单选题Machine policy templates can be assigned based on certain attributes of a machine. A customer  organizes their machines based on the following requirements:   The machines are all placed in specific Organizational Units in the Active Directory.   The c

题目
单选题
Machine policy templates can be assigned based on certain attributes of a machine. A customer  organizes their machines based on the following requirements:   The machines are all placed in specific Organizational Units in the Active Directory.   The customer has Citrix Servers, and they have a specific naming convention meant only for their Citrix Servers. The customer has DHCP enabled for all the client machines.   The customer has made it clear that they should not need to change anything in the existing infrastructure. Given these requirements, which single assignment attribute would be chosen for assigning machine policy templates?()
A

Hostnames

B

IP Addresses

C

Machine Group Tag

D

Active Directory Groups


相似考题
更多“单选题Machine policy templates can be assigned based on certain attributes of a machine. A customer  organizes their machines based on the following requirements:   The machines are all placed in specific Organizational Units in the Active Directory.   The c”相关问题
  • 第1题:

    Which of the following requires an update to the baseline after installing new software on a machine?()

    • A、Signature-based NIPS
    • B、Signature-based NIDS
    • C、Honeypot
    • D、Behavior-based HIDS

    正确答案:D

  • 第2题:

    Machine policy templates can be assigned based on certain attributes of a machine. A customer  organizes their machines based on the following requirements:   The machines are all placed in specific Organizational Units in the Active Directory.   The customer has Citrix Servers, and they have a specific naming convention meant only for their Citrix Servers. The customer has DHCP enabled for all the client machines.   The customer has made it clear that they should not need to change anything in the existing infrastructure. Given these requirements, which single assignment attribute would be chosen for assigning machine policy templates?()

    • A、Hostnames
    • B、IP Addresses
    • C、Machine Group Tag
    • D、Active Directory Groups

    正确答案:C

  • 第3题:

    Your network contains a Virtualization environment that includes the following: - 10 hosts that run VMware ESX Server 4.0 - Microsoft System Center Virtual Machine Manager - 50 Hyper-V hosts that run Windows Server 2008 R2 Each Virtualization host contains a minimum of 15 virtual machines (VMs). You need to recommend a solution to ensure that users can create and deploy VMs to any of the virtualization hosts. The VMs must be based on templates created by an administrator. What should you include in the recommendation?()

    • A、Microsoft System Center Data Protection Manager
    • B、Microsoft Enterprise Desktop Virtualization (MED-V) Workspace Packager
    • C、VMM Self-service Portal
    • D、System Center Virtual Machine Manager physical-to-virtual machine (P2V) conversion
    • E、Virtual Machine Servicing Tool (VSMT)
    • F、Authorization Manager
    • G、Microsoft Application Virtualization (App-V) Sequencer
    • H、Microsoft System Center Operations Manager
    • I、System Center Virtual Machine Manager virtual-to-virtual machine (V2V) conversion
    • J、Active Directory Rights Management Services (AD RMS)

    正确答案:C

  • 第4题:

    You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()

    • A、Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computers
    • B、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computers
    • C、Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computers
    • D、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers

    正确答案:A

  • 第5题:

    A bank runs 50 workstations and would like to decrease its electricity costs, while not sacrificing functionality. All of the workstations are high-end performance units that are intended to be used for CAD-like applications. Analysts benefit from the added performance, but tellers and associates could use more minimalist systems. Which of the following methods would decrease the banks electricity and hardware costs?()

    • A、Swap all teller and associate machines with servers.
    • B、Swap all teller and associate machines with thin clients.
    • C、Swap all teller and associate machines with low-profile high-end workstations.
    • D、Swap all teller and associate machines with laptops.

    正确答案:B

  • 第6题:

    单选题
    A bank runs 50 workstations and would like to decrease its electricity costs, while not sacrificing functionality. All of the workstations are high-end performance units that are intended to be used for CAD-like applications. Analysts benefit from the added performance, but tellers and associates could use more minimalist systems. Which of the following methods would decrease the banks electricity and hardware costs?()
    A

    Swap all teller and associate machines with servers.

    B

    Swap all teller and associate machines with thin clients.

    C

    Swap all teller and associate machines with low-profile high-end workstations.

    D

    Swap all teller and associate machines with laptops.


    正确答案: B
    解析: 暂无解析

  • 第7题:

    单选题
    Your company has an Active Directory directory service domain. All servers run Windows Server 2003. You are developing a security monitoring plan. You must monitor the files that are stored in a specific directory on a member server. You have the following requirements. Log all attempts to access the files.Retain log information until the full weekly backup occurs. You need to ensure that the security monitoring plan meets the requirements.  What should your plan include?()
    A

     Configure a directory service access audit policy. Increase the maximum size of the security log.

    B

     Configure a directory service access audit policy. Set the system log to overwrite events older than 7 days.

    C

     Configure an object access audit policy for the directory. Increase the maximum size of the system log.

    D

     Configure an object access audit policy for the directory. Set the security log to overwrite events older than 7 days.


    正确答案: A
    解析: 暂无解析

  • 第8题:

    单选题
    Your company has a single Active Directory directory service domain that includes a main office and two branch offices. Each branch office has its own Active Directory site. All user accounts are placed into organizational units (OUs) based on department. Multiple Group Policy objects (GPOs) are linked at the domain, the site, and the OU levels. A user in Atlanta transfers to a different branch office and joins a different department. You move her user account into the corresponding OU. After logging on to her new client computer, the user notices that the desktop settings are different from the settings she had in her previous location. You need to find out the effect of all GPOs on the user.  What should you do?()
    A

     Use the Security Configuration and Analysis snap-in.

    B

     Use the Resultant Set of Policy snap-in.

    C

     Run the Secedit /analyze command.

    D

     Run the Secedit /validate command.


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    Which of the following requires an update to the baseline after installing new software on a machine?()
    A

    Signature-based NIPS

    B

    Signature-based NIDS

    C

    Honeypot

    D

    Behavior-based HIDS


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    Regarding a route-based versus policy-based IPsec VPN, which statement is true?()
    A

    A route-based VPN generally uses less resources than a policy-based VPN.

    B

    A route-based VPN cannot have a deny action in a policy; a policy-based VPN can have a deny action.

    C

    A route-based VPN is better suited for dialup or remote access compared to a policy-based VPN.

    D

    A route-based VPN uses a policy referencing the IPsec VPN; a policy-based VPN policy does not use apolicy referencing the IPsec VPN


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    You work as a network exchange administrator at company.com.thecompany.com network currently consists of a single active directory forest containing a single domain named company.com.the company.com organization makes use of microsoft exchange server 2010 as their messaging solution.in each of the organizational units in the company.com forest, a user has been identified to manage recipients in their specific organizational units.During the course of the business week you receive instruction from company.com to ensure that these chosen users will indeed have the ability to manage recipients in a specific organizational unit (ou).what should you do?()
    A

    you should consider using role based access control (rbac) and having a new management scope created.

    B

    you should consider using role based access control (rbac) and having the default management scope modified.

    C

    you should consider having a new direct role assignment created.

    D

    you should consider having a new management role assignment policy created.


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    The Company should clearly define and document the master’s responsibility with regard to all the following items except().
    A

    implementing the safety and environmental protection policy of the Company

    B

    preparing procedures to respond to emergency situations

    C

    verifying that specified requirements are observed

    D

    reviewing the SMS and reporting its deficiencies to the shore based management


    正确答案: B
    解析: 暂无解析

  • 第13题:

    Which of the following technologies can provide geographically based load balancing with high availability between two web servers with static content?()

    • A、Multicast
    • B、Active/passive cluster
    • C、Active/active cluster
    • D、DNS round robin

    正确答案:C

  • 第14题:

    Regarding a route-based versus policy-based IPsec VPN, which statement is true?()

    • A、A route-based VPN generally uses less resources than a policy-based VPN.
    • B、A route-based VPN cannot have a deny action in a policy; a policy-based VPN can have a deny action.
    • C、A route-based VPN is better suited for dialup or remote access compared to a policy-based VPN.
    • D、A route-based VPN uses a policy referencing the IPsec VPN; a policy-based VPN policy does not use apolicy referencing the IPsec VPN

    正确答案:A

  • 第15题:

    Your company has a single Active Directory directory service domain that includes a main office and two branch offices. Each branch office has its own Active Directory site. All user accounts are placed into organizational units (OUs) based on department. Multiple Group Policy objects (GPOs) are linked at the domain, the site, and the OU levels. A user in Atlanta transfers to a different branch office and joins a different department. You move her user account into the corresponding OU. After logging on to her new client computer, the user notices that the desktop settings are different from the settings she had in her previous location. You need to find out the effect of all GPOs on the user.  What should you do?()

    • A、 Use the Security Configuration and Analysis snap-in.
    • B、 Use the Resultant Set of Policy snap-in.
    • C、 Run the Secedit /analyze command.
    • D、 Run the Secedit /validate command.

    正确答案:B

  • 第16题:

    You work as a network exchange administrator at company.com.thecompany.com network currently consists of a single active directory forest containing a single domain named company.com.the company.com organization makes use of microsoft exchange server 2010 as their messaging solution.in each of the organizational units in the company.com forest, a user has been identified to manage recipients in their specific organizational units.During the course of the business week you receive instruction from company.com to ensure that these chosen users will indeed have the ability to manage recipients in a specific organizational unit (ou).what should you do?()

    • A、you should consider using role based access control (rbac) and having a new management scope created.
    • B、you should consider using role based access control (rbac) and having the default management scope modified.
    • C、you should consider having a new direct role assignment created.
    • D、you should consider having a new management role assignment policy created.

    正确答案:A

  • 第17题:

    Your company has a server named Server1 that runs Windows Server 2008 and Microsoft Hyper-V. Server1 hosts three virtual machines.  Company policy states that the virtual machines must not connect to the company network.  You need to configure all of the virtual machines to connect to each other. You must meet the company policy.  Which two actions should you perform?()

    • A、Select the Not connected option for each virtual machine.
    • B、Enable the Enable virtual LAN identification option for each virtual machine.
    • C、Set the Connection to Host for the network interface card.
    • D、Set the Connection to None for the network interface card.

    正确答案:B,C

  • 第18题:

    单选题
    You are an enterprise administrator for Cer-tech .com. All the servers on the network run Windows Server2008. The network consists of a server called Server01 that runs Microsoft Hyper-V and hosts three virtualmachines. To fulfill a network requirement, you need to configure all of the virtual machines to connect toeach other. However, the company policy states that the virtual machines must not connect to the companynetwork. Which of the following options would you choose to ensure that all the virtual machines connect to eachother and you meet the company policy also?()
    A

    Enable the Enable virtual LAN identification option for each virtual machine

    B

    Enable the Enable virtual LAN identification option for each virtual machine and then set the connection to Host for the network interface card

    C

    Set the Connection to None for the network interface card

    D

    Select the Not connected option for each virtual machine.


    正确答案: C
    解析: 暂无解析

  • 第19题:

    单选题
    A system administrator wants to configure 802.1X on an Ethernet switch to enable access to specific parts of the network based on group memberships.How can the administrator accomplish this goal?()
    A

    Configure roles based on departments and assign access based on source IP address.

    B

    Configure roles based on the user's manager and assign access based on the user's MAC address

    C

    Configure roles based on group memberships and assign a specific VLAN to the role.

    D

    Configure roles based on RADIUS request attribute and assign a specific VLAN to the role.


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    Which statement regarding the implementation of an IDP policy template is true?()
    A

    IDP policy templates are automatically installed as the active IDP policy.

    B

    IDP policy templates are enabled using a commit script.

    C

    IDP policy templates can be downloaded without an IDP license.

    D

    IDP policy templates are included in the factory-default configuration.


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()
    A

    Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computers

    B

    Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computers

    C

    Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computers

    D

    Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    Which of the following technologies can provide geographically based load balancing with high availability between two web servers with static content?()
    A

     Multicast

    B

     Active/passive cluster

    C

     Active/active cluster

    D

     DNS round robin


    正确答案: C
    解析: 暂无解析

  • 第23题:

    多选题
    Your company has a server named Server1 that runs Windows Server 2008 and Microsoft Hyper-V. Server1 hosts three virtual machines.  Company policy states that the virtual machines must not connect to the company network.  You need to configure all of the virtual machines to connect to each other. You must meet the company policy.  Which two actions should you perform?()
    A

    Select the Not connected option for each virtual machine.

    B

    Enable the Enable virtual LAN identification option for each virtual machine.

    C

    Set the Connection to Host for the network interface card.

    D

    Set the Connection to None for the network interface card.


    正确答案: C,B
    解析: 暂无解析