第1题:
第2题:
Your company has an Active Directory directory service domain. All servers run Windows Server 2003. You are developing a security monitoring plan. You must monitor the files that are stored in a specific directory on a member server. You have the following requirements. Log all attempts to access the files.Retain log information until the full weekly backup occurs. You need to ensure that the security monitoring plan meets the requirements. What should your plan include?()
第3题:
(c) (i) Provide three examples of personal financial planning protection products that would be of use in
Henry’s situation. Justify your selections by reference to the type of protection provided. (6 marks)
第4题:
You configured the default backup device type as disk for RMAN backups. In your database,because of business requirements,you have to take a simultaneous duplicate backup of the data files when the RMAN BACKUP command is used. What must you set using the RMAN CONFIGURE command to achieve this?()
第5题:
You and a co-worker have established wireless communication directly between your wireless laptops. What type of wireless topology has been created()。
第6题:
Your network consists of a single Active Directory forest. You have an Exchange Server 2003 organization. You need to create a plan to transition the organization to Exchange Server 2010. The plan must meet the following requirements: .Ensure that e-mail messages can be sent between all users in the organization .Ensure that administrators can modify address lists from Exchange Server 2010 servers .Ensure that users who are moved to Exchange Server 2010 can access all public folders in theorganization What should you include in the plan?()
第7题:
You are the desktop administrator for your company's sales department. The IT manager for the sales department needs to distribute three custom applications to the department's Windows XP Professional computers. She deploys these applications by using Group Policy. Some users report that they must log on several times before the newly deployed applications are present on their computers. You need to ensure that all software is deployed the next time the users log on. What should you do?()
第8题:
A.BSS
B.ESS
C.IBSS
D.SSID
第9题:
Your Cisco network currently runs OSPF and you have a need to policy-route some specific traffic,regardless of what the routing table shows. Which one of these options would enable you to policy-route the traffic?()
第10题:
You need to design a security strategy for VPN2. Your solution must meet business requirements. What should you do?()