The company wants to evaluate making all business office use

题目
单选题
The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()
A

On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policy

B

On all client computers, implement logon auditing for all user account logons

C

On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policy

D

On all domain controllers, implement logon auditing for all user account logons

参考答案和解析
正确答案: C
解析: 暂无解析
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

your company uses DHCP to lease IPv4 addresses to computers at the main office. A WAN link connects the main office to a branch office. All computers in the branch office are configured with static ip addresses. The branch office does not use DHCP and uses a different subnet. You need to ensure that the portable computers can connect to network resources at the main office and the branch office. How should you configure each portable computer?()

  • A、Use a static IPv4 address in the range used at the branch office.
  • B、Use a alternate configuration that contains a static IP address in the range used at the main office.
  • C、Use the address that was assigned by DHCP as a static IP address.
  • D、Use an altermate configuration that contains a static IP address in the range used at the branch office.

正确答案:D

第2题:

The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()

  • A、On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policy
  • B、On all client computers, implement logon auditing for all user account logons
  • C、On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policy
  • D、On all domain controllers, implement logon auditing for all user account logons

正确答案:C

第3题:

A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()

A. WEP encryption

B. Channel rotation

C. Disable SSID

D. WPA encryption


参考答案:D

第4题:

our company has a main office and 15 branch offices. The company has a single active directory domain. All servers run windows server 2008.You need to ensure that the VPN connections between the office and the branch offices meet the following requirements:All data must be encrypted by using end-to-end encryption.The vpn connection must use computer-level authentication.User names and passwords cannot be used for authentication.What should do?()

  • A、Configure an ipsec connection to use tunnel mode and preshared key authentication.
  • B、Configure a PPTP connection to use version 2 of the MS-CHAP v2 authentication.
  • C、Configure a L2TP/IPsec connection to use the EAP-TLS authentication.
  • D、Configure a L2TP/IPsec connection to use version 2 of the MS-CHAP v2 authentication.

正确答案:C

第5题:

A medium-sized company has a Class C IP address. It has two Cisco routers and one non-Cisco router. All three routers are using RIP version 1. The company network is using the block of 198.133.219.0/24. The company has decided it would be a good idea to split the network into three smaller subnets and create the option of conserving addresses with VLSM. What is the best course of action if the company wants to have 40 hosts in each of the three subnets?()

  • A、Convert all the routers to EIGRP and use 198.133.219.32/27, 198.133.219.64/27, and 198.133.219.92/27 as the new subnetworks.
  • B、Maintain the use of RIP version 1 and use 198.133.219.32/27, 198.133.219.64/27, and 133.219.92/27 as the new subnetworks.
  • C、Convert all the routers to EIGRP and use 198.133.219.64/26, 198.133.219.128/26, and 133.219.192/26 as the new subnetworks.
  • D、Convert all the routers to RIP version 2 and use 198.133.219.64/26, 198.133.219.128/26, and 133.219.192/26 as the new subnetworks.
  • E、Convert all the routers to OSPF and use 198.133.219.16/28, 198.133.219.32/28, and 198.133.219.48/28 as the new subnetworks.
  • F、Convert all the routers to static routes and use 198.133.219.16/28, 198.133.219.32/28, and

正确答案:D

第6题:

You are the network administrator for your company. All network servers run Windows Server 2003. Business hours are 8 A.M. to 5 P.M. You provide network assistance during business hours only. A server named Server1 stores personal files for all network users. Mobile users access Server1 by using the company's VPN. They must have 24-hour access to the files on Server1. You need to be able to identify the source of the recurring slowdowns in VPN access. First, you log on to Server1. What should you do next?()

  • A、Use Task Manager to review network utilization of the VPN adapter.
  • B、Use the Performance console to create a log of network utilization outside of business hours.
  • C、Use System Monitor to review network utilization of the VPN connection.
  • D、Use Task Manager to select Bytes Sent as the Network Adapter History setting.

正确答案:C

第7题:

Your company uses DHCP to lease IPv4 addresses to computers at the main office. A WAN link connects the main office to a branch office. All computers in the branch office are configured with static IP addresses. The branch office does not use DHCP and uses a different subnet. You need to ensure that the portable computers can connect to network resources at the main office and the branch office. How should you configure each portable computer?()

  • A、Use a static IPv4 address in the range used at the branch office.
  • B、Use an alternate configureation that contains a static IP address in the range used at the main office
  • C、Use the address that was assigned by DHCP as a static IP address
  • D、Use an alternate configuration that contains a static Ip address in the range used at the branch office.

正确答案:D

第8题:

Start of repeated scenarioYou are an enterprise desktop support technician for Fabrikam, Inc. Active Directory InformationThe company has a main office and a branch office. The main office hosts all of the companys servers. The main office connects to the branch office by using a WAN link. The network contains a single Active Directory domain that has 500 users. The domain contains three domain controllers and an enterprise root certification authority (CA). All servers run Windows Server 2008 R2. All user accounts are in an organizational unit (OU) named Employees. The computer accounts for all desktop computers are in an OU named Desktops. The computer accounts for all portable computers are in an OU named Laptops. A startup script is deployed to all computers by using Group Policy objects (GPOs). Client ConfigurationsAll client computers run Windows 7 Enterprise. All users have desktop computers. All computers are members of the domain. All desktop computers use wired connections to connect to the network. All portable computers use wireless connections to connect to the network. The wireless network is secured by using EAP-TLS. Company policy states that all client computers must be configured by using DHCP. The company has an internal Web site. The Web site is configured to useSSL encryption and to require client certificates. All company users can access the internal Web site. End of repeated scenario Users in the branch office report slow network performance when they connect to the file shares in the main office. You need to recommend a solution to improve performance when users access the file shares from the branch office. The solution must minimize hardware costs. What should you recommend implementing?()


参考答案:A

第9题:

You are a network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. The company’s main office is in Barcelona, and it has branch offices in Paris and London. The company has no immediate plans to expand or relocate the offices.   The company wants to connect the office networks by using a frame relay WAN connection and Routing and Remote Access servers that are configured with frame relay WAN adapters. Computers in each office will be configured to use the local Routing and Remote Access server as a default gateway. You are planning the routing configuration for the Routing and Remote Access servers.   You need to allow computers in Barcelona, Paris, and London to connect to computers in any office. You want to minimize routing traffic on the WAN connection.   What should you do?  ()

  • A、 At each office, add the OSPF routing protocol to Routing and Remote Access, add the WAN adapter to the OSPF routing protocol, and deploy OSPF as a single-area internetwork.
  • B、 At each office, add the RIP version 2 routing protocol to Routing and Remote Access, and configure the WAN adapter to use RIP version 2. Configure the outgoing packet protocol as RIP version 2 broadcast and the incoming packet protocol as RIP version 1 and 2.
  • C、 At each office, add the RIP version 2 routing protocol to Routing and Remote Access, and configure the WAN adapter to use RIP version 2. Configure the outgoing packet protocol as RIP version 2 multicast and the incoming packet protocol as RIP version 2 only.
  • D、 At each office, configure the Routing and Remote Access server with static routes to the local networks at the other two offices.

正确答案:D

第10题:

Your company has client computers that run Windows Vista.   The company plans to upgrade the Windows Vista computers to Windows 7.   The current configuration of all client computers in your company is based on a common Windows Vista image.   Some branch offices use WAN connections to connect to the main office. You have the following requirements:   Transfer all user data from the original Windows Vista installation to the new Windows 7 installation.  Use the least amount of bandwidth while transferring the user data.  Support the same migration strategy for all offices.    You need to design a user state migration strategy that supports the requirements.   What should you do?()

  • A、Use the multicast feature of Windows Deployment Services (WDS)
  • B、Use the Deployment Image Servicing and Management (DISM) tool
  • C、Use the User State Migration Tool (USMT) and a hard-link migration store
  • D、Use Windows PE to perform an offline migration

正确答案:C

更多相关问题