Create a SQL Server login with Windows Authentication for each main office database administrator.Add all of these logins to the db_owner role in each database.
Create a SQL Server login with SQL Server Authentication for each main office database administrator.Add all of these logins to the sysadmin role.
Create a Windows global group named DBAdmins. Add each main office database administrator’s Windows user account to the Windows DBAdmins group.Create a SQL Server login with Windows Authentication for the group.Add the group to the serveradmin fixed server role.
Add each main office database administrator’s Windows user account to the Windows SQLManagersgroup.
第1题:
You have an Exchange 2010 organization. Your companys security policy states that all connections to Outlook Web App (OWA) must use smartcard authentication. You need to recommend a solution to meet the security policy requirements. Which two possible ways to achieve this goal should you recommend?()
第2题:
You are designing an authentication solution to meet the security needs of the network administrators. You install an enterprise certification authority (CA). Which three additional actions should you take?()
第3题:
You need to recommend a solution for managing App1. The solution must require the minimum amount of administrative effort.What should you include in the recommendation?()
第4题:
You need to recommend a solution for starting the servers in the San Francisco office from Windows Recovery Environment (Windows RE). The solution must meet the company’s security requirements. What should you include in the recommendation?()
第5题:
You need to recommend a security strategy for WebApp2 that meets the company’s applicaton requirements.What should you include in the recommendation?()
第6题:
Your company has a main office and 15 branch offices. The company has a single Active Directory domain. All servers run Windows Server 2008 R2.You need to ensure that the VPN connections between the main office and the branch offices meet the following requirements: ˆAll data must be encrypted by using end-to-end encryption. ˆ The VPN connection must use computer-level authentication. ˆ User names and passwords cannot be used for authentication. What should you do?()
第7题:
Configure an IPsec connection to use tunnel mode and preshared key authentication.
Configure a PPTP connection to use version 2 of the MS-CHAP v2 authentication.
Configure a L2TP/IPsec connection to use the EAP-TLS authentication.
Configure a L2TP/IPsec connection to use version 2 of the MS-CHAP v2 authentication.
第8题:
Active Directory delegation
Authorization Manager
built-in security groups
user rights assignments
第9题:
Group Policy Administrative Templates
Group Policy Preferences
Group Policy Software Settings
Windows Remote Management (WinRM)
第10题:
Use a PPTP connection with EAP-TLS authentication.
Use a PPTP connection with MS-CHAP v2 authentication.
Use an L2TP connection with EAP-TLS authentication.
Use an L2TP connection with MS-CHAP v2 authentication.
第11题:
Configure an IPsec connection to use tunnel mode and preshared key authentication.
Configure a PPTP connection to use version 2 of the MS-CHAP v2 authentication.
Configure a L2TP/IPsec connection to use the EAP-TLS authentication
Configure a L2TP/IPsec connection to use version 2 of the MS-CHAP v2 authentication.
第12题:
Basic authentication and connection security rules
Basic authentication and SSL
Digest authentication and connection security rules
Digest authentication and SSL
第13题:
You are a network administrator for your company. The company has a main office and one branch office. The network consists of a single Active Directory domain. All servers run Windows Server 2003. The company needs to connect the main office network and the branch office network by using Routing and Remote Access servers at each office. The networks will be connected by a VPN connection over the Internet. The company’s written security policy includes the following requirements for VPN connections over the Internet: All data must be encrypted with end-to-end encryption. VPN connection authentication must be at the computer level. Credential information must not be transmitted over the Internet as part of the authentication process. You need to configure security for VPN connection between the main office and the branch office. You need to comply with the written security policy. What should you do? ()
第14题:
You need to define an authentication system for the main office database administrators. The setup should require the minimum amount of administrative effort. The authentication environment must fulfill the company’s security requirements.What should you do?()
第15题:
You need to recommend a solution for managing administrative rights for the branch office client computers. The solution must meet the companys technical requirements.What should you recommend configuring?()
第16题:
You need to recommend a management solution for Server1 that meets the company's security requirements. What should you include in the recommendation?()
第17题:
You have a Windows 7 computer that is a member of a workgroup. You need to prevent members of a localgroup from starting a specific application. You must achieve this goal by using the minimum amount ofadministrative effort. What should you create?()
第18题:
You need to recommend a solution for the USB storage devices on the client computers.The solution must meet the company’s security requirements. What should you include in the recommendation?()
第19题:
Configure System Monitor to monitor the authentication events.
Configure Performance Logs and Alerts with a counter log to record the authentication events.
Configure Network Monitor to record the authentication events.
Configure Performance Logs and Alerts with an alert to trigger on authentication events.
第20题:
Active Directory delegation
Administrator Role Separation
managed service accounts
Restricted Groups
第21题:
Encrypted File System (EFS)
the AppLocker Group Policy settings
the Enhanced Storage Access settings
Windows BitLocker Drive Encryption (BitLocker)
第22题:
an iSCSI initiator
the Multipath I/O feature
Wake On LAN
Windows Deployment Services (WDS)
第23题:
Create a SQL Server login with Windows Authentication for each main office database administrator.Add all of these logins to the db_owner role in each database.
Create a SQL Server login with SQL Server Authentication for each main office database administrator.Add all of these logins to the sysadmin role.
Create a Windows global group named DBAdmins. Add each main office database administrator’s Windows user account to the Windows DBAdmins group.Create a SQL Server login with Windows Authentication for the group.Add the group to the serveradmin fixed server role.
Add each main office database administrator’s Windows user account to the Windows SQLManagersgroup.
第24题:
You should consider using Basic authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.
You should consider using NTLM authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.
You should consider using NTLM authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.
You should consider using Basic authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.