找考题网-背景图
单项选择题

A.Encrypt customer information when it is stored and wh……

You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()

A.Encrypt customer information when it is stored and when it is being transmitted
B.Require encrypted connections to the public Web site, which is hosted on the Web server on the perimeter network
C.Encrypt all marketing information on file servers and client computers
D.Require encrypted connections to all file servers

热门试题

单项选择题Youneedtodesignanaccesscontrolstrategythatmeetsbusinessandsecurityrequirements.Yoursolutionmustminimizeforestwidereplication.Whatshouldyoudo?()

A.Create a global group for each department and a global group for each location. Add users to their respective departmental groups as members. Place the departmental global groups within the location global groups. Assign the location global groups to file and printer resources in their respective domains, and then assign permissions for the file and printer resources by using the location global groups
B.Create a global group for each department, and add the respective users as members. Create domain local groups for file and printer resources. Add the global groups to the respective domain local groups. Then, assign permissions to the file and printer resources by using the domain local groups
C.Create a local group on each server and add the authorized users as members. Assign appropriate permissions for the file and printer resources to the local groups
D.Create a universal group for each location, and add the respective users as members. Assign the universal groups to file and printer resources. Then, assign permissions by using the universal groups

单项选择题You need to design a permission structure for registry objects that enables the legacy application at the resorts to run. Your solution must comply with the written security policy.  What should you do?()

A.Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the legacy application, Use the GPO to give the Domain Users security group full control on the partitions of the registry that the legacy application uses
B.Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the legacy application. Use the GPO to give the Domain Users security group full control on the HKEY_USERS partition of the registry
C.Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the Legacy application. Use the GPO to make all users who require access to the application members of Local Administrators group on each computer
D.Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the Legacy application. Use the GPO to give all users who require access to the application full control for the Ntuser.dat file