Move the encrypted data to a folder on ATLFP2 over an IPSec connection
Move the encrypted data to an Encrypting File System (EFS) folder on ATLFP2 over an IPSec connection
Move the encrypted data to a new server that is not a member of the domain, and then move it to ATLFP2
Move the encrypted data to a compressed folder on ATLFP2 by using Web Distributed Authoring and Versioning (WebDAV) over SSL
第1题:
Error log analysis indicates that a disk is starting to fail and will need to be replaced. The failing disk contains multiple logical volumes which span multiple disks. A free disk has been added to the failing disk’s volume group.Which of the following is the most efficient method to move the data from the failing disk to the new disk?()
第2题:
You need to recommend a backup strategy for the servers in the San Francisco office. The strategy must meet the company's technical requirements What should you include in the recommendation?()
第3题:
Your data recovery strategy must meet the following requirements:·Back up all data files and folders in C:\Data.·Restore individual files and folders in C:\Data.·Ensure that data is backed up to and restored from external media.What should you do?()
A.A
B.B
C.C
D.D
第4题:
You need to design a strategy to move confidential data from research users’ client computers to ATLFP2. Your solution must meet the business requirements. What should you instruct the research users to do?()
第5题:
Your company has an Active Directory domain. All consultants belong to a global group named TempWorkers. The TempWorkers group is not nested in any other groups. You move the computer objects of three file servers to a new organizational unit named SecureServers. These file servers contain only confidential data in shared folders. You need to prevent members of the TempWorkers group from accessing the confidential data on the file servers. You must achieve this goal without affecting access to other domain resources. What should you do()
第6题:
You are the network administrator for The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. All confidential company files are stored on a file server named TestKing1. The written company security states that all confidential data must be stored and transmitted in a secure manner. To comply with the security policy, you enable Encrypting File System (EFS) on the confidential files. You also add EFS certificates to the data decryption field (DDF) of the confidential files for the users who need to access them. While performing network monitoring, you notice that the confidential files that are stored on TestKing1 are being transmitted over the network without encryption. You must ensure that encryption is always used when the confidential files on TestKing1 are stored and transmitted over the network. What are two possible ways to accomplish this goal? ()(Each correct answer presents a complete solution. Choose two)
第7题:
You have a Web application that is configured for personalization. You need to access personalization data from one of the pages of the Web application by using the minimum amount of administrative effort. What should you do? ()
第8题:
Your network contains an Exchange Server 2007 Mailbox server named Server1 and an Exchange Server 2010 Mailbox server named Server2.You need to move a mailbox from Server1 to Server2.What should you do?()
第9题:
You are evaluating the implementation of two Hyper-V hosts for the Web servers. You need to design a solution that will move the Web servers automatically between the Hyper-V hosts based on the physical resources available. Which software should you include in the design?()
第10题:
Your company has an Active Directory domain. All consultants belong to a global group named TempWorkers. The TempWorkers group is not nested in any other groups. You move the computer objects of three file servers to a new organizational unit named SecureServers. These file servers contain only confidential data in shared folders. You need to prevent members of the TempWorkers group from accessing the confidential data on the file servers. You must achieve this goal without affecting access to other domain resources. What should you do()