找考题网-背景图
单项选择题

A.Configure and publish a certificate template that is ……

You need to design a strategy to meet the company’s requirements for e-mail. What should you do?()

A.Configure and publish a certificate template that is suitable for S/MIME, Deploy a Group Policy object (GPO) so that a certificate that is based on this template is automatically issued to all domain users
B.Specify Group Policy objects (GPOs) and IPSec policies that require all client computers to use Kerberos authentication to connect to mail servers
C.For each mail server, acquire an SSL server certificate from a commercial CA whose root certificate is already trusted
D.Require IPSec encryption on all TCP connections that are used to send or receive e-mail messages

热门试题

多项选择题Youneedtodesignanauthenticationsolutionforwirelessnetworkaccess.Yoursolutionmustmeetbusinessandtechnicalrequirements.Whichtwoactionsshouldyouperform?()

A.Deploy an offline enterprise root CA in the corp.woodgrovebank.com domain. Deploy subordinate enterprise root CAs in each child domain. Install Internet Authentication Service (IAS) on one member server in the la.corp.woodgrovebank.com domain and one member server in the den.corp.woodgrovebank.com domain
B.Deploy an enterprise root CA in each domain. Install Internet Authentication Service (IAS) on a member server in the corp.woodgrovebank.com domain. Install the Routing and Remote Access service on a member server in each child domain, and configure these servers as RADIUS clients
C.Enroll and deploy user certificates to all administrators in each domain. Enroll and deploy computer certificates to all portable computers that have wireless network adapters. Configure each portable computer to use Protected EAP (PEAP) for authentication
D.Enroll and deploy computer certificates to all portable computers that have wireless network adapters. Configure each portable computer to use EAP-MS-CHAP v2 for authentication. Configure each portable computer to connect to the Internet Authentication Service (IAS) server

单项选择题Youneedtodesignasecuritystrategythatwillensurethatunauthorizeduserscannotaccesspersonneldata.Yoursolutionmustcomplywithsecurityrequirementsandthecompany’snewadministrativemodel.Whatshouldyoudo?()

A.In the Default Domain Policy Group Policy object (GPO) for the corp.woodgrovebank.com domain, add the LA\HRUsers group to the Restricted Groups list. Add only the HR department user accounts to the Allowed Members list
B.In the Default Domain Policy Group Policy object (GPO) for the la.corp.woodgrovebank.com domain, add the LA\HRUsers group to the Restricted Groups list. Add only the HR department user accounts to the Allowed Members list
C.In the Default Domain Policy Group Policy object (GPO) for the corp.woodgrovebank.com domain, add the LA\HRUsers group and the CORP\Backup Operators group to the Restricted Groups list. Add only the HR department user accounts and the administrator user accounts to the Allowed Members list for each group
D.In the Default Domain Policy Group Policy object (GPO) for the la.corp.woodgrovebank.com domain, add the LA\HRUsers group and the CORP\Backup Operators group to the Restricted Groups list. Add only the HR department user accounts to the Allowed Members list for the LA\HRUsers group. Add only the administrator user accounts to the Allowed Members list for the CORP\Backup Operators group