Copy the files to a network share on an NTFS volume. Do nothing further.
Copy the files to a network share on a FAT32 volume. Do nothing further.
Copy the files to a floppy disk that has been formatted by using Win2000 Professional. Do nothing further.
Place the files in an encrypted folder. Then copy the folder to a floppy disk.
第1题:
You are the network administrator for The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. All confidential company files are stored on a file server named TestKing1. The written company security states that all confidential data must be stored and transmitted in a secure manner. To comply with the security policy, you enable Encrypting File System (EFS) on the confidential files. You also add EFS certificates to the data decryption field (DDF) of the confidential files for the users who need to access them. While performing network monitoring, you notice that the confidential files that are stored on TestKing1 are being transmitted over the network without encryption. You must ensure that encryption is always used when the confidential files on TestKing1 are stored and transmitted over the network. What are two possible ways to accomplish this goal? ()(Each correct answer presents a complete solution. Choose two)
第2题:
Your company has a single active directory domain. All servers run windows server 2008. The company network has 10 servers that perform as web servers. All confidential files are located on a server named FSS1. The company security policy states that all confidential data must be transmitted in the most secure manner. When you monitor the network, you notice that the confidential files are stored on FSS1 server are being transmitted over the network without encryption. You need to ensure that encryption is always used when the confidential files on the FSS1 server are transmitted over the network. What are two possible ways to achieve this goal? ()
第3题:
You are a help desk technician for your company. All users have Windows XP Professional computers. Ten users run a custom application named Finance on their computers. Finance stores user passwords in a file named Passwords.ini. By default, the Passwords.ini file is stored in a folder named C:/Winnt/App1. The location and name of the file can be changed by an administrator. Each Passwords.ini file is unique. Each computer contains a single logical drive, which is drive C and is formatted as NTFS. In order to comply with a new company security policy, you need to ensure that the Passwords.ini files are encrypted. What should you do?()
第4题:
Your computer is part of a workgroup. You share files with other users on the network. You configure exceptions in Microsoft Windows Firewall to allow file sharing. Users report that they are unable to connect to your computer. You need to ensure that other users are able to access only the shared files. What should you do? ()
第5题:
You have a combined Windows 2000 and Windows 98 network that contain sensitive data. You want to utilize as many new Windows 2000 security features as possible. You want to customize a security policy on each computer to ensure that data is kept confidential and secured. Allcomputers must still be able to communicate with each other over the network. What should you do?()
第6题:
You are the administrator of your company’s network. A user named Peter runs Windows 2000 Professional on his portable computer. Peter wants to be able to work at home on files that were created in the office on the company network. Prior to logging off the network and leaving the office, Peter enables offline files. Peter wants to automatically download all the opened files to his computer and he should not manually define the offline files. What setting you will do in caching option? ()
第7题:
Deactivate all LM and NTLM authentication methods on the FSS1 server
Use IIS to publish the confidentials files. activate SSL on the ISS server, and then open the files as a web folder.
Use IPSec encryption between the FSS1 server and the computers of the users who need to access the confidential files
Use the Server Message Block (SMB) signing between the FSS1 server and the computers of the users who want to access the confidential files.
Activate offline files for the confidential files that are stored on the FSS1 server. In the Folder Advanced.Properties dialog box, select the Encrypt contents to secure data option.
第8题:
Copy the files to a network share on an NTFS volume. Do nothing further.
Copy the files to a network share on a FAT32 volume. Do nothing further.
Copy the files to a floppy disk that has been formatted by using Win2000 Professional. Do nothing further.
Place the files in an encrypted folder. Then copy the folder to a floppy disk.
第9题:
Use a software restriction policy to disable all unauthorized scripts.
Use an Administrative Template to ensure that Outlook and lnternet Explorer are in the Restricted Sites security zon
Use a centralized logon script to rename the Wscript.exe file on each computer to contain a nonexecutable extensio
Use a file system security policy to assign the Deny - Execute permission for the Wscript.exe file.
第10题:
Archive the private key on the server.
Apply the Hisecdc security template to the domain controllers.
Configure the certificate for automatic enrollment for the computers that store encrypted files.
Install an Enterprise Subordinate CA and issue a user certificate to users of the encrypted files.
第11题:
Anonymous
Certificate
Forms
Microsoft Windows Integrated Security
第12题:
Set the network share permissions to grant all Windows 7 users Read access for the share.
Copy the ADMX files to the central store,and then restart the GPO Editor.
Copy the ADMX files to the %systemroot%/inf folder on each Windows 7 computer,and then restart the GPO Editor
Copy the ADMX files to the %systemroot%/system32 folder on each Windows 7 computer,and then restart the GPO Editor.
第13题:
You upgrade all client computers in your network to Windows 2000 Professional. Then you apply the basicwk.inf security template to the computers. Now, none of the users can run the company’s database application. What should you do?()
第14题:
You are planning to deploy two Windows Server 2008 R2 Hyper-V servers. You need to design the storage of VHD files for maximum security. What should you do?()
第15题:
You have a server that runs Windows Server 2003 Service Pack 2 (SP2). A server application creates report files. The application saves the report files in a folder named Report. A service account is listed as the owner of all report files. You need to assign ownership of the report files to a user in a department named Audit. You must achieve this goal by using the minimum amount of administrative effort. What should you do? ()
第16题:
Your Windows 2000 Professionally computer belongs to the contoso.com domain. You need to encrypt a compressed file named C:/data. You successfully encrypt the file but discover that it is no longer compressed. What is the most likely cause of this problem?()
第17题:
You are a security administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional. The company occasionally experiences downtime because of malicious lnternet worms that arrive as Microsoft Visual Basic Scripting Edition (VBS) files. You examine several client computers and discover that VBS files are downloaded by using Microsoft Outlook,instant messaging,or peer-to-peer file sharing programs. You need to prevent users from running VBS files regardless of how they arrive on client computers. What should you do?()
第18题:
You encrypt your files to ensure the security of the files. You want to make a backup copy of the files and maintain their security settings. You have the option of backing up to either the network or floppy disk. What should you do?()
第19题:
Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.
Turn on auditing for objects in the Local Security Policy and Select 'Object Access'.
Use Windows Explorer to turn on auditing for the specific files.
Have the administrator for domains log you on as an administrator and enable auditing for a specific file.
Turn on auditing for objects in the Local Security Policy and Select 'Account Management'.
Allow only one account at a time to log on to your shared folder. Check the event viewer to see who logged on.
第20题:
Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.
Turn on auditing for objects in the Local Security Policy and Select 'Object Access'.
Use Windows Explorer to turn on auditing for the specific files.
Have the administrator for domains log you on as an administrator and enable auditing for a specific file.
Turn on auditing for objects in the Local Security Policy and Select 'Account Management'.
Allow only one account at a time to log on to your shared folder. Check the event viewer to see who logged on.
第21题:
For both the CustomerDB database and the master database, enable Transparent Database Encryption.
You should use the built-in encryption functions to encrypt the sensitive data at the cell level.
You should make the CustomerDB database accessible only through stored procedures and functions.
For the CustomerDB database, enable Transparent Database Encryption and back up the transaction log.
第22题:
Configure a static IP address.
Configure the default gateway.
Configure the DNS server address.
Add the domain to the DNS suffix on the network interface.
第23题:
Configure a static IP address
Configure the default gateway
Configure the DNS server address
Add the domain to the DNS suffix on the network interface
第24题:
At a command prompt, run Cipher.exe.
At a command prompt, run Certutil.exe.
From the local computer policy, modify the User Rights Assignment.
From User Accounts, run the Manage your file encryption certificates wizard.