找考题网-背景图
单项选择题

A. Maintain a list of the dates that the approved scrip……

You are a security administrator for your company. The company has one main office and five branch offices. Network administrators work in the main office and each branch office.   
Network administrators in the main office frequently create scripts that automate common 
administrative tasks. You review each script to ensure it does not introduce security vulnerabilities. Scripts that do not introduce security vulnerabilities are considered approved. Occasionally, branch office administrators modify these scripts and distribute the modified scripts to other 
branch office administrators. Branch office administrators often report that they accidentally run a modified version of a script.   
You need to ensure that branch office administrators can verify which scripts are approved scripts. 
What should you do?()



A. Maintain a list of the dates that the approved scripts were last modified. lnstruct branch office administrators to verif
B. Digitally sign All approved scripts. Instruct branch office administrators to verify the signature before using a script.
C. Distribute all approved scripts to branch office administrators in an e-mail message.
D. Place all approved scripts on a file server in the main office. Assign All branch office administrators only the Allow -the approved scripts. Instruct administrators to copy scripts from this file server.

热门试题

单项选择题You are a security administrator for your company. The network consists of a single Active Directory domain. Servers run either Windows Server 2003 or Windows 2000 Server. All client computers run Windows XP Professional.    The company’s written security policy states that user accounts must be locked if an unauthorized user attempts to guess the users, passwords. The current account policy locks out a user after two invalid password attempts in five minutes. The user remains locked out until the account is reset by an administrator. Users frequently call the help desk to have their account unlocked. Calls related to account lockout constitute 25 percent of help desk calls.    You need to reduce the number of help desk calls related to account lockout.  What should you do?()

A. Modify the Default Domain Controllers Policy Group Policy object(GPO). Increase the maximum lifetime for service
B. Modify the Default Domain Policy Group Policy object(GPO). Configure an account lockout threshold of 10.
C. Modify the Default Domain Controllers Policy Group Policy object(GPO). Disable the enforcement of user logon res
D. Modify the Default Domain Policy Group Policy object(GPO). Increase the minimum password age.

单项选择题You are a security administrator for your company. The network consists of a single Active  Directory domain. All servers run Windows Server 2003. All client computers run Windows 2000 Professional.   You manage a Windows Server 2003 computer named Server1 that is a domain member server. You use IIS on Server1 to host an Internet Web site. Approximately 4,000 employees of your company connect over the lnternet to access company confidential data on Server1. You control access to data on Server1 by using NTFS file permissions assigned to groups. Different groups are assigned access to different files. Employees must have access only to files that they are assigned access to based on their membership in a group. You enable SSL on Server1 to protect confidential data while it is in transit. You issue each employee an Authenticated Session certificate and store a copy of that certificate with their user account in the Active Directory domain.    You need to ensure that Server1 authenticates users based on possession of their certificate.  What should you do?()

A. Request a Web server certificate from a commercial certification authority (CA).
B. Configure access restrictions based on employee ip address.
C. Enable Digest authentication for Windows domain servers.
D. Configure client certificate mapping.

单项选择题You are a security administrator for your company. The network consists of two Active Directory forests.    The first forest is named tailspintoys.com and contains domain controllers that run either  Windows Server 2003 or Windows 2000 Server. The second forest is named wingtiptoys.com and contains domain controllers that run Windows Server 2003. No trust relationships areestablished.    A certification authority (CA) running Windows Server 2003 Certificate Services is deployed and all computers are issued a Computer certificate. A Windows Server 2003 computer named  Server1 is a member of the wingtiptoys.com Active Directory domain. Server1 provides users in both domains access to a payroll application. You decide to implement IPSec to encrypt the  payroll application data during transmission. You configure a custom IPSec policy named Payroll App on Server1 using the rules shown in the exhibit. (Click the Exhibit button.)    You configure an IPSec default Client policy on the client computers in both Active Directory domains. During testing, you notice that client computers in the wingtiptoys.com Active Directory domain use IPSec when communicating with Server1. However, client computers in the tailspintoys.com Active Directory domain cannot communicate with Server1.    You need to enable all client computers to use IPSec when communicating with Server1.  What should you do?()

A. Modify the custom Payroll App policy by adding the certificate authentication type to the existing rules on Server1.
B. Use the custom Payroll App policy and issue an IPSec certificate from the internal CA to Server1.
C. Unassign the custom Payroll App policy and assign the default Server policy on Server1.
D. Unassign the custom Payroll App policy and assign the default Secure Server policy on Server1.

多项选择题You are the security administrator of your network. The network consists of an Active Directory domain. All computers on the network are in the domain. The domain controllers and file servers on the network run Windows Server 2003. The client computers run Windows XP Professional.    The file servers use a custom IPSec policy named Server Traffic. The Server Traffic policy contains rules to encrypt Telnet and SNMP traffic, as shown in the exhibit. (Click the Exhibit button.) All client computers use the Client (Respond Only) IPSec policy. The default exemptions to IPSec filtering are disabled on the client computer. You want to configure the network so that Telnet, SNMP,and Kerberos traffic is encrypted by IPSec. You do not want to encrypt other network protocols. What should you do?()

A. On the client computers,enable the default exemptions to IPSec filtering.
B. On the file servers,enable the default exemptions to IPSec filtering.
C. On the file servers,configure the IPSec policy in the local computer policy to encrypt Kerberos traffic.
D. Add a new rule to the Server Traffic policy to encrypt Kerberos traffic.
E. Configure the Server Traffic policy to enable the Default Response rule.
F. Configure the rules in the Server Traffic policy to use an authentication method other than Kerberos.