Encrypt customer information when it is stored and when it is being transmitted
Require encrypted connections to the public Web site, which is hosted on the Web server on the perimeter network
Encrypt all marketing information on file servers and client computers
Require encrypted connections to all file servers
第1题:
You need to recommend a solution for managing the address information of the user accounts. The solution must meet the company’s security requirements. What should you include in the recommendation?()
第2题:
You need to design security changes that provide maximum protection for customer data and courier assignments.What should you do?()
第3题:
You need to design a remote administration solution for servers on the internal network. Your solution must meet business and security requirements. What should you do?()
第4题:
You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()
第5题:
You need to design access to e-mail by Internet users. What should you do?()
第6题:
Use error reporting on all servers in the development department to report errors for a custom application
Configure all servers in the development department so that they do not require the CTRL+ALT+DELTE keys to pressed in order to log on interactively to the server
Create a Group Policy object (GPO) and link it to the development department’s Servers OU. Configure the GPO with an interactive logon policy to display a message for users who attempt to log on
Configure the screen saver on all servers in the development department to require a password
第7题:
Configure front-end servers to use HTTP to communicate with back-end servers
Configure the internal firewall to allow IPSec traffic between front-end and back-end Exchange servers
Require all users to encrypt all outbound e-mail messages
Issue digital certificates to all remote users. Require the certificates to be used when authenticating to Outlook Web Access
第8题:
Active Directory delegation
Authorization Manager
built-in security groups
user rights assignments
第9题:
Configure the mail server to disallow SMTP relaying
Instruct customers to obtain digital certificates from a trusted commercial authority (CA), and digitally sign all order e-mail messages. Reject unsigned order e-mail messages
Provide customers with a public encryption key, and instruct them to encrypt all order e-mail messages. Reject unencrypted e-mail messages
Implement an e-mail filtering solution, and add customer e-mail addresses to the list of allowed addresses. Reject e-mail messages from other addresses
第10题:
managed folder mailbox policies
multiple OWA virtual directories
OWA segmentation
WebReady Document Viewing
第11题:
default VLAN information for all unused switch ports
802.1x configuration parameters
number of IP subnets needed
IP routing protocol information
第12题:
Publish the data in the database as an XML Web service by using the FOR XML AUTO clause.
Create a table to store the banking information for each customer. Create a trigger that fires when data is inserted into the table that joins with the data coming from the Web service.
Create a Transact-SQL stored procedure that uses a temporary table to store the banking information for each customer. Update the table with the values from the Web service.
Have a developer in your company create an assembly that calls the remote Web service. Create aCLR function by using the assembly. Call the CLR function and combine the results with banking information in the database.
第13题:
You need to design a method to address the chief information officer’s security concerns. What should you do?()
第14题:
You have an Exchange Server 2010 organization. Your companys security policy states that users must not be able to encrypt e-mail messages by usingOutlook Web App (OWA). You need to recommend a client access solution that meets the requirements of the security policy. What should you include in the solution?()
第15题:
You need to design a method to modify the current e-mail ordering system. Which will be used until Fourth Coffee deploys the Web-based ordering application. Your solution must address business concerns and improve security. What should you do?()
第16题:
You need to design a security solution for WEB1. Your solution must address the chief information officer’s concerns. What should you do?()
第17题:
You need to design a method to configure the servers in the development department to meet the requirements of the chief information officer. What should you do?()
第18题:
Enable Web distributed Authoring and Versioning (WebDAV) components on WEB1
Install and configure the URLScan ISAPI filter on WEB1
Install a computer certificate on WEB1, and enable the Server (Request Security) IPSec policy on WEB1
Configure the Web site redirection option on the properties of WEB1 in the Internet Service Manager console
第19题:
Encrypt customer information when it is stored and when it is being transmitted
Require encrypted connections to the public Web site, which is hosted on the Web server on the perimeter network
Encrypt all marketing information on file servers and client computers
Require encrypted connections to all file servers
第20题:
Publish the data in the database as an XML Web service by using the FOR XML AUTO clause.
Create a table to store the banking information for each customer. Create a trigger that fires when data is inserted into the table that joins with the data coming from the Web service.
Create a Transact-SQL stored procedure that uses a temporary table to store the banking information for each customer. Update the table with the values from the Web service.
Have a developer in TestKing.com create an assembly that calls the remote Web service.Create a CLR function by using the assembly. Call the CLR function and combine the results with banking information in the database.
第21题:
Group Policy is preventing the compression of encrypted files.
The file is stored on a FAT32 partition.
Only members of the Administrators and the Power Users groups can compress and encrypt files.
Encrypted files cannot be compressed.
第22题:
Require client computers to connect to the marketing application by using a VPN connection
Use IPSec to encrypt communications between the servers in the New York and Atlanta offices
Require the high security setting on Terminal Services connections to the marketing application
Configure all marketing application Web pages to require SSL
第23题:
Configure Windows Management Instrumentation (WMI) filtering options in the Default Domain Policy GPO
Use the gpresult command
Use Mbsacli.exe
Configure software restriction policy options in the Default Domain Policy GPO
第24题:
Create a separate domain for courier authentication
Implement smart card authentication for business office users and couriers, upgrading client operating systems as needed. Modify the Web kiosks to require smart card presence for continued access
Modify the Default Domain Policy Group Policy object (GPO) so that couriers must use complex user account passwords. Require all couriers to change their passwords the next time they log on to the Web application
Use Encrypting File System (EFS) to encrypt all files that contain customer data