Implement ACLs.
Disable accounts for staff members who do not require server access.
Implement anti-spam software on the server.
Implement anti-virus software on the server.
第1题:
Which of the following is the BEST way to allow web software through the server firewall?()
第2题:
Which of the following is the BEST reason to implement a firewall on a server?()
第3题:
Which of the following is the MOST effective method to restrict staff members from accessing a service on a company server?()
第4题:
Which of the following is MOST likely the reason a technician would implement software RAID for a SOHO environment?()
第5题:
All client computers on your company network run Windows 7 and are members of a Windows Server 2008 R2 domain. The R&D department staff are local administrators on their computers and are members of the R&D global security group. A new version of a business software application is available on the network. You plan to apply an AppLocker security policy to the R&D group. You need to ensure that members of the R&D group are not allowed to upgrade the software. What should you do?()
第6题:
Explore the ramification of the change before implementation.
Determine the service level agreement in place before implementation.
Review the equipment disposal procedures and policies before implementation.
Notify all staff members of the planned system outage before implementation.
第7题:
第8题:
Power Users
User
Administrator
Guest
第9题:
Implement ACLs.
Disable accounts for staff members who do not require server access.
Implement anti-spam software on the server.
Implement anti-virus software on the server.
第10题:
Authentication
Authorization Rules
IIS Manager Permissions
SSL Settings
第11题:
Explore the ramification of the change before implementation.
Determine the service level agreement in place before implementation.
Review the equipment disposal procedures and policies before implementation.
Notify all staff members of the planned system outage before implementation.
第12题:
You should configure SSL Settings
You should configure Authentication
You should configure Authorization Rules
You should configure IIS Manager Permissions
第13题:
Which of the following is the MOST important consideration before making a change to a server?()
第14题:
An email server has been installed; however, the staff reports that they are unable to receive email from external email addresses, but they can email each other. Which of the following is the MOST likely reason for this?()
第15题:
A staff member reports that they cannot access the shared folder on the network; however, other staff members are reporting that they can access the shared folder. Which of the following is the BEST way to identify the problem?()
第16题:
A customer who is reducing their technical staff has requested an Intel server proposal from various vendors. Which of the following is most relevant to this proposal?()
第17题:
You have a server that runs Windows Server 2008. The server has the Web Server (IIS) server role installed. The server contains a Web site that is configured to use only Windows Authentication. You have a security group named Group1 that contains several user accounts. You need to prevent the members of Group1 from accessing a Web site. You must not prevent other users from accessing the Web site. Which Web site feature should you configure?()
第18题:
Implement ACLs.
Disable accounts for staff members who do not require server access.
Implement anti-spam software on the server.
Implement anti-virus software on the server.
第19题:
Create an Audit only restriction based on the version of the software.
Create an Audit only restriction based on the publisher of the software.
Create an Enforce rule restriction based on the version of the software.
Create an Enforce rule restriction based on the publisher of the software.
第20题:
The company firewall is blocking SMTP ports.
The DHCP server is misconfigured.
The DNS server is only resolving internal name spaces.
The email server should be configured to resolve names by IP addresses.
第21题:
The administrator should monitor all traffic between the staff member and the server.
The administrator should reconfigure the RAID configuration to allow more space.
The administrator should map a drive using the net use command.
The administrator should allow the staff member to use a USB drive.
第22题:
Grid Computing
Active Energy Manager
Remote KVM
Systems Management
第23题:
CPU efficiency
High availability
High redundancy
Cost effective
第24题:
Explore the ramification of the change before implementation.
Determine the service level agreement in place before implementation.
Review the equipment disposal procedures and policies before implementation.
Notify all staff members of the planned system outage before implementation.