You need to design a strategy to move confidential data from

题目
单选题
You need to design a strategy to move confidential data from research users’ client computers to ATLFP2. Your solution must meet the business requirements. What should you instruct the research users to do?()
A

Move the encrypted data to a folder on ATLFP2 over an IPSec connection

B

Move the encrypted data to an Encrypting File System (EFS) folder on ATLFP2 over an IPSec connection

C

Move the encrypted data to a new server that is not a member of the domain, and then move it to ATLFP2

D

Move the encrypted data to a compressed folder on ATLFP2 by using Web Distributed Authoring and Versioning (WebDAV) over SSL

参考答案和解析
正确答案: B
解析: 暂无解析
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Error log analysis indicates that a disk is starting to fail and will need to be replaced. The failing disk contains multiple logical volumes which span multiple disks. A free disk has been added to the failing disk’s volume group.Which of the following is the most efficient method to move the data from the failing disk to the new disk?()

  • A、Back up the data, remove the failing disk from the volume group, then restore the data to the new disk.
  • B、Use the migratepv command to move data from one disk to another and then remove the failing disk from the volume group.
  • C、Use the mirrorvg command to mirror the data to the new disk, break the mirror and then remove the failing disk from the volume group.
  • D、Create a new filesystem on the new disk and use the mv command to move the data to the new filesystem, and then remove the failing disk from the volume group.

正确答案:B

第2题:

You need to recommend a backup strategy for the servers in the San Francisco office. The strategy must meet the company's technical requirements    What should you include in the recommendation?()

  • A、native-boot virtual hard disks (VHDs)
  • B、Microsoft System Center Data Protection Manager 2010
  • C、system restore points
  • D、Windows Server Backup

正确答案:B

第3题:

Your data recovery strategy must meet the following requirements:·Back up all data files and folders in C:\Data.·Restore individual files and folders in C:\Data.·Ensure that data is backed up to and restored from external media.What should you do?()

A.A

B.B

C.C

D.D


参考答案:D

第4题:

You need to design a strategy to move confidential data from research users’ client computers to ATLFP2. Your solution must meet the business requirements. What should you instruct the research users to do?()

  • A、Move the encrypted data to a folder on ATLFP2 over an IPSec connection
  • B、Move the encrypted data to an Encrypting File System (EFS) folder on ATLFP2 over an IPSec connection
  • C、Move the encrypted data to a new server that is not a member of the domain, and then move it to ATLFP2
  • D、Move the encrypted data to a compressed folder on ATLFP2 by using Web Distributed Authoring and Versioning (WebDAV) over SSL

正确答案:B

第5题:

Your company has an Active Directory domain. All consultants belong to a global group named   TempWorkers. The TempWorkers group is not nested in any other groups.   You move the computer objects of three file servers to a new organizational unit named SecureServers.   These file servers contain only confidential data in shared folders.   You need to prevent members of the TempWorkers group from accessing the confidential data on the file  servers. You must achieve this goal without affecting access to other domain resources.   What should you do()

  • A、Create a new GPO and link it to the SecureServers organizational unit. Assign the Deny access to this  computer from the network user right to the TempWorkers global group.
  • B、Create a new GPO and link it to the domain. Assign the Deny access to this computer from the network  user right to the TempWorkers global group.
  • C、Create a new GPO and link it to the domain. Assign the Deny log on locally user right to the  TempWorkers global group.
  • D、Create a new GPO and link it to the SecureServers organizational unit. Assign the Deny log on locallyuser right to the TempWorkers global group.

正确答案:A

第6题:

You are the network administrator for The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. All confidential company files are stored on a file server named TestKing1. The written company security states that all confidential data must be stored and transmitted in a secure manner. To comply with the security policy, you enable Encrypting File System (EFS) on the confidential files. You also add EFS certificates to the data decryption field (DDF) of the confidential files for the users who need to access them. While performing network monitoring, you notice that the confidential files that are stored on TestKing1 are being transmitted over the network without encryption. You must ensure that encryption is always used when the confidential files on TestKing1 are stored and transmitted over the network. What are two possible ways to accomplish this goal? ()(Each correct answer presents a complete solution. Choose two)

  • A、Enable offline files for the confidential files that are stored on TestKing1, and select the Encrypt offline files to secure data check box on the client computers of the users who need to access the files.
  • B、Use IPSec encryption between TestKing1 and the client computers of the users who need to access the confidential files.
  • C、Use Server Message Block (SMB) signing between TestKing1 and the client computers of the users who need to access the confidential files.
  • D、Disable all LM and NTLM authentication methods on TestKing1.
  • E、Use IIS to publish the confidential files. Enable SSL on the IIS server. Open the files as a Web folder.

正确答案:B,E

第7题:

You have a Web application that is configured for personalization. You need to access personalization data from one of the pages of the Web application by using the minimum amount of administrative effort. What should you do? ()

  • A、Access the personalization data from the Session property of the HttpContext object.
  • B、Access the personalization data from the Application property of the HttpContext object.
  • C、Access the personalization data from the Cache property of the HttpContext object.
  • D、Access the personalization data from the Profile property of the HttpContext object.

正确答案:D

第8题:

Your network contains an Exchange Server 2007 Mailbox server named Server1 and an Exchange Server 2010 Mailbox server named Server2.You need to move a mailbox from Server1 to Server2.What should you do?()

  • A、From Server1, run Move-Mailbox.
  • B、From Server2, run Move-Mailbox.
  • C、From Server1, run New-MoveRequest.
  • D、From Server2, run New-MoveRequest.

正确答案:D

第9题:

You are evaluating the implementation of two Hyper-V hosts for the Web servers. You need to design a solution that will move the Web servers automatically between the Hyper-V hosts based on the physical resources available. Which software should you include in the design?()

  • A、Microsoft System Center Operations Manager
  • B、Microsoft System Center Virtual Machine Manager
  • C、Microsoft System Center Data Protection Manager
  • D、Microsoft System Center Configuration Manager

正确答案:A,B

第10题:

Your company has an Active Directory domain. All consultants belong to a global group named  TempWorkers. The TempWorkers group is not nested in any other groups.   You move the computer objects of three file servers to a new organizational unit named  SecureServers. These file servers contain only confidential data in shared folders.    You need to prevent members of the TempWorkers group from accessing the confidential data  on the file servers. You must achieve this goal without affecting access to other domain  resources.     What should you do()

  • A、Create a new GPO and link it to the SecureServers organizational unit. Assign the Deny access to this computer fro
  • B、Create a new GPO and link it to the domain. Assign the Deny access to this computer from the network user right to
  • C、Create a new GPO and link it to the domain. Assign the Deny log on locally user right to the TempWorkers global g
  • D、Create a new GPO and link it to the SecureServers organizational unit. Assign the Deny log on locally user right to

正确答案:A

更多相关问题