欢迎来到PP题库网 PP题库官网
logo
全部科目 > 微软认证考试 > MCSE > MCSE(70-298)

单项选择题

You need to design a strategy to log access to the company Web site. What should you do?()

    A.Enable logging on the company Web site and select the NCSA Common Log File Format. Store the log files on a SQL Server computer
    B.Use System Monitor to create a counter log that captures network traffic to the Web server by using the Web Service object. Store the log files on a SQL Server computer
    C.Run the Network Monitor on the Web server. Create a capture filter for the SNA protocol and save the results to a capture file. Store the capture file on a SQL Server computer
    D.Enable logging on the company Web site and select ODBC Logging. Configure the ODBC logging options by using a nonadministrative SQL account

点击查看答案

相关考题

  • 单项选择题
    Youneedtodesignamethodtoprotecttrafficonthewirelessnetwork.Yoursolutionmustmeettherequirementsofthechiefsecurityofficer.Whatshouldyoudo?()

    A.Configure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addresses
    B.Configure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points use
    C.Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networks
    D.Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks

  • 单项选择题
    Youneedtodesignamonitoringstrategytomeetbusinessrequirementsfordataonserversintheproductiondepartment.Whatshouldyoudo?()

    A.Use the Microsoft Baseline Security Analyzer (MBSA) to scan for Windows vulnerabilities on all servers in the production department
    B.Run Security and Configuration Analysis to analyze the security settings of all servers in the production department
    C.Enable auditing for data on each server in the production department. Run System Monitor on all servers in the production department to create a counter log that tracks activity for the Objects performance object
    D.Create a Group Policy Object (GPO) that enables auditing for object access and link it to the product department’s Servers OU. Enable auditing for data on each server in the production department

  • 单项选择题
    YouneedtodesignamethodtomonitorthesecurityconfigurationoftheIISservertomeettherequirementsinthewrittensecuritypolicy.Whatshouldyoudo?()

    A.Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the IIS server computer account
    B.Run the Microsoft Baseline Security Analyzer (MBSA) on the IIS server and scan for vulnerabilities in Windows and IIS checks
    C.Run Security Configuration and Analysis to analyze the IIS server’s security settings by using a custom security template
    D.On the IIS server, run the gpresult command from a command prompt and analyze the output

微信小程序免费搜题
微信扫一扫,加关注免费搜题

微信扫一扫,加关注免费搜题