找考题网-背景图
多项选择题

A.Use SSH to encrypt content as it is transferred to th……

You need to design a method to update the content on the Web server. Your solution must meet business and security requirements. What are two possible ways to achieve this goal?()

A.Use SSH to encrypt content as it is transferred to the Web server on the perimeter network
B.Install the Microsoft FrontPage Server Extensions, and use FrontPage to update content
C.Use Web Distributed Authoring and Versioning (WebDAV) over and SSL connection to the Web server to update content
D.Use FTP over an IPSec connection to transfer content to the Web server
E.Use Telnet to connect to the Web server, and then perform content changes directly on the server

热门试题

单项选择题Youneedtodesignanaccesscontrolstrategythatmeetsbusinessandsecurityrequirements.Yoursolutionmustminimizeforestwidereplication.Whatshouldyoudo?()

A.Create a global group for each department and a global group for each location. Add users to their respective departmental groups as members. Place the departmental global groups within the location global groups. Assign the location global groups to file and printer resources in their respective domains, and then assign permissions for the file and printer resources by using the location global groups
B.Create a global group for each department, and add the respective users as members. Create domain local groups for file and printer resources. Add the global groups to the respective domain local groups. Then, assign permissions to the file and printer resources by using the domain local groups
C.Create a local group on each server and add the authorized users as members. Assign appropriate permissions for the file and printer resources to the local groups
D.Create a universal group for each location, and add the respective users as members. Assign the universal groups to file and printer resources. Then, assign permissions by using the universal groups

单项选择题You need to design a permission structure for registry objects that enables the legacy application at the resorts to run. Your solution must comply with the written security policy.  What should you do?()

A.Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the legacy application, Use the GPO to give the Domain Users security group full control on the partitions of the registry that the legacy application uses
B.Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the legacy application. Use the GPO to give the Domain Users security group full control on the HKEY_USERS partition of the registry
C.Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the Legacy application. Use the GPO to make all users who require access to the application members of Local Administrators group on each computer
D.Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the Legacy application. Use the GPO to give all users who require access to the application full control for the Ntuser.dat file