当前位置:MCSE(70-297)题库

问题:

[多选]

You need to identify the types of inbound traffic that should pass through the perimeter firewall while maintaining the security of the network.
 Which inbound traffic should be allowed? ()

A .  VPN Traffic
B .  DNS Traffic
C .  LDAP Traffic
D .  HTTP Traffic
E .  HTTPS Traffic
F .  Traffic from the network address of 192.168.10/24

您有一台运行 Windows 7 的计算机。您需要确定以前的版本占用多少磁盘空间。您应该怎么做?() 在命令提示符处,运行 Diskpart。 在命令提示符处,运行 Vaultcmd。 从“系统”中,查看“系统保护”设置。 从驱动器C的“属性”中,查看以前版本的设置。 糖尿病足的预防的指导要点包括:() 温水洗脚不泡脚。 选择鞋尖宽大、鞋面透气性好、系带、平跟厚鞋。 选择浅色、袜腰松、吸水性好、透气性好、松软暖和的袜子。 不要赤脚或赤脚穿凉鞋、拖鞋行走。 合理饮食,适量运动,积极戒烟。 You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. You are responsible for managing the Exchange network for TestKing.com The organization contains three Exchange Server 2010 Edge Transport Servers and seven ExchangeServer 2010 Hub Transport servers. The Edge Transport server is used to transfer e-mail from your organization to the Internet. During the course of day you receive an instruction form the CIO to ensure that all clients is able to send encrypted messages to other organizations over the Internet as well asensuring that communications between the Hub Transport servers and the Edge Transport servers isencrypted. What should you do?() Your best option would be to deploy SMTP over SSL.。 Your best option would be to implement Security/Multipurpose Internet Mail Extensions (S/MINE).。 Your best option would be to deploy IPsec.。 Your best option would be to implement Domain Securtiy.。 You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. You are responsible for managing an Active Directory Managment Services server named TESTKING-EX01. TestKing.com users currently make use of Outlook Web App (OWA) to access their mailboxes.During the course of day you receive an instruction form the CIO to devise a security solution plan for the organization. Management wants you to ensure that e-mail messages are stored in an encrypted formatand that the administator-defined templates are used to secure messages. What else should you incorporate?() You should consider incorporating Domain Security into the plan.。 You should consider incorporating Secure/Multipurpose Internet Mail Extensions (S/MIME) into theplan.。 You should consider incorporating a legal hold into the plan。 You should consider incorporating Outlook Protection Rules into the plan.。 下列哪一项不是基于TCP/IP协议的进行欺骗攻击的。() IP欺骗。 DNS欺骗。 Web欺骗。 特洛伊木马。

You need to identify the types of inbound traffic that should pass through the perimeter firewall while maintaining the security of the network.
 Which inbound traffic should be allowed? ()

参考答案:

  参考解析

本题暂无解析

相关题目:

在线 客服