stop all running instances of PDACLD
log in to the EchoClient as a different IBM Tivoli Access Manager for e-business (TAMeb) user
change the TAMeb ACL policy applying to the Web Services namespace
update the authorization module configuration in the Trust Service using the IBM Tivoli Federated Identity Manager Console
第1题:
You work as a database administrator for Supportcenter.cn. You want to administer your database servers, which are running on different host machines, using the Web-enabled grid control interface. You have configured the agent on the host machines. You have started the Oracle Database 10g Grid Control utility on your machine. Which two additional components would you configure to achieve this objective?()
第2题:
Every morning, you inspect your company's development and staging servers. You do this to ensure that the servers have the same versions of all files in your Web application.For security reasons, you can only access the staging server through FTP.You need to synchronize files from the staging server so that the staging server matches the development server.You want to achieve this goal by using the minimum amount of administrative effort. Which tool should you use?()
第3题:
You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The server hasthe Web Server (IIS) server role installed. The server contains a Web site that is configured to use onlyWindows Authentication. You have a security group named Group1 that contains several user accounts.Now you receive an order from the company management. According to the company requirement, youhave to prevent the members of Group1 from accessing a Web site. But you are not allowed prevent otherusers from accessing the Web site. Which Web site feature should you configure?()
第4题:
You have a combined Windows 2000 and Windows 98 network that contain sensitive data. You want to utilize as many new Windows 2000 security features as possible. You want to customize a security policy on each computer to ensure that data is kept confidential and secured. Allcomputers must still be able to communicate with each other over the network. What should you do?()
第5题:
You use Windows 2000 Professional on your desktop Computer. You schedule a task to run an MMC snap-in to perform configuration tasks on other computers. You notice that the task is not completing correctly. You manually start MMC. You add the snap-in. You are then able to successfully run the task. You verify that all of your other tasks are working correctly. You want to enable your tasks to complete successfully. What should you do?()
第6题:
You have a server that runs Windows Server 2008. The server has the Terminal Services Gateway (TS Gateway) role service installed. You need to provide a security group access to the TS Gateway server. What should you do?()
第7题:
You have a share on your local computer. Someone has been intentionally damaging your files. You want to be able to know which account is doing this. What do you do? ()
第8题:
stop all running instances of PDACLD
log in to the EchoClient as a different IBM Tivoli Access Manager for e-business (TAMeb) user
change the TAMeb ACL policy applying to the Web Services namespace
update the authorization module configuration in the Trust Service using the IBM Tivoli Federated Identity Manager Console
第9题:
Add each user account to the Power Users group on that user’s computer.
Configure the financial and credit applications to run as services on the computers in the accounting department.
Apply the Compatws.inf security template to the local security policy of the computers in the accounting department.
Use the Computer Management console to configure separate memory spaces for each financial and credit application on the accounting department computers.
第10题:
Use Scheduled Tasks to configure the task to run under the security context of your account.
Configure the Task Scheduler service account to use a local Administrator account and password.
Use Computer Management to start the Messenger service and to configure the Messenger service to start automatically.
Use Computer Management to start the Task Scheduler service and to configure the Task Scheduler service to start automatically.
第11题:
A Terminal Services Resource Authorization Policy should be created and configured.
A Terminal Services Connection Authorization Policy should be created and configured.
The security group should be added to the Remote Desktop Users group.
The security group should be added to the TS Web Access Computers group.
第12题:
You should configure SSL Settings
You should configure Authentication
You should configure Authorization Rules
You should configure IIS Manager Permissions
第13题:
Your company has an Active Directory domain. A server named Server2 runs Windows Server 2008. All client computers run Windows Vista. You install the Terminal Services role,Terminal Services Web Access role service,and Terminal Services Gateway role service on Server2. You need to ensure that all client computers have compliant firewall, antivirus software,and antispyware. Which two actions should you perform?()
第14题:
You upgrade 11 computers in the accounting department from Windows NT Workstation 4.0 to Windows 2000 Professional. All of the upgraded computers are configured to have the default security settings. After the upgrade, users in the accounting department report that they can no longer run any financial or credit applications on their computers. You want all accounting department users to be able to run these applications. You want to allow only the rights that allow users to run the applications. What should you do?()
第15题:
You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is an Active Directory domain in your company. Windows Server 2008 isrun by a server named S02. All client computers run Windows Vista. You perform the installation of theTerminal Services server role, TS Web Access role service, and TS Gateway role service on S02. Youhave to make sure that all client computers have compliant firewall, antivirus software,and antispyware. What should you do to make sure of this?()
第16题:
You need to design a security patch management strategy. Your solution must meet business and security requirements, and it must accommodate the company’s resource restrictions. What should you do?()
第17题:
You have an Exchange Server 2010 organization with mailbox server in a lab environment.The lab is not connected to internet.You need to verify autodiscover is configured correctly for client connectivity.What will you use?()
第18题:
You have a server that runs Windows Server 2008. The server has the Web Server (IIS) server role installed. The server contains a Web site that is configured to use only Windows Authentication. You have a security group named Group1 that contains several user accounts. You need to prevent the members of Group1 from accessing a Web site. You must not prevent other users from accessing the Web site. Which Web site feature should you configure?()
第19题:
You have successfully configured EchoClient and EchoApplication secured by Web Services Security Management (WSSM). You want to test that authorization is correctly being performed on the request. Which technique would allow you to do this?()
第20题:
Add the security group to the Remote Desktop Users group.
Add the security group to the TS Web Access Computers group.
Create and configure a Resource Authorization Policy.
Create and configure a Connection Authorization Policy.
第21题:
FTP
XCOPY
the Publish Web tool
the Copy Web tool
第22题:
Use the security configuration and analysis console to improve the HISECWS security template file.
Use the local computer policy to disable the access this computer from the network option.
Use SECEDIT to reconfigure the computer default security settings to not allow anonymous access to the computer.
Create a policy that excludes write access to the windows 2000 computers then apply the policy to all non-windows 2000 computers.
None of the above, Windows 9X systems cannot be secured using security template files.
第23题:
[edit interfaces]
[edit security zones]
[edit system services]
[edit security interfaces]
第24题:
stop all running instances of PDACLD
log in to the EchoClient as a different IBM Tivoli Access Manager for e-business (TAMeb) user
change the TAMeb ACL policy applying to the Web Services namespace
update the authorization module configuration in the Trust Service using the IBM Tivoli Federated Identity Manager Console