What should you do?

You need to design a method to monitor the security configuration of the IIS server to meet the requirements in the written security policy. What should you do?

You need to design a method to monitor the security configuration of the IIS server to meet the requirements in the written security policy. What should you do?

A.
Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the IIS server computer account.

B.
Run the Microsoft Baseline Security Analyzer (MBSA) on the IIS server and scan for vulnerabilities in Windows and IIS checks.

C.
Run Security Configuration and Analysis to analyze the IIS server’s security settings by using a custom security template.

D.
On the IIS server, run the gpresult command from a command prompt and analyze the output.



Leave a Reply 0

Your email address will not be published. Required fields are marked *