Encrypt customer information when it is stored and when it is being transmitted
Require encrypted connections to the public Web site, which is hosted on the Web server on the perimeter network
Encrypt all marketing information on file servers and client computers
Require encrypted connections to all file servers
第1题:
Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows Vista computers. You are planning to deploy Windows 7 and a custom application. You have the following requirements: The application must be available to only a specific group of users. You must be able to monitor application usage. You need to design a deployment method for the custom application that meets the requirements. Which deployment method should you use in your design?()
第2题:
You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()
第3题:
A.security needs
B.patent
C.firework
D.encryption technologies
第4题:
You are planning to deploy two Windows Server 2008 R2 Hyper-V servers. You need to design the storage of VHD files for maximum security. What should you do?()
第5题:
You need to design a method to log changes that are made to servers and domain controllers. You also need to track when administrators modify local security account manager objects on servers. What should you do?()
第6题:
You need to design a method to standardize and deploy a baseline security configuration for servers. You solution must meet business requirements. What should you do?()
第7题:
You are the network administrator for The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. All confidential company files are stored on a file server named TestKing1. The written company security states that all confidential data must be stored and transmitted in a secure manner. To comply with the security policy, you enable Encrypting File System (EFS) on the confidential files. You also add EFS certificates to the data decryption field (DDF) of the confidential files for the users who need to access them. While performing network monitoring, you notice that the confidential files that are stored on TestKing1 are being transmitted over the network without encryption. You must ensure that encryption is always used when the confidential files on TestKing1 are stored and transmitted over the network. What are two possible ways to accomplish this goal? ()(Each correct answer presents a complete solution. Choose two)
第8题:
A、patents
B、passwords
C、telnet
D、encryption technologies
第9题:
Your company has a single active directory domain. All servers run windows server 2008. The company network has 10 servers that perform as web servers. All confidential files are located on a server named FSS1. The company security policy states that all confidential data must be transmitted in the most secure manner. When you monitor the network, you notice that the confidential files are stored on FSS1 server are being transmitted over the network without encryption. You need to ensure that encryption is always used when the confidential files on the FSS1 server are transmitted over the network. What are two possible ways to achieve this goal? ()
第10题:
You need to design a method to address the chief information officer’s security concerns. What should you do?()