the business knowledge of the IT staff
the technical knowledge of the IT staff
the company’s business objectives
the company’s network topology
the IT future directions
第1题:
When determining a customer’s security requirements using the security site survey from the steps for success methodology, which three of theses should be included in the customer’s security policy and procedures?()
第2题:
Which of the following documents should always be kept up-to-date after any major changes aremade to a network backbone?()
第3题:
You are the administrator of the Corp arborshoes.com domain. Users in the domain run Windows 2000 Professional on their desktop computers. A user named Katrin in the Sales organizational unit (OU) reports that her mouse is not working correctly. You log on to the domain from Katrin’s computer by using the domain Administrator account. You use Device Manager to display the current information for the mouse driver. You discover that Katrin’s computer is using an older version of the mouse driver. You have current drivers furnished by the manufacturer of the mouse. You install the current driver by using Device manager and restart the computer. You test the mouse and it is still not functioning correctly. You view Device Manger and notice that the display of the current driver indicates that the previous driver is still uninstalled. You want to be able to install the correct mouse driver. What should you do? ()
第4题:
You need to configure the security settings for the new app servers. Which two actions should you perform?()
第5题:
You deploy mobile devices that run Microsoft Windows Mobile 5.0. Company security policy requires an authentication process that is stronger than a user name and password combination. You need to ensure that Microsoft ActiveSync sessions use an authentication process that meets the company security policy. What should you do?()
第6题:
You are the network administrator in the New York office of TestKing. The company network consists of a single Active Directory domain The New York office currently contains one Windows Server 2003 file server named TestKingA. All file servers in the New York office are in an organizational unit (OU) named New York Servers. You have been assigned the Allow - Change permission for a Group Policy object (GPO) named NYServersGPO, which is linked to the New York Servers OU. The written company security policy states that all new servers must be configured with specified predefined security settings when the servers join the domain. These settings differ slightly for the various company offices. You plan to install Windows Sever 2003, on 15 new computers, which all functions as file servers. You will need to configure the specified security settings on the new file servers. TestKingA currently has the specified security settings configured in its local security policy. You need to ensure that the security configuration of the new file servers is identical to that of TestKingA. You export a copy of TestKingA's local security policy settings to a template file. You need to configure the security settings of the new servers, and you want to use the minimum amount of administrative effort. What should you do?()
第7题:
Third-party due diligence policy review
Remote Access Policy
Encryption Policy
Application change control policy
Security Personnel policy
第8题:
You should create policies based on the appropriate facets. Apply the policies against a server group. The server group includes the database servers that need to be configured
You should create a Transact-SQL script based on the sp_configure stored procedure. Use a configuration server to run the script against a server group that includes the database servers that need to be configured
You should edit the RSReportServer.config configuration file. Distribute the file to all database servers that need to be configured
You should analyze your database servers by using the SQL Server Best Practices Analyzer (BPA). Implement the recommendations of the BPA
第9题:
Microsoft Baseline Security Analyzer (MBSA)
Microsoft Security Assessment Tool (MSAT)
Resultant Set of Policy (RSoP)
Security Configuration Wizard (SCW)
第10题:
The Do not set default client printer should be set to be default printer in a session option to Enabled.The GPO should be applied to all the client computers.
The Easy Print driver first option should be set to Disabled. The GPO should be applied to the Terminal Server.
The Use Terminal Services Easy Print driver first option should be set to Disabled. The GPO should be applied to all the client computers.
The Do not set default client printer should be set to be default printer in a session option to Enabled.The GPO should be applied to the Terminal Server.
第11题:
802.1X
DHCP
IPSec
VPN
第12题:
You should use the Database Engine Tuning Advisor.
In Microsoft SQL Server Management Studio, you should create a maintenance plan
You should use the SQL Server Configuration Manager
In Microsoft SQL Server Management Studio, you should create a policy
第13题:
When disposing of data, which of the following should be considered FIRST?()
第14题:
You deploy mobile devices that run Microsoft Windows Mobile 5.0 with Microsoft Messaging and Security Feature Pack. A server that runs Microsoft Exchange Server 2003 Service Pack 2 is configured by using the default installation settings. Company security policy requires a complex password for unlocking the Windows Mobilebased devices. You need to ensure that the Windows Mobilebased devices that perform Microsoft ActiveSync synchronization meet the company security policy. Which two actions should you perform?()
第15题:
You are the administrator of your company’s network. You use Security Templates to configure a Security Policy on the Windows 2000 Professional Computers in the Sales organizational unit (OU). You notice that the Computers in the Sales OU are not downloading the Security Policy settings. On each computer, the Security Policy appears in the Local Computer Policy, but is not listed as the effective policy. You want all computers in the Sales OU to have the Security Policy listed as the effective policy. How should you accomplish this task? ()
第16题:
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com security policy prohibits the employees to send certain words between them.What should you do?()
第17题:
You need to ensure that all servers meet the company’s security requirements. Which tool should you use?()
第18题:
Network diagram
Performance baseline
Network security procedure
Company policy
第19题:
A domain account should be created for each of the company’s users. And then, each domain account should be offered with access to SQL1 and the Services database.
A local logon account should be created on SQL1 for each of the company’s users. And then, each logon account should be offered with access to SQL1 and the Services database.
One SQL Server logon account should be created for all of the company’s computers running MS-DOS or UNIX-based operating systems. And then, the Enforce password policy option should be enabled for users’ accounts. At last, the logon accounts should be provided with access to the Services database.
A SQL Server logon account should be created for each of the company’s users. And then, the Enforce password policy option should be enabled for each logon account. At last, each logon account should be offered with access to the Services database.
A virtual directory should be configured through Internet Information Services (IIS) for access to SQL1. And then, users should be directed to the virtual directory for data access.
第20题:
The best option is to create an Outlook Protection Rule to comply with the Company.com security policy.
The best option is to set up a content filtering feature to comply with the Company.com security policy.
The best option is to create a transport rule to comply with the Company.com security policy.
The best option is to set up a sender reputation feature to comply with the Company.com security policy.
第21题:
Configure a packet filter for the network adapter on the test network to block the Internet Key Exchange (IKE) port.
Configure the network adapter on the test network to disable IEEE 802.1x authentication.
Configure the network adapter on the test network to enable TCP/IP filtering, and then permit all traffic.
Use the netsh command to assign a persistent IPSec policy that permits all traffic on the network adapter on the test.
Assign an IPSec policy in the local computer policy that permits all traffic on the network adapter on the test.
第22题:
A Terminal Services Resource Authorization Policy should be created and configured.
A Terminal Services Connection Authorization Policy should be created and configured.
The security group should be added to the Remote Desktop Users group.
The security group should be added to the TS Web Access Computers group.
第23题:
the business knowledge of the IT staff
the technical knowledge of the IT staff
the company’s business objectives
the company’s network topology
the IT future directions
第24题:
A stored procedure should be created, and changes are disallowed by the procedure to the Price column that violates company policy.
On the Price column, a check constraint should be created, and a specified minimum value is required by the check constraint.
A trigger should be created, and changes are rolled back by the trigger to the Price column that violates company policy.
On the Price column, a foreign key constraint is created to a table that valid prices are included.