单选题You need to design a security solution for WEB1. Your solution must address the chief information officer’s concerns. What should you do?()A Enable Web distributed Authoring and Versioning (WebDAV) components on WEB1B Install and configure the URLScan 

题目
单选题
You need to design a security solution for WEB1. Your solution must address the chief information officer’s concerns. What should you do?()
A

Enable Web distributed Authoring and Versioning (WebDAV) components on WEB1

B

Install and configure the URLScan ISAPI filter on WEB1

C

Install a computer certificate on WEB1, and enable the Server (Request Security) IPSec policy on WEB1

D

Configure the Web site redirection option on the properties of WEB1 in the Internet Service Manager console


相似考题
参考答案和解析
正确答案: A
解析: 暂无解析
更多“You need to design a security solution for WEB1. Your soluti”相关问题
  • 第1题:

    You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. TestKing.com is configured to run an exchange 2010 environment.  You are planning to design the installation of numerous Mailbox servers. TestKing.com Service LevelAgreement (SLA) requires the following: * The servers need to support 1,500 concurrent connections to mailboxes.* The servers need to maintain a latency of less than 20 milliseconds. You ensure deployment success you need to ensure that your design comply with the Service LevelAgreement (SLA) of TestKing.com. What should you do?()

    • A、The best option is to use the Exchange Server User Monitor (ExMon) tool to check if your design meets the requirements.
    • B、The best option is to use the Exchange Server Load Generator (LoadGen) 2010 tool to check if your design meets the requirements.
    • C、The best option is to use the Exchange Server Connectivity Analyzer (ExRCA) tool to check if your design meets the requirements.
    • D、The best option is to use the Exchange Server Jetstress 2010 tool to check if you design meets there quirements.

    正确答案:B

  • 第2题:

    You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()

    • A、Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access point
    • B、Configure IEEE 802.1x authentication with smart cards
    • C、Configure the wireless network to use Wired Equivalent Privacy (WEP)
    • D、Install and configure an Internet Authentication Service (IAS) server

    正确答案:C

  • 第3题:

    You have an Exchange Server 2010 organization.  Your company has a relationship with another company.  The partner company has an Exchange Server 2010 organization.  You need to recommend a security solution to meet the following requirements:  .Ensure that all e-mail delivery between your servers and the partner companys servers is encrypted .Ensure that all communication between your servers and the partner companys servers is authenticated What should you include in the solution?()

    • A、Active Directory Rights Management Services (AD RMS)
    • B、Domain Security
    • C、Forms-based Authentication
    • D、Secure/Multipurpose Internet Mail Extensions (S/MIME)

    正确答案:B

  • 第4题:

    You have an Exchange Server 2010 organization.  Your companys security policy states that users must not be able to encrypt e-mail messages by usingOutlook Web App (OWA).  You need to recommend a client access solution that meets the requirements of the security policy.  What should you include in the solution?()

    • A、managed folder mailbox policies
    • B、multiple OWA virtual directories
    • C、OWA segmentation
    • D、WebReady Document Viewing

    正确答案:C

  • 第5题:

    You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. The organization consists of 40 servers is configured to run Exchange Server 2010. A new TestKing.com security policy requires that approved server patches of Exchange and Windows aswell as security updates be applied to servers within seven days of it being released. During the course of day you receive an instruction from management to: * Ensure that only approved patches and security updates are installed. * Ensure that only administrators are allowed to approve patches and security updates manually. * Ensure that the deployment casts is reduced. * Ensure that the administrative effort of deploying patched is reduced. You are instructed to recommend a solution that will comply with the set criteria. What should you do?()

    • A、You should recommend that Microsoft System Center Configuration Manager be included in your solution.
    • B、You should recommend that Windows Update be included in your solution.
    • C、You should recommend that Windows Server Update Services be included in your solution.
    • D、You should recommend that Microsoft Update be included in your solution.

    正确答案:C

  • 第6题:

    单选题
    You need to design a patch management strategy for Southbridge Video. Your solution must meet business requirements. What should you do?()
    A

    Configure all client computers to use Automatic Updates to obtain security patches from the Windows Update Web site. Test and install all patches

    B

    Configure a batch file to download security patches daily. Distribute the security patches by using a.zap file and the Default Domain Policy Group Policy object (GPO)

    C

    Deploy a Software Update Services (SUS) server. Test all security patches and then approve them. Configure all client computers to automatically obtain updates from the server

    D

    Configure a batch file to download security patches daily. Manually install the security patches on all computers


    正确答案: B
    解析: 暂无解析

  • 第7题:

    单选题
    You need to recommend a solution for managing the address information of the user accounts. The solution must meet the company’s security requirements. What should you include in the recommendation?()
    A

    Active Directory delegation

    B

    Authorization Manager

    C

    built-in security groups

    D

    user rights assignments


    正确答案: A
    解析: 暂无解析

  • 第8题:

    You need to design a security strategy for VPN2. Your solution must meet business requirements. What should you do?()

    • A、Create and configure a new security template. Import the template into the Default Domain Policy Group Policy object (GPO)
    • B、Install Internet Authentication Service (IAS) on RAS1. Configure VPN2 to be the RADIUS client of RAS1. Configure the remote access policy on VPN2
    • C、Create and configure a new security template. Import the template into the local policy on VPN2
    • D、Move VPN2 into the VPN Servers OU. Configure the remote access policy on VPN2

    正确答案:D

  • 第9题:

    You have an Exchange Server 2010 organization.  The organization contains a global security group named Group1.  You plan to deploy a monitoring solution for the Exchange servers in your organization.  You need to recommend a solution that allows members of Group1 to monitor the performance ofExchange Server 2010 servers.  Your solution must prevent members of Group1 from modifying the configurations of the ExchangesServer 2010 organization.  What should you include in the solution?()

    • A、Delegation of Control Wizard
    • B、Federation Trusts
    • C、Reliability Monitor
    • D、Role Based Access Control (RBAC)

    正确答案:D

  • 第10题:

    You have an Exchange Server 2010 organization.  You have a global security group named Legal that contains all the members of your companys legaldepartment.  The companys security policy states that the Legal group must be able to search all mailboxes for e-mailmessages that contain specific keywords.  You need to recommend a solution for the organization that complies with the security policy.  What should you include in the solution?()

    • A、a Discovery Management role group
    • B、a legal hold
    • C、administrator audit logging
    • D、Mailbox journaling

    正确答案:A

  • 第11题:

    You need to design a remote administration solution for servers on the internal network. Your solution must meet business and security requirements. What should you do?()

    • A、Permit administrators to use an HTTP interface to manage servers remotely
    • B、Permit only administrators to connect to the servers’ Telnet service
    • C、Permit administrators to manage the servers by using Microsoft NetMeeting
    • D、Require administrators to use Remote Desktop for Administration connections to manage the servers

    正确答案:B

  • 第12题:

    单选题
    The company is evaluating using a new Active Directory domain to contain all customer user accounts. You need to design a monitoring or logging strategy that meets business and security requirements for the new Web-based ordering application. Your solution must minimize overhead on existing domain controllers and servers.  What should you do?()
    A

    Enable logon auditing in both the new and the existing domains

    B

    Enable logon auditing only in the existing domain

    C

    Enable logon auditing only in the new domain

    D

    Enable logon auditing on only the Web server


    正确答案: A
    解析: 暂无解析

  • 第13题:

    单选题
    You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()
    A

    a list of applications currently in use in the network

    B

    IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats

    C

    detailed security device specifications

    D

    results from pilot network testing


    正确答案: B
    解析: 暂无解析

  • 第14题:

    单选题
    You need to design a security solution for WEB1. Your solution must address the chief information officer’s concerns. What should you do?()
    A

    Enable Web distributed Authoring and Versioning (WebDAV) components on WEB1

    B

    Install and configure the URLScan ISAPI filter on WEB1

    C

    Install a computer certificate on WEB1, and enable the Server (Request Security) IPSec policy on WEB1

    D

    Configure the Web site redirection option on the properties of WEB1 in the Internet Service Manager console


    正确答案: B
    解析: 暂无解析