单选题You need to design a security strategy that will ensure that unauthorized users cannot access personnel data. Your solution must comply with security requirements and the company’s new administrative model.What should you do?()A In the Default Domain P

题目
单选题
You need to design a security strategy that will ensure that unauthorized users cannot access personnel data. Your solution must comply with security requirements and the company’s new administrative model.What should you do?()
A

In the Default Domain Policy Group Policy object (GPO) for the corp.woodgrovebank.com domain, add the LA/HRUsers group to the Restricted Groups list. Add only the HR department user accounts to the Allowed Members list

B

In the Default Domain Policy Group Policy object (GPO) for the la.corp.woodgrovebank.com domain, add the LA/HRUsers group to the Restricted Groups list. Add only the HR department user accounts to the Allowed Members list

C

In the Default Domain Policy Group Policy object (GPO) for the corp.woodgrovebank.com domain, add the LA/HRUsers group and the CORP/Backup Operators group to the Restricted Groups list. Add only the HR department user accounts and the administrator user accounts to the Allowed Members list for each group

D

In the Default Domain Policy Group Policy object (GPO) for the la.corp.woodgrovebank.com domain, add the LA/HRUsers group and the CORP/Backup Operators group to the Restricted Groups list. Add only the HR department user accounts to the Allowed Members list for the LA/HRUsers group. Add only the administrator user accounts to the Allowed Members list for the CORP/Backup Operators group


相似考题
更多“You need to design a security strategy that will ensure that”相关问题
  • 第1题:

    You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains 50 application servers that run Windows Server 2003.   The security configuration of the application servers is not uniform. The application servers were deployed by local administrators who configured the settings for each of the application servers differently based on their knowledge and skills. The application servers are configured with different authentication methods, audit settings, and account policy settings.   The security team recently completed a new network security design. The design includes a baseline configuration for security settings on all servers. The baseline security settings use the Hisecws.inf predefined security template. The design also requires modified settings for servers in an application role. These settings include system service startup requirements, renaming the administrator account, and more stringent account lockout policies. The security team created a security template named Application.inf that contains the modified settings.   You need to plan the deployment of the new security design. You need to ensure that all security settings for the application servers are standardized, and that after the deployment, the security settings on all application servers meet the design requirements.   What should you do? ()

    • A、 Apply the Setup security.inf template first, the Hisecws.inf template next, and then the Application.inf template.
    • B、 Apply the Application.inf template and then the Hisecws.inf template.
    • C、 Apply the Application.inf template first, the Setup security.inf template next, and then the Hisecws.inf template.
    • D、 Apply the Setup security.inf template and then the Application.inf template.

    正确答案:A

  • 第2题:

    You need to recommend a Group Policy strategy for the Remote Desktop servers. What should you include in the recommendation?()

    • A、block inheritance
    • B、loopback processing
    • C、security filtering
    • D、WMI filtering

    正确答案:B

  • 第3题:

    You are developing a Windows Forms Application by using the .NET Framework 3.5.You plan to design a composite custom control for the application. You include a ListBox control has a property that provides the item count of  the ListBox control. You need to ensure that the property cannot be accessed at design time. Which attribute should you use?()

    • A、[Bindable(false)]
    • B、[DesignOnly(false)]
    • C、[EditorBrowsable(EditorBrowsableState.Never)]
    • D、[Browsable(false)]

    正确答案:D

  • 第4题:

    You need to ensure that all servers meet the company’s security requirements. Which tool should you use?()

    • A、Microsoft Baseline Security Analyzer (MBSA)
    • B、Microsoft Security Assessment Tool (MSAT)
    • C、Resultant Set of Policy (RSoP)
    • D、Security Configuration Wizard (SCW)

    正确答案:A

  • 第5题:

    You need to design an access control and permission strategy for user objects in Active Directory.What should you do?()

    • A、Make the members of the AdvancedSupport security group members of the Domain Admins security group
    • B、Give each desktop support technician permission to reset passwords for the top-level OU that contains user accounts at their own location
    • C、Delegate full control over all OUs that contain user accounts to all AllSupport  security group
    • D、Change the permissions on the domain object and its child objects so that the BasicSupport security group is denied permissions. Then, add a permission to each OU that contains user accounts that allows AllSupport security group members to reset passwords in that OU

    正确答案:B

  • 第6题:

    Your environment includes multiple Windows Server 2008 R2 Hyper-V servers. You are designing an administrative strategy for virtual machines (VMs). You need to ensure that members of the Security Compliance Active Directory Domain Services (AD DS) security group can monitor failed logon events on the VMs. What should you do?()

    • A、Add the Security Compliance group to the local administrators group of each VM
    • B、Add the Security Compliance group to the local administrators group of each Hyper-V server
    • C、In the InitialStore.xml file of each VM, define an access policy for the Security Compliance group
    • D、in the InitialStore.xml file of each Hyper-V server, define an access policy for the Security Compliance group

    正确答案:A

  • 第7题:

    You need to design a strategy to ensure that all servers are in compliance with the business requirements for maintaining security patches. What should you do?()

    • A、Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the domain
    • B、Log on to each server and run Security Configuration and Analysis to analyze the security settings by using a custom security template
    • C、Create a logon script to run the secedit command to analyze all servers in the domain
    • D、Run the Microsoft Baseline Security Analyzer (MBSA) on a server to scan for Windows vulnerabilities on all servers in the domain

    正确答案:D

  • 第8题:

    多选题
    You need to design a strategy to increase security for the client computers in the finance department. Which two actions should you perform?()
    A

    Enable automatic certificate enrollment

    B

    Enforce smart card logons

    C

    Enable Encrypting File System (EFS) for offline files

    D

    Enable a screen saver password


    正确答案: A,D
    解析: 暂无解析

  • 第9题:

    单选题
    You need to design a patch management strategy for Southbridge Video. Your solution must meet business requirements. What should you do?()
    A

    Configure all client computers to use Automatic Updates to obtain security patches from the Windows Update Web site. Test and install all patches

    B

    Configure a batch file to download security patches daily. Distribute the security patches by using a.zap file and the Default Domain Policy Group Policy object (GPO)

    C

    Deploy a Software Update Services (SUS) server. Test all security patches and then approve them. Configure all client computers to automatically obtain updates from the server

    D

    Configure a batch file to download security patches daily. Manually install the security patches on all computers


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains 50 application servers that run Windows Server 2003.   The security configuration of the application servers is not uniform. The application servers were deployed by local administrators who configured the settings for each of the application servers differently based on their knowledge and skills. The application servers are configured with different authentication methods, audit settings, and account policy settings.   The security team recently completed a new network security design. The design includes a baseline configuration for security settings on all servers. The baseline security settings use the Hisecws.inf predefined security template. The design also requires modified settings for servers in an application role. These settings include system service startup requirements, renaming the administrator account, and more stringent account lockout policies. The security team created a security template named Application.inf that contains the modified settings.   You need to plan the deployment of the new security design. You need to ensure that all security settings for the application servers are standardized, and that after the deployment, the security settings on all application servers meet the design requirements.   What should you do? ()
    A

     Apply the Setup security.inf template first, the Hisecws.inf template next, and then the Application.inf template.

    B

     Apply the Application.inf template and then the Hisecws.inf template.

    C

     Apply the Application.inf template first, the Setup security.inf template next, and then the Hisecws.inf template.

    D

     Apply the Setup security.inf template and then the Application.inf template.


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    You need to design a group membership strategy for the EditorialAdmins group. What should you do?()
    A

    Move the EditorialAdmins group to the Servers OU in the editorial department

    B

    Move the members of the EditorialAdmins group to the Editorial OU

    C

    Move the members of the EditorialAdmins group to the New York OU

    D

    Move the EditorialAdmins group to the New York OU


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    Your environment includes multiple Windows Server 2008 R2 Hyper-V servers. You are designing an administrative strategy for virtual machines (VMs). You need to ensure that members of the Security Compliance Active Directory Domain Services (AD DS) security group can monitor failed logon events on the VMs. What should you do?()
    A

    Add the Security Compliance group to the local administrators group of each VM

    B

    Add the Security Compliance group to the local administrators group of each Hyper-V server

    C

    In the InitialStore.xml file of each VM, define an access policy for the Security Compliance group

    D

    in the InitialStore.xml file of each Hyper-V server, define an access policy for the Security Compliance group


    正确答案: B
    解析: 暂无解析

  • 第13题:

    You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()

    • A、Require client computers to connect to the marketing application by using a VPN connection
    • B、Use IPSec to encrypt communications between the servers in the New York and Atlanta offices
    • C、Require the high security setting on Terminal Services connections to the marketing application
    • D、Configure all marketing application Web pages to require SSL

    正确答案:D

  • 第14题:

    You need to design a security strategy for the DHCP servers in the Seattle office. Which two actions should you perform?()

    • A、Disable all unnecessary services on each DHCP server
    • B、Modify the discretionary access control lists (DACLs) in Active Directory so that only members of the Enterprise Admins security group can authorize additional DHCP servers
    • C、Use an IPSec policy that allows only the packets necessary for DHCP and domain membership for each DHCP server
    • D、Install a digital certificate for SSL on each DHCP server

    正确答案:A,C

  • 第15题:

    You are developing a Windows Presentation Foundation (WPF) application for a travel reservation system You need to ensure that users can select a range of travel dates. What should you do ?()

    • A、Add single DatePicker control to the design surface
    • B、Add single Calendar control to the design surface
    • C、Add single MediaElement control to the design surface to display a calendar
    • D、Add the appropriate Windows Forms references to the project references. Add a single Windows Forms DateTimePicker control to the design surface

    正确答案:B

  • 第16题:

    You need to recommend a strategy to ensure that the administration of AD LDS is encrypted.  What should you include in the recommendation?()

    • A、a server authentication certificate
    • B、client authentication certificates
    • C、Digest authentication
    • D、Windows Integrated authentication

    正确答案:A

  • 第17题:

    You need to recommend a security strategy for WebApp2 that meets the company’s applicaton  requirements.What should you include in the recommendation?()

    • A、Basic authentication and connection security rules
    • B、Basic authentication and SSL
    • C、Digest authentication and connection security rules
    • D、Digest authentication and SSL

    正确答案:B

  • 第18题:

    You need to recommend a configuration design for the new VMs. The design must ensure that operating systems can be deployed to the new VMs. What should you include in the recommendation?()

    • A、virtual machine queue (VMQ)
    • B、Virtual Machine Chimney
    • C、a synthetic network adapter
    • D、an emulated network adapter

    正确答案:D

  • 第19题:

    单选题
    You need to recommend a configuration design for the new VMs. The design must ensure that operating systems can be deployed to the new VMs. What should you include in the recommendation?()
    A

    virtual machine queue (VMQ)

    B

    Virtual Machine Chimney

    C

    a synthetic network adapter

    D

    an emulated network adapter


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    You need to ensure that all servers meet the company’s security requirements. Which tool should you use?()
    A

    Microsoft Baseline Security Analyzer (MBSA)

    B

    Microsoft Security Assessment Tool (MSAT)

    C

    Resultant Set of Policy (RSoP)

    D

    Security Configuration Wizard (SCW)


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    You need to recommend a strategy to ensure that the administration of AD LDS is encrypted.  What should you include in the recommendation?()
    A

    a server authentication certificate

    B

    client authentication certificates

    C

    Digest authentication

    D

    Windows Integrated authentication


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    You design a Business Intelligence (BI) solution by using SQL Server 2008. You plan to design the report strategy for a new report project that will be used by a financial application. The application uses five calculations that are implemented in Microsoft .NET Framework 3.5 assemblies. The assemblies are written in the C# language and use the static methods. You need to ensure that the calculations can be used by the expressions in all reports. You also need to ensure consistency within the reports by using the least amount of development effort. What should you do?()
    A

     Add a reference to the assemblies in the Report Properties References tab. 

    B

     Write the calculation logic used by the calculations by using T-SQL functions. 

    C

     Write the code of the calculation logic into the Report Properties Custom Code tab.

    D

     Write the calculation logic in each report by using the mathematical functions available natively to SQL Server 2008 Reporting Services (SSRS).


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    You need to design a monitoring strategy to meet business requirements for data on servers in the production department. What should you do?()
    A

    Use the Microsoft Baseline Security Analyzer (MBSA) to scan for Windows vulnerabilities on all servers in the production department

    B

    Run Security and Configuration Analysis to analyze the security settings of all servers in the production department

    C

    Enable auditing for data on each server in the production department. Run System Monitor on all servers in the production department to create a counter log that tracks activity for the Objects performance object

    D

    Create a Group Policy Object (GPO) that enables auditing for object access and link it to the product department’s Servers OU. Enable auditing for data on each server in the production department


    正确答案: D
    解析: 暂无解析

  • 第24题:

    单选题
    You are developing a Windows Presentation Foundation (WPF) application. You are implementing a test strategy for the application. You need to ensure that the test class can repeat user input. From which base class should the test class inherit?()
    A

     AutomationElementIdentifier

    B

     AutomationPeer

    C

     Keyboard

    D

     UICues


    正确答案: B
    解析: 暂无解析