You need to design a method to monitor the security configur

题目
单选题
You need to design a method to monitor the security configuration of the IIS server to meet the requirements in the written security policy. What should you do?()
A

Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the IIS server computer account

B

Run the Microsoft Baseline Security Analyzer (MBSA) on the IIS server and scan for vulnerabilities in Windows and IIS checks

C

Run Security Configuration and Analysis to analyze the IIS server’s security settings by using a custom security template

D

On the IIS server, run the gpresult command from a command prompt and analyze the output

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()

  • A、On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policy
  • B、On all client computers, implement logon auditing for all user account logons
  • C、On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policy
  • D、On all domain controllers, implement logon auditing for all user account logons

正确答案:C

第2题:

You need to design a method to standardize and deploy a baseline security configuration for servers. You solution must meet business requirements. What should you do?()

  • A、Create a script that installs the Hisecdc.inf security template
  • B、Use a GPO to distribute and apply the Hisec.inf security template
  • C、Use the System Policy Editor to configure each server’s security settings
  • D、Use a GPO to distribute and apply a custom security template

正确答案:D

第3题:

你们需要安保专家对场馆做安全评估吗?

A.Do you need a security expert to value the potential danger of the region?

B.Do you need a security expert to calculate the potential adventure of the area?

C.Do you need a security expert to account the potential risks of the region?

D.Do you need a security expert to evaluate the potential risks of the place?


正确答案:D

第4题:

You need to design a method to log changes that are made to servers and domain controllers. You also need to track when administrators modify local security account manager objects on servers. What should you do?()

  • A、Enable failure audit for privilege user and object access on all servers and domain controllers
  • B、Enable success audit for policy change and account management on all servers and domain controllers
  • C、Enable success audit for process tracking and logon events on all servers and domain controllers
  • D、Enable failure audit for system events and directory service access on all servers and domain controllers

正确答案:B

第5题:

You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains 50 application servers that run Windows Server 2003.   The security configuration of the application servers is not uniform. The application servers were deployed by local administrators who configured the settings for each of the application servers differently based on their knowledge and skills. The application servers are configured with different authentication methods, audit settings, and account policy settings.   The security team recently completed a new network security design. The design includes a baseline configuration for security settings on all servers. The baseline security settings use the Hisecws.inf predefined security template. The design also requires modified settings for servers in an application role. These settings include system service startup requirements, renaming the administrator account, and more stringent account lockout policies. The security team created a security template named Application.inf that contains the modified settings.   You need to plan the deployment of the new security design. You need to ensure that all security settings for the application servers are standardized, and that after the deployment, the security settings on all application servers meet the design requirements.   What should you do? ()

  • A、 Apply the Setup security.inf template first, the Hisecws.inf template next, and then the Application.inf template.
  • B、 Apply the Application.inf template and then the Hisecws.inf template.
  • C、 Apply the Application.inf template first, the Setup security.inf template next, and then the Hisecws.inf template.
  • D、 Apply the Setup security.inf template and then the Application.inf template.

正确答案:A

第6题:

You need to design the retrieval of advertising statistics without compromising security. What should you do?()

  • A、Design a Notification Services solution that sends the advertising statistics to specified subscribers by e-mail.
  • B、Design a SQL Server Web service that runs a stored procedure to return the statistics on a call from the advertisers application.
  • C、Design a Database Mail solution that sends the advertising statistics to e-mail addresses that are specified in a table.
  • D、Design a stored procedure to return the statistics on a call from the advertisers application.
  • E、Design a user-defined function to return the statistics on a call from the advertisers application.

正确答案:B

第7题:

You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. TestKing.com is configured to run an exchange 2010 environment.  You are planning to design the installation of numerous Mailbox servers. TestKing.com Service LevelAgreement (SLA) requires the following: * The servers need to support 1,500 concurrent connections to mailboxes.* The servers need to maintain a latency of less than 20 milliseconds. You ensure deployment success you need to ensure that your design comply with the Service LevelAgreement (SLA) of TestKing.com. What should you do?()

  • A、The best option is to use the Exchange Server User Monitor (ExMon) tool to check if your design meets the requirements.
  • B、The best option is to use the Exchange Server Load Generator (LoadGen) 2010 tool to check if your design meets the requirements.
  • C、The best option is to use the Exchange Server Connectivity Analyzer (ExRCA) tool to check if your design meets the requirements.
  • D、The best option is to use the Exchange Server Jetstress 2010 tool to check if you design meets there quirements.

正确答案:B

第8题:

Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows Vista computers.  You are planning to deploy Windows 7 and a custom application.   You have the following requirements:   The application must be available to only a specific group of users. You must be able to monitor application usage.   You need to design a deployment method for the custom application that meets the requirements.  Which deployment method should you use in your design?()

  • A、software installation in Group Policy
  • B、startup scripts in Group Policy
  • C、Microsoft Application Virtualization (App-V)
  • D、baseline Windows 7 image that includes the custom application

正确答案:C

第9题:

You need to design a method to allow the new-ideas-testking.com Web site to function in accordance with security and business requirements.  What should you do?()

  • A、Require a PPTP VPN for all connections to the Web server
  • B、Require that traffic between Web browsers and the Web server uses an L2TP/IPSec tunnel
  • C、Require that traffic between Web browsers and the Web server uses SSL
  • D、Require certificate mappings between the Web server and Active Directory

正确答案:C

第10题:

You create Microsoft Windows-based applications.  You create an application that requires users to be authenticated by a domain controller.  The application contains a series of processor intensive method calls that require different database connections. A bug is reported during testing.  The bug description states that the application hangs during one of the processor-intensive calls more than 50 percent of the times when the method is executed.  Your unit test for the same method was successful.You need to reproduce the bug.   Which two factors should you ascertain from the tester?()

  • A、 Security credentials of the logged on user
  • B、 Code access security settings
  • C、 Hardware settings
  • D、 Network settings
  • E、 Database settings

正确答案:D,E

更多相关问题