网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

You need to identify potential security threats. Which of the following security breaches might occur under the current IT and security practices?(Choose all that apply)()

  • A、A virus that infects an IT administrator’s client computer could gain domain administrator privileges
  • B、Couriers could gain access to domain administrator privileges
  • C、Business office staff could discover couriers’ passwords and use them to access couriers’ information
  • D、All users could use their user accounts to gain the ability to install untested security patches on their client computers

参考答案

更多 “You need to identify potential security threats. Which of the following security breaches might occur under the current IT and security practices?(Choose all that apply)()A、A virus that infects an IT administrator’s client computer could gain domain administrator privilegesB、Couriers could gain access to domain administrator privilegesC、Business office staff could discover couriers’ passwords and use them to access couriers’ informationD、All users could use their user accounts to gain the ability to install untested security patches on their client computers” 相关考题
考题 Your company has a single Active Directory directory service domain. All servers in your environment run Windows Server 2003. Client computers run Windows XP or Windows Vista. You plan to create a security update scan procedure for client computers. You need to choose a security tool that supports all the client computers.  Which tool should you choose? ()A、 UrlScan Security ToolB、 Enterprise Scan Tool (EST)C、 Malicious Removal Tool (MRT)D、 Microsoft Baseline Security Analyzer (MBSA)

考题 The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()A、On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policyB、On all client computers, implement logon auditing for all user account logonsC、On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policyD、On all domain controllers, implement logon auditing for all user account logons

考题 You are the network administrator for The network consists of a single Active Directory domain named All five domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. The domain's audit policy ensures that all account logon events are audited. A temporary employee named King uses a client computer named TestKing1. When King's temporary assignment concludes, his employment is terminated. Now you need to learn the times and dates when King logged on to the domain. You need to accomplish this goal by reviewing the minimum amount of information. What should you do?()A、Log on to TestKing1 as a local Administrator. Use Event Viewer to view the local security log. Use the Find option to list only the events for King's user account.B、Log on to TestKing1 as a local Administrator. Use Event Viewer to view the local security log. Use the Find option to list only the events for the TestKing1 computer account.C、Use Event Viewer to view the security log on each domain controller. Use the Find option to list only the events for King's user account.D、Use Event Viewer to view the security log on each domain controller. Set a filter to list only the events for King's user account.E、Use Event Viewer to view the security log on each domain controller. Set a filter to list only the events for the TestKing1 computer account.

考题 You manage a software update infrastructure by using Windows Server Update Services (WSUS) 3.0. All client computers run Windows XP Professional Service Pack 3 (SP3). The client computers receive Automatic Updates from the WSUS server, and they are configured to install Automatic Updates immediately. From the Update Services console, you approve a required security update for all client computers. You need to force a client computer to apply the required security update as soon as possible. Which tool should you use? ()A、SeceditB、WuaucltC、WsusutilD、Gpupdate

考题 You have a single Active Directory directory service domain. All client computers run either Windows Vista or Windows XP. You create and configure a Group Policy object (GPO) named Secure Client  Computer. You need to ensure that the Secure Client Computer GPO is automatically applied to current  and future Windows XP client computers.  What should you do?()A、 Create a WMI filter that limits the scope of the Secure Client Computer GPO to the Windows XP operating system. Link the WMI filter to the GPO. Link the GPO to the domain.B、 Create a global security group that contains all of the Windows XP client computers. Edit the permissions of the Secure Client Computer GPO to allow the global security group the Read and Apply Group Policy permissions. Link the Secure Client Computer GPO to the domain.C、 Use the Delegation of Control Wizard at the domain level, and delegate the Generate Resultant Set of policy (Planning) right to the Windows XP client computers. Link the Secure Client Computer GPO to the domain.D、 Use the Delegation of Control Wizard at the domain level, and delegate the Generate Resultant Set of policy (Logging) right to the Windows XP client computers. Link the Secure Client Computer GPO to the domain.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional. You need to implement a new software update infrastructure.  You discover that security patches, critical updates, and service packs have never been installed on any client computer on the network. You install Windows Server Update Services (WSUS) on a Windows Server 2003 computer named Server5. You synchronize and approve all of the current security patches, critical updates, and service packs. You need to ensure that all client computers receive all Microsoft security patches, critical updates, and service packs.  Which two actions should you perform?()A、Open the WSUS console. Select the option to automatically approve WSUS updates.B、Install the Automatic Updates client on all client computers.C、Modify the Microsoft Update settings of the Default Domain Controller organizational unit (OU) Group Policy object (GPO) to point client computers to http ://server5.D、Modify the Microsoft Update settings of the Default Domain Policy Group Policy object (GPO) to point client computers to http: //server5.E、Open the WSUS console. Create a target group and assign all client computers to the group.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All five domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. The domain's audit policy ensures that all account logon events are audited. A temporary employee named Peter uses a client computer named Client1. When Peter's temporary assignment concludes, his employment is terminated. Now you need to learn the times and dates when Peter logged on to the domain. You need to accomplish this goal by reviewing the minimum amount of information. What should you do?()A、Log on to Client1 as a local Administrator. Use Event Viewer to view the local security log. Use the Find option to list only the events for Peter's user account.B、Log on to Client1 as a local Administrator. Use Event Viewer to view the local security log. Use the Find option to list only the events for the Client1 computer account. Use Event Viewer to view the security log on each domain controller. Use the Find option to list only the events for Peter's user account. Use Event Viewer to view the security log on each domain controller.C、Set a filter to list only the events for Peter's user account. Use Event Viewer to view the security log on each domain controller.D、Set a filter to list only the events for the Client1 computer account.

考题 You are the desktop administrator for your company. The company's network consists of a single Microsoft Windows NT domain. The network contains 2,000 Windows XP Professional computers.  The information security department releases a new security template named NewSecurity.inf. You are instructed to apply the new template to all 2,000 Windows XP Professional computers. You use the Security Configuration and Analysis console to import NewSecurity.inf into a security database named NewSec.sdb. You copy NewSec.sdb to a folder named Sec on a server named Server1. You need to apply NewSecurity.inf to the Windows XP Professional computers. What should you do?() A、Use the Security Configuration and Analysis console to export a template named NewSec.inf from NewSec.sdb. Copy NewSec.inf to each client computer. B、Write a logon script that copies NewSec.sdb to the %systemroot%/System32 folder on each client computer. C、Copy NewSec.sdb to the Netlogon shared folder on each domain controller. D、Write a logon script that runs the Secedit /configure /db //Server1/Sec/NewSec.sdb command. Apply the logon script to all domain user accounts. 

考题 Your company uses Windows Update to download and install security updates on client computers. When Microsoft releases a security update, you have the following requirements:   Establish which client computers require the security update.   Identify what changes will occur as a result of the security update.  Identify which applications might be affected by the security update.    You need to select the appropriate tool to detect application-compatibility issues.   What should you do?()A、Use the Inventory Collector.B、Use the Setup Analysis Tool.C、Use the Update Compatibility Evaluator.D、Use the Windows Compatibility Evaluator.

考题 A user named Marie uses a Windows 2000 Professional computer named Client1 to process payroll records. Marie reports that she can no longer run her financial applications. You determine that file permissions have been applied incorrectly to her computer. You want to configure Client1 to have the same security configuration and file permission settings that were applied when the computer was installed.  What should you do?()A、Grant usersFull Controlpermission to the C drive and all child foldersB、Use the Recovery Console to restore system filesC、Use Security Configuration and Analysis to apply the Secure security template to Client1D、Use Security Configuration and Analysis to apply the Default security template to Client 1

考题 You are the network administrator for TestKing. Your network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all 200 client computers run Windows XP Professional. Software Update Services (SUS) is installed with default settings on a server named TestKing5. You discover that a critical security update for Internet Explorer is not installed on any client computer. You verify that the update was downloaded from the Internet to TestKing5. You also verify that more recent security updates are installed. You need to investigate the cause of this problem. You will use the SUS administration console on TestKing5. Which data should you evaluate? ()(Choose two)A、The security update in the synchronization log.B、The security update in the approval log.C、The status of Internet Explorer 5.5x in the Monitor Server window.D、The status of Internet Explorer 6.x in the Monitor Server window.

考题 You are the administrator of the Corp arborshoes.com domain. Users in the domain run Windows 2000 Professional on their desktop computers.   A user named Katrin in the Sales organizational unit (OU) reports that her mouse is not working correctly. You log on to the domain from Katrin’s computer by using the domain Administrator account. You use Device Manager to display the current information for the mouse driver.   You discover that Katrin’s computer is using an older version of the mouse driver. You have current drivers furnished by the manufacturer of the mouse. You install the current driver by using Device manager and restart the computer.   You test the mouse and it is still not functioning correctly. You view Device Manger and notice that the display of the current driver indicates that the previous driver is still uninstalled.   You want to be able to install the correct mouse driver. What should you do? ()A、Set the Sales OU policy for security to warn and allow the installation to override the local security defaults. B、Set the domain policy for security to block but allow the installation to override the local and Sales OU security defaults. C、Set the Local Computer Policy for security on Katrin’s computer to warn but allow the installation to override the domain and the Sales OU security defaults. D、Disable plug and play on Katrin’s computer. Restart the computer and manually set up the system resources for the mouse. 

考题 You are the network administrator for Test King. The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. The Default Domain Policy has been modified by importing a security template file, which contain several security settings. A server named TestKing1 cannot run a program that us functioning on other similarly configured servers. You need to find out whether additional security settings have been added to the local security policy on TestKing1. To troubleshoot, you want to use a tool to compare the current security settings on TestKing1 against the security template file in order to automatically identify any settings that might have been added to the local security policy. Which tool should you run on TestKing1?()A、Microsoft Baseline Security Analyzer (MBSA)B、Security Configuration and Analysis consoleC、gpresult.exeD、Resultant Set of Policy console in planning mode

考题 You need to identify all failed logon attempts on the domain controllers.     What should you do()A、Run Event Viewer.B、View the Netlogon.log file.C、Run the Security Configuration Wizard.D、View the Security tab on the domain controller computer object.

考题 Your company has a single Active Directory directory service domain. Servers in your environment run Windows Server 2003. Client computers run Windows XP or Windows Vista. You plan to create an internal centrally managed security update infrastructure for client computers. You need to choose a security update management tool that supports all the client computers.  Which tool should you choose? ()A、 Microsoft Assessment and Planning (MAP) ToolkitB、 Microsoft Baseline Security AnalyzerC、 Microsoft System Center Operations ManagerD、 Windows Server Update Services (WSUS)

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All domain controllers run Windows Server 2003. All client computers run Windows XP Professional.   The company has legacy applications that run on UNIX servers. The legacy applications use the LDAP protocol to query Active Directory for employee information.  The domain controllers are currently configured with the default security settings. You need to configure enhanced security for the domain controllers. In particular, you want to configure stronger password settings, audit settings, and lockout settings. You want to minimize interference with the proper functioning of the legacy applications.   You decide to use the predefined security templates. You need to choose the appropriate predefined security template to apply to the domain controllers.  What should you do?()A、 Apply the Setup security.inf template to the domain controllers.B、 Apply the DC security.inf template to the domain controllers.C、 Apply the Securedc.inf template to the domain controllers.D、 Apply the Rootsec.inf template to the domain controllers.

考题 You are the domain administrator for TestKing's Active Directory domain named All client computers run Windows XP Professional. You need to implement a solution for managing security updates on client computers. You plan to use a Windows Server 2003 computer to manage security updates. Your solution for managing security updates must meet the following requirements: 1. You must not purchase additional software or licences. 2. Security updates must be installed automatically. 3. You must be able to control which updates are available to install. 4. Security updates must synchronize automatically with the latest updates offered by Microsoft. You need to implement a solution for managing security updates that meets the requirements. What should you do?()A、Publish the security updates by using a Group Policy object (GPO). Assign the GPO to the client computers that require updatesB、Install Software Update Services (SUS). Configure the SUS software to synchronize daily with Microsoft. Use Group Policy to configure the appropriate Windows Update settings on the client computers.C、Install Microsoft Internet Security and Acceleration (ISA) Server on a Windows Server 2003 computer.D、Create a process to run Windows Update on all client computers.

考题 单选题The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()A On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policyB On all client computers, implement logon auditing for all user account logonsC On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policyD On all domain controllers, implement logon auditing for all user account logons

考题 单选题You are the network administrator for Test King. The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. The Default Domain Policy has been modified by importing a security template file, which contain several security settings. A server named TestKing1 cannot run a program that us functioning on other similarly configured servers. You need to find out whether additional security settings have been added to the local security policy on TestKing1. To troubleshoot, you want to use a tool to compare the current security settings on TestKing1 against the security template file in order to automatically identify any settings that might have been added to the local security policy. Which tool should you run on TestKing1?()A Microsoft Baseline Security Analyzer (MBSA)B Security Configuration and Analysis consoleC gpresult.exeD Resultant Set of Policy console in planning mode

考题 单选题Your company has a single Active Directory directory service domain. All servers in your environment run Windows Server 2003. Client computers run Windows XP or Windows Vista. You plan to create a security update scan procedure for client computers. You need to choose a security tool that supports all the client computers.  Which tool should you choose? ()A  UrlScan Security ToolB  Enterprise Scan Tool (EST)C  Malicious Removal Tool (MRT)D  Microsoft Baseline Security Analyzer (MBSA)

考题 多选题You are the network administrator for TestKing. Your network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all 200 client computers run Windows XP Professional. Software Update Services (SUS) is installed with default settings on a server named TestKing5. You discover that a critical security update for Internet Explorer is not installed on any client computer. You verify that the update was downloaded from the Internet to TestKing5. You also verify that more recent security updates are installed. You need to investigate the cause of this problem. You will use the SUS administration console on TestKing5. Which data should you evaluate? ()(Choose two)AThe security update in the synchronization log.BThe security update in the approval log.CThe status of Internet Explorer 5.5x in the Monitor Server window.DThe status of Internet Explorer 6.x in the Monitor Server window.

考题 单选题You need to identify potential security threats. Which of the following security breaches might occur under the current IT and security practices?(Choose all that apply)()A A virus that infects an IT administrator’s client computer could gain domain administrator privilegesB Couriers could gain access to domain administrator privilegesC Business office staff could discover couriers’ passwords and use them to access couriers’ informationD All users could use their user accounts to gain the ability to install untested security patches on their client computers

考题 单选题Your company has a single Active Directory directory service domain. Servers in your environment run Windows Server 2003. Client computers run Windows XP or Windows Vista. You plan to create an internal centrally managed security update infrastructure for client computers. You need to choose a security update management tool that supports all the client computers.  Which tool should you choose? ()A  Microsoft Assessment and Planning (MAP) ToolkitB  Microsoft Baseline Security AnalyzerC  Microsoft System Center Operations ManagerD  Windows Server Update Services (WSUS)