Which two actions should you perform?
You need to design Group Policy object (GPO) settings to support the use of the Encrypting File System (EFS). Your solution must meet business and security requirements. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
What should you do?
You need to design the configuration of the Windows Server 2003 Routing and Remote Access server in the Seattle office to meet business requirements. What should you do?
Which three actions should you take?
You need to design the configuration of the Windows Server 2003 terminal server that hosts the SalesForceMax application to meet security requirements. Which three actions should you take? (Each correct answer presents part of the solution. Choose three.)
What should you do?
You need to design a method to allow the new-ideas.wideworldimporters.com Web site to function in accordance with security and business requirements. What should you do?
Which two actions should you perform?
You need to design desktop and security settings for the client computers in the Seattle call center. Your solution must be implemented by using the minimum amount of administrative effort. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
Which two actions should you erform?
You need to design a security strategy for the DHCP servers in the Seattle office. Which two actions should you erform? (Each correct answer presents part of the solution. Choose two.)
What should you do?
You need to design a strategy to meet the company’s requirements for e-mail. What should you do?
What should you do?
You need to design a method to automate the deployment of critical updates and security patches that are supplied by Microsoft as these updates and security patches are released. Your solution must meet technical requirements. What should you do?
Which two actions should you perform?
You need to design an authentication solution for wireless network access. Your solution must meet business and technical requirements. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
What should you do?
You need to design a PKI solution that meets business and security requirements. What should you do?