多项选择题
A. Enable offline files for the confidential files that are stored on TestKing1, and select the Encrypt offline files to secure data check box on the client computers of the users who need to access the files.
B. Use IPSec encryption between TestKing1 and the client computers of the users who need to access the confidential files.
C. Use Server Message Block (SMB) signing between TestKing1 and the client computers of the users who need to access the confidential files.
D. Disable all LM and NTLM authentication methods on TestKing1.
E. Use IIS to publish the confidential files. Enable SSL on the IIS server. Open the files as a Web folder.
单项选择题 You are the network administrator for The network consists of a single Active Directory domain named The intranet Web site is hosted on a Windows Server 2003 computer named TestKing4, which is a member of a workgroup. All client computers are members of the domain and are enabled for IPSec. The network security administrator creates a new security policy for TestKing4. The policy states that only HTTP traffic is permitted, that HTTP traffic must be encrypted, and that all computers must be authenticated. The new security policy is implemented. Domain users report that they are not able to connect to TestKing4. You load the IP Security Monitor snap-in, and you view the details shown in the following window. You need to ensure that all domain users can securely connect to TestKing4. What should you do?()
单项选择题 You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. A member server named TK1 runs IIS. You install a Web-enabled application on TK1. The application includes a security feature that detects unauthorized attemptsto access the server. Whenever an authorized attempt is detected, the application automatically modifies the IIS configuration file to restrict the unauthorized users access. To test the security feature, you try to gain unauthorized access to TK1. Twenty seconds after your first attempt, you try again. However, TK1 does not restrict your access on the second attempt. You wait five minutes, and then you examine the IIS configuration file. You verify that it was correctly modified by the application to restrict your access. You need to configure IIS to ensure that changes in the IIS configuration file will result in immediate changes in the behaviour of IIS. What should you do?()
单项选择题 You are the network administrator for The network consists of a single Active Directory domain named testking.com. All domain controllers run Windows Server 2003. A member server named TestKing3 has IIS installed. TestKing3 hosts all content for company web sites. The server is backed up on magnetic tape once each month. To replace the web functionality of TestKing3, the company acquires a new computer. You configure the computer as a member server named TestKing4 and install IIS. You transfer all content from TestKing3 to TestKing4 and start the IIS service on TestKing4. You discover that TestKing4 is not configured with the IIS settings that were defined on TestKing3. You need to ensure that TestKing4 has the same IIS settings that were defined on TestKing3. What should you do?()