In the Default Domain Policy Group Policy object (GPO) for the corp.woodgrovebank.com domain, add the LA/HRUsers group to the Restricted Groups list. Add only the HR department user accounts to the Allowed Members list
In the Default Domain Policy Group Policy object (GPO) for the la.corp.woodgrovebank.com domain, add the LA/HRUsers group to the Restricted Groups list. Add only the HR department user accounts to the Allowed Members list
In the Default Domain Policy Group Policy object (GPO) for the corp.woodgrovebank.com domain, add the LA/HRUsers group and the CORP/Backup Operators group to the Restricted Groups list. Add only the HR department user accounts and the administrator user accounts to the Allowed Members list for each group
In the Default Domain Policy Group Policy object (GPO) for the la.corp.woodgrovebank.com domain, add the LA/HRUsers group and the CORP/Backup Operators group to the Restricted Groups list. Add only the HR department user accounts to the Allowed Members list for the LA/HRUsers group. Add only the administrator user accounts to the Allowed Members list for the CORP/Backup Operators group
第1题:
You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains 50 application servers that run Windows Server 2003. The security configuration of the application servers is not uniform. The application servers were deployed by local administrators who configured the settings for each of the application servers differently based on their knowledge and skills. The application servers are configured with different authentication methods, audit settings, and account policy settings. The security team recently completed a new network security design. The design includes a baseline configuration for security settings on all servers. The baseline security settings use the Hisecws.inf predefined security template. The design also requires modified settings for servers in an application role. These settings include system service startup requirements, renaming the administrator account, and more stringent account lockout policies. The security team created a security template named Application.inf that contains the modified settings. You need to plan the deployment of the new security design. You need to ensure that all security settings for the application servers are standardized, and that after the deployment, the security settings on all application servers meet the design requirements. What should you do? ()
第2题:
You need to recommend a Group Policy strategy for the Remote Desktop servers. What should you include in the recommendation?()
第3题:
You are developing a Windows Forms Application by using the .NET Framework 3.5.You plan to design a composite custom control for the application. You include a ListBox control has a property that provides the item count of the ListBox control. You need to ensure that the property cannot be accessed at design time. Which attribute should you use?()
第4题:
You need to ensure that all servers meet the company’s security requirements. Which tool should you use?()
第5题:
You need to design an access control and permission strategy for user objects in Active Directory.What should you do?()
第6题:
Your environment includes multiple Windows Server 2008 R2 Hyper-V servers. You are designing an administrative strategy for virtual machines (VMs). You need to ensure that members of the Security Compliance Active Directory Domain Services (AD DS) security group can monitor failed logon events on the VMs. What should you do?()
第7题:
You need to design a strategy to ensure that all servers are in compliance with the business requirements for maintaining security patches. What should you do?()
第8题:
Enable automatic certificate enrollment
Enforce smart card logons
Enable Encrypting File System (EFS) for offline files
Enable a screen saver password
第9题:
Configure all client computers to use Automatic Updates to obtain security patches from the Windows Update Web site. Test and install all patches
Configure a batch file to download security patches daily. Distribute the security patches by using a.zap file and the Default Domain Policy Group Policy object (GPO)
Deploy a Software Update Services (SUS) server. Test all security patches and then approve them. Configure all client computers to automatically obtain updates from the server
Configure a batch file to download security patches daily. Manually install the security patches on all computers
第10题:
Apply the Setup security.inf template first, the Hisecws.inf template next, and then the Application.inf template.
Apply the Application.inf template and then the Hisecws.inf template.
Apply the Application.inf template first, the Setup security.inf template next, and then the Hisecws.inf template.
Apply the Setup security.inf template and then the Application.inf template.
第11题:
Move the EditorialAdmins group to the Servers OU in the editorial department
Move the members of the EditorialAdmins group to the Editorial OU
Move the members of the EditorialAdmins group to the New York OU
Move the EditorialAdmins group to the New York OU
第12题:
Add the Security Compliance group to the local administrators group of each VM
Add the Security Compliance group to the local administrators group of each Hyper-V server
In the InitialStore.xml file of each VM, define an access policy for the Security Compliance group
in the InitialStore.xml file of each Hyper-V server, define an access policy for the Security Compliance group
第13题:
You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()
第14题:
You need to design a security strategy for the DHCP servers in the Seattle office. Which two actions should you perform?()
第15题:
You are developing a Windows Presentation Foundation (WPF) application for a travel reservation system You need to ensure that users can select a range of travel dates. What should you do ?()
第16题:
You need to recommend a strategy to ensure that the administration of AD LDS is encrypted. What should you include in the recommendation?()
第17题:
You need to recommend a security strategy for WebApp2 that meets the company’s applicaton requirements.What should you include in the recommendation?()
第18题:
You need to recommend a configuration design for the new VMs. The design must ensure that operating systems can be deployed to the new VMs. What should you include in the recommendation?()
第19题:
virtual machine queue (VMQ)
Virtual Machine Chimney
a synthetic network adapter
an emulated network adapter
第20题:
Microsoft Baseline Security Analyzer (MBSA)
Microsoft Security Assessment Tool (MSAT)
Resultant Set of Policy (RSoP)
Security Configuration Wizard (SCW)
第21题:
a server authentication certificate
client authentication certificates
Digest authentication
Windows Integrated authentication
第22题:
Add a reference to the assemblies in the Report Properties References tab.
Write the calculation logic used by the calculations by using T-SQL functions.
Write the code of the calculation logic into the Report Properties Custom Code tab.
Write the calculation logic in each report by using the mathematical functions available natively to SQL Server 2008 Reporting Services (SSRS).
第23题:
Use the Microsoft Baseline Security Analyzer (MBSA) to scan for Windows vulnerabilities on all servers in the production department
Run Security and Configuration Analysis to analyze the security settings of all servers in the production department
Enable auditing for data on each server in the production department. Run System Monitor on all servers in the production department to create a counter log that tracks activity for the Objects performance object
Create a Group Policy Object (GPO) that enables auditing for object access and link it to the product department’s Servers OU. Enable auditing for data on each server in the production department
第24题:
AutomationElementIdentifier
AutomationPeer
Keyboard
UICues