题目

You are designing an authentication strategy for the accounting department. Your solution must meet business requirements. What should you do?()

A、Install wireless network cards on all accounting department computers. Select PEAP authentication

B、Install user certificates on all accounting department computers. Configure these computers to respond to requests for IPSec encryption

C、Issue smart cards and smart card readers to all accounting department users and computers. Require NTLMv2 authentication

D、Issue smart cards and smart card readers to all accounting department users and computers. Configure the domain to require smart cards for the accounting department users during logon

答案
查看答案
相关试题

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance.You must make sure that all SQL Server instances are consistently configured for naming conventions, security settings, force index creation and avoidance of data fragmentation. So what action should you perform to achieve this goal?()  

A、You should use the Database Engine Tuning Advisor. 

B、In Microsoft SQL Server Management Studio, you should create a maintenance plan 

C、You should use the SQL Server Configuration Manager 

D、In Microsoft SQL Server Management Studio, you should create a policy

You need to design a Security strategy for the wireless network at all resort locations.What should you do?()

A、Connect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Require company users to establish a VPN to access company resources

B、Install Internet Authentication Service (IAS) on a domain controller.Configure the wireless access points to require IEEE 802.1x authentication

C、Establish IPSec policies on all company servers to request encryption from all computers that connect from the wireless IP networks

D、Configure all wireless access points to require the Wired Equivalent Privacy (WEP) protocol for all connections. Use a Group Policy object (GPO) to distribute the WEP keys to all computers in the domain

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. You configure the SQL Server instance to use the -T1222 and -T1204 trace flags during startup. You must make sure that your failure recovery plan performs backup of the use of the trace flags.  So what action should you perform to achieve this goal?()  

A、You should backup the master database

B、You should backup the default.trc file 

C、You should backup the SQL Server registry hive. 

D、You should backup the resource database 

由龟板、白芍、黄芩、黄柏、香附、椿根皮组成的方剂名为()

A、大补阴丸

B、虎潜丸

C、玉女煎

D、固冲汤

E、固经丸

与胶艾汤方证较为接近的方剂是()

A、温经汤

B、桃核承气汤

C、失笑散

D、少腹逐瘀汤

E、黄芪桂枝五物汤

最新解答的试题
提出现代生物-心理-社会医学模式是()

A.恩格尔B.波特C.托马斯·帕茨瓦尔D.比彻尔E.桑德斯
付款人在进行付款时无()

A.形式审查义务

B.实质审查义务

C.附带审查义务

D.票据外有关事项的审查义务
根据《公司法》的规定,有限责任公司下列人员中,可以提议召开股东会临时会议的是()。
A.总经理B.人数过半数的股东C.监事会主席D.人数为半数的董事
关于股份有限公司中的监事会,下列说法错误的是()

A.监事会负责提议聘请或更换外部审计机构B.监事会主席和副主席由全体监事过半数选举产生C.监事会中的职工代表的比例不得低于三分之一D.监事会应至少每6个月召开一次会议
三北精神的科学内涵