单项选择题
You need to design a strategy to move confidential data from research users’ client computers to ATLFP2. Your solution must meet the business requirements. What should you instruct the research users to do?()
A.Move the encrypted data to a folder on ATLFP2 over an IPSec connection
B.Move the encrypted data to an Encrypting File System (EFS) folder on ATLFP2 over an IPSec connection
C.Move the encrypted data to a new server that is not a member of the domain, and then move it to ATLFP2
D.Move the encrypted data to a compressed folder on ATLFP2 by using Web Distributed Authoring and Versioning (WebDAV) over SSL
相关考题
-
单项选择题
Youneedtodesignanauthenticationsolutionforthewirelessnetwork.Yoursolutionmustmeetthesecurityrequirements.Whatshouldyoudo?()
A.Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access point
B.Configure IEEE 802.1x authentication with smart cards
C.Configure the wireless network to use Wired Equivalent Privacy (WEP)
D.Install and configure an Internet Authentication Service (IAS) server -
单项选择题
YouneedtodesignanauthenticationsolutionforTerminalServicesthatmeetsthebusinessrequirements.Whatshouldyoudo?()
A.Configure the terminal server to use smart cards
B.Configure IPSec to permit only Remote Desktop Protocol (RDP) connections to the terminal server
C.Deny the Remote Desktop Users group access to the terminal server
D.Restrict treyresearch.com users from logging on locally to the terminal server -
单项选择题
The company is evaluating using a new Active Directory domain to contain all customer user accounts. You need to design a monitoring or logging strategy that meets business and security requirements for the new Web-based ordering application. Your solution must minimize overhead on existing domain controllers and servers. What should you do?()
A.Enable logon auditing in both the new and the existing domains
B.Enable logon auditing only in the existing domain
C.Enable logon auditing only in the new domain
D.Enable logon auditing on only the Web server
