niusouti.com

单选题A company has a policy that states that all servers will be fully backed up on the weekend.Additionally, all changed items will be backed up each night. In the event of a server failure, the administrator wants to be able to fully recover the system us

题目
单选题
A company has a policy that states that all servers will be fully backed up on the weekend.Additionally, all changed items will be backed up each night. In the event of a server failure, the administrator wants to be able to fully recover the system using two restore jobs. Which of the following backup levels should be used nightly?()
A

Incremental

B

Normal

C

Differential

D

Full


相似考题

1.Start of repeated scenarioYou are an enterprise desktop support technician for Fabrikam, Inc. Active Directory InformationThe company has a main office and a branch office. The main office hosts all of the companys servers. The main office connects to the branch office by using a WAN link. The network contains a single Active Directory domain that has 500 users. The domain contains three domain controllers and an enterprise root certification authority (CA). All servers run Windows Server 2008 R2. All user accounts are in an organizational unit (OU) named Employees. The computer accounts for all desktop computers are in an OU named Desktops. The computer accounts for all portable computers are in an OU named Laptops. A startup script is deployed to all computers by using Group Policy objects (GPOs). Client ConfigurationsAll client computers run Windows 7 Enterprise. All users have desktop computers. All computers are members of the domain. All desktop computers use wired connections to connect to the network. All portable computers use wireless connections to connect to the network. The wireless network is secured by using EAP-TLS. Company policy states that all client computers must be configured by using DHCP. The company has an internal Web site. The Web site is configured to useSSL encryption and to require client certificates. All company users can access the internal Web site. End of repeated scenario Users in the branch office report slow network performance when they connect to the file shares in the main office. You need to recommend a solution to improve performance when users access the file shares from the branch office. The solution must minimize hardware costs. What should you recommend implementing?()

参考答案和解析
正确答案: D
解析: 暂无解析
更多“A company has a policy that states that all servers will be ”相关问题
  • 第1题:

    ou are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.Two of the servers on the network contain highly confidential documents. The company’s written security policy states that all network connections with these servers must be encrypted by using an IPSec policy.You place the two servers in an organizational unit (OU) named SecureServers. You configure a Group Policy object (GPO) that requires encryption for all connections. You assign the GPO to the SecureServers OU.  You need to verify that users are connecting to the two servers by using encrypted connections.   What should you do?()

    • A、Run the net view command.
    • B、Run the gpresult command.
    • C、Use the IP Security Monitor console.
    • D、Use the IPSec Policy Management console.

    正确答案:C

  • 第2题:

    Your company has several branch offices. Your network consists of a single Active Directory domain.   Each branch office contains domain controllers and member servers. The domain controllers run  Windows Server 2003 SP2. The member servers run Windows Server 2008 R2.  Physical security of the servers at the branch offices is a concern.   You plan to implement Windows BitLocker Drive Encryption (BitLocker) on the member servers.  You need to ensure that you can access the BitLocker volume if the BitLocker keys are corruptedon the member servers. The recovery information must be stored in a central location. What should you do?()

    • A、Upgrade all domain controllers to Windows Server 2008 R2.Use Group Policy to configure Public Key  policies.
    • B、Upgrade all domain controllers to Windows Server 2008 R2. Use Group Policy to enable Trusted platform Module(TPM) backups to Active Directory.
    • C、Upgrade the domain controller that has the schema master role to Windows Server 2008 R2. Use group Policy to enable a Data Recovery Agent (DRA).
    • D、Upgrade the domain controller that has the primary domain controller (PDC) emulator role to windows Server 2008 R2. Use Group Policy to enable a Data Recovery Agent (DRA).

    正确答案:B

  • 第3题:

    You have an Exchange Server 2010 organization.  Your company has a relationship with another company.  The partner company has an Exchange Server 2010 organization.  You need to recommend a security solution to meet the following requirements:  .Ensure that all e-mail delivery between your servers and the partner companys servers is encrypted .Ensure that all communication between your servers and the partner companys servers is authenticated What should you include in the solution?()

    • A、Active Directory Rights Management Services (AD RMS)
    • B、Domain Security
    • C、Forms-based Authentication
    • D、Secure/Multipurpose Internet Mail Extensions (S/MIME)

    正确答案:B

  • 第4题:

    You are the network administrator in the New York office of TestKing. The company network consists of a single Active Directory domain The New York office currently contains one Windows Server 2003 file server named TestKingA. All file servers in the New York office are in an organizational unit (OU) named New York Servers. You have been assigned the Allow - Change permission for a Group Policy object (GPO) named NYServersGPO, which is linked to the New York Servers OU. The written company security policy states that all new servers must be configured with specified predefined security settings when the servers join the domain. These settings differ slightly for the various company offices. You plan to install Windows Sever 2003, on 15 new computers, which all functions as file servers. You will need to configure the specified security settings on the new file servers. TestKingA currently has the specified security settings configured in its local security policy. You need to ensure that the security configuration of the new file servers is identical to that of TestKingA. You export a copy of TestKingA's local security policy settings to a template file. You need to configure the security settings of the new servers, and you want to use the minimum amount of administrative effort. What should you do?()

    • A、Use the Security Configuration and Analysis tool on one of the new servers to import the template file.
    • B、Use the default Domain Security Policy console on one of the new servers to import the template file.
    • C、Use the Group Policy Editor console to open NYServersGPO and import the template file.
    • D、Use the default Local Security Policy console on one of the new servers to import the template file.

    正确答案:C

  • 第5题:

    单选题
    A company has a policy that states that all servers will be fully backed up on the weekend.Additionally, all changed items will be backed up each night. In the event of a server failure, the administrator wants to be able to fully recover the system using two restore jobs. Which of the following backup levels should be used nightly?()
    A

    Incremental

    B

    Normal

    C

    Differential

    D

    Full


    正确答案: C
    解析: 暂无解析

  • 第6题:

    多选题
    You are the senior systems engineer for your company. The network consists of a single Active Directory domain.  All servers run Windows Server 2003. Client computers in the sales department run Windows NT Workstation 4.0 with the Active Directory Client Extensions software installed. All other client computers run Windows XP Professional. All servers are located in an organizational unit (OU) named Servers. All client computers are located in an OU named Desktops.   Four servers contain confidential company information that is used by users in either the finance department or the research department. Users in the sales department also store files and applications on these servers. The company’s written security policy states that for auditing purposes, all network connections to these resources must require authentication at the protocol level. The written security policy also states that all network connections to these resources must be encrypted. The company budget does not allow for the purchase of any new hardware or software. The applications and data located on these servers may not be moved to any other server in the network.   You define and assign the appropriate permissions to ensure that only authorized users can access the resources on the servers.   You now need to ensure that all connections made to these servers by the users in the finance department and in the research department meet the security guidelines stated by the written security policy. You also need to ensure that all users in the sales department can continue to access their resources.   Which two actions should you take?()
    A

    Create a new Group Policy object (GPO) and link it to the Servers OU. Enable the Secure Server (Require Security) IPSec policy in the GPO.

    B

    Create a new Group Policy object (GPO) and link it to the Servers OU. Enable the Server (Request Security) IPSec policy in the GPO.

    C

    Create a new Group Policy object (GPO) and link it to the Desktops OU. Enable the Client (Respond only) IPSec policy in the GPO.

    D

    Create a new Group Policy object (GPO). Edit the GPO to enable the Registry Policy Processing option and the IP Security Policy Processing option. Copy the GPO files to the Netlogon shared folder.

    E

    Use System Policy Editor to open the System.adm file and enable the Registry Policy Processing option and the IP Security Policy Processing option. Save the system policy as NTConfig.pol.


    正确答案: E,A
    解析: 暂无解析

  • 第7题:

    多选题
    Your company has a server named Server1 that runs Windows Server 2008 and Microsoft Hyper-V. Server1 hosts three virtual machines.  Company policy states that the virtual machines must not connect to the company network.  You need to configure all of the virtual machines to connect to each other. You must meet the company policy.  Which two actions should you perform?()
    A

    Select the Not connected option for each virtual machine.

    B

    Enable the Enable virtual LAN identification option for each virtual machine.

    C

    Set the Connection to Host for the network interface card.

    D

    Set the Connection to None for the network interface card.


    正确答案: A,C
    解析: 暂无解析

  • 第8题:

    多选题
    Your company has a single Active Directory domain. All servers run Windows Server 2008. The company network has servers that perform as Web Servers. All confidential files are located on a server named FSS1. The company security policy states that all confidential data must be transmitted in the most secure manner. When you monitor the network you notice that the confidential files stored on FSS1 server are being transmitted over the network without encryption. You need to ensure that encryption is always usedwhen the confidential files on the FSS1 server are transmitted over the network. What are two possible ways to achieve this goal? ()
    A

    Deactivate all LM and NTLM authentication methods on FSS1 server

    B

    Use IIS to publish the confidential files, activate SSL on the IIS server, and then open the files as a web folder

    C

    Use IPsec encryption between the FSS1 server and the computers of the users who need to access the confidential files.

    D

    Use the Server Message Block (SMB) signing between the FSS1 server and the computers of the users who want to access the confidential files.

    E

    Activate offline files for the confidential files that are stored on the FSS1 server. In the Folder avanced Properties box, select the Encrypt contents to secure data optiion


    正确答案: E,D
    解析: 暂无解析

  • 第9题:

    Your company has a single active directory domain. All servers run windows server 2008. The company network has 10 servers that perform as web servers. All confidential files are located on a server named FSS1. The company security policy states that all confidential data must be transmitted in the most secure manner. When you monitor the network, you notice that the confidential files are stored on FSS1 server are being transmitted over the network without encryption. You need to ensure that encryption is always used when the confidential files on the FSS1 server are transmitted over the network. What are two possible ways to achieve this goal? ()

    • A、Deactivate all LM and NTLM authentication methods on the FSS1 server.
    • B、Use IIS to publish the confidentials files. Activate SSL on the ISS server, and then open the files as a web folder.
    • C、Use IPSec encryption between the FSS 1 server and the computers of the users who need to access the confidential files.
    • D、Use the server messager block (SMB) signing between the FSS1 server and the computers of the users who want to access the confidential files.
    • E、Activate offline files for the confidential files that are stored on the FSS1 server. In the folder advanced properties dialog box, select the encrypt contents to secure data option.

    正确答案:B,C

  • 第10题:

    Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  What should you do?()

    • A、Configure all access points as RADIUS clients to the Remediation Servers.
    • B、Configure all access points as RADIUS clients to the Network Policy Server (NPS).
    • C、Create a Network Policy that defines Remote Access Server as a network connection method.
    • D、Create a Network Policy that specifies EAP-TLS as the only available authentication method.

    正确答案:B

  • 第11题:

    You are the systems engineer for your company. The network consists of a single Active Directory domain. The company has a main office and two branch offices. All servers run Windows Server 2003. All client computers run either Windows XP Professional or Windows 2000 Professional.   Each branch office maintains a dedicated 256-Kbps connection to the main office. Each office also maintains a T1 connection to the Internet. Each office has a Microsoft Internet Security and Acceleration (ISA) Server 2000 computer, which provides firewall and proxy services on the Internet connection. Each branch office contains one domain controller and five servers that are not domain controllers. There is minimal administrative staff at the branch offices.  A new company policy states that all servers must now be remotely administered by administrators in the main office. The policy states that all remote administration connections must be authenticated by the domain and that all traffic must be encrypted. The policy also states that the remote administration traffic must never be carried in clear text across the Internet.   You choose to implement remote administration by enabling Remote Desktop connections on all servers on the network. You decide to use the Internet-connected T1 lines for remote administration connectivity between offices.   Because administrative tasks might require simultaneous connections to multiple servers across the network, you need to ensure that administrators do not lose connections to servers in one office when they attempt to connect to servers in another office.   What should you do? ()

    • A、 Configure Routing and Remote Access on one server in each branch office. Create L2TP/IPSec VPN ports on these servers. Create new VPN connections on the administrators’ computers to connect to the VPN servers in the branch offices.
    • B、 Configure a VPN server in each branch office. Create connections that use IPSec Authentication Header (AH) in tunnel mode from the main office connect to VPN servers in the branch offices.
    • C、 Configure a local L2TP/IPSec VPN connection on the ISA Server 2000 firewall computer in the main office. Configure the ISA Server 2000 firewall computers at the branch offices as remote L2TP/IPSec VPN servers.
    • D、 Configure a local PPTP VPN connection on the ISA Server 2000 firewall computers in each branch office. Configure the ISA Server 2000 firewall computer at the main office as a remote PPTP VPN server.

    正确答案:C

  • 第12题:

    You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003.   The network contains servers that have Terminal Server enabled. The terminal servers host legacy applications that currently require users to be members of the Power Users group.   A new requirement in the company’s written security policy states that the Power Users group must be empty on all resource servers.   You need to maintain the ability to run the legacy applications on the terminal servers when the new security requirement is implemented.   What should you do?  ()

    • A、 Add the Domain Users global group to the Remote Desktop Users built-in group in the domain.  
    • B、 Add the Domain Users global group to the Remote Desktop Users local group on each terminal server.
    • C、 Modify the Compatws.inf security template settings to allow members of the local Users group to run the applications. Import the security template into the Default Domain Controllers Policy Group Policy object (GPO).
    • D、 Modify the Compatws.inf security template settings to allow members of the local Users group to run the applications. Apply the modified template to each terminal server.

    正确答案:D

  • 第13题:

    单选题
    You are a security administrator for your company. The network consists of a single Active Directory domain. All client computers run Windows XP Professional. All servers run Windows Server 2003. All computers on the network are members of the domain.    Traffic on the network is encrypted by IPSec. The domain contains a custom IPSec policy named Lan Security that applies to all computers in the domain. The Lan Security policy does not allow unsecured communication with non-lPSec-aware computers. The company’s written security policy states that the configuration of the domain and the configuration of the Lan Security policy must not be changed. The domain contains a multihomed server named Server1. Server1 isconnected to the company network, and Server1 is also connected to a test network. Currently, the Lan Security IPSec policy applies to network traffic on both network adapters in Server1. You need to configure Server1 so that it communicates on the test network without IPSec security. Server1 must still use the Lan Security policy when it communicates on the company network.  How should you configure Server1?()
    A

     Configure a packet filter for the network adapter on the test network to block the Internet Key Exchange (IKE) port.

    B

     Configure the network adapter on the test network to disable IEEE 802.1x authentication.

    C

     Configure the network adapter on the test network to enable TCP/IP filtering, and then permit all traffic.

    D

     Use the netsh command to assign a persistent IPSec policy that permits all traffic on the network adapter on the test.

    E

     Assign an IPSec policy in the local computer policy that permits all traffic on the network adapter on the test.


    正确答案: A
    解析: 暂无解析

  • 第14题:

    单选题
    This question is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. Start of repeated scenarioYou are an enterprise desktop support technician for Fabrikam, Inc. Active Directory InformationThe company has a main office and a branch office. The main office hosts all of the companys servers. The main office connects to the branch office by using a WAN link. The network contains a single Active Directory domain that has 500 users. The domain contains three domain controllers and an enterprise root certification authority (CA). All servers run Windows Server 2008 R2. All user accounts are in an organizational unit (OU) named Employees. The computer accounts for all desktop computers are in an OU named Desktops. The computer accounts for all portable computers are in an OU named Laptops. A startup script is deployed to all computers by using Group Policy objects (GPOs). Client ConfigurationsAll client computers run Windows 7 Enterprise. All users have desktop computers. All computers are members of the domain. All desktop computers use wired connections to connect to the network. All portable computers use wireless connections to connect to the network. The wireless network is secured by using EAP-TLS. Company policy states that all client computers must be configured by using DHCP. The company has an internal Web site. The Web site is configured to use SSL encryption and to require client certificates. All company users can access the internal Web site. End of repeated scenario The company hires a new desktop support technician. The technician is added to the Administrators group on all client computers and the DHCP Users group on all DHCP servers. The new technician reports that the DHCP snap-in is unavailable on his computer. You need to ensure that the technician can view the configurations of the DHCP servers. What should you do?()
    A

    Instruct the technician to customize the Start menu to display the administrative tools.

    B

    Instruct the technician to install Remote Server Administration Tools (RSAT) and to modify the Windows Features.

    C

    Request that the technician be added to the Server Operators group in Active Directory.

    D

    Request that the technician be added to the Network Configuration Operators group in Active Directory and modify the Windows Features.


    正确答案: C
    解析: 暂无解析

  • 第15题:

    单选题
    Your company has deployed network access protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP what should you do?()
    A

    Configure all access points as RADIUS clients to the remediation servers.

    B

    Configure all access points as RADIUS clients to the network Policy Server (NPS).

    C

    Create a network policy that defines remote access server as a network connection method.

    D

    Create a network policy that specifies EAP-TLS as the only available authentication method.


    正确答案: A
    解析: 暂无解析

  • 第16题:

    单选题
    Start of repeated scenarioYou are an enterprise desktop support technician for Fabrikam, Inc. Active Directory InformationThe company has a main office and a branch office. The main office hosts all of the companys servers. The main office connects to the branch office by using a WAN link. The network contains a single Active Directory domain that has 500 users. The domain contains three domain controllers and an enterprise root certification authority (CA). All servers run Windows Server 2008 R2. All user accounts are in an organizational unit (OU) named Employees. The computer accounts for all desktop computers are in an OU named Desktops. The computer accounts for all portable computers are in an OU named Laptops. A startup script is deployed to all computers by using Group Policy objects (GPOs). Client ConfigurationsAll client computers run Windows 7 Enterprise. All users have desktop computers. All computers are members of the domain. All desktop computers use wired connections to connect to the network. All portable computers use wireless connections to connect to the network. The wireless network is secured by using EAP-TLS. Company policy states that all client computers must be configured by using DHCP. The company has an internal Web site. The Web site is configured to useSSL encryption and to require client certificates. All company users can access the internal Web site. End of repeated scenario Users in the branch office report slow network performance when they connect to the file shares in the main office. You need to recommend a solution to improve performance when users access the file shares from the branch office. The solution must minimize hardware costs. What should you recommend implementing?()
    A

    BranchCache

    B

    DirectAccess

    C

    Distributed File System Replication (DFSR)

    D

    Universal Group Membership Caching


    正确答案: B
    解析: 暂无解析