单项选择题
You need to design an administrative control strategy for Denver administrators. What should you do?()
A.Create a security group named HelpDesk. Add the HelpDesk group to the Enterprise Admins group in both domains
B.Create a security group named HelpDesk. Add the HelpDesk group to the Domain Admins groups in both domains
C.Add the Domain Admins group in the litwareinc.com domain to the Domain Admins group in the contoso.com domain. Delegate full control of the litwareinc.com domain to the Domain Admins group in the contoso.com domain
D.Create a security group named HelpDesk for each office. Delegate administrative tasks to their respective OU or domain.Delegate full control of the contoso.com domain to the Domain Admins group from the litwareinc.com domain
相关考题
-
多项选择题
Youneedtodesignaremoteaccesssolutionforthemobilesalesusersinthelitwareinc.comdomain.Whichtwoactionsshouldyouperform?()
A.Configure autoenrollment for user certificates and computer certificates
B.Configure Web enrollment for user certificates and computer certificates
C.Configure a Certificate Services hierarchy in the litwareinc.com domain
D.Configure qualified subordination between the litwareinc.com and the contoso.com domains
E.Configure PEAP authentication on the remote access servers -
单项选择题
YouaredesigningthesettingsforFinServ.Youspecifythepermissionsthatwillbeused.Youneedtospecifyanyadditionalsettingsrequiredbythecompany.Whatshouldyoudo?()
A.Install a digital certificate for Encrypting File System (EFS) on FinServ
B.Activate failure auditing on the access to files and objects
C.Configure all firewalls to track when any packets addresses to FinServ are dropped
D.Create an IPSec policy that requires IPSec encryption between FinServ and the firewall -
单项选择题
Youaredesigningthewirelessnetworksforthethreewarehouses.Yourdesignmustsupporttheinventoryandshippingmanagementsolution,anditmustmeetsecurityrequirements.Whatshouldyoudo?()
A.Ensure that all wireless networking equipment fully supports the IEE 802.11a, IEEE 802.11b, and IEEE 802.11g wireless networking protocols
B.Assign a random service set identifier (SSID) to each wireless access point. Disable broadcasting of SSIDs on all wireless access points
C.Create a firewall to block traffic to any IP address that did not originate from the company’s DHCP servers. Ensure that all wireless access points connect behind this new firewall
D.Configure a server to use Internet Authentication Service (IAS). Configure the wireless networking equipment to use the IEEE 802.1x protocol and the IAS server
