51搜题 >医卫类别 >医药类 >试题详情
题目

You need to design a security strategy for the Web folders and files created by the consultants and the internal Web developers. What are two possible ways to achieve this goal?()

A

Require the internal Web developers to use Telnet with Kerberos authentication. Require the consultants to use L2TP with IPSec

B

Require the internal Web developers to use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV). Require the consultants to use Microsoft.NET Passport authentication with Security Level 0

C

Require the internal Web developers to use Web Distributed Authoring and Versioning (WebDAV) over SSL.Require the consultants to use WebDAV over SSL

D

Require the internal Web developers to use L2TP with IPSec. Require the consultants to use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV)

E

Require the internal Web developers to use Web Distributed Authoring and Versioning (WebDAV) over SSL.Require the consultants to use L2TP with IPSec

提示:未搜索到的试题可在搜索页快速提交,您可在会员中心"提交的题"快速查看答案。
答案
查看答案
相关试题

具有定惊安神、活血散瘀、利尿通淋功效的药物是()

A、朱砂

B、磁石

C、龙骨

D、牡蛎

E、琥珀

治疗湿疮肿毒,便血痔血,应选用的药物是()

A、山茱萸

B、五味子

C、桑螵蛸

D、五倍子

E、海螵蛸

You need to design a method to enable remote encryption on Server5. What should you do?()

A、Configure the editor’s user account properties to enable Store password using reversible encryption

B、Configure the editor’s user account properties to enable Use DES encryption for this account

C、Configure the Local Security Policy on Server to enable the System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing security policy

D、Configure the Server5 computer account properties to enable Trust computer for delegation

下列各项,属对因治疗功效的是()

A、止痛

B、止咳

C、止血

D、止汗

E、泻下

You need to design a strategy to log access to the company Web site. What should you do?()

A、Enable logging on the company Web site and select the NCSA Common Log File Format. Store the log files on a SQL Server computer

B、Use System Monitor to create a counter log that captures network traffic to the Web server by using the Web Service object. Store the log files on a SQL Server computer

C、Run the Network Monitor on the Web server. Create a capture filter for the SNA protocol and save the results to a capture file. Store the capture file on a SQL Server computer

D、Enable logging on the company Web site and select ODBC Logging. Configure the ODBC logging options by using a nonadministrative SQL account

联系我们 会员中心
返回顶部