What should you do?
You need to design a method to implement account policies that meets the requirements in the written security policy.
What should you do?
What should you do?
You need to design a method to enable remote encryption on Server5. What should you do?
What should you do?
You need to design a group membership strategy for the EditorialAdmins group. What should you do?
What should you do?
You need to design a method to deploy security configuration settings to servers. What should you do?
What should you do?
You need to design a strategy to log access to the company Web site. What should you do?
What should you do?
You need to design a method to protect traffic on the wireless networks. Your solution must meet the requirements of the chief security officer. What should you do?
What should you do?
You need to design a security patch management strategy. Your solution must meet business and security requirements, and it must accommodate the company’s resource restrictions.
What should you do?
What should you do?
You need to design a monitoring strategy to meet business requirements for data on servers in the production department. What should you do?
What should you do?
You need to design a method to monitor the security configuration of the IIS server to meet the requirements in the written security policy. What should you do?
What should you do?
You need to design a strategy to ensure that all servers are in compliance with the business requirements for maintaining security patches. What should you do?