Enable Web distributed Authoring and Versioning (WebDAV) components on WEB1
Install and configure the URLScan ISAPI filter on WEB1
Install a computer certificate on WEB1, and enable the Server (Request Security) IPSec policy on WEB1
Configure the Web site redirection option on the properties of WEB1 in the Internet Service Manager console
第1题:
You are tasked with designing a security solution for your network. What information should be gathered prior to designing the solution?()
第2题:
You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. TestKing.com is configured to run an exchange 2010 environment. You are planning to design the installation of numerous Mailbox servers. TestKing.com Service LevelAgreement (SLA) requires the following: * The servers need to support 1,500 concurrent connections to mailboxes.* The servers need to maintain a latency of less than 20 milliseconds. You ensure deployment success you need to ensure that your design comply with the Service LevelAgreement (SLA) of TestKing.com. What should you do?()
第3题:
You are the domain administrator for TestKing‘s Active Directory domain named All client computers run Windows XP Professional.You need to implement a solution for managing security updates on client computers. You plan to use a Windows Server 2003 computer to manage security updates. Your solution for managing security updates must meet the following requirements:1. You must not purchase additional software or licences.2. Security updates must be installed automatically.3. You must be able to control which updates are available to install.4. Security updates must synchronize automatically with the latest updates offered by Microsoft.You need to implement a solution for managing security updates that meets the requirements.What should you do?()
A. Publish the security updates by using a Group Policy object (GPO). Assign the GPO to the client computers that require updates
B. Install Software Update Services (SUS). Configure the SUS software to synchronize daily with Microsoft. Use Group Policy to configure the appropriate Windows Update settings on the client computers.
C. Install Microsoft Internet Security and Acceleration (ISA) Server on a Windows Server 2003 computer.
D. Create a process to run Windows Update on all client computers.
第4题:
You have an Exchange Server 2010 organization. Your company has a relationship with another company. The partner company has an Exchange Server 2010 organization. You need to recommend a security solution to meet the following requirements: .Ensure that all e-mail delivery between your servers and the partner companys servers is encrypted .Ensure that all communication between your servers and the partner companys servers is authenticated What should you include in the solution?()
第5题:
You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()
第6题:
You need to design a method to standardize and deploy a baseline security configuration for servers. You solution must meet business requirements. What should you do?()
第7题:
You need to design a security strategy for VPN2. Your solution must meet business requirements. What should you do?()
第8题:
You need to design the retrieval of advertising statistics without compromising security. What should you do?()
第9题:
You have an Exchange Server 2010 organization. The organization contains a global security group named Group1. You plan to deploy a monitoring solution for the Exchange servers in your organization. You need to recommend a solution that allows members of Group1 to monitor the performance ofExchange Server 2010 servers. Your solution must prevent members of Group1 from modifying the configurations of the ExchangesServer 2010 organization. What should you include in the solution?()
第10题:
You have an Exchange Server 2010 organization. You have a global security group named Legal that contains all the members of your companys legaldepartment. The companys security policy states that the Legal group must be able to search all mailboxes for e-mailmessages that contain specific keywords. You need to recommend a solution for the organization that complies with the security policy. What should you include in the solution?()