable(false)]B、[DesignOnly(false)]C、[EditorBrowsable(EditorBrowsableState.Never)]D、[Browsable(false)]

考题 You are developing a Windows Presentation Foundation (WPF) application for a travel reservation system You need to ensure that users can select a range of travel dates. What should you do ?()A、Add single DatePicker control to the design surfaceB、Add single Calendar control to the design surfaceC、Add single MediaElement control to the design surface to display a calendarD、Add the appropriate Windows Forms references to the project references. Add a single Windows Forms DateTimePicker control to the design surface

考题 You need to design an access control and permission strategy for user objects in Active Directory.What should you do?()A、Make the members of the AdvancedSupport security group members of the Domain Admins security groupB、Give each desktop support technician permission to reset passwords for the top-level OU that contains user accounts at their own locationC、Delegate full control over all OUs that contain user accounts to all AllSupport  security groupD、Change the permissions on the domain object and its child objects so that the BasicSupport security group is denied permissions. Then, add a permission to each OU that contains user accounts that allows AllSupport security group members to reset passwords in that OU

考题 单选题You need to design a security strategy for a remote e-mail access. What should you do?()A Require remote users to access e-mails by using Outlook Mobile AccessB Require Outlook Web Access users to install the secure MIME ActiveX-Control and to encrypt all messagesC On Outlook Web Access servers that accept connections from the Internet configure IIS to require SSL for all connectionsD On Outlook Web Access servers that accept connections from the Internet configure IIS to require Integrated Windows Authentication

考题 单选题You need to design an access control strategy for the Payment folder for the Sales Managers group. What should you do?()A Use IPSec in transport modeB Use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV)C Use PEAP-EAP-TLSD Use Encrypting File System (EFS) remote encryption

考题 单选题You are developing a Windows Presentation Foundation (WPF) application.You need to display HTML content from a Web page on the WPF form. What should you do?()A Add a FlowDocumentReader control to the design surface. Then create a FlowDocument control.B Add a DocumentViewer control to the design surface. Then create a FixedDocument control.C Add a WebBrowser control to the design surface. Then use the Navigate method to navigate the URI object.D Add a ContentControl control to the design surface. Then reference a WebClient object to return an HTML string.

考题 单选题You are developing a Windows Forms Application by using the .NET Framework 3.5.You plan to design a composite custom control for the application. You include a ListBox control has a property that provides the item count of  the ListBox control. You need to ensure that the property cannot be accessed at design time. Which attribute should you use?()A [Bindable(false)]B [DesignOnly(false)]C [EditorBrowsable(EditorBrowsableState.Never)]D [Browsable(false)]

考题 单选题You are developing a Windows Presentation Foundation (WPF) application. You need to display HTML content from a Web Page on the WPF form. What should you do?()A Add a FlowDocumentReader control to the design surface. Then create a FlowDocument control.B Add a ContentControl control to the design surface. The reference a WebClient object to return an HTML string.C Add a DocumentViewer control to the design surface. The create a FixedDocument control.

考题 单选题You are designing a strategy to allow users to have remote access to internal resources. Which service or services should you allow on the public interface of the NAT Server?()A HTTPB LDAPC POP3D SMTPE VPN Gateway

考题 单选题You need to design an access control strategy that meets business and security requirements. Your solution must minimize forestwide replication. What should you do?()A Create a global group for each department and a global group for each location. Add users to their respective departmental groups as members. Place the departmental global groups within the location global groups. Assign the location global groups to file and printer resources in their respective domains, and then assign permissions for the file and printer resources by using the location global groupsB Create a global group for each department, and add the respective users as members. Create domain local groups for file and printer resources. Add the global groups to the respective domain local groups. Then, assign permissions to the file and printer resources by using the domain local groupsC Create a local group on each server and add the authorized users as members. Assign appropriate permissions for the file and printer resources to the local groupsD Create a universal group for each location, and add the respective users as members. Assign the universal groups to file and printer resources. Then, assign permissions by using the universal groups

考题 多选题Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()ASession-Export policies on the Junos Pulse Secure Access ServiceBSession-Export policies on the Junos Pulse Access Control ServiceCSession-Import policies on the Junos Pulse Secure Access ServiceDSession-Import policies on the Junos Pulse Access Control ServiceEResource access policies on the Junos Pulse Access Control Service

考题 多选题What are two use cases enabled by IF-MAP Federation?()AUsers authenticated to one Junos Pulse Access Control Service can transparently access resources protected by another Junos Pulse Access Control Service.BUsers authenticated to a Junos Pulse Access Control Service can transparently access resources protected by a Junos Pulse Secure Access Service.CRemote access users authenticated to a Junos Pulse Secure Access Service can transparently access resources protected by a Junos Pulse Access Control Service.DRemote access users authenticated to one Junos Pulse Secure Access Service can transparently access resources protected by another Junos Pulse Secure Access Service.

考题 单选题You are receiving reports of possible unauthorized access to resources protected by a firewall enforcer running the Junos OS. You want to verity which users are currently accessing resources through the enforcer.Which command should you use to verify user access on the enforcer?()A show services unified-access-control authentication-tableB show auth tableC show services unified-access-control policiesD show services unified-access-control captive-portal

考题 单选题You are designing a strategy to allow users to have remote access to internal resources.   Which service or services should you allow on the public interface of the NAT Server?()A  HTTPB  LDAPC  POP3D  SMTPE  VPN Gateway

考题 多选题You need to design an access control strategy for the external and intranet Web sites. Which two actions should you perform?()AEnable SSL on the external Web site by using a Microsoft cryptographic service provider (CSP)BEnable Microsoft .NET Passport authentication on the external Web site. Use Passport Level 0 with SSL on the external Web siteCEnable SSL on the external Web site by using a commercial digital certificateDEnable SSL on the intranet Web site by using an internal server certificateEEnable SSL on the external Web site by using an internal server certificate

考题 单选题You are creating a Windows Forms application by using the .Net Framework 3.5.You plan to design a composite control for the application.You need to derive the control from a base class that supports templates.What should you do?()A Derive from the Control class.B Derive from the UserControl class.C Derive from the ScrollableControl class.D Derive from the ContainerControl class.

考题 单选题Your company hires 10 new employees. You want the new employees to connect to the main office through a VPN connection. You create new user accounts and grant the new employees the Allow Read and Allow Execute permissions to shared resources in the main office. The new employees are unable to access shared resources in the main office. You need to ensure that users are able to establish a VPN connection to the main office What should you do()A Grant the new employees the Allow Full control permission.B Grant the new employees the Allow Access Dial-in permission.C Add the new employees to the Remote Desktop Users security group.D Add the new employees to the Windows Authorization Access security group.