单项选择题
You need to design a method to monitor the security configuration of the IIS server to meet the requirements in the written security policy. What should you do?()
A.Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the IIS server computer account
B.Run the Microsoft Baseline Security Analyzer (MBSA) on the IIS server and scan for vulnerabilities in Windows and IIS checks
C.Run Security Configuration and Analysis to analyze the IIS server’s security settings by using a custom security template
D.On the IIS server, run the gpresult command from a command prompt and analyze the output
相关考题
-
单项选择题
Youneedtodesignastrategytoensurethatallserversareincompliancewiththebusinessrequirementsformaintainingsecuritypatches.Whatshouldyoudo?()
A.Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the domain
B.Log on to each server and run Security Configuration and Analysis to analyze the security settings by using a custom security template
C.Create a logon script to run the secedit command to analyze all servers in the domain
D.Run the Microsoft Baseline Security Analyzer (MBSA) on a server to scan for Windows vulnerabilities on all servers in the domain -
单项选择题
Youneedtodesignamethodtologchangesthataremadetoserversanddomaincontrollers.Youalsoneedtotrackwhenadministratorsmodifylocalsecurityaccountmanagerobjectsonservers.Whatshouldyoudo?()
A.Enable failure audit for privilege user and object access on all servers and domain controllers
B.Enable success audit for policy change and account management on all servers and domain controllers
C.Enable success audit for process tracking and logon events on all servers and domain controllers
D.Enable failure audit for system events and directory service access on all servers and domain controllers -
单项选择题
Youneedtodesignamethodtoconfiguretheserversinthedevelopmentdepartmenttomeettherequirementsofthechiefinformationofficer.Whatshouldyoudo?()
A.Use error reporting on all servers in the development department to report errors for a custom application
B.Configure all servers in the development department so that they do not require the CTRL+ALT+DELTE keys to pressed in order to log on interactively to the server
C.Create a Group Policy object (GPO) and link it to the development department’s Servers OU. Configure the GPO with an interactive logon policy to display a message for users who attempt to log on
D.Configure the screen saver on all servers in the development department to require a password
