A companys legal and regulatory departments have drafted a new policy in which emails must be retained for no longer than three years.  Which of the following locations should an administrator configure when complying with the new policy?()A、 Local works

题目

A companys legal and regulatory departments have drafted a new policy in which emails must be retained for no longer than three years.  Which of the following locations should an administrator configure when complying with the new policy?()

  • A、 Local workstations
  • B、 Backup tapes
  • C、 Domain controllers
  • D、 Email server
  • E、 SMTP gateway
  • F、 Proxy server

相似考题
更多“A companys legal and regulatory departments have drafted a new policy in which emails must be retained for no longer than three years.  Which of the following locations should an administrator configure when complying with the new policy?()A、 Local workst”相关问题
  • 第1题:

    An administrator is implementing a new data retention program for the company. Which of the following is the MOST important consideration as the new program is created? ()

    • A、 Awareness of company policy requirements
    • B、 Differentiating between archiving and backup processes
    • C、 Awareness of potential legal requirements
    • D、 Ensuring that the backups for the retention program cover key business areas

    正确答案:C

  • 第2题:

    A companys computer policy dictates that all users workstations must use the companys corporate web page as their default home page.  Which of the following methods should an administrator use to BEST comply with this policy?()

    • A、 Configure a logon script to set the homepage at logon.
    • B、 Set the default homepage to the corporate website in Group Policy.
    • C、 Manually configure the homepage on all workstations and setup trace logs to ensure compliance.
    • D、 Set the default homepage to the corporate website on the base computer image.

    正确答案:B

  • 第3题:

    An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections. Which of the following MUST be deployed?()

    • A、IDS
    • B、IPS
    • C、Firewall
    • D、Managed PKI

    正确答案:A

  • 第4题:

    You need to design a security strategy for VPN2. Your solution must meet business requirements. What should you do?()

    • A、Create and configure a new security template. Import the template into the Default Domain Policy Group Policy object (GPO)
    • B、Install Internet Authentication Service (IAS) on RAS1. Configure VPN2 to be the RADIUS client of RAS1. Configure the remote access policy on VPN2
    • C、Create and configure a new security template. Import the template into the local policy on VPN2
    • D、Move VPN2 into the VPN Servers OU. Configure the remote access policy on VPN2

    正确答案:D

  • 第5题:

    Your network consists of three Active Directory forests. Forest trust relationships exist between all forests. Each forest contains one domain. All domain controllers run Windows Server 2008 R2. Your company has three network administrators. Each network administrator manages a forest and the Group Policy objects (GPOs) within that forest.   You need to create standard GPOs that the network administrators in each forest will use. The GPOs must meet the following requirements:   èThe GPOs must only contain settings for either user configurations or computer configurations. èThe number of GPOs must be minimized.   Which two actions should you perform?()

    • A、Export the new GPOs to .cab files. Ensure that the .cab files are available to the network administrator  in each forest.
    • B、Create two new GPOs. Configure both GPOs to use the required user configurations and the required  computer configurations.
    • C、Create two new GPOs. Configure one GPO to use the required user configuration. Configure the other GPO to use the required computer configuration.
    • D、Back up the Sysvol folder that is located on the domain controller where the new GPOs were created. Provide the backup to the network administrator in each forest.

    正确答案:A,C

  • 第6题:

    You need to configure the security settings for the new app servers. Which two actions should you perform?()

    • A、Create a Group policy object (GPO) for the web servers.
    • B、Create a Group policy object (GPO) for the database servers.
    • C、Modify the Default Domain Policy.
    • D、Modify the Default Domain Controllers Policy.

    正确答案:A,B

  • 第7题:

    You are the network administrator in the New York office of TestKing. The company network consists of a single Active Directory domain The New York office currently contains one Windows Server 2003 file server named TestKingA. All file servers in the New York office are in an organizational unit (OU) named New York Servers. You have been assigned the Allow - Change permission for a Group Policy object (GPO) named NYServersGPO, which is linked to the New York Servers OU. The written company security policy states that all new servers must be configured with specified predefined security settings when the servers join the domain. These settings differ slightly for the various company offices. You plan to install Windows Sever 2003, on 15 new computers, which all functions as file servers. You will need to configure the specified security settings on the new file servers. TestKingA currently has the specified security settings configured in its local security policy. You need to ensure that the security configuration of the new file servers is identical to that of TestKingA. You export a copy of TestKingA's local security policy settings to a template file. You need to configure the security settings of the new servers, and you want to use the minimum amount of administrative effort. What should you do?()

    • A、Use the Security Configuration and Analysis tool on one of the new servers to import the template file.
    • B、Use the default Domain Security Policy console on one of the new servers to import the template file.
    • C、Use the Group Policy Editor console to open NYServersGPO and import the template file.
    • D、Use the default Local Security Policy console on one of the new servers to import the template file.

    正确答案:C

  • 第8题:

    You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services,and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The TerminalServices server role is installed on the server. A Terminal Services application runs on the server. Now youreceive report from users saying that that the application stops responding. You monitor the memory usageon the server for a week and find that the application has a memory leak. A patch is not currently available.You create a new resource-allocation policy in Microsoft Windows System Resource Manager (WSRM).You configure a Process Matching Criteria named TrackShip and choose the application. You have toterminate the application when the application consumes more than half of the available memory on theserver. What action should you perform?()

    • A、The resource-allocation policy and the maximum working set limit option should be set to half the available memory on the server. The new policy should be set as a Managing Policy.
    • B、The resource-allocation policy and the maximum committed memory option should be set to half the available memory on the server. The new policy should be set as a Profiling Policy.
    • C、The resource-allocation policy and the maximum committed memory option should be set to half the available memory on the server. The new policy should be set as a Managing Policy.
    • D、The resource-allocation policy should be configured and the maximum working set limit option should be set to half the available memory on the server. The new policy should be set as a Profiling Policy.

    正确答案:C

  • 第9题:

    A System p administrator is looking at changing attributes of a logical volume.  Which of the following must be defined when it is created()

    • A、placement of the logical volume
    • B、stripe size of the logical volume
    • C、inter-disk policy of the logical volume
    • D、intra-disk policy of the logical volume

    正确答案:B

  • 第10题:

    单选题
    You have an Exchange Server 2010 organization.  You have a global security group named Legal that contains all the members of your companys legaldepartment.  The companys security policy states that the Legal group must be able to search all mailboxes for e-mailmessages that contain specific keywords.  You need to recommend a solution for the organization that complies with the security policy.  What should you include in the solution?()
    A

    a Discovery Management role group

    B

    a legal hold

    C

    administrator audit logging

    D

    Mailbox journaling


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    An administrator is implementing a new data retention program for the company. Which of the following is the MOST important consideration as the new program is created? ()
    A

     Awareness of company policy requirements

    B

     Differentiating between archiving and backup processes

    C

     Awareness of potential legal requirements

    D

     Ensuring that the backups for the retention program cover key business areas


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    An administrator is creating a new data retention policy. Which of the following is the MOST important consideration?()
    A

    Compile technical requirements for new policy

    B

    Comply with applicable laws and regulations

    C

    Destroy the old data retention policy

    D

    Have hard copies of the new policy stored offsite


    正确答案: C
    解析: 暂无解析

  • 第13题:

    An administrator is creating a new data retention policy. Which of the following is the MOST important consideration?()

    • A、Compile technical requirements for new policy
    • B、Comply with applicable laws and regulations
    • C、Destroy the old data retention policy
    • D、Have hard copies of the new policy stored offsite

    正确答案:B

  • 第14题:

    When disposing of data, which of the following should be considered FIRST?()

    • A、Company policy requirements
    • B、Local legal requirements
    • C、Storage requirements
    • D、Disposal requirements

    正确答案:B

  • 第15题:

    You have enabled backup optimization in RMAN. You issue the following RMAN command to configure a redundancy-based retention policy: CONFIGURE RETENTION POLICY TO REDUNDANCY 3; Which statement is true?()

    • A、The command fails because you cannot configure a redundancy-based retention policy when backup optimization is enabled
    • B、Backup optimization is performed, but RMAN considers the redundancy-based retention policy when it determines which datafiles should be backed up
    • C、Backup optimization is permanently disabled
    • D、Backup optimization is temporarily disabled because a redundancy-based retention policy is specified

    正确答案:B

  • 第16题:

    You need to design a method to implement account policies that meets the requirements in the written security policy. What should you do?()

    • A、Create a GPO and link it to the New York OU, to the Denver OU, and to the Dallas OU.Configure the GPO with the required account policy settings
    • B、On all computers in the domain, configure the Local Security Policy7 with the required account policy settings
    • C、Configure the Default Domain Policy GPO with the required account policy settings
    • D、Configure the Default Domain Controllers Policy GPO with the required account policy settings

    正确答案:C

  • 第17题:

    You have an Exchange Server 2010 organization.  You have a global security group named Legal that contains all the members of your companys legaldepartment.  The companys security policy states that the Legal group must be able to search all mailboxes for e-mailmessages that contain specific keywords.  You need to recommend a solution for the organization that complies with the security policy.  What should you include in the solution?()

    • A、a Discovery Management role group
    • B、a legal hold
    • C、administrator audit logging
    • D、Mailbox journaling

    正确答案:A

  • 第18题:

    You need to design Group Policy object (GPO) settings to support the use of the Encrypting File System (EFS). Your solution must meet business and security requirements. Which two actions should you perform?()

    • A、Designate a data recovery agent and issue an EFS certificate to the data recovery agent. Export the private key and restrict access to the exported key
    • B、Make the data recovery agent a local administrator on all client computers
    • C、Remove the default data recovery agent from the Default Domain Policy GPO. Then, include the new data recovery agent instead
    • D、Delete the Default Domain Policy GPO. Configure a new GPO linked to the domain that does not specify a data recovery agent

    正确答案:A,C

  • 第19题:

    You have an Exchange Server 2010 organization. Your company’s compliance policy states the following:.Delete e-mail messages sent to legal department users that are older than 180 days. .Delete e-mail messages sent to all other users that are older than 60 days You need to recommend a solution that meets the requirements of the compliance policy. What should you recommend?()

    • A、Configure deleted item retention for all users.
    • B、Configure Personal Archives for the legal department users.
    • C、Create two Managed Folder mailbox policies. Use one policy for the legal department users. Use the other policy for all other users.
    • D、Create two new message classifications. Use one message classification for the e-mails sent to legal department users. Use the other message classification for the e-mails sent to all other users.

    正确答案:C

  • 第20题:

    Terminal Services application runs on the server. Users report that the application stops responding. You monitor the memory usage on the server for a week. You discover that the application has a memory leak. A patch is not currently available.  You create a new resource-allocation policy in Microsoft Windows Server Resource Manager. You configure a Process Matching Criteria named TrackShip and select the application.  You need to terminate the application when the application consumes more than half of the available memory on the server. What should you do?()

    • A、Configure the resource-allocation policy and set the maximum working set limit option to half the available memory on the server. Set the new policy as a Profiling Policy.
    • B、Configure the resource-allocation policy and set the maximum working set limit option to half the available memory on the server. Set the new policy as a Managing Policy.
    • C、Configure the resource-allocation policy and set the maximum committed memory option to half the available memory on the server. Set the new policy as a Profiling Policy.
    • D、Configure the resource-allocation policy and set the maximum committed memory option to half the available memory on the server. Set the new policy as a Managing Policy.

    正确答案:D

  • 第21题:

    单选题
    You need to design a software usage policy for the employees of Southbridge Video. The policy must meet business requirements. What should you do?()
    A

    Configure the software restriction policy in the Default Domain Policy Group Policy object (GPO)

    B

    Create a new connection object by using the Connection Manager Administration Kit (CMAK), and install the new connection object on all client computers

    C

    Create and configure a local security policy on both of the ISA server computers

    D

    Configure the Internet Explorer settings in the Default Domain Policy Group Policy object (GPO)


    正确答案: C
    解析: 暂无解析

  • 第22题:

    多选题
    A companys legal and regulatory departments have drafted a new policy in which emails must be retained for no longer than three years.  Which of the following locations should an administrator configure when complying with the new policy?()
    A

    Local workstations

    B

    Backup tapes

    C

    Domain controllers

    D

    Email server

    E

    SMTP gateway

    F

    Proxy server


    正确答案: C,E
    解析: 暂无解析

  • 第23题:

    单选题
    When disposing of data, which of the following should be considered FIRST?()
    A

    Company policy requirements

    B

    Local legal requirements

    C

    Storage requirements

    D

    Disposal requirements


    正确答案: D
    解析: 暂无解析