单选题Your company security policy does not allow you to connect your servers directly to the internet. You would like to utilize some of theYour company? security policy does not allow you to connect your servers directly to the internet. You would like to 

题目
单选题
Your company security policy does not allow you to connect your servers directly to the internet. You would like to utilize some of theYour company? security policy does not allow you to connect your servers directly to the internet. You would like to utilize some of the functionality in Solaris 10 to analyze your systems for available OS updates, and also download and install those updates from Sun Microsystems.  Which answer describes how to utilize this functionality to analyze your systems for available OS updates, and also download and install those updates without connecting your server directly to the internet? ()
A

A

B

B

C

C

D

D

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. You are responsible for managing the Exchange network for TestKing.com The organization contains three Exchange Server 2010 Edge Transport Servers and seven ExchangeServer 2010 Hub Transport servers. The Edge Transport server is used to transfer e-mail from your organization to the Internet. During the course of day you receive an instruction form the CIO to ensure that all clients is able to send encrypted messages to other organizations over the Internet as well asensuring that communications between the Hub Transport servers and the Edge Transport servers isencrypted. What should you do?()

  • A、Your best option would be to deploy SMTP over SSL.
  • B、Your best option would be to implement Security/Multipurpose Internet Mail Extensions (S/MINE).
  • C、Your best option would be to deploy IPsec.
  • D、Your best option would be to implement Domain Securtiy.

正确答案:B

第2题:

You are the network administrator for your company. The network consists of a single Active Directory domain. The company has an internal network and a perimeter network. The internal network is protected by a firewall. Application servers on the perimeter network are accessible from the Internet.   You are deploying 10 Windows Server 2003 computers in application server roles. The servers will be located in theperimeter network and will not be members of the domain. The servers will host only publicly available Web pages.  The network design requires that custom security settings must be applied to the application servers. These custom security settings must be automatically refreshed every day to ensure compliance with the design.   You create a custom security template named Baseline1.inf for the application servers. You need to comply with the design requirements.   What should you do?  ()

  • A、 Import Baseline1.inf into the Default Domain Policy Group Policy object (GPO).
  • B、 Create a task on each application server that runs Security and Configuration Analysis with Baseline1.inf every day.
  • C、 Create a task on each application server that runs the secedit command with Baseline1.inf every day.
  • D、 Create a startup script in the Default Domain Policy Group Policy object (GPO) that runs the secedit command with Baseline1.inf.

正确答案:C

第3题:

You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter.Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.You need to configure the wireless connection to allow your computer to discover other computers.What should you do?()

A.A

B.B

C.C

D.D


参考答案:A

第4题:

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is an internal application which uses Analysis Services and Reporting Services. You use the application on the basis of SQL Server 2008. According to the requirement of company security policy, the surface area for all the deployed components of SQL Server 2008 should be configured. You have to implement the security policy and devise a method to evaluate the security policy against other database servers. What should you do?()  

  • A、You should create policies based on the appropriate facets. Apply the policies against a server group. The server group includes the database servers that need to be configured 
  • B、You should create a Transact-SQL script based on the sp_configure stored procedure. Use a configuration server to run the script against a server group that includes the database servers that need to be configured 
  • C、You should edit the RSReportServer.config configuration file. Distribute the file to all database servers that need to be configured 
  • D、You should analyze your database servers by using the SQL Server Best Practices Analyzer (BPA). Implement the recommendations of the BPA

正确答案:A

第5题:

You are the senior systems engineer for your company. The network consists of a single Active Directory domain.  All servers run Windows Server 2003. Client computers in the sales department run Windows NT Workstation 4.0 with the Active Directory Client Extensions software installed. All other client computers run Windows XP Professional. All servers are located in an organizational unit (OU) named Servers. All client computers are located in an OU named Desktops.   Four servers contain confidential company information that is used by users in either the finance department or the research department. Users in the sales department also store files and applications on these servers. The company’s written security policy states that for auditing purposes, all network connections to these resources must require authentication at the protocol level. The written security policy also states that all network connections to these resources must be encrypted. The company budget does not allow for the purchase of any new hardware or software. The applications and data located on these servers may not be moved to any other server in the network.   You define and assign the appropriate permissions to ensure that only authorized users can access the resources on the servers.   You now need to ensure that all connections made to these servers by the users in the finance department and in the research department meet the security guidelines stated by the written security policy. You also need to ensure that all users in the sales department can continue to access their resources.   Which two actions should you take?()

  • A、 Create a new Group Policy object (GPO) and link it to the Servers OU. Enable the Secure Server (Require Security) IPSec policy in the GPO.
  • B、 Create a new Group Policy object (GPO) and link it to the Servers OU. Enable the Server (Request Security) IPSec policy in the GPO.
  • C、 Create a new Group Policy object (GPO) and link it to the Desktops OU. Enable the Client (Respond only) IPSec policy in the GPO.
  • D、 Create a new Group Policy object (GPO). Edit the GPO to enable the Registry Policy Processing option and the IP Security Policy Processing option. Copy the GPO files to the Netlogon shared folder.
  • E、 Use System Policy Editor to open the System.adm file and enable the Registry Policy Processing option and the IP Security Policy Processing option. Save the system policy as NTConfig.pol.

正确答案:B,C

第6题:

Your company uses SQL Server 2005. You are implementing a series of views that are used in ad hoc queries. The views are used to enforce your companys security policy of abstracting data.  Some of these views perform slowly. You create indexes on those views to increase performance, while still maintaining the companys security policy. One of the views returns the current date as one of the columns. The view returns the current date by using the GETDATE( ) function. This view does not allow you to create an index. You need to create an index on the view.  Which two actions should you perform?()

  • A、 Remove all deterministic function calls from within the view. 
  • B、 Remove all nondeterministic function calls from within the view. 
  • C、 Schema-bind all functions that are called from within the view. 
  • D、 Create the view and specify the WITH CHECK OPTION clause.

正确答案:B,C

第7题:

ou are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.Two of the servers on the network contain highly confidential documents. The company’s written security policy states that all network connections with these servers must be encrypted by using an IPSec policy.You place the two servers in an organizational unit (OU) named SecureServers. You configure a Group Policy object (GPO) that requires encryption for all connections. You assign the GPO to the SecureServers OU.  You need to verify that users are connecting to the two servers by using encrypted connections.   What should you do?()

  • A、Run the net view command.
  • B、Run the gpresult command.
  • C、Use the IP Security Monitor console.
  • D、Use the IPSec Policy Management console.

正确答案:C

第8题:

Your company has an Active Directory domain. All servers run Windows Server 2008 R2. Your  company runs an Enterprise Root certification authority (CA).     You need to ensure that only administrators can sign code.     Which two tasks should you perform()

  • A、Publish the code signing template.
  • B、Edit the local computer policy of the Enterprise Root CA to allow users to trust peer certificates and allow only admi
  • C、Edit the local computer policy of the Enterprise Root CA to allow only administrators to manage Trusted Publishers.
  • D、Modify the security settings on the template to allow only administrators to request code signing certificates.

正确答案:A,D

第9题:

Company.com has employed you as their Exchange administrator.The Company.com network contains Mailbox servers that are configured to run either Exchange Server 2007 or Exchange Server 2010.During the course of the week you receive an instruction from the CIO to ensure that all e-mail messages stored for more than 90 days in the Inbox folder of clients be deleted. What should you do?()

  • A、Your best option would be to create a new retention policy.
  • B、Your best option would be to create a new message classification.
  • C、Your best option would be to create new managed content settings.
  • D、Your best option would be to create a new managed custom folder.

正确答案:C

第10题:

You need to design a remote access strategy for the customer support users when they work from home. Your solution must meet security requirements. What should you do?()

  • A、Deploy an L2TP/IPsec VPN server in each call center. Configure the portable computers as L2TP VPN clients
  • B、Create IPSec tunnel mode connections between the customer support users home and the company’s Internet-facing routers
  • C、Create IP packet filters on the company’s Internet-facing routers to allow the Remote Desktop Protocol (RDP).Create IPSec filters on the terminal servers to allow only connections that use RDP
  • D、Create IP packet filters on the company’s Internet-facing routers to allow the IPSec protocols. Assign the Secure Server (Require Security) IPSec policy to the terminal servers. Assign the Client (Respond only) IPSec policy to the portable computers

正确答案:A

更多相关问题