单项选择题
The company is evaluating using a new Active Directory domain to contain all customer user accounts. You need to design a monitoring or logging strategy that meets business and security requirements for the new Web-based ordering application. Your solution must minimize overhead on existing domain controllers and servers.
What should you do?()
A.Enable logon auditing in both the new and the existing domains
B.Enable logon auditing only in the existing domain
C.Enable logon auditing only in the new domain
D.Enable logon auditing on only the Web server
相关考题
-
单项选择题
Youneedtodesignasecuritypatchmanagementstrategy.Yoursolutionmustmeetbusinessandsecurityrequirements,anditmustaccommodatethecompany’sresourcerestrictions.Whatshouldyoudo?()
A.Test and manually deploy updates
B.Deploy a Software Update Services (SUS) server. Test all updates and then approve them. Configure all client computers to automatically obtain updates from the server
C.Test all updates and then use a third-party utility to repackage updates in a Windows Installer file. Deploy the -.msi files by using Group Policy
D.Configure all client computers to use Automatic Updates to obtain security updates from the Windows Update Web site. Test all updates posted to the Windows Update Web site -
单项选择题
YouneedtodesignadomainmodelthatmeetsthecompanybusinessandsecurityrequirementsforcontrollingaccesstothenewWeb-basedorderingapplication.Whatshouldyoudo?()
A.Create a child OU within the existing domain
B.Create a child domain of the existing domain
C.Create a new domain in a new forest. Configure the new domain to trust the existing domain
D.Create a new tree in the existing forest. Configure the new domain to trust the existing domain -
单项选择题
Youneedtodesignamethodtomodifythecurrente-mailorderingsystem.WhichwillbeuseduntilFourthCoffeedeploystheWeb-basedorderingapplication.Yoursolutionmustaddressbusinessconcernsandimprovesecurity.Whatshouldyoudo?()
A.Configure the mail server to disallow SMTP relaying
B.Instruct customers to obtain digital certificates from a trusted commercial authority (CA), and digitally sign all order e-mail messages. Reject unsigned order e-mail messages
C.Provide customers with a public encryption key, and instruct them to encrypt all order e-mail messages. Reject unencrypted e-mail messages
D.Implement an e-mail filtering solution, and add customer e-mail addresses to the list of allowed addresses. Reject e-mail messages from other addresses
