You need to design a security strategy that will ensure that unauthorized users cannot access personnel data. Your solution must comply with security requirements and the company’s new administrative model.What should you do?()
A、In the Default Domain Policy Group Policy object (GPO) for the corp.woodgrovebank.com domain, add the LA/HRUsers group to the Restricted Groups list. Add only the HR department user accounts to the Allowed Members list
B、In the Default Domain Policy Group Policy object (GPO) for the la.corp.woodgrovebank.com domain, add the LA/HRUsers group to the Restricted Groups list. Add only the HR department user accounts to the Allowed Members list
C、In the Default Domain Policy Group Policy object (GPO) for the corp.woodgrovebank.com domain, add the LA/HRUsers group and the CORP/Backup Operators group to the Restricted Groups list. Add only the HR department user accounts and the administrator user accounts to the Allowed Members list for each group
D、In the Default Domain Policy Group Policy object (GPO) for the la.corp.woodgrovebank.com domain, add the LA/HRUsers group and the CORP/Backup Operators group to the Restricted Groups list. Add only the HR department user accounts to the Allowed Members list for the LA/HRUsers group. Add only the administrator user accounts to the Allowed Members list for the CORP/Backup Operators group
善于治疗外感风寒、头痛鼻塞、鼻渊的药组是()
A、荆芥、防风
B、麻黄、桂枝
C、羌活、独活
D、辛夷、苍耳子
E、紫苏、生姜
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. You configure the SQL Server instance to use the -T1222 and -T1204 trace flags during startup. You must make sure that your failure recovery plan performs backup of the use of the trace flags. So what action should you perform to achieve this goal?()
A、You should backup the master database
B、You should backup the default.trc file
C、You should backup the SQL Server registry hive.
D、You should backup the resource database
You are designing an authentication strategy for the accounting department. Your solution must meet business requirements. What should you do?()
A、Install wireless network cards on all accounting department computers. Select PEAP authentication
B、Install user certificates on all accounting department computers. Configure these computers to respond to requests for IPSec encryption
C、Issue smart cards and smart card readers to all accounting department users and computers. Require NTLMv2 authentication
D、Issue smart cards and smart card readers to all accounting department users and computers. Configure the domain to require smart cards for the accounting department users during logon
您需要为Northwind贸易商设计一项补丁管理策略。您应该做什么?()
A、配置缺省领域政策小组政策对象(GPO)使northwindtraders.com领域配置客户计算机下载更新从挂起服务器在纽约。配置缺省领域政策GPO使boston.northwindtraders.com领域配置客户计算机下载更新从挂起服务器在纽约
B、使用小组政策配置客户计算机下载更新从一台窗口更新服务器在互联网。配置缺省领域政策小组政策对象(GPO)以跑Mbsacli.exe的一个起始的剧本。配置它扫描计算机在两个分部
C、安装和配置挂起服务器在波士顿分部。配置服务器下载更新从一台窗口更新服务器在互联网。配置微软基础线安全分析仪(MBSA)扫描为更新和计算机在纽约办公室
D、安装和配置挂起服务器在各个分部。配置挂起服务器下载更新从纽约挂起服务器。配置微软基础线安全分析仪(MBSA)扫描为更新计算机在纽约办公室
You need to design a Security strategy for the wireless network at all resort locations.What should you do?()
A、Connect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Require company users to establish a VPN to access company resources
B、Install Internet Authentication Service (IAS) on a domain controller.Configure the wireless access points to require IEEE 802.1x authentication
C、Establish IPSec policies on all company servers to request encryption from all computers that connect from the wireless IP networks
D、Configure all wireless access points to require the Wired Equivalent Privacy (WEP) protocol for all connections. Use a Group Policy object (GPO) to distribute the WEP keys to all computers in the domain