Run the Resultant Set of Policy wizard with a Windows Management Instrumentation (WMI) filter on each department’s Server OU
Log on to each server and use local policy to configure and manage the security settings
Create a customer security template. Log on to a domain controller and run the seceditcommand to import the security template
Create a customer security template. Create a GPO and import the security template. Link the GPO to each department’s Server OU
第1题:
You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains 50 application servers that run Windows Server 2003. The security configuration of the application servers is not uniform. The application servers were deployed by local administrators who configured the settings for each of the application servers differently based on their knowledge and skills. The application servers are configured with different authentication methods, audit settings, and account policy settings. The security team recently completed a new network security design. The design includes a baseline configuration for security settings on all servers. The baseline security settings use the Hisecws.inf predefined security template. The design also requires modified settings for servers in an application role. These settings include system service startup requirements, renaming the administrator account, and more stringent account lockout policies. The security team created a security template named Application.inf that contains the modified settings. You need to plan the deployment of the new security design. You need to ensure that all security settings for the application servers are standardized, and that after the deployment, the security settings on all application servers meet the design requirements. What should you do? ()
第2题:
You need to design a method to address the chief information officer’s security concerns. What should you do?()
第3题:
Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows Vista computers. You are planning to deploy Windows 7 and a custom application. You have the following requirements: The application must be available to only a specific group of users. You must be able to monitor application usage. You need to design a deployment method for the custom application that meets the requirements. Which deployment method should you use in your design?()
第4题:
You are creating a Windows Communication Foundation (WCF) service based on WSHttpBinding. New audit requirements dictate that callers must be authenticated on every call to ensure that their credentials have not been revoked.You need to ensure that the service will not cache the security request token. What should you do?()
第5题:
You need to design a method to enable remote encryption on Server5. What should you do?()
第6题:
You are planning a Windows 7 deployment infrastructure for a new company. You have the following requirements: Three domains 10,000 client computers No user interaction You need to recommend a deployment infrastructure. What should you recommend?()
第7题:
You need to design a security patch management strategy. Your solution must meet business and security requirements, and it must accommodate the company’s resource restrictions. What should you do?()
第8题:
You need to design a method to standardize and deploy a baseline security configuration for servers. You solution must meet business requirements. What should you do?()
第9题:
You have an Exchange Server 2010 organization that consists of 50 Exchange Server 2010 servers. Your companys security policy states that approved Exchange and Windows Server patches and securityupdates must be applied to all Exchange servers within one week of being released. You need to recommend a patch management solution that meets the following requirements: .Allow administrators to manually approve patches and security updates .Allow only the installation of approved patches and security updates .Minimize the administrative effort to deploy patches .Minimize the deployment costs What should you include in the solution?()
第10题:
You deploy mobile devices that run Microsoft Windows Mobile 5.0. Company security policy requires an authentication process that is stronger than a user name and password combination. You need to ensure that Microsoft ActiveSync sessions use an authentication process that meets the company security policy. What should you do?()