网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
You are designing a security strategy for the infrastructure servers at the resorts.Which two actions should you perform?(Each correct answer presents part of the solution. Choose two)()
A

Place all infrastructure servers in subnets that cannot exchange information with the Internet

B

Establish a custom security template that contains unique required settings for each combination of services that run on the infrastructure servers

C

Use Group Policy objects (GPOs) to apply the custom security template or templates to the Infrastructure servers

D

Edit the local policy settings to configure each individual server


参考答案

参考解析
解析: 暂无解析
更多 “多选题You are designing a security strategy for the infrastructure servers at the resorts.Which two actions should you perform?(Each correct answer presents part of the solution. Choose two)()APlace all infrastructure servers in subnets that cannot exchange information with the InternetBEstablish a custom security template that contains unique required settings for each combination of services that run on the infrastructure serversCUse Group Policy objects (GPOs) to apply the custom security template or templates to the Infrastructure serversDEdit the local policy settings to configure each individual server” 相关考题
考题 You are designing a strategy to ensure that all employees have Internet access. For each branch office,  what should you do?()A、 Configure a DNS server to function as caching-only serversB、 Configure Internet Connection sharing on terminal servers.C、 Install and configure an Internet Security and Acceleration (ISA) Server ComputerD、 Install and configure a server running Routing and Remote Acess to function as a VPN server

考题 You are designing the NetBIOS domain naming strategy for the company. Which NetBIOS domain name or names should you use?()A、eastB、westC、quebecD、newyorkE、northamericaF、wideworldimporters

考题 You need to recommend a Group Policy strategy for the Remote Desktop servers. What should you include in the recommendation?()A、block inheritanceB、loopback processingC、security filteringD、WMI filtering

考题 You are designing an IP addressing strategy for your VPN solution. How many public addresses should you use?()A、1B、25C、50D、255

考题 You are designing a strategy to meet the security and financial requirements related to the Manifest application.  What should you do? ()A、 Configure a VPN server in Sydney.B、 Configure a VPN server in each branch office.C、 Configure a dial-up server in SydneyD、 Configure a dial-up server in each branch office.

考题 You are designing a strategy to perform inplace upgrade of domain controller in Boston and San Diego. Which method should you use?()A、adprepB、sysprepC、Answer FileD、Remote Installtion Services (RIS)

考题 You are designing a VPN strategy to meet the business and technical requirements. Based on the current infrastructure,  what is the maximum number of VPN connections that can be supported? ()A、 25B、 35C、 70D、 128E、 256

考题 You are designing a DNS implementation strategy for the network.  Which two zone types should you use?()A、Reverse lookup zonesB、Standard primary zonesC、Standard secondary zonesD、Active Directory-integrated zones

考题 You are designing a security strategy for the public Web server. You solution must address the chief security officer’s concerns. What should you do?()A、Install  a Web server certificate on WEB1B、Enable Internet Connection Firewalll (ICF) on WEB1C、Configure IIS on WEB1 to operate in IIS 5.0 isolation modeD、Install and configure the URLScan ISAPI filer on WEB1

考题 You need to recommend a security strategy for WebApp2 that meets the company’s applicaton  requirements.What should you include in the recommendation?()A、Basic authentication and connection security rulesB、Basic authentication and SSLC、Digest authentication and connection security rulesD、Digest authentication and SSL

考题 Your environment includes multiple Windows Server 2008 R2 Hyper-V servers. You are designing an administrative strategy for virtual machines (VMs). You need to ensure that members of the Security Compliance Active Directory Domain Services (AD DS) security group can monitor failed logon events on the VMs. What should you do?()A、Add the Security Compliance group to the local administrators group of each VMB、Add the Security Compliance group to the local administrators group of each Hyper-V serverC、In the InitialStore.xml file of each VM, define an access policy for the Security Compliance groupD、in the InitialStore.xml file of each Hyper-V server, define an access policy for the Security Compliance group

考题 单选题You are designing a strategy to meet the security and financial requirements related to the Manifest application.  What should you do? ()A  Configure a VPN server in Sydney.B  Configure a VPN server in each branch office.C  Configure a dial-up server in SydneyD  Configure a dial-up server in each branch office.

考题 单选题You are designing a strategy to ensure that all employees have Internet access. For each branch office, what should you do?()A Configure a DNS server to function as caching-only servers.B Configure Internet Connection sharing on terminal servers.C Install and configure an Internet Security and Acceleration (ISA) Server Computer.D Install and configure a server running Routing and Remote Acess to function as a VPN server.

考题 单选题You are designing a VPN strategy to meet the business and technical requirements. Based on the current infrastructure,  what is the maximum number of VPN connections that can be supported? ()A  25B  35C  70D  128E  256

考题 单选题You are designing a new NETBIOS naming strategy for the corporate environment.  Which domain name should you use?()A  adB  woodgroveadC  woodgrovebankD  woodgrovebank.com

考题 单选题Your environment includes multiple Windows Server 2008 R2 Hyper-V servers. You are designing an administrative strategy for virtual machines (VMs). You need to ensure that members of the Security Compliance Active Directory Domain Services (AD DS) security group can monitor failed logon events on the VMs. What should you do?()A Add the Security Compliance group to the local administrators group of each VMB Add the Security Compliance group to the local administrators group of each Hyper-V serverC In the InitialStore.xml file of each VM, define an access policy for the Security Compliance groupD in the InitialStore.xml file of each Hyper-V server, define an access policy for the Security Compliance group

考题 单选题You are designing a DNS implementing strategy to meet the business and technical requirement.  Which type of zone should you use?()A  Sub ZonesB  Standard Primary ZonesC  Secondary ZonesD  Active DirectoryIntegrated Zones

考题 多选题You are designing the NetBIOS domain naming strategy for the company. Which NetBIOS domain name or names should you use?()AeastBwestCquebecDnewyorkEnorthamericaFwideworldimporters

考题 单选题You are designing an IP addressing strategy for your VPN solution. How many public addresses should you use?()A 1B 25C 50D 255

考题 单选题You are designing a new NETBIOS naming strategy for the corporate environment. Which domain name should you use?()A adB woodgroveadC woodgrovebankD woodgrovebank.com

考题 单选题You are designing a strategy to ensure that all employees have Internet access. For each branch office,  what should you do?()A  Configure a DNS server to function as caching-only serversB  Configure Internet Connection sharing on terminal servers.C  Install and configure an Internet Security and Acceleration (ISA) Server ComputerD  Install and configure a server running Routing and Remote Acess to function as a VPN server