单项选择题
You need to design security changes that provide maximum protection for customer data and courier assignments.What should you do?()
A.Create a separate domain for courier authentication
B.Implement smart card authentication for business office users and couriers, upgrading client operating systems as needed. Modify the Web kiosks to require smart card presence for continued access
C.Modify the Default Domain Policy Group Policy object (GPO) so that couriers must use complex user account passwords. Require all couriers to change their passwords the next time they log on to the Web application
D.Use Encrypting File System (EFS) to encrypt all files that contain customer data
相关考题
-
单项选择题
YouneedtodesignamethodforjuniorITadministratorstoperformmoreITsupporttasks.Yoursolutionmustmeetbusinessandsecurityrequirements.Whatshouldyoudo?()
A.Delegate appropriate Active Directory permissions to the junior IT administrators
B.Add the junior IT administrators’ user accounts to the Domain Admins user group
C.Create a custom Microsoft Management Console (MMC) that uses taskpad views to enable the appropriate tasks for the junior IT administrators
D.Make the junior IT administrators’ domain user accounts member of the local Administrators group on all client computers
E.Create new domain user accounts for each junior IT administrator. Make the new accounts members of the Domain Admins group and instruct junior IT administrators to use the new accounts only for appropriate administrative tasks -
单项选择题
Youneedtoidentifypotentialsecuritythreats.WhichofthefollowingsecuritybreachesmightoccurunderthecurrentITandsecuritypractices?(Chooseallthatapply)()
A.A virus that infects an IT administrator’s client computer could gain domain administrator privileges
B.Couriers could gain access to domain administrator privileges
C.Business office staff could discover couriers’ passwords and use them to access couriers’ information
D.All users could use their user accounts to gain the ability to install untested security patches on their client computers -
单项选择题
Thecompanywantstoevaluatemakingallbusinessofficeusersadministratorsontheirclientcomputers.Youneedtodesignamethodtoensurethatthischangecanbemadeinamannerthatmeetsbusinessandsecurityrequirements.Whatshouldyoudo?()
A.On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policy
B.On all client computers, implement logon auditing for all user account logons
C.On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policy
D.On all domain controllers, implement logon auditing for all user account logons
