You need to design Group Policy object (GPO) settings to support the use of the Encrypting File System (EFS). Your solution must meet business and security requirements. Which two actions should you perform?()

A . Designate a data recovery agent and issue an EFS certificate to the data recovery agent. Export the private key and restrict access to the exported key B . Make the data recovery agent a local administrator on all client computers C . Remove the default data recovery agent from the Default Domain Policy GPO. Then, include the new data recovery agent instead D . Delete the Default Domain Policy GPO. Configure a new GPO linked to the domain that does not specify a data recovery agent

时间:2022-08-27 23:49:41 所属题库:MCSE(70-298)题库

相似题目

  • You need to design a patch management strategy for Northwind Traders. What should you do?()

    A . Configure the Default Domain Policy Group Policy object (GPO) for the northwindtraders.com domain to configure client computers to download updates from the SUS server in New York. Configure the Default Domain Policy GPO for the boston.northwindtraders.com domain to configure client computers to download updates from the SUS server in New York B . Use Group Policy to configure client computers to download updates from a Windows Update server on the Internet. Configure the Default Domain Policy Group Policy object (GPO) with a startup script that runs Mbsacli.exe. Configure it to scan the computers in both of the branch offices C . Install and configure a SUS server in the Boston branch office. Configure the server to download updates from a Windows Update server on the Internet. Configure Microsoft Baseline Security Analyzer (MBSA) to scan for updates and computers in the New York office D . Install and configure a SUS server in each branch office. Configure the SUS servers to download updates from the New York SUS server. Configure Microsoft Baseline Security Analyzer (MBSA) to scan for updates on computers in the New York office

  • You need to design a strategy to meet the company’s requirements for e-mail. What should you do?()

    A . Configure and publish a certificate template that is suitable for S/MIME, Deploy a Group Policy object (GPO) so that a certificate that is based on this template is automatically issued to all domain users B . Specify Group Policy objects (GPOs) and IPSec policies that require all client computers to use Kerberos authentication to connect to mail servers C . For each mail server, acquire an SSL server certificate from a commercial CA whose root certificate is already trusted D . Require IPSec encryption on all TCP connections that are used to send or receive e-mail message

  • You need to design a storage mode for the ProductOrderStatus measure group. What should you do?()

    A . Use ROLAP for the Historical partition and MOLAP for the CurrentDay partition. B . Use MOLAP for the Historical partition and ROLAP for the CurrentDay partition. C . Use ROLAP for the Historical partition and Automatic MOLAP for the CurrentDay partition. D . Use HOLAP for the Historical partition and Low-latency MOLAP for the CurrentDay partition.

  • You need to design an administrative model for the Exchange Server environment. What should you do?()

    A . Create a single organizational unit (OU). Place the user accounts for each office in the OU. Delegate control over the OU to the office’s server administrators and the central IT staff B . Create a single Exchange administrative group. Place all Exchange servers into that administrative group. Assign permissions for the administrative group to the officer’s server administrators and the central IT staff C . Create an Exchange administrative group for each office. Place the Exchange severs for each office into that office’s administrative group. Assign permissions for the administrative group to the office’s server administrators. Allow the central IT staff to manage user mailboxes D . Create an organizational unit (OU) for each office. Place the user accounts for each office into the appropriate OU. Delegate control over each OU to the office’s server administrators. Allow the central IT staff to manager user mailboxe

  • You need to design a patch management strategy that meets business requirements. What should you do?()

    A . Install Systems Management Server (SMS) on a computer on the internal network. Use the Default Domain Policy GPO to distribute the SMS client software to all computers in the domain B . Install Microsoft Operations Manager (MOM) on a computer on the internal network. Use the Default Domain Policy GPO to distribute the MOM client software to all computers in the domain C . Install Software Update Services (SUS) on a Web server, and configure it to synchronize and approve updates nightly. Configure client computers to receive automatic updates from the Web server. Ensure that users restart their client computers daily D . Install Software Update Services (SUS) on a domain controller, and configure it to synchronize and approve updates nightly. Configure client computers to receive automatic updates from the domain controller. Ensure that users restart their client computers daily

  • You need to design a method to address the chief information officer’s security concerns. What should you do?()

    A . Configure Windows Management Instrumentation (WMI) filtering options in the Default Domain Policy GPO B . Use the gpresult command C . Use Mbsacli.exe D . Configure software restriction policy options in the Default Domain Policy GPO

  • You need to design the storage of the application texts for UI elements to fulfill the requirements. Which table and column design should you use?()

    A . Languages (LanguageID, Name)Elements (ElementID, Description)ElementLanguages (ElementID, LanguageID, Text)  B . Languages (LanguageID, Name)Elements (ElementID, LanguageID, Description, Text)  C . Languages (LanguageID, Name)ElementTexts (LanguageID, Text)ElementDescriptions (ElementID, Description)  D . Languages (LanguageID, Name)Elements (ElementID, Description, Text)

  • You need to design a PKI for the Northwind Traders internal network. What should you do?()

    A . Add an enterprise root CA to the northwindtraders.com domain. Configure cross-certification between the northwindtraders.com domain and the boston.northwindtraders.com domain B . Add an enterprise subordinate issuing CA to the northwindtraders.com domain. Configure qualified subordination for the enterprise subordinate issuing CA in Boston C . Add enterprise subordinate issuing CAs to the New York, Boston, and Seattle LANs. Configure qualified subordinations for each enterprise subordinate issuing CA D . Add a stand-alone commercial issuing CA to only the northwindtraders.com domain. Configure cross-certification between the commercial CA and the boston.northwindtraders.com domai

  • You need to configure connectors between each routing group. What are two possible ways to achieve this goal?()

    A . Create and configure SMTP connectors between the routing groups. Do not create additional connectors between the routing groups B . Create and configure routing group connectors between the routing groups. Do not create additional connectors between routing groups C . Create and configure low-cost group connectors and high-cost SMTP connectors between the routing groups D . Create and configure high-cost routing group connectors and low-cost SMTP connectors between the routing grou

  • You need to design a PKI for Litware, Inc. What should you do?()

    A . Add one offline stand-alone root certificate authority(CA).Add two online enterprise subordinate CAs B . Add one online stand-alone root certification authority(CA).Add two online enterprise subordinate CAs C . Add one online enterprise root certification authority CA).Add one offline enterprise subordinate CA D . Add one online enterprise root certification authority(CA).Add two online enterprise subordinate CA

  • You need to design a configuration for the mailbox servers. What should you do?()

    A . Create two Exchange Server 2003 computers. Place the mailboxes for main office users on one server, and place the mailboxes for remote users on the other server B . Create a Network Load Balancing cluster that contains two Exchange Server 2003 computers. Place half of the user mailboxes on one server, and place half of the user mailboxes on the other server C . Create a Microsoft Cluster Server cluster that contains two Exchange Server 2003 computers. Place all of the user mailboxes on one server and configure the other server as a failover node D . Create a Microsoft Cluster Server cluster that contains two Exchange Server 2003 computers. Place half of the user mailboxes on one server, and place half of the user mailboxes on the other server

  • You are designing for implementing Group Policy objects (GPOs) to meet the business and technical requirement. What should you do?()

    A . Create one new GPO to enforce software restriction policies. Link this GPO to the domain. B . Create one new GPO to enforce software restriction policies. Link this GPO to the appropriate  organizational unit (OU). C . Create one new GPO to enforce software restriction policies. Link this GPO to all organizational units (OUs). D . Create new GPOs to match the number of organizational units (OUs).configure these GPOs to enforce software restriction policies. Link this GPO to its respective OU.

  • You need to design a PKI that meets business requirements. What should you do?()

    A . Move ATLCA1 offline and create an enterprise subordinate CA to issue certificates B . Create a stand-alone subordinate CA to issue certificates C . Use a qualified subordinate CA D . Configure certificate template access control lists (ACLs) on ATLCA1

  • You need to design an administrative model for Exchange Server 2003. What should you?()

    A . Create an administrative group for each office. Place each Exchange server that is managed by an office technician into that Office’s administrative group. Assign the central IT group full control over all administrative groups. Assign each office technician control over his or her office’s administrative groups B . Create one administrative group. Place all Exchange servers in the administrative group. Assign the central IT group full control over the administrative group. Make each office technician a member fo the local Backup Operators group on each group they manage C . Create an administrative group for each office. Place one Exchange server in each group. Assign the central IT group and each office technician full control over each administrative group D . Create one administrative group for all Exchange front-end servers. Assign each office technician control over this administrative group. Create another administrative group for all Exchange back-end servers. Assign the central IT group control over this administrative grou

  • You need to design a certificate management process for internal users. What should you do?()

    A . Establish a Web enrollment service for internal users to request access to resources B . Grant Enrollment Agent rights to users C . Establish enrollment stations and store user certificates in a smart card D . Create Connection Manager scripts to identify the client computer operating system, and configure Web proxy settings to specify the appropriate Web enrollment service

  • You need to design a method to enable remote encryption on Server5. What should you do?()

    A . Configure the editor’s user account properties to enable Store password using reversible encryption B . Configure the editor’s user account properties to enable Use DES encryption for this account C . Configure the Local Security Policy on Server to enable the System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing security policy D . Configure the Server5 computer account properties to enable Trust computer for delegatio

  • You are designing for implementing Group Policy objects (GPOs) to meet the business and technical requirement.  What should you do? ()

    A .  Create one new GPO to enforce software restriction policies. Link this GPO to the domain. B .  Create one new GPO to enforce software restriction policies. Link this GPO to the appropriate organizational unit (OU). C .  Create one new GPO to enforce software restriction policies. Link this GPO to all organizational units (OUs). D .  Create new GPOs to match the number of organizational units (OUs).configure these GPOs to enforce software restriction policies. Link this GPO to its respective OU.

  • You need to design a method to deploy security configuration settings to servers. What should you do?()

    A . Run the Resultant Set of Policy wizard with a Windows Management Instrumentation (WMI) filter on each department’s Server OU B . Log on to each server and use local policy to configure and manage the security settings C . Create a customer security template. Log on to a domain controller and run the seceditcommand to import the security template D . Create a customer security template. Create a GPO and import the security template. Link the GPO to each department’s Server OU

  • You need to design an access control strategy for the Payment folder for the Sales Managers group. What should you do?()

    A . Use IPSec in transport mode B . Use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV) C . Use PEAP-EAP-TLS D . Use Encrypting File System (EFS) remote encryptio

  • You need to design an administrative control strategy for Denver administrators. What should you do?()

    A . Create a security group named HelpDesk. Add the HelpDesk group to the Enterprise Admins group in both domains B . Create a security group named HelpDesk. Add the HelpDesk group to the Domain Admins groups in both domains C . Add the Domain Admins group in the litwareinc.com domain to the Domain Admins group in the contoso.com domain. Delegate full control of the litwareinc.com domain to the Domain Admins group in the contoso.com domain D . Create a security group named HelpDesk for each office. Delegate administrative tasks to their respective OU or domain.Delegate full control of the contoso.com domain to the Domain Admins group from the litwareinc.com domai

  • You need to design a group membership strategy for the EditorialAdmins group. What should you do?()

    A . Move the EditorialAdmins group to the Servers OU in the editorial department B . Move the members of the EditorialAdmins group to the Editorial OU C . Move the members of the EditorialAdmins group to the New York OU D . Move the EditorialAdmins group to the New York OU

  • You need to design access to e-mail by Internet users. What should you do?()

    A . Configure front-end servers to use HTTP to communicate with back-end servers B . Configure the internal firewall to allow IPSec traffic between front-end and back-end Exchange servers C . Require all users to encrypt all outbound e-mail messages D . Issue digital certificates to all remote users. Require the certificates to be used when authenticating to Outlook Web Acce

  • You need to design the deployment of antivirus software. What should you do?()

    A . Install the antivirus software on each mailbox storage server B . Install the antivirus software on each Outlook Web Access server C . Install the antivirus software on one Outlook Web Access server at each office D . Install the antivirus software on a back-end server that contains no mailboxe

  • You need to maintain the partitions on the ProductOrderStatus measure group. What should you do?()

    A . Create a Microsoft SQL Server 2005 Integration Services (SSIS) package that alters the partition queries and processes aggregated partitions every evening. B . Enable proactive caching on the partitions. Set the cache to update periodically with a latency of 24 hours. C . Set the rebuild interval of the partitions to 36 hours. Create a Microsoft SQL Server 2005 Integration Services (SSIS) package that processes aggregated partitions every evening. D . Enable proactive caching on the ProductOrderStatus measure group. Set scheduled polling that re-processes the measure group whenever the system dates change.