Users can define policy to control traffic flow between which two components? ()(Choose two.)
第1题:
A. Database server
B. NTP server
C. DHCP server
D. SQLServer
E. DNS server
F. Domain name
第2题:
Which two statements are true of login classes?()
第3题:
What is the primary purpose of creating a Location Group Policy? ()
第4题:
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com policy prohibits the users from changing their password by using Outlook Web App (OWA). What should you do?()
第5题:
Network Access Protection (NAP) is configured for the corporate network.Users connect to the corporate network by using portable computers.The company policy requires confidentiality of data when the data is in transit between the portable computers and the servers.You need to ensure that users can access network resources only from computers that comply with the company policy.What should you do?()
第6题:
You have an Exchange Server 2010 organization.You need to ensure that all users in the organization can view the availability of a company projector.What should you create for the projector?()
第7题:
Database server
NTP server
DHCP server
SQLServer
DNS server
Domain name
第8题:
Create a Group Policy object (GPO) that configures the Allow .rdp files from unknown publishers policy setting in the Remote Desktop Client Connection template to Disabled. Apply the GPO to the TSUsers OU.
Create a Group Policy object (GPO) that configures the Allow .rdp files from valid publishers and users default .rdp settings policy setting in the Remote Desktop Client Connection template to Disabled. Apply the GPO to the TSUsers OU.
Create a Group Policy object (GPO) that configures the Allow .rdp files from valid publishers and users default .rdp settings policy setting in the Remote Desktop Client Connection template to Enabled. Apply the GPO to the TSAdmins OU.
Create a Group Policy object (GPO) that configures the Specify SHA1 thumbprints of certificates representing trusted .rdp publishers policy setting in the Remote Desktop Client Connection template to Enabled. Apply the GPO to the TSAdmins OU.
第9题:
Create a new Group Policy object (GPO) and link it to the Servers OU. Enable the Secure Server (Require Security) IPSec policy in the GPO.
Create a new Group Policy object (GPO) and link it to the Servers OU. Enable the Server (Request Security) IPSec policy in the GPO.
Create a new Group Policy object (GPO) and link it to the Desktops OU. Enable the Client (Respond only) IPSec policy in the GPO.
Create a new Group Policy object (GPO). Edit the GPO to enable the Registry Policy Processing option and the IP Security Policy Processing option. Copy the GPO files to the Netlogon shared folder.
Use System Policy Editor to open the System.adm file and enable the Registry Policy Processing option and the IP Security Policy Processing option. Save the system policy as NTConfig.pol.
第10题:
The endpoints can use agentless access.
Encrypted traffic flows between the endpoint and the enforcer.
Encrypted traffic flows between the endpoint and the protected resource
The endpoints can use the Odyssey Access Client.
第11题:
Define a test server group, install the patches and if successful schedule installation on production servers.
Define a test server group, schedule installation on production servers and then install all updates and patches.
Install the patches during a non-working hour.
Send an email to all company users and request the best time for installation.
第12题:
Create an IPsec Enforcement Network policy
Create an 802.1X enforcement network policy
Create a wired network (IEEE 802.3) Group Policy
Create an Extensible Authentication Portocol (EAP) Enforcement Network Policy
第13题:
When configuring a DHCP server, which of the following can the administrator define for DHCP users?()
第14题:
An administrator needs to implement a security patch policy on the network that adheres to an internal SLA. Which of the following actions BEST achieves this task?()
第15题:
You wish to enable an audit policy for all database users, except SYS, SYSTEM, and SCOTT.You issue the following statements: SQL> AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYS;SQL> AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYSTEM; SQL> AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SCOTT; For which database users is the audit policy now active?()
第16题:
You are the network administrator for TestKing.com. The network consists of a single Active Directory domain named testking.com. All network servers run Windows Server 2003, and all client computers run Windows XP Professional. A new management directive states that users can log to the domain only during business hours. Users who remain logged on after business hours must be automatically disconnected from network resources. You need to enforce this directive by using the minimum amount of administrative effort. Which two actions should you perform?() (Each correct answer presents part of the solution. Choose two)
第17题:
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com policy prohibits the users from changing their password by using Outlook Web App (OWA).However, they can use Windows to change their passwords.What should you do?()
第18题:
to associate more than one realm with an authentication server
to logically group network access devices and associate them with specific sign-in policies
to allow or prevent users from accessing resources in specific locations on the network
to define the URL that users of network access devices can use to access the Infranet Controller
第19题:
Enable the Require domain controller to unlock policy.
Set the Number of previous logons to cache policy to 0.
Remove all user and group accounts from the Log on locally user right.
Remove all user and group accounts from the Access this computer from the network user right.
第20题:
Configure the Content Filter agent.
Configure the Attachment Filter agent.
Create a managed folder mailbox policy.
Create an Outlook Web App Mailbox policy.
第21题:
Ignore
Replace users role
Terminate user session
Disable user account
第22题:
from a zone to the device itself
from a zone to the same zone
from a zone to a different zone
from one interface to another interface
第23题:
Configure File signature verification to block driver installation, and set driver signing as a system default.
Remove all users from the Power User group.
Create a Local Computer Policy to prevent users from installing drivers.
Create a Local Computer Policy to enable Windows File Protection.