单选题You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()A Encrypt customer information when it is stored and when it is being transmittedB Require encrypte

题目
单选题
You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()
A

Encrypt customer information when it is stored and when it is being transmitted

B

Require encrypted connections to the public Web site, which is hosted on the Web server on the perimeter network

C

Encrypt all marketing information on file servers and client computers

D

Require encrypted connections to all file servers


相似考题

2.  You work with a SQL Server 2005 database that provides banking information for customers. You want customers to see banking reports that combine data that is retrieved from the database with real-time investment information that comes from a Web service provided by a third party. The investment information must be current when the reports are executed. You need to create the appropriate objects that support the reports.  What should you do?()A、 Publish the data in the database as an XML Web service by using the FOR XML AUTO clause. B、 Create a table to store the banking information for each customer. Create a trigger that fires when data is inserted into the table that joins with the data coming from the Web service. C、 Create a Transact-SQL stored procedure that uses a temporary table to store the banking information for each customer. Update the table with the values from the Web service. D、 Have a developer in your company create an assembly that calls the remote Web service. Create aCLR function by using the assembly. Call the CLR function and combine the results with banking information in the database.

更多“单选题You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()A Encrypt customer information when it is stored and when it is being transmittedB Require encrypte”相关问题
  • 第1题:

    You need to recommend a solution for managing the address information of the user accounts. The solution must meet the company’s security requirements. What should you include in the recommendation?()

    • A、Active Directory delegation
    • B、Authorization Manager
    • C、built-in security groups
    • D、user rights assignments

    正确答案:A

  • 第2题:

    You need to design security changes that provide maximum protection for customer data and courier assignments.What should you do?()

    • A、Create a separate domain for courier authentication
    • B、Implement smart card authentication for business office users and couriers, upgrading client operating systems as needed. Modify the Web kiosks to require smart card presence for continued access
    • C、Modify the Default Domain Policy Group Policy object (GPO) so that couriers must use complex user account passwords. Require all couriers to change their passwords the next time they log on to the Web application
    • D、Use Encrypting File System (EFS) to encrypt all files that contain customer data

    正确答案:B

  • 第3题:

    You need to design a remote administration solution for servers on the internal network. Your solution must meet business and security requirements. What should you do?()

    • A、Permit administrators to use an HTTP interface to manage servers remotely
    • B、Permit only administrators to connect to the servers’ Telnet service
    • C、Permit administrators to manage the servers by using Microsoft NetMeeting
    • D、Require administrators to use Remote Desktop for Administration connections to manage the servers

    正确答案:B

  • 第4题:

    You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()

    • A、Encrypt customer information when it is stored and when it is being transmitted
    • B、Require encrypted connections to the public Web site, which is hosted on the Web server on the perimeter network
    • C、Encrypt all marketing information on file servers and client computers
    • D、Require encrypted connections to all file servers

    正确答案:A

  • 第5题:

    You need to design access to e-mail by Internet users. What should you do?()

    • A、Configure front-end servers to use HTTP to communicate with back-end servers
    • B、Configure the internal firewall to allow IPSec traffic between front-end and back-end Exchange servers
    • C、Require all users to encrypt all outbound e-mail messages
    • D、Issue digital certificates to all remote users. Require the certificates to be used when authenticating to Outlook Web Access

    正确答案:B

  • 第6题:

    单选题
    You need to design a method to configure the servers in the development department to meet the requirements of the chief information officer. What should you do?()
    A

    Use error reporting on all servers in the development department to report errors for a custom application

    B

    Configure all servers in the development department so that they do not require the CTRL+ALT+DELTE keys to pressed in order to log on interactively to the server

    C

    Create a Group Policy object (GPO) and link it to the development department’s Servers OU. Configure the GPO with an interactive logon policy to display a message for users who attempt to log on

    D

    Configure the screen saver on all servers in the development department to require a password


    正确答案: B
    解析: 暂无解析

  • 第7题:

    单选题
    You need to design access to e-mail by Internet users. What should you do?()
    A

    Configure front-end servers to use HTTP to communicate with back-end servers

    B

    Configure the internal firewall to allow IPSec traffic between front-end and back-end Exchange servers

    C

    Require all users to encrypt all outbound e-mail messages

    D

    Issue digital certificates to all remote users. Require the certificates to be used when authenticating to Outlook Web Access


    正确答案: B
    解析: 暂无解析

  • 第8题:

    单选题
    You need to recommend a solution for managing the address information of the user accounts. The solution must meet the company’s security requirements. What should you include in the recommendation?()
    A

    Active Directory delegation

    B

    Authorization Manager

    C

    built-in security groups

    D

    user rights assignments


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    You need to design a method to modify the current e-mail ordering system. Which will be used until Fourth Coffee deploys the Web-based ordering application. Your solution must address business concerns and improve security. What should you do?()
    A

    Configure the mail server to disallow SMTP relaying

    B

    Instruct customers to obtain digital certificates from a trusted commercial authority (CA), and digitally sign all order e-mail messages. Reject unsigned order e-mail messages

    C

    Provide customers with a public encryption key, and instruct them to encrypt all order e-mail messages. Reject unencrypted e-mail messages

    D

    Implement an e-mail filtering solution, and add customer e-mail addresses to the list of allowed addresses. Reject e-mail messages from other addresses


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    You have an Exchange Server 2010 organization.  Your companys security policy states that users must not be able to encrypt e-mail messages by usingOutlook Web App (OWA).  You need to recommend a client access solution that meets the requirements of the security policy.  What should you include in the solution?()
    A

    managed folder mailbox policies

    B

    multiple OWA virtual directories

    C

    OWA segmentation

    D

    WebReady Document Viewing


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    What network information do you need when you plan to implement a VLAN-based solution?()
    A

    default VLAN information for all unused switch ports

    B

    802.1x configuration parameters 

    C

    number of IP subnets needed

    D

    IP routing protocol information


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    You work with a SQL Server 2005 database that provides banking information for customers. You want customers to see banking reports that combine data that is retrieved from the database with real-time investment information that comes from a Web service provided by a third party. The investment information must be current when the reports are executed. You need to create the appropriate objects that support the reports.  What should you do?()
    A

     Publish the data in the database as an XML Web service by using the FOR XML AUTO clause. 

    B

     Create a table to store the banking information for each customer. Create a trigger that fires when data is inserted into the table that joins with the data coming from the Web service. 

    C

     Create a Transact-SQL stored procedure that uses a temporary table to store the banking information for each customer. Update the table with the values from the Web service. 

    D

     Have a developer in your company create an assembly that calls the remote Web service. Create aCLR function by using the assembly. Call the CLR function and combine the results with banking information in the database.


    正确答案: A
    解析: 暂无解析

  • 第13题:

    You need to design a method to address the chief information officer’s security concerns. What should you do?()

    • A、Configure Windows Management Instrumentation (WMI) filtering options in the Default Domain Policy GPO
    • B、Use the gpresult command
    • C、Use Mbsacli.exe
    • D、Configure software restriction policy options in the Default Domain Policy GPO

    正确答案:C

  • 第14题:

    You have an Exchange Server 2010 organization.  Your companys security policy states that users must not be able to encrypt e-mail messages by usingOutlook Web App (OWA).  You need to recommend a client access solution that meets the requirements of the security policy.  What should you include in the solution?()

    • A、managed folder mailbox policies
    • B、multiple OWA virtual directories
    • C、OWA segmentation
    • D、WebReady Document Viewing

    正确答案:C

  • 第15题:

    You need to design a method to modify the current e-mail ordering system. Which will be used until Fourth Coffee deploys the Web-based ordering application. Your solution must address business concerns and improve security. What should you do?()

    • A、Configure the mail server to disallow SMTP relaying
    • B、Instruct customers to obtain digital certificates from a trusted commercial authority (CA), and digitally sign all order e-mail messages. Reject unsigned order e-mail messages
    • C、Provide customers with a public encryption key, and instruct them to encrypt all order e-mail messages. Reject unencrypted e-mail messages
    • D、Implement an e-mail filtering solution, and add customer e-mail addresses to the list of allowed addresses. Reject e-mail messages from other addresses

    正确答案:B

  • 第16题:

    You need to design a security solution for WEB1. Your solution must address the chief information officer’s concerns. What should you do?()

    • A、Enable Web distributed Authoring and Versioning (WebDAV) components on WEB1
    • B、Install and configure the URLScan ISAPI filter on WEB1
    • C、Install a computer certificate on WEB1, and enable the Server (Request Security) IPSec policy on WEB1
    • D、Configure the Web site redirection option on the properties of WEB1 in the Internet Service Manager console

    正确答案:B

  • 第17题:

    You need to design a method to configure the servers in the development department to meet the requirements of the chief information officer. What should you do?()

    • A、Use error reporting on all servers in the development department to report errors for a custom application
    • B、Configure all servers in the development department so that they do not require the CTRL+ALT+DELTE keys to pressed in order to log on interactively to the server
    • C、Create a Group Policy object (GPO) and link it to the development department’s Servers OU. Configure the GPO with an interactive logon policy to display a message for users who attempt to log on
    • D、Configure the screen saver on all servers in the development department to require a password

    正确答案:C

  • 第18题:

    单选题
    You need to design a security solution for WEB1. Your solution must address the chief information officer’s concerns. What should you do?()
    A

    Enable Web distributed Authoring and Versioning (WebDAV) components on WEB1

    B

    Install and configure the URLScan ISAPI filter on WEB1

    C

    Install a computer certificate on WEB1, and enable the Server (Request Security) IPSec policy on WEB1

    D

    Configure the Web site redirection option on the properties of WEB1 in the Internet Service Manager console


    正确答案: A
    解析: 暂无解析

  • 第19题:

    单选题
    You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()
    A

    Encrypt customer information when it is stored and when it is being transmitted

    B

    Require encrypted connections to the public Web site, which is hosted on the Web server on the perimeter network

    C

    Encrypt all marketing information on file servers and client computers

    D

    Require encrypted connections to all file servers


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    You work with a SQL Server 2005 database that provides banking information for customers. You want customers to see banking reports that combine data that is retrieved from the database with real-time investment information that comes from a Web service provided by a third party. The investment information must be current when the reports are executed. You need to create the appropriate objects that support the reports. What should you do?()
    A

    Publish the data in the database as an XML Web service by using the FOR XML AUTO clause.

    B

    Create a table to store the banking information for each customer. Create a trigger that fires when data is inserted into the table that joins with the data coming from the Web service.

    C

    Create a Transact-SQL stored procedure that uses a temporary table to store the banking information for each customer. Update the table with the values from the Web service.

    D

    Have a developer in TestKing.com create an assembly that calls the remote Web service.Create a CLR function by using the assembly. Call the CLR function and combine the results with banking information in the database.


    正确答案: C
    解析: 暂无解析

  • 第21题:

    单选题
    Your Windows 2000 Professionally computer belongs to the contoso.com domain. You need to encrypt a compressed file named C:/data. You successfully encrypt the file but discover that it is no longer compressed.   What is the most likely cause of this problem?()
    A

    Group Policy is preventing the compression of encrypted files.

    B

    The file is stored on a FAT32 partition.

    C

    Only members of the Administrators and the Power Users groups can compress and encrypt files.

    D

    Encrypted files cannot be compressed.


    正确答案: D
    解析: A compressed file cannot be encrypted, and an encrypted file cannot be compressed. If you encrypt a compressed file, the file will first be uncompressed and then encrypted. It will no longer be compressed and neither will you be able to compress it once it has been encrypted.

  • 第22题:

    单选题
    You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()
    A

    Require client computers to connect to the marketing application by using a VPN connection

    B

    Use IPSec to encrypt communications between the servers in the New York and Atlanta offices

    C

    Require the high security setting on Terminal Services connections to the marketing application

    D

    Configure all marketing application Web pages to require SSL


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    You need to design a method to address the chief information officer’s security concerns. What should you do?()
    A

    Configure Windows Management Instrumentation (WMI) filtering options in the Default Domain Policy GPO

    B

    Use the gpresult command

    C

    Use Mbsacli.exe

    D

    Configure software restriction policy options in the Default Domain Policy GPO


    正确答案: C
    解析: 暂无解析

  • 第24题:

    单选题
    You need to design security changes that provide maximum protection for customer data and courier assignments.What should you do?()
    A

    Create a separate domain for courier authentication

    B

    Implement smart card authentication for business office users and couriers, upgrading client operating systems as needed. Modify the Web kiosks to require smart card presence for continued access

    C

    Modify the Default Domain Policy Group Policy object (GPO) so that couriers must use complex user account passwords. Require all couriers to change their passwords the next time they log on to the Web application

    D

    Use Encrypting File System (EFS) to encrypt all files that contain customer data


    正确答案: D
    解析: 暂无解析