A companys legal and regulatory departments have drafted a new policy in which emails must be retained for no longer than three years. Which of the following locations should an administrator configure when complying with the new policy?()
第1题:
An administrator is implementing a new data retention program for the company. Which of the following is the MOST important consideration as the new program is created? ()
第2题:
A companys computer policy dictates that all users workstations must use the companys corporate web page as their default home page. Which of the following methods should an administrator use to BEST comply with this policy?()
第3题:
An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections. Which of the following MUST be deployed?()
第4题:
You need to design a security strategy for VPN2. Your solution must meet business requirements. What should you do?()
第5题:
Your network consists of three Active Directory forests. Forest trust relationships exist between all forests. Each forest contains one domain. All domain controllers run Windows Server 2008 R2. Your company has three network administrators. Each network administrator manages a forest and the Group Policy objects (GPOs) within that forest. You need to create standard GPOs that the network administrators in each forest will use. The GPOs must meet the following requirements: èThe GPOs must only contain settings for either user configurations or computer configurations. èThe number of GPOs must be minimized. Which two actions should you perform?()
第6题:
You need to configure the security settings for the new app servers. Which two actions should you perform?()
第7题:
You are the network administrator in the New York office of TestKing. The company network consists of a single Active Directory domain The New York office currently contains one Windows Server 2003 file server named TestKingA. All file servers in the New York office are in an organizational unit (OU) named New York Servers. You have been assigned the Allow - Change permission for a Group Policy object (GPO) named NYServersGPO, which is linked to the New York Servers OU. The written company security policy states that all new servers must be configured with specified predefined security settings when the servers join the domain. These settings differ slightly for the various company offices. You plan to install Windows Sever 2003, on 15 new computers, which all functions as file servers. You will need to configure the specified security settings on the new file servers. TestKingA currently has the specified security settings configured in its local security policy. You need to ensure that the security configuration of the new file servers is identical to that of TestKingA. You export a copy of TestKingA's local security policy settings to a template file. You need to configure the security settings of the new servers, and you want to use the minimum amount of administrative effort. What should you do?()
第8题:
You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services,and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The TerminalServices server role is installed on the server. A Terminal Services application runs on the server. Now youreceive report from users saying that that the application stops responding. You monitor the memory usageon the server for a week and find that the application has a memory leak. A patch is not currently available.You create a new resource-allocation policy in Microsoft Windows System Resource Manager (WSRM).You configure a Process Matching Criteria named TrackShip and choose the application. You have toterminate the application when the application consumes more than half of the available memory on theserver. What action should you perform?()
第9题:
A System p administrator is looking at changing attributes of a logical volume. Which of the following must be defined when it is created()
第10题:
a Discovery Management role group
a legal hold
administrator audit logging
Mailbox journaling
第11题:
Awareness of company policy requirements
Differentiating between archiving and backup processes
Awareness of potential legal requirements
Ensuring that the backups for the retention program cover key business areas
第12题:
Compile technical requirements for new policy
Comply with applicable laws and regulations
Destroy the old data retention policy
Have hard copies of the new policy stored offsite
第13题:
An administrator is creating a new data retention policy. Which of the following is the MOST important consideration?()
第14题:
When disposing of data, which of the following should be considered FIRST?()
第15题:
You have enabled backup optimization in RMAN. You issue the following RMAN command to configure a redundancy-based retention policy: CONFIGURE RETENTION POLICY TO REDUNDANCY 3; Which statement is true?()
第16题:
You need to design a method to implement account policies that meets the requirements in the written security policy. What should you do?()
第17题:
You have an Exchange Server 2010 organization. You have a global security group named Legal that contains all the members of your companys legaldepartment. The companys security policy states that the Legal group must be able to search all mailboxes for e-mailmessages that contain specific keywords. You need to recommend a solution for the organization that complies with the security policy. What should you include in the solution?()
第18题:
You need to design Group Policy object (GPO) settings to support the use of the Encrypting File System (EFS). Your solution must meet business and security requirements. Which two actions should you perform?()
第19题:
You have an Exchange Server 2010 organization. Your company’s compliance policy states the following:.Delete e-mail messages sent to legal department users that are older than 180 days. .Delete e-mail messages sent to all other users that are older than 60 days You need to recommend a solution that meets the requirements of the compliance policy. What should you recommend?()
第20题:
Terminal Services application runs on the server. Users report that the application stops responding. You monitor the memory usage on the server for a week. You discover that the application has a memory leak. A patch is not currently available. You create a new resource-allocation policy in Microsoft Windows Server Resource Manager. You configure a Process Matching Criteria named TrackShip and select the application. You need to terminate the application when the application consumes more than half of the available memory on the server. What should you do?()
第21题:
Configure the software restriction policy in the Default Domain Policy Group Policy object (GPO)
Create a new connection object by using the Connection Manager Administration Kit (CMAK), and install the new connection object on all client computers
Create and configure a local security policy on both of the ISA server computers
Configure the Internet Explorer settings in the Default Domain Policy Group Policy object (GPO)
第22题:
Local workstations
Backup tapes
Domain controllers
Email server
SMTP gateway
Proxy server
第23题:
Company policy requirements
Local legal requirements
Storage requirements
Disposal requirements