单选题You need to define an authentication system for the main office database administrators. The setup should require the minimum amount of administrative effort. The authentication environment must fulfill the company’s security requirements.What should y

题目
单选题
You need to define an authentication system for the main office database administrators. The setup should require the minimum amount of administrative effort. The authentication environment must fulfill the company’s security requirements.What should you do?()
A

Create a SQL Server login with Windows Authentication for each main office database administrator.Add all of these logins to the db_owner role in each database.

B

Create a SQL Server login with SQL Server Authentication for each main office database administrator.Add all of these logins to the sysadmin role.

C

Create a Windows global group named DBAdmins. Add each main office database administrator’s Windows user account to the Windows DBAdmins group.Create a SQL Server login with Windows Authentication for the group.Add the group to the serveradmin fixed server role.

D

Add each main office database administrator’s Windows user account to the Windows SQLManagersgroup.


相似考题

1. Company.com network consists of a single Active Directory domain named  Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Microsoft Office Outlook 2007 to connect to their mailboxes.RPC over HTTP and Auto discover are configured on Microsoft Office Outlook 2007. A new Company.com security policy requires that the employees connected to the domain does not need authentication when using Outlook Anywhere.However, those not connected t the domain needs to be authentication when using Outlook Anywhere.The employees need to comply with the new Company.com security policy.  What should you do?()A、You should consider using Basic authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.B、You should consider using NTLM authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.C、You should consider using NTLM authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.D、You should consider using Basic authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.

2. You are a help desk technician for your company. Susan is an executive. Because Susan travels frequently, she uses a Windows XP Professional portable computer that has a smart card reader.  Susan asks you to configure her computer so that she can dial in to the company network when she is out of the office. Company security policy states that dial-in users must use a smart card when they connect to the network, and that the users must use the strongest form of data encryption possible. Company security policy also states that client computers must disconnect if the Routing and Remote Access server does not support both smart card authentication and the strongest possible authentication. You need to configure the dial-up connection properties on Susan’s computer to dial in to the company network. Your solution must ensure that company security policies are enforced.  Which three actions should you perform?() A、Select the Advanced (custom settings) security option.B、Select the Require data encryption check box. C、Select the Typical (recommended settings) security option. D、Select the Use smart card item from the Validate my identity as follows list.E、Select the Maximum strength encryption item from the Data encryption list.F、Select the Extensible Authentication Protocol (EAP) option, and select Smart Card or other Certificate from the EAP list.

参考答案和解析
正确答案: A
解析: 暂无解析
更多“单选题You need to define an authentication system for the main office database administrators. The setup should require the minimum amount of administrative effort. The authentication environment must fulfill the company’s security requirements.What should y”相关问题
  • 第1题:

    You have an Exchange 2010 organization.  Your companys security policy states that all connections to Outlook Web App (OWA) must use smartcard authentication.  You need to recommend a solution to meet the security policy requirements.  Which two possible ways to achieve this goal should you recommend?()

    • A、Require certificate-based authentication for all Internet-facing Client Access servers.
    • B、Require Windows Integrated Authentication for all Internet-facing Client Access servers.
    • C、Deploy an Edge Transport server, and then disable Windows Integrated Authentication.
    • D、Deploy a server that runs Microsoft Internet Security and Acceleration (ISA) Server, and then enable Kerberos constrained delegation.

    正确答案:A,D

  • 第2题:

    You are designing an authentication solution to meet the security needs of the network administrators. You install an enterprise certification authority (CA). Which three additional actions should you take?()

    • A、Enroll each administrative account for a smart card authentication certificate.
    • B、Configure autoenrollment for computer authentication certificates. 
    • C、Install a smart card reader on each server computer.  
    • D、Install a smart card reader on each network administrator’s computer.  
    • E、Configure each administrative account to require a smart card for interactive logon.
    • F、Configure the Default Domain Policy GPO to require smart cards for interactive login.

    正确答案:A,D,E

  • 第3题:

    You need to recommend a solution for managing App1. The solution must require the minimum  amount of administrative effort.What should you include in the recommendation?()

    • A、Group Policy Administrative Templates
    • B、Group Policy Preferences
    • C、Group Policy Software Settings
    • D、Windows Remote Management (WinRM)

    正确答案:B

  • 第4题:

    You need to recommend a solution for starting the servers in the San Francisco office from Windows Recovery Environment (Windows RE). The solution must meet the company’s security requirements.   What should you include in the recommendation?()

    • A、an iSCSI initiator
    • B、the Multipath I/O feature
    • C、Wake On LAN
    • D、Windows Deployment Services (WDS)

    正确答案:D

  • 第5题:

    You need to recommend a security strategy for WebApp2 that meets the company’s applicaton  requirements.What should you include in the recommendation?()

    • A、Basic authentication and connection security rules
    • B、Basic authentication and SSL
    • C、Digest authentication and connection security rules
    • D、Digest authentication and SSL

    正确答案:B

  • 第6题:

    Your company has a main office and 15 branch offices. The company has a single Active Directory domain. All servers run Windows Server 2008 R2.You need to ensure that the VPN connections between the main office and the branch offices meet the following requirements: ˆAll data must be encrypted by using end-to-end encryption. ˆ The VPN connection must use computer-level authentication. ˆ User names and passwords cannot be used for authentication. What should you do?()

    • A、Configure an IPsec connection to use tunnel mode and preshared key authentication.
    • B、Configure a PPTP connection to use version 2 of the MS-CHAP v2 authentication.
    • C、Configure a L2TP/IPsec connection to use the EAP-TLS authentication.
    • D、Configure a L2TP/IPsec connection to use version 2 of the MS-CHAP v2 authentication.

    正确答案:C

  • 第7题:

    单选题
    Your company has a main office and 15 branch offices. The company has a single Active Directory domain. All servers run Windows Server 2008 R2.You need to ensure that the VPN connections between the main office and the branch offices meet the following requirements: ˆAll data must be encrypted by using end-to-end encryption. ˆ The VPN connection must use computer-level authentication. ˆ User names and passwords cannot be used for authentication. What should you do?()
    A

    Configure an IPsec connection to use tunnel mode and preshared key authentication.

    B

    Configure a PPTP connection to use version 2 of the MS-CHAP v2 authentication.

    C

    Configure a L2TP/IPsec connection to use the EAP-TLS authentication.

    D

    Configure a L2TP/IPsec connection to use version 2 of the MS-CHAP v2 authentication.


    正确答案: D
    解析: 暂无解析

  • 第8题:

    单选题
    You need to recommend a solution for managing the address information of the user accounts. The solution must meet the company’s security requirements. What should you include in the recommendation?()
    A

    Active Directory delegation

    B

    Authorization Manager

    C

    built-in security groups

    D

    user rights assignments


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    You need to recommend a solution for managing App1. The solution must require the minimum  amount of administrative effort.What should you include in the recommendation?()
    A

    Group Policy Administrative Templates

    B

    Group Policy Preferences

    C

    Group Policy Software Settings

    D

    Windows Remote Management (WinRM)


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    You are a network administrator for your company. The company has a main office and one branch office. The network consists of a single Active Directory domain. All servers run Windows Server 2003.   The company needs to connect the main office network and the branch office network by using Routing and Remote Access servers at each office. The networks will be connected by a VPN connection over the Internet.   The company’s written security policy includes the following requirements for VPN connections over the Internet:  All data must be encrypted with end-to-end encryption.  VPN connection authentication must be at the computer level.   Credential information must not be transmitted over the Internet as part of the authentication process.   You need to configure security for VPN connection between the main office and the branch office. You need to comply with the written security policy.   What should you do?  ()
    A

     Use a PPTP connection with EAP-TLS authentication.

    B

     Use a PPTP connection with MS-CHAP v2 authentication.

    C

     Use an L2TP connection with EAP-TLS authentication.

    D

     Use an L2TP connection with MS-CHAP v2 authentication.


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    Your company has a main office and 15 branch offices. The company has a single Active Directory domain. All servers run Windows Server 2008. You need to ensure that the VPN connections between the main office and the branch offices meet the following requirements:All data must be encrypted by using end-to-end encryption. The VPN connection must use computer-level authentication User names and passwords cannot be used for authentication. What should you do?()
    A

     Configure an IPsec connection to use tunnel mode and preshared key authentication.

    B

     Configure a PPTP connection to use version 2 of the MS-CHAP v2 authentication.

    C

     Configure a L2TP/IPsec connection to use the EAP-TLS authentication

    D

     Configure a L2TP/IPsec connection to use version 2 of the MS-CHAP v2 authentication.


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    You need to recommend a security strategy for WebApp2 that meets the company’s applicaton  requirements.What should you include in the recommendation?()
    A

    Basic authentication and connection security rules

    B

    Basic authentication and SSL

    C

    Digest authentication and connection security rules

    D

    Digest authentication and SSL


    正确答案: B
    解析: 暂无解析

  • 第13题:

    You are a network administrator for your company. The company has a main office and one branch office. The network consists of a single Active Directory domain. All servers run Windows Server 2003.   The company needs to connect the main office network and the branch office network by using Routing and Remote Access servers at each office. The networks will be connected by a VPN connection over the Internet.   The company’s written security policy includes the following requirements for VPN connections over the Internet:  All data must be encrypted with end-to-end encryption.  VPN connection authentication must be at the computer level.   Credential information must not be transmitted over the Internet as part of the authentication process.   You need to configure security for VPN connection between the main office and the branch office. You need to comply with the written security policy.   What should you do?  ()

    • A、 Use a PPTP connection with EAP-TLS authentication.
    • B、 Use a PPTP connection with MS-CHAP v2 authentication.
    • C、 Use an L2TP connection with EAP-TLS authentication.
    • D、 Use an L2TP connection with MS-CHAP v2 authentication.

    正确答案:C

  • 第14题:

    You need to define an authentication system for the main office database administrators. The setup should require the minimum amount of administrative effort. The authentication environment must fulfill the company’s security requirements.What should you do?()

    • A、Create a SQL Server login with Windows Authentication for each main office database administrator.Add all of these logins to the db_owner role in each database.
    • B、Create a SQL Server login with SQL Server Authentication for each main office database administrator.Add all of these logins to the sysadmin role.
    • C、Create a Windows global group named DBAdmins. Add each main office database administrator’s Windows user account to the Windows DBAdmins group.Create a SQL Server login with Windows Authentication for the group.Add the group to the serveradmin fixed server role.
    • D、Add each main office database administrator’s Windows user account to the Windows SQLManagersgroup.

    正确答案:D

  • 第15题:

    You need to recommend a solution for managing administrative rights for the branch office client computers. The solution must meet the companys technical requirements.What should you recommend configuring?()

    • A、Account Policies by using GPOs
    • B、Local Users and Groups by using Group Policy preferences
    • C、Restricted Groups by using GPOs
    • D、Security Options by using Group Policy preferences

    正确答案:B

  • 第16题:

    You need to recommend a management solution for Server1 that meets the company's security  requirements.   What should you include in the recommendation?()

    • A、access-based enumeration (ABE)
    • B、Authentication Mechanism Assurance
    • C、Authorization Manager
    • D、Hyper-V Manager

    正确答案:C

  • 第17题:

    You have a Windows 7 computer that is a member of a workgroup. You need to prevent members of a localgroup from starting a specific application. You must achieve this goal by using the minimum amount ofadministrative effort.  What should you create?()

    • A、administrative template.
    • B、application control policy.
    • C、IPSec policy.
    • D、software restriction policy.

    正确答案:B

  • 第18题:

    You need to recommend a solution for the USB storage devices on the client computers.The solution must meet the company’s security requirements. What should you include in the recommendation?()

    • A、Encrypted File System (EFS)
    • B、the AppLocker Group Policy settings
    • C、the Enhanced Storage Access settings
    • D、Windows BitLocker Drive Encryption (BitLocker)

    正确答案:C

  • 第19题:

    单选题
    You are the network administrator for your company. The network consists of a single Active Directory domain. The company has a main office in San Francisco and branch offices in Paris and Bogota. Each branch office contains a Windows Server 2003 domain controller. All client computers run Windows XP Professional.   Users in the Bogota office report intermittent problems authenticating to the domain. You suspect that a specific client computer is causing the problem.   You need to capture the authentication event details on the domain controller in the Bogota office so that you can find out the IP address of the client computer that is the source of the problem.   What should you do?  ()
    A

     Configure System Monitor to monitor the authentication events.

    B

     Configure Performance Logs and Alerts with a counter log to record the authentication events.

    C

     Configure Network Monitor to record the authentication events.

    D

     Configure Performance Logs and Alerts with an alert to trigger on authentication events.


    正确答案: B
    解析: 暂无解析

  • 第20题:

    单选题
    You need to recommend an administrative solution for the local support technicians in the satellite offices. The solution must meet the companys security requirements.What should you include in the recommendation?()
    A

    Active Directory delegation

    B

    Administrator Role Separation

    C

    managed service accounts

    D

    Restricted Groups


    正确答案: A
    解析: 暂无解析

  • 第21题:

    单选题
    You need to recommend a solution for the USB storage devices on the client computers.The solution must meet the company’s security requirements. What should you include in the recommendation?()
    A

    Encrypted File System (EFS)

    B

    the AppLocker Group Policy settings

    C

    the Enhanced Storage Access settings

    D

    Windows BitLocker Drive Encryption (BitLocker)


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    You need to recommend a solution for starting the servers in the San Francisco office from Windows Recovery Environment (Windows RE). The solution must meet the company’s security requirements.   What should you include in the recommendation?()
    A

    an iSCSI initiator

    B

    the Multipath I/O feature

    C

    Wake On LAN

    D

    Windows Deployment Services (WDS)


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    You need to define an authentication system for the main office database administrators. The setup should require the minimum amount of administrative effort. The authentication environment must fulfill the company’s security requirements.What should you do?()
    A

    Create a SQL Server login with Windows Authentication for each main office database administrator.Add all of these logins to the db_owner role in each database.

    B

    Create a SQL Server login with SQL Server Authentication for each main office database administrator.Add all of these logins to the sysadmin role.

    C

    Create a Windows global group named DBAdmins. Add each main office database administrator’s Windows user account to the Windows DBAdmins group.Create a SQL Server login with Windows Authentication for the group.Add the group to the serveradmin fixed server role.

    D

    Add each main office database administrator’s Windows user account to the Windows SQLManagersgroup.


    正确答案: C
    解析: 暂无解析

  • 第24题:

    单选题
    Company.com network consists of a single Active Directory domain named  Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Microsoft Office Outlook 2007 to connect to their mailboxes.RPC over HTTP and Auto discover are configured on Microsoft Office Outlook 2007. A new Company.com security policy requires that the employees connected to the domain does not need authentication when using Outlook Anywhere.However, those not connected t the domain needs to be authentication when using Outlook Anywhere.The employees need to comply with the new Company.com security policy.  What should you do?()
    A

    You should consider using Basic authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.

    B

    You should consider using NTLM authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.

    C

    You should consider using NTLM authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.

    D

    You should consider using Basic authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.


    正确答案: C
    解析: 暂无解析