Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the IIS server computer account
Run the Microsoft Baseline Security Analyzer (MBSA) on the IIS server and scan for vulnerabilities in Windows and IIS checks
Run Security Configuration and Analysis to analyze the IIS server’s security settings by using a custom security template
On the IIS server, run the gpresult command from a command prompt and analyze the output
第1题:
The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()
第2题:
You need to design a method to standardize and deploy a baseline security configuration for servers. You solution must meet business requirements. What should you do?()
第3题:
你们需要安保专家对场馆做安全评估吗?
A.Do you need a security expert to value the potential danger of the region?
B.Do you need a security expert to calculate the potential adventure of the area?
C.Do you need a security expert to account the potential risks of the region?
D.Do you need a security expert to evaluate the potential risks of the place?
第4题:
You need to design a method to log changes that are made to servers and domain controllers. You also need to track when administrators modify local security account manager objects on servers. What should you do?()
第5题:
You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains 50 application servers that run Windows Server 2003. The security configuration of the application servers is not uniform. The application servers were deployed by local administrators who configured the settings for each of the application servers differently based on their knowledge and skills. The application servers are configured with different authentication methods, audit settings, and account policy settings. The security team recently completed a new network security design. The design includes a baseline configuration for security settings on all servers. The baseline security settings use the Hisecws.inf predefined security template. The design also requires modified settings for servers in an application role. These settings include system service startup requirements, renaming the administrator account, and more stringent account lockout policies. The security team created a security template named Application.inf that contains the modified settings. You need to plan the deployment of the new security design. You need to ensure that all security settings for the application servers are standardized, and that after the deployment, the security settings on all application servers meet the design requirements. What should you do? ()
第6题:
You need to design the retrieval of advertising statistics without compromising security. What should you do?()
第7题:
You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. TestKing.com is configured to run an exchange 2010 environment. You are planning to design the installation of numerous Mailbox servers. TestKing.com Service LevelAgreement (SLA) requires the following: * The servers need to support 1,500 concurrent connections to mailboxes.* The servers need to maintain a latency of less than 20 milliseconds. You ensure deployment success you need to ensure that your design comply with the Service LevelAgreement (SLA) of TestKing.com. What should you do?()
第8题:
Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows Vista computers. You are planning to deploy Windows 7 and a custom application. You have the following requirements: The application must be available to only a specific group of users. You must be able to monitor application usage. You need to design a deployment method for the custom application that meets the requirements. Which deployment method should you use in your design?()
第9题:
You need to design a method to allow the new-ideas-testking.com Web site to function in accordance with security and business requirements. What should you do?()
第10题:
You create Microsoft Windows-based applications. You create an application that requires users to be authenticated by a domain controller. The application contains a series of processor intensive method calls that require different database connections. A bug is reported during testing. The bug description states that the application hangs during one of the processor-intensive calls more than 50 percent of the times when the method is executed. Your unit test for the same method was successful.You need to reproduce the bug. Which two factors should you ascertain from the tester?()