MCSE

单选题You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()A Encrypt customer information when it is stored and when it is being transmittedB Require encrypte

题目
单选题
You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()
A

Encrypt customer information when it is stored and when it is being transmitted

B

Require encrypted connections to the public Web site, which is hosted on the Web server on the perimeter network

C

Encrypt all marketing information on file servers and client computers

D

Require encrypted connections to all file servers

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows Vista computers.  You are planning to deploy Windows 7 and a custom application.   You have the following requirements:   The application must be available to only a specific group of users. You must be able to monitor application usage.   You need to design a deployment method for the custom application that meets the requirements.  Which deployment method should you use in your design?()

  • A、software installation in Group Policy
  • B、startup scripts in Group Policy
  • C、Microsoft Application Virtualization (App-V)
  • D、baseline Windows 7 image that includes the custom application

正确答案:C

第2题:

You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()

  • A、Require client computers to connect to the marketing application by using a VPN connection
  • B、Use IPSec to encrypt communications between the servers in the New York and Atlanta offices
  • C、Require the high security setting on Terminal Services connections to the marketing application
  • D、Configure all marketing application Web pages to require SSL

正确答案:D

第3题:

Members of Internet-based supply chains will need to evaluate their () and employ () and other electronic security tools to protect confidential data.

A.security needs

B.patent

C.firework

D.encryption technologies


正确答案:AD

第4题:

You are planning to deploy two Windows Server 2008 R2 Hyper-V servers. You need to design the storage of VHD files for maximum security.    What should you do?()

  • A、Store the VHD files on a dedicated NTFS volume
  • B、Store unencrypted VHD files on a volume that uses Windows BitLocker drive encryption
  • C、Encrypt the VHD files by using EFS on a volume that uses Windows BitLocker drive encryption
  • D、Encrypt the VHD files by using EFS on a volume that does not use Windows BitLocker drive encryption

正确答案:B

第5题:

You need to design a method to log changes that are made to servers and domain controllers. You also need to track when administrators modify local security account manager objects on servers. What should you do?()

  • A、Enable failure audit for privilege user and object access on all servers and domain controllers
  • B、Enable success audit for policy change and account management on all servers and domain controllers
  • C、Enable success audit for process tracking and logon events on all servers and domain controllers
  • D、Enable failure audit for system events and directory service access on all servers and domain controllers

正确答案:B

第6题:

You need to design a method to standardize and deploy a baseline security configuration for servers. You solution must meet business requirements. What should you do?()

  • A、Create a script that installs the Hisecdc.inf security template
  • B、Use a GPO to distribute and apply the Hisec.inf security template
  • C、Use the System Policy Editor to configure each server’s security settings
  • D、Use a GPO to distribute and apply a custom security template

正确答案:D

第7题:

You are the network administrator for The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. All confidential company files are stored on a file server named TestKing1. The written company security states that all confidential data must be stored and transmitted in a secure manner. To comply with the security policy, you enable Encrypting File System (EFS) on the confidential files. You also add EFS certificates to the data decryption field (DDF) of the confidential files for the users who need to access them. While performing network monitoring, you notice that the confidential files that are stored on TestKing1 are being transmitted over the network without encryption. You must ensure that encryption is always used when the confidential files on TestKing1 are stored and transmitted over the network. What are two possible ways to accomplish this goal? ()(Each correct answer presents a complete solution. Choose two)

  • A、Enable offline files for the confidential files that are stored on TestKing1, and select the Encrypt offline files to secure data check box on the client computers of the users who need to access the files.
  • B、Use IPSec encryption between TestKing1 and the client computers of the users who need to access the confidential files.
  • C、Use Server Message Block (SMB) signing between TestKing1 and the client computers of the users who need to access the confidential files.
  • D、Disable all LM and NTLM authentication methods on TestKing1.
  • E、Use IIS to publish the confidential files. Enable SSL on the IIS server. Open the files as a Web folder.

正确答案:B,E

第8题:

Members of Internet-based supply chains will need to evaluate their security needs and employ ()and other electronic security tools to protect confidential data.

A、patents

B、passwords

C、telnet

D、encryption technologies


正确答案:D

第9题:

Your company has a single active directory domain. All servers run windows server 2008. The company network has 10 servers that perform as web servers. All confidential files are located on a server named FSS1. The company security policy states that all confidential data must be transmitted in the most secure manner. When you monitor the network, you notice that the confidential files are stored on FSS1 server are being transmitted over the network without encryption. You need to ensure that encryption is always used when the confidential files on the FSS1 server are transmitted over the network. What are two possible ways to achieve this goal? ()

  • A、Deactivate all LM and NTLM authentication methods on the FSS1 server.
  • B、Use IIS to publish the confidentials files. Activate SSL on the ISS server, and then open the files as a web folder.
  • C、Use IPSec encryption between the FSS 1 server and the computers of the users who need to access the confidential files.
  • D、Use the server messager block (SMB) signing between the FSS1 server and the computers of the users who want to access the confidential files.
  • E、Activate offline files for the confidential files that are stored on the FSS1 server. In the folder advanced properties dialog box, select the encrypt contents to secure data option.

正确答案:B,C

第10题:

You need to design a method to address the chief information officer’s security concerns. What should you do?()

  • A、Configure Windows Management Instrumentation (WMI) filtering options in the Default Domain Policy GPO
  • B、Use the gpresult command
  • C、Use Mbsacli.exe
  • D、Configure software restriction policy options in the Default Domain Policy GPO

正确答案:C

更多相关问题