You need to design an access control strategy for resources 

题目
单选题
You need to design an access control strategy for resources that are located in the extranet for partners and for internal users. Your solution must meet business and security requirements. What should you do?()
A

Create a new child domain named extranet.corp.woodgrovebank.com in the existing forest. Create user accounts for users from partner companies in the new child domain. Create shortcut trusts in which the child domain trusts every domain in the forest

B

Create a new forest and domain named extranet.woodgrovebank.com. Create user accounts for users from partner companies in the new domain. Create a one-way forest trust relationship in which the extranet forest trusts the company forest

C

Create a new forest and domain named extranet.woodgrovebank.com. Create user accounts for users from partner companies in the new domain. Create an external trust relationship in which the extranet domain trusts the den.corp.woodgrovebank.com domain

D

Create a child domain of the den.corp.woodgrovebank.com domain for the extranet. Create user accounts for users from partner companies in the new child domain. Create an external trust relationship in which the forest root domain trusts the extranet domain

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Your computer is unable to access external names or IP addresses. You need to connect to external Internet resources.What should you do first?()

A.A

B.B

C.C

D.D


参考答案:C

第2题:

You are designing a strategy to allow users to have remote access to internal resources. Which service or services should you allow on the public interface of the NAT Server?()

  • A、HTTP
  • B、LDAP
  • C、POP3
  • D、SMTP
  • E、VPN Gateway

正确答案:B

第3题:

Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()

A. Session-Export policies on the Junos Pulse Secure Access Service

B. Session-Export policies on the Junos Pulse Access Control Service

C. Session-Import policies on the Junos Pulse Secure Access Service

D. Session-Import policies on the Junos Pulse Access Control Service

E. Resource access policies on the Junos Pulse Access Control Service


参考答案:A, D, E

第4题:

You need to design an e-mail access strategy for remote users. What should you do? () 

  • A、 Instruct remote users to connect to their e-mail by using RPC
  • B、 Instruct remote users to connect to Outlook Web Access by using only HTTPS
  • C、 Instruct remote users to connect to the company network by using PPTP connections
  • D、 Instruct remote users to connectd to their e-mail by using RPC over HTTP Configure the HTTP servers to require encryption.

正确答案:D

第5题:

You need to design a PKI that meets business requirements. What should you do?()

  • A、Move ATLCA1 offline and create an enterprise subordinate CA to issue certificates
  • B、Create a stand-alone subordinate CA to issue certificates
  • C、Use a qualified subordinate CA
  • D、Configure certificate template access control lists (ACLs) on ATLCA1

正确答案:A

第6题:

You are developing a Windows Presentation Foundation (WPF) application for a travel reservation systemYou need to ensure that users can select a range of travel dates.What should you do ?()

A. Add single DatePicker control to the design surface

B. Add single Calendar control to the design surface

C. Add single MediaElement control to the design surface to display a calendar

D. Add the appropriate Windows Forms references to the project references. Add a single Windows Forms DateTimePicker control to the design surface


参考答案:B

第7题:

You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()

  • A、Require client computers to connect to the marketing application by using a VPN connection
  • B、Use IPSec to encrypt communications between the servers in the New York and Atlanta offices
  • C、Require the high security setting on Terminal Services connections to the marketing application
  • D、Configure all marketing application Web pages to require SSL

正确答案:D

第8题:

You are receiving reports of possible unauthorized access to resources protected by a firewall enforcer running the Junos OS. You want to verity which users are currently accessing resources through the enforcer.Which command should you use to verify user access on the enforcer?()

A. show services unified-access-control authentication-table

B. show auth table

C. show services unified-access-control policies

D. show services unified-access-control captive-portal


参考答案:A

第9题:

You need to design a security strategy for the DHCP servers in the Seattle office. Which two actions should you perform?()

  • A、Disable all unnecessary services on each DHCP server
  • B、Modify the discretionary access control lists (DACLs) in Active Directory so that only members of the Enterprise Admins security group can authorize additional DHCP servers
  • C、Use an IPSec policy that allows only the packets necessary for DHCP and domain membership for each DHCP server
  • D、Install a digital certificate for SSL on each DHCP server

正确答案:A,C

第10题:

You are developing a Windows Forms Application by using the .NET Framework 3.5.You plan to design a composite custom control for the application. You include a ListBox control has a property that provides the item count of  the ListBox control. You need to ensure that the property cannot be accessed at design time. Which attribute should you use?()

  • A、[Bindable(false)]
  • B、[DesignOnly(false)]
  • C、[EditorBrowsable(EditorBrowsableState.Never)]
  • D、[Browsable(false)]

正确答案:D

更多相关问题