{"id":655,"date":"2008-12-18T09:21:41","date_gmt":"2008-12-18T01:21:41","guid":{"rendered":"http:\/\/www.killtest.com.tw\/?p=655"},"modified":"2008-12-18T09:23:38","modified_gmt":"2008-12-18T01:23:38","slug":"70-299","status":"publish","type":"post","link":"https:\/\/www.killtest.com.tw\/?p=655","title":{"rendered":"70-299"},"content":{"rendered":"<p>MCSE <a title=\"70-299\" href=\"http:\/\/www.killtest.net\/MCSE2003\/70-299.asp\">70-299<\/a>\u8003\u8a66\u984c\u5eab\u7531KillTest\u8a8d\u8b49\u984c\u5eab\u7db2\u8cc7\u6df1IT\u8a8d\u8b49\u8b1b\u5e2b\u548cMCSE2003\u7522\u54c1\u5c08\u5bb6\u7d50\u5408PROMETRIC\u6216VUE\u7684\u771f\u5be670-299\u8003\u8a66\u74b0\u5883\u6700\u65b0\u539f\u984c\u50be\u5fc3\u6253\u9020\u3002\u984c\u5eab\u8986\u84cb\u4e86\u7576\u524d\u6700\u65b0\u7684\u771f\u5be6\u8003\u984c\uff0c\u4e26\u4e14\u5168\u90e8\u9644\u6709\u6b63\u78ba\u7b54\u6848\uff0c\u6211\u5011\u627f\u8afe\u984c\u5eab\u5c0dMCSE 70-299(Implementing and Administering Security in a Microsoft Windows Server 2003 Network)\u8003\u8a66\u539f\u984c\u5b8c\u6574\u8986\u84cb\u300270-299\u984c\u5eab\u52a9\u60a8\u8f15\u9b06\u901a\u904e\u8a8d\u8b49\u8003\u8a66\uff0c\u4e00\u6b21\u4e0d\u904e\u5168\u984d\u9000\u6b3e\u3002<\/p>\n<p>MCSE70-299(Implementing and Administering Security in a Microsoft Windows Server 2003 Network)\u8003\u984c\u7531\u6211\u5011\u7684\u8cc7\u6df1IT\u8a8d\u8b49\u8b1b\u5e2b\u548cMCSE2003\u7522\u54c1\u5c08\u5bb6\u7cbe\u5fc3\u6253\u9020\uff0c\u5305\u62ec\u4e86\u7576\u524d\u6700\u65b0\u7684\u771f\u5be670-299\u8003\u984c\uff0c\u5168\u90e8\u9644\u6709\u6b63\u78ba\u7b54\u6848\u3002<\/p>\n<p>Implementing and Administering Security in a Microsoft Windows Server 2003 Network(<a title=\"70-299\" href=\"http:\/\/www.killtest.com.tw\/index.php\/microsoft\/70-299\/\">70-299 <\/a>Exam)\u5c6c\u65bcMCSE\u8a8d\u8b49\u8003\u8a66\u4e2d\u7684\u4e00\u9580\uff0c\u5982\u679c\u9700\u8981\u53d6\u5f97MCSE\u8b49\u66f8\uff0c\u60a8\u53ef\u80fd\u9084\u9700\u8981\u53c3\u52a0\u5176\u4ed6\u76f8\u95dc\u8003\u8a66\uff0c\u8a73\u60c5\u53ef\u8a2a\u554fMCSE\u8a8d\u8b49\u5c08\u984c\uff0c\u5728\u90a3\u88e1\uff0c\u4f60\u5c07\u770b\u5230\u6240\u6709MCSE\u8a8d\u8b49\u76f8\u95dc\u8003\u8a66\u79d1\u76ee\u3002<\/p>\n<p>1.You are a security administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.Eight Windows Server 2003 computers are members of the domain. These computers are used to store confidential files. They reside in a data center that only IT administration personnel have physical access to. You need to restrict members of a group named Contractors from connecting to the file server computers. Allother employees require access to these computers.<br \/>\nWhat should you do?<br \/>\nA. Apply a security template to the file server computers that assigns the Access this computer from the network right to the Domain Users group.<br \/>\nB. Apply a security template to the file server computers that assigns the Deny access to this computer from the net work right to the Contractors group.<br \/>\nC. Apply a security template to the file server computers that assigns the Allow log on locally right to the Domain Users group.<br \/>\nD. Apply a security template to the file server computers that assigns the Deny log on locally right to the Contractors group.<br \/>\nAnswer: B<\/p>\n<p>2. You are a security administrator for your company. The network consists of a single Active Directory domain.<br \/>\nFour Windows Server 2003 computers run IIS and serve as Web servers on the Internet.<br \/>\nThe company&#8217;s written security policy states that computers that are accessible from the Internet must be hardened against attacks. The procedure for hardening computers includes disabling unnecessary services. You evaluate which services are necessary by using the following information about the Web servers: Customers and business partners access Web content on the Web servers after they authenticate by using a user<br \/>\nname and password. To access certain parts of the site, some of these connections use the SSL protocol.<br \/>\nAll software is installed locally on the Web servers by using removable media, except for service packs and security patches.<br \/>\nThe Web servers automatically download service packs and security patches from an internal computer that runs Software Update Services (SUS).<br \/>\nThe Web servers are not functioning as any other roles.<br \/>\nYou need to create a security template for the Web servers that disables unnecessary services and allows necessary services to operate.<br \/>\nWhat should you do?<br \/>\nTo answer, drag the appropriate service startup types to the correct locations in the work area.<\/p>\n<p>Answer:<\/p>\n<p>3. You are a security administrator for your company. The network consists of a single Active Directory domain.<br \/>\nServers run either Windows Server 2003 or Windows 2000 Server. All client computers run Windows 2000 Professional. The latest operating system service pack is installed on each computer.<br \/>\nThirty Windows Server 2003 computers are members of the domain and function as file servers. Client computers access files on these file servers over the network by using the Server Message Block (SMB) protocol. You are concerned about the possible occurrence of man-in-the-middle attacks during SMB communications.<br \/>\nYou need to ensure that SMB communications between the Windows Server 2003 file servers and the client computers are cryptographically signed. The file servers must not communicate with client computers if the client computers cannot sign SMB communications. Client computers must be able to use unsigned SMB<br \/>\ncommunications with all other computers in the domain.<br \/>\nWhat should you do to configure the file servers?<br \/>\nA. Apply a security template that enables the Microsoft network server: Digitally sign communications (always) setting.<br \/>\nB. Apply a security template that enables the Microsoft network server: Digitally sign communications (if client agrees) setting.<br \/>\nC. Apply a security template that enables the Domain member: Digitally sign secure channel data (when possible)setting.<br \/>\nD. Apply a security template that enables the Domain member: Digitally encrypt or sign secure channel data(always) setting.<br \/>\nAnswer: A<\/p>\n","protected":false},"excerpt":{"rendered":"<p>MCSE 70-299\u8003\u8a66\u984c\u5eab\u7531KillTest\u8a8d\u8b49\u984c\u5eab\u7db2\u8cc7\u6df1IT\u8a8d\u8b49\u8b1b\u5e2b\u548cMCSE2003\u7522\u54c1\u5c08\u5bb6\u7d50\u5408PROMETRIC\u6216VUE\u7684\u771f\u5be670-299\u8003\u8a66\u74b0\u5883\u6700\u65b0\u539f\u984c\u50be\u5fc3\u6253\u9020\u3002\u984c\u5eab\u8986\u84cb\u4e86\u7576\u524d\u6700\u65b0\u7684\u771f\u5be6\u8003\u984c\uff0c\u4e26\u4e14\u5168\u90e8\u9644\u6709\u6b63\u78ba\u7b54\u6848\uff0c\u6211\u5011\u627f\u8afe\u984c\u5eab\u5c0dMCSE 70-299(Implementing and Administering Security in a Microsoft Windows Server 2003 Network)\u8003\u8a66\u539f\u984c\u5b8c\u6574\u8986\u84cb\u300270-299\u984c\u5eab\u52a9\u60a8\u8f15\u9b06\u901a\u904e\u8a8d\u8b49\u8003\u8a66\uff0c\u4e00\u6b21\u4e0d\u904e\u5168\u984d\u9000\u6b3e\u3002 MCSE70-299(Implementing and Administering Security in a Microsoft Windows Server 2003 Network)\u8003\u984c\u7531\u6211\u5011\u7684\u8cc7\u6df1IT\u8a8d\u8b49\u8b1b\u5e2b\u548cMCSE2003\u7522\u54c1\u5c08\u5bb6\u7cbe\u5fc3\u6253\u9020\uff0c\u5305\u62ec\u4e86\u7576\u524d\u6700\u65b0\u7684\u771f\u5be670-299\u8003\u984c\uff0c\u5168\u90e8\u9644\u6709\u6b63\u78ba\u7b54\u6848\u3002 Implementing and Administering Security in a Microsoft Windows Server 2003 Network(70-299 Exam)\u5c6c\u65bcMCSE\u8a8d\u8b49\u8003\u8a66\u4e2d\u7684\u4e00\u9580\uff0c\u5982\u679c\u9700\u8981\u53d6\u5f97MCSE\u8b49\u66f8\uff0c\u60a8\u53ef\u80fd\u9084\u9700\u8981\u53c3\u52a0\u5176\u4ed6\u76f8\u95dc\u8003\u8a66\uff0c\u8a73\u60c5\u53ef\u8a2a\u554fMCSE\u8a8d\u8b49\u5c08\u984c\uff0c\u5728\u90a3\u88e1\uff0c\u4f60\u5c07\u770b\u5230\u6240\u6709MCSE\u8a8d\u8b49\u76f8\u95dc\u8003\u8a66\u79d1\u76ee\u3002 1.You are a security administrator for your company. The network consists of a single Active Directory domain. All servers [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[243,35,3161],"class_list":["post-655","post","type-post","status-publish","format-standard","hentry","category-microsoft","tag-70-299","tag-mcse","tag-microsoft"],"_links":{"self":[{"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/655","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=655"}],"version-history":[{"count":3,"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/655\/revisions"}],"predecessor-version":[{"id":657,"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/655\/revisions\/657"}],"wp:attachment":[{"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=655"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=655"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=655"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}