MCSE

单选题You need to design a method to implement account policies that meets the requirements in the written security policy. What should you do?()A Create a GPO and link it to the New York OU, to the Denver OU, and to the Dallas OU.Configure the GPO with the 

题目
单选题
You need to design a method to implement account policies that meets the requirements in the written security policy. What should you do?()
A

Create a GPO and link it to the New York OU, to the Denver OU, and to the Dallas OU.Configure the GPO with the required account policy settings

B

On all computers in the domain, configure the Local Security Policy7 with the required account policy settings

C

Configure the Default Domain Policy GPO with the required account policy settings

D

Configure the Default Domain Controllers Policy GPO with the required account policy settings

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows Vista computers.  You are planning to deploy Windows 7 and a custom application.   You have the following requirements:   The application must be available to only a specific group of users. You must be able to monitor application usage.   You need to design a deployment method for the custom application that meets the requirements.  Which deployment method should you use in your design?()

  • A、software installation in Group Policy
  • B、startup scripts in Group Policy
  • C、Microsoft Application Virtualization (App-V)
  • D、baseline Windows 7 image that includes the custom application

正确答案:C

第2题:

The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()

  • A、On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policy
  • B、On all client computers, implement logon auditing for all user account logons
  • C、On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policy
  • D、On all domain controllers, implement logon auditing for all user account logons

正确答案:C

第3题:

You are creating a Windows Communication Foundation (WCF) service that implements operations in a RESTful manner. You need to add a delete operation. You implement the delete method as follows:void DeleteItems(string id);You need to configure WCF to call this method when the client calls the service with the HTTP DELETE operation. What should you do?()

A. Add the WebInvoke(UriTemplate="/Items/{id}", Method="DELETE") attribute to the operation

B. Add the HttpDelete atribute to the operation

C. Replace the string parameter with a RemovedActivityAction parameter

D. Replace the return type with RemovedActivityAction.


参考答案:A

第4题:

You need to design a method to log changes that are made to servers and domain controllers. You also need to track when administrators modify local security account manager objects on servers. What should you do?()

  • A、Enable failure audit for privilege user and object access on all servers and domain controllers
  • B、Enable success audit for policy change and account management on all servers and domain controllers
  • C、Enable success audit for process tracking and logon events on all servers and domain controllers
  • D、Enable failure audit for system events and directory service access on all servers and domain controllers

正确答案:B

第5题:

You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains 50 application servers that run Windows Server 2003.   The security configuration of the application servers is not uniform. The application servers were deployed by local administrators who configured the settings for each of the application servers differently based on their knowledge and skills. The application servers are configured with different authentication methods, audit settings, and account policy settings.   The security team recently completed a new network security design. The design includes a baseline configuration for security settings on all servers. The baseline security settings use the Hisecws.inf predefined security template. The design also requires modified settings for servers in an application role. These settings include system service startup requirements, renaming the administrator account, and more stringent account lockout policies. The security team created a security template named Application.inf that contains the modified settings.   You need to plan the deployment of the new security design. You need to ensure that all security settings for the application servers are standardized, and that after the deployment, the security settings on all application servers meet the design requirements.   What should you do? ()

  • A、 Apply the Setup security.inf template first, the Hisecws.inf template next, and then the Application.inf template.
  • B、 Apply the Application.inf template and then the Hisecws.inf template.
  • C、 Apply the Application.inf template first, the Setup security.inf template next, and then the Hisecws.inf template.
  • D、 Apply the Setup security.inf template and then the Application.inf template.

正确答案:A

第6题:

You are creating a Windows Forms application for a financial service provider by using the .NET Framework 3.5. You have to implement a multiple document interface (MDI) in the application to allow users to open multiple financial documents simultaneously.You need to ensure that whenever the child MDI form is created, the application displays a message in the title bar of the parent MDI that a child form has received focus.   What should you do?()

  • A、Implement theActivated event
  • B、Implement the MdiChildActivate event
  • C、Override the OnParentVisibleChanged method
  • D、Override the OnParentBindingContextChanged method

正确答案:B

第7题:

You need to design a PKI solution that meets business and security requirements. What should you do?()

  • A、Implement an enterprise root CA in the corp.woodgrovebank.com domain.Implement subordinate CAs in each child domain. Take the root CA offline
  • B、Implement an enterprise root CA in the corp.woodgrovebank.com domain
  • C、Implement an enterprise root CA in each of the child domains. Take the enterprise CA in each domain offline
  • D、Implement an enterprise root CA in the corp.woodgrovebank.com domain. Implement a stand-alone root CA in each of the child domains

正确答案:A

第8题:

You need to implement a high availability design in the Company routed network.  Which protocol  allows for the automatic selection and simultaneous use of multiple available gateways as well as  automatic failover between those gateways?()

  • A、 VRRP
  • B、 GLBP
  • C、 IRDP
  • D、 HSRP
  • E、 None of the other alternatives apply

正确答案:B

第9题:

You need to design a method to implement account policies that meets the requirements in the written security policy. What should you do?()

  • A、Create a GPO and link it to the New York OU, to the Denver OU, and to the Dallas OU.Configure the GPO with the required account policy settings
  • B、On all computers in the domain, configure the Local Security Policy7 with the required account policy settings
  • C、Configure the Default Domain Policy GPO with the required account policy settings
  • D、Configure the Default Domain Controllers Policy GPO with the required account policy settings

正确答案:C

第10题:

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is an internal application which uses Analysis Services and Reporting Services. You use the application on the basis of SQL Server 2008. According to the requirement of company security policy, the surface area for all the deployed components of SQL Server 2008 should be configured. You have to implement the security policy and devise a method to evaluate the security policy against other database servers. What should you do?()  

  • A、You should create policies based on the appropriate facets. Apply the policies against a server group. The server group includes the database servers that need to be configured 
  • B、You should create a Transact-SQL script based on the sp_configure stored procedure. Use a configuration server to run the script against a server group that includes the database servers that need to be configured 
  • C、You should edit the RSReportServer.config configuration file. Distribute the file to all database servers that need to be configured 
  • D、You should analyze your database servers by using the SQL Server Best Practices Analyzer (BPA). Implement the recommendations of the BPA

正确答案:A

更多相关问题