IPSec and Kerberos Authentication
Secure By Default and AIX Security Expert
Trusted Execution and Role Based Access Control
First Failure Data Capture and Storage Protection Keys
第1题:
The company is evaluating using a new Active Directory domain to contain all customer user accounts. You need to design a monitoring or logging strategy that meets business and security requirements for the new Web-based ordering application. Your solution must minimize overhead on existing domain controllers and servers. What should you do?()
第2题:
Companycom is migrating from p670 systems running AIX 5.2 to p5 595 systems running AIX 5.3. They will be changing out only the system units. They will re-use the existing 61D drawers and adapters with the new p5 595 systems. What compatibility issue must be considered?()
第3题:
A customer has two locations that host their pSeries servers. Traffic is being routed through the public Internet. The customer needs to exchange confidential financial data between the servers. Which of the following solutions should the pSeries technical specialist propose to the customer to secure the data?()
第4题:
You are the senior systems engineer for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. Client computers in the sales department run Windows NT Workstation 4.0 with the Active Directory Client Extensions software installed. All other client computers run Windows XP Professional. All servers are located in an organizational unit (OU) named Servers. All client computers are located in an OU named Desktops. Four servers contain confidential company information that is used by users in either the finance department or the research department. Users in the sales department also store files and applications on these servers. The company’s written security policy states that for auditing purposes, all network connections to these resources must require authentication at the protocol level. The written security policy also states that all network connections to these resources must be encrypted. The company budget does not allow for the purchase of any new hardware or software. The applications and data located on these servers may not be moved to any other server in the network. You define and assign the appropriate permissions to ensure that only authorized users can access the resources on the servers. You now need to ensure that all connections made to these servers by the users in the finance department and in the research department meet the security guidelines stated by the written security policy. You also need to ensure that all users in the sales department can continue to access their resources. Which two actions should you take?()
第5题:
Your company has file servers located in an organizational unit named Payroll. The file servers contain payroll files located in a folder named Payroll. You create a GPO. You need to track which employees access the Payroll files on the file servers. What should you do()
第6题:
Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.
Turn on auditing for objects in the Local Security Policy and Select 'Object Access'.
Use Windows Explorer to turn on auditing for the specific files.
Have the administrator for domains log you on as an administrator and enable auditing for a specific file.
Turn on auditing for objects in the Local Security Policy and Select 'Account Management'.
Allow only one account at a time to log on to your shared folder. Check the event viewer to see who logged on.
第7题:
Enable logon auditing in both the new and the existing domains
Enable logon auditing only in the existing domain
Enable logon auditing only in the new domain
Enable logon auditing on only the Web server
第8题:
Enable the Audit object access option. Link the GPO to the Payroll organizational unit. On the file servers, configure Auditing for the Everyone group in the Payroll folder.
Enable the Audit object access option. Link the GPO to the domain. On the domain controllers, configure Auditing for the Authenticated Users group in the Payroll folder.
Enable the Audit process tracking option. Link the GPO to the Domain Controllers organizational unit. On the file servers, configure Auditing for the Authenticated Users group in the Payroll folder.
Enable the Audit process tracking option. Link the GPO to the Payroll organizational unit. On the file servers, configure Auditing for the Everyone group in the Payroll folder.
第9题:
A DCE domain
A Kerberos domain
A PPP tunnel between the servers
An IPSEC tunnel between the servers
第10题:
assigning a private IP address to the AP
changing the default SSID value
configuring a new administrator password
changing the mixed mode setting to single mode
configuring traffic filtering
第11题:
Install CDROM drives or tape drives on the systems because that is the only way to install AIX.
Install one system. Take a mksysb from the first system and resotre the mksysb to the remaining systems.
Install one system. Mirror rootvg onto a disk from each of the remaining systems.
Setup and NIM master and resources.
第12题:
Redundant VIO servers
Storage Protection Keys
Electronic Service Agent
NPIV support in the kernel
第13题:
You use a shared Windows 2000 Professional Computer. You notice, that some of your Microsoft Word documents that were on the local hard drive have been deleted. You restore the documents from a recent backup. Now, you want to be able to track all users who access your Word documents in the future. What should you do? ()
第14题:
A company runs very large database applications on multiple HP-UX servers. They recently upgraded the device drivers for their fibre channel HBAs and have suffered numerous crashes on several systems. Which feature of Power Systems running AIX would help eliminate this problem during pre-release testing of a new device driver?()
第15题:
New AIX systems arrive without a CDROM drive. All systems do not have the system hardware configuration. Which of the following options is the most appropriate way to install AIX on the systems?()
第16题:
You are a systems administrator responsible for deploying Windows SharePoint Services (WSS) for accessby users from an external business partner. You have installed the appropriate server role and have verified that the SharePoint Web site loads properly from the local server computer. All options are usingtheir installation default values. External users report that they cannot log on to the site. Which of thefollowing changes should you make to resolve the problem?()
第17题:
You have a share on your local computer. Someone has been intentionally damaging your files. You want to be able to know which account is doing this. What do you do? ()
第18题:
APV, AIX5.2ML4
AIX5.3 or i5/OS
APV, i5/OS, AIX5.3
APV, AIX5.3 or SuSE9
第19题:
MSDS
OEM
ESD
EMI
第20题:
On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policy
On all client computers, implement logon auditing for all user account logons
On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policy
On all domain controllers, implement logon auditing for all user account logons
第21题:
IPSec and Kerberos Authentication
Secure By Default and AIX Security Expert
Trusted Execution and Role Based Access Control
First Failure Data Capture and Storage Protection Keys
第22题:
APV features are not supported for some legacy POWER4 adapters
APV will require the most current maintenance level for AIX 5.2
APV features will require that legacy POWER4 adapters be updated with new microcode
The Virtual IO Server must run AIX 5.3 and the LPARs can run either AIX 5.2 or AIX 5.3
第23题:
Create a new site within an existing site collection for the external users.
Create a new site collection for the external users.
Change the authentication mode for the Web application to Forms authentication.
Modify the User Permissions For Web Applications settings.