单项选择题X 纠错

A.Configure the editor’s user account properties to enable Store password using reversible encryption
B.Configure the editor’s user account properties to enable Use DES encryption for this account
C.Configure the Local Security Policy on Server to enable the System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing security policy
D.Configure the Server5 computer account properties to enable Trust computer for delegation

参考答案:
查答案就用赞题库小程序 还有拍照搜题 语音搜题 快来试试吧
无需下载 立即使用

你可能喜欢

单项选择题

A.Move the EditorialAdmins group to the Servers OU in the editorial department
B.Move the members of the EditorialAdmins group to the Editorial OU
C.Move the members of the EditorialAdmins group to the New York OU
D.Move the EditorialAdmins group to the New York OU

单项选择题

A.Run the Resultant Set of Policy wizard with a Windows Management Instrumentation (WMI) filter on each department’s Server OU
B.Log on to each server and use local policy to configure and manage the security settings
C.Create a customer security template. Log on to a domain controller and run the seceditcommand to import the security template
D.Create a customer security template. Create a GPO and import the security template. Link the GPO to each department’s Server OU

单项选择题

A.Enable logging on the company Web site and select the NCSA Common Log File Format. Store the log files on a SQL Server computer
B.Use System Monitor to create a counter log that captures network traffic to the Web server by using the Web Service object. Store the log files on a SQL Server computer
C.Run the Network Monitor on the Web server. Create a capture filter for the SNA protocol and save the results to a capture file. Store the capture file on a SQL Server computer
D.Enable logging on the company Web site and select ODBC Logging. Configure the ODBC logging options by using a nonadministrative SQL account

单项选择题

A.Configure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addresses
B.Configure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points use
C.Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networks
D.Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks

单项选择题

A.Use the Microsoft Baseline Security Analyzer (MBSA) to scan for Windows vulnerabilities on all servers in the production department
B.Run Security and Configuration Analysis to analyze the security settings of all servers in the production department
C.Enable auditing for data on each server in the production department. Run System Monitor on all servers in the production department to create a counter log that tracks activity for the Objects performance object
D.Create a Group Policy Object (GPO) that enables auditing for object access and link it to the product department’s Servers OU. Enable auditing for data on each server in the production department

单项选择题

A.Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the IIS server computer account
B.Run the Microsoft Baseline Security Analyzer (MBSA) on the IIS server and scan for vulnerabilities in Windows and IIS checks
C.Run Security Configuration and Analysis to analyze the IIS server’s security settings by using a custom security template
D.On the IIS server, run the gpresult command from a command prompt and analyze the output

单项选择题

A.Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the domain
B.Log on to each server and run Security Configuration and Analysis to analyze the security settings by using a custom security template
C.Create a logon script to run the secedit command to analyze all servers in the domain
D.Run the Microsoft Baseline Security Analyzer (MBSA) on a server to scan for Windows vulnerabilities on all servers in the domain

单项选择题

A.Enable failure audit for privilege user and object access on all servers and domain controllers
B.Enable success audit for policy change and account management on all servers and domain controllers
C.Enable success audit for process tracking and logon events on all servers and domain controllers
D.Enable failure audit for system events and directory service access on all servers and domain controllers

单项选择题

A.Use error reporting on all servers in the development department to report errors for a custom application
B.Configure all servers in the development department so that they do not require the CTRL+ALT+DELTE keys to pressed in order to log on interactively to the server
C.Create a Group Policy object (GPO) and link it to the development department’s Servers OU. Configure the GPO with an interactive logon policy to display a message for users who attempt to log on
D.Configure the screen saver on all servers in the development department to require a password

多项选择题

A.Use SSH to encrypt content as it is transferred to the Web server on the perimeter network
B.Install the Microsoft FrontPage Server Extensions, and use FrontPage to update content
C.Use Web Distributed Authoring and Versioning (WebDAV) over and SSL connection to the Web server to update content
D.Use FTP over an IPSec connection to transfer content to the Web server
E.Use Telnet to connect to the Web server, and then perform content changes directly on the server

赞题库

赞题库-搜题找答案

(已有500万+用户使用)


  • 历年真题

  • 章节练习

  • 每日一练

  • 高频考题

  • 错题收藏

  • 在线模考

  • 提分密卷

  • 模拟试题

无需下载 立即使用

版权所有©考试资料网(ppkao.com)All Rights Reserved