网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

You are the administrator of your company's network. You want to configure a Security Policy for the Windows 2000 Professional Computers that are in the sales department.   On one of the computers, you use Security Templates to configure the Security Policy based on the desired security settings. You then export those settings to an .inf file that will be used on all of the Computers in the sales department. You want to configure each Computer to have a customized Security Policy. What steps should you follow in order to achieve your goal?()

  • A、Use Secedit.exe to import the security settings from the .inf file to the computers in the sales department.
  • B、Use a text editor to change the default security settings to the desired security settings. Then export those settings to the Computers in the sales department.
  • C、Create an organizational unit (OU) named Sales. Add the users in the sales department to the Sales OU. Then apply the security template to the users in the Sales OU.
  • D、Create an organizational unit (OU) named Sales. Add the computers in the sales department to the Sales OU. Then apply the security template to computers in the Sales OU.

参考答案

更多 “ You are the administrator of your company's network. You want to configure a Security Policy for the Windows 2000 Professional Computers that are in the sales department.   On one of the computers, you use Security Templates to configure the Security Policy based on the desired security settings. You then export those settings to an .inf file that will be used on all of the Computers in the sales department. You want to configure each Computer to have a customized Security Policy. What steps should you follow in order to achieve your goal?()A、Use Secedit.exe to import the security settings from the .inf file to the computers in the sales department.B、Use a text editor to change the default security settings to the desired security settings. Then export those settings to the Computers in the sales department.C、Create an organizational unit (OU) named Sales. Add the users in the sales department to the Sales OU. Then apply the security template to the users in the Sales OU.D、Create an organizational unit (OU) named Sales. Add the computers in the sales department to the Sales OU. Then apply the security template to computers in the Sales OU.” 相关考题
考题 You are the desktop administrator for one of your company's branch offices. The network in your branch office contains 100 Windows XP Professional computers. The computers are configured with the Compatws.inf security template. One of the network administrators in the company's main office creates a new security template named CompanySec.inf. The new template is designed to be applied to each of the company's Windows XP Professional computers. The users in your branch office have different security requirements from the users in the main office. You need to find out whether the new security template will violate the security requirements of the users in the branch office. What should you do?()A、Run the Secedit.exe command in validation mode and specify the new security template.B、Run the Secedit.exe command in configuration mode and specify the new security template. C、Use the Security Configuration and Analysis console to import both templates into a security database, and then perform an Analyze operation. D、Use the Security Configuration and Analysis console to import both templates into a security database, and then perform a Configure operation. 

考题 You are the administrator of Company.com's Windows 2000 Network. The routed TCP/IP network that you administer consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. All computers are members of a single Windows 2000 domain named Company.com. TCP/IP is the only network protocol used at Company's office. You have recently installed 10 new Windows 2000 Professional computers and you want to enable the new computers to use host names to connect to shared resources on the network. You configure a TCP/IP address and a gateway address on each new computer. You want to complete the configuration to allow the computers to communicate on the network.  What should you do?()A、Configure a DNS suffix.B、Configure a subnet mask.C、Configure an LMHOSTS file.D、Configure an Interface metric.E、Configure at least one DNS address.

考题 You upgrade all client computers in your network to Windows 2000 Professional. Then you apply the basicwk.inf security template to the computers. Now, none of the users can run the company’s database application. What should you do?()A、Apply the compactws.inf security template to the computers.B、Delete the basicwk.inf security template file from the computers.C、Use the system policy editor to configure a new security policy for the database application.D、For each user account, allow read permission to the database application and in associated files.

考题 You are the network administrator for Company.  You have been assigned the task to upgrade the 23 Windows NT Workstation 4.0 computers in the accounting department to Windows 2000 Professional. Users in the accounting department run a peer-to-peer financial and credit application on their computers. The application requires that information is passed between the accounting department computers over the network. You upgrade all the computers and configure them to have the default security settings. You want to ensure that network traffic between accounting computers is secure. What should you do? ()A、Disable NetBIOS over TCP/IP on the accounting department computers.B、Apply the Hisecws.inf security template to the local security policy on the accounting department computers.C、Enable the Encrypting File System (EFS) on all files used by the financial and credit application on the accounting department computers.D、Configure port filters for each port used by the financial and credit application on the accounting department computers.

考题 You are the administrator of Company.com’s Windows 2000 Network.  Your routed TCP/IP network consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. All computers are in the Company.com domain. Your network uses TCP/IP as the only network protocol. You are installing 10 new Windows 2000 Professional computers. You want to enable the new computers to use host names to connect to shared resources on the network. You configure a TCP/IP address, a gateway address and a subnet mask on each new computer.   You want to complete the configuration to allow the computers to communicate on the network.  What should you do?()A、Configure a HOSTS file.B、Configure a LMHOSTS file.C、Configure a WINS server database.D、Configure a DHCP server address.E、Configure at least one DNS address.

考题 You are the administrator of your company’s network. Ten Windows 2000 Professional computers are located in the Research department. The computers contain highly confidential information. You want the 10 computers to be able to communicate with other Windows 2000 Professional computers on the network. However, you do not want them to communicate with computers that are not running Windows 2000, including those that are running Windows 95, Windows 98 and Windows NT.  You want to configure a security policy on each computer to ensure that the confidential information is secure. What should you do?()A、Use Security Configuration and Analysis to import the Hisecws.inf security template file to modify the default security settings.B、Use security templates to create a security template file and import the security settings to modify the default security settings.C、Use the local computer policy to disable the access to this computer from the network option.D、Use Secedit.exe to reconfigure the computers’ default security settings to not allow anonymous access to the computers.

考题 You are the administrator of your company’s network. You use Security Templates to configure a Security Policy on the Windows 2000 Professional Computers in the Sales organizational unit (OU). You notice that the Computers in the Sales OU are not downloading the Security Policy settings. On each computer, the Security Policy appears in the Local Computer Policy, but is not listed as the effective policy. You want all computers in the Sales OU to have the Security Policy listed as the effective policy. How should you accomplish this task? ()A、Use Security Templates to correct the setting and export the security file.B、Use Security Configuration and Analysis to import the security setting. Then create a Group policy object (GPO) for the Sales QU.C、Use Secedit /RefreshPolicy Machine_Policy command.D、Use the Basicwk.inf security file settings, save the security file, and then import the fileto theComputers.

考题 You are the network administrator for The network consists of a single Active Directory domain The domain contains 25 Windows server 2003 computers and 5,000 Windows 2000 Professional computers. You install and configure Software Update Services (SUS) on a server named TestKingSrv. All client computer accounts are in the Clients organizational unit (OU). You create a Group Policy object (GPO) named SUSupdates and link it to the Clients OU. You configure the SUSupdates GPO so that client computers obtain security updates from TestKingSrv. Three days later, you examine the Windowsupdate.log file on several client computers and discover that they have downloaded Windows security updates from only You need to configure all client computers to download Windows security updates from TestKingSrv. What should you do?()A、Open the SUSupdates GPO and configure the Configure Automatic Update policy to assign the Auto download and notify for install setting for Windows security updates.B、Open the SUSupdates GPO and configure the Configure Automatic Update policy to assign the Auto download and schedule the install setting for Windows security updates.C、Create software distribution policy for the SUSupdates GPO that assigns the package WUAU22.msi to all client computers. Restart all client computers.D、On all client computers, configure the UseWUServer registry value to enable Automatic Updates to use TestKingSrv.

考题 You are the network administrator for ExamSheet.  Computers on your network run Windows 2000 Professional, Windows NT Workstation 4.0 and Windows 98. Ten Windows 2000 Professional computers are located in the research department. These computers contain highly confidential information. You want the 10 Windows 2000 Professional computers to be able to communicate only with other Windows 2000 computers.  What should you do?()A、On the research computers use the Local Computer Policy to disable theAccess this computer  from the networkoption.B、Use Security Configuration and Analysis to apply the Highly Secure security template to the research computers.C、Add the users of the research computers to the Power Users group on each computer.D、On the research computers configure the security settings to prevent anonymous access.

考题 You are the administrator of your company's network. You install 220 new Windows 2000 Professional computers in the Sales department. Two weeks later users report that five of the computers have stopped responding. You troubleshoot the five computers and find that the users have attached USB devices and have installed device drivers that are not supported by Windows 2000 Professional. You want to ensure that it does not happen again. You decide to configure the computer to install device drivers only for the devices that are included on the current hardware compatibility list (HCL). What should you do?()A、Use NTFS permission to restrict users access to the C:///WinNT/driver cache folder.B、Use NTFS permission to restrict users access to the C:///WinNT/system32/drivers folder.C、Configure Windows 2000 Professional to enable driver signing verification.D、Configure Windows 2000 Professional to trust the Microsoft certificate authority (CA).

考题 You are the network administrator for ExamSheet.net. You administer ExamSheet’s Windows 2000 network. Computers on the network run Windows 2000 Professional, Windows NT Workstation 4.0 and Windows 98. Ten Windows 2000 Professional computers are located in the research department. The users of the Windows 2000 Professional computers run legacy applications which are not certified for Windows 2000. These applications will not run for those users who only have User rights on the computers. You want to uniformly grant the users of these computers with the least possible administrative rights and still allow them to run the applications. What should you do? ()A、On the research computers user the Local Computer Policy to disable theAccess this computer  from the networkoption.B、Apply the Compatws.inf security template to the research computers.C、Apply the Hisecws.inf security template to the research computers.D、On the research computers configure the computer default security settings to prevent anonymous access.

考题 You are the administrator of your company’s network. Your network consists of 20 Windows 2000 Professional computers. You want to configure all of the computers to allow access to the Internet. Your Budget does not allow for installing a permanent Internet connection for the network. You do have a single dial-up account at a local Internet service provider (ISP) and a 56-Kbps modem. You want the computer to be able to access the Internet when web resources are requested. What should you do?()A、Configure the shared modem to use software handshakingB、Configure the dial-up connection to enable on-demand dialing.C、Configure the dial-up connection to enable the Internet connection sharing.D、Configure all the other computers to have a dial-up connection that uses the shared modem. E、Attach the modem to one of the Windows 2000 Professional computer, and create a dial-up connection to the ISP.F、Attach the modem to one of the Windows 2000 Professional computers, and share the modem on the network.

考题 You are the administrator of your company’s network. The software department is preparing to rewrite an accounting application so that it will run on Windows 2000 Professional computers. All of the computers in the software department currently use Windows 98.  You want to configure the computers in the software department so that the users can use both Windows 98 and Windows 2000 Professional during the project. You also want to ensure that the computers are configured for optimal disk performance. In addition you want to ensure that users in the software department can access all of the files on their computers by using either operating system.  What should you do? ()A、 Create and format a FAT 32 partition.B、 Create and format an NTFS volume.C、 Configure Windows 2000 Professional to enable disk compression.D、 Configure Windows 2000 Professional to enable dynamic volume

考题 You are the administrator of a Windows 2000 network.  You upgrade five computers in the sales department to Windows 2000 Professional. You then apply the Basicwk.inf security template to the upgraded computers. The remaining computers in the sales department are using Windows NT Workstation 4.0. When users log on to the Windows 2000 Professional computers they report that they are unable to run the company’s database application.  When the users log on to Windows NT Workstation 4.0 computers they are able to run the database application.  You want the users of Windows 2000 Professional computers to be able to run the database application.  What should you do? ()A、Apply the Securews.inf security template to the computers.B、Apply the Compatsws.inf security template to the computers.C、Delete the Basicwk.inf security template file from the computers.D、For each user account, grant Read permission to the database application and its associated files.E、Use the System Policy Editor to configure a new security policy for the database application.

考题 You are the domain administrator for TestKing's Active Directory domain named All client computers run Windows XP Professional. You need to implement a solution for managing security updates on client computers. You plan to use a Windows Server 2003 computer to manage security updates. Your solution for managing security updates must meet the following requirements: 1. You must not purchase additional software or licences. 2. Security updates must be installed automatically. 3. You must be able to control which updates are available to install. 4. Security updates must synchronize automatically with the latest updates offered by Microsoft. You need to implement a solution for managing security updates that meets the requirements. What should you do?()A、Publish the security updates by using a Group Policy object (GPO). Assign the GPO to the client computers that require updatesB、Install Software Update Services (SUS). Configure the SUS software to synchronize daily with Microsoft. Use Group Policy to configure the appropriate Windows Update settings on the client computers.C、Install Microsoft Internet Security and Acceleration (ISA) Server on a Windows Server 2003 computer.D、Create a process to run Windows Update on all client computers.

考题 You are the network administrator for ExamSheet.net. You administer ExamSheet’s Windows 2000 network. You upgrade 10 computers in the Accounting department from Windows NT Workstation 4.0 to Windows 2000 Professional. All of the upgraded computers are configured to have the default security settings. For security purposes you want to ensure that these computers can only communicate with other Windows 2000 computers.  What should you do?()A、On each computer configure separate memory spaces for each financial and credit applications.B、Apply Highly Secure security template to the local security policy of the computers in the Accounting department.C、Apply Compatible security template to the local security policy of the computers in the Accounting department.D、Add each user account to the Power Users group on that user’s computer.

考题 You are the network administrator for Company. Many of the employees in the sales department travel on a regular basis and needs to dial into the company network from their Windows 2000 Professional portable computers. Your company recently implemented a new computing security policy that mandates all remote connections be established by a two-way authentication method. You configure a Windows 2000 Server computer to run Routing and Remote Access to meet the requirements of the new security policy. Employees who travel report they can no longer initiate a dial-up connection. You need to give employees who travel the ability to dial in to the company network. What should you do? ()A、Configure the dial-up connection on all of the portable computers to use L2TP.B、Configure the dial-up connection on all of the portable computers to use MS-CHAP v2.C、Apply the Compatws.inf Security Template to all of the portable computers.D、Apply the Hisecws.inf Security Template to all of the portable computers.

考题 单选题You are the administrator of a Windows 2000 network.  You upgrade five computers in the sales department to Windows 2000 Professional. You then apply the Basicwk.inf security template to the upgraded computers. The remaining computers in the sales department are using Windows NT Workstation 4.0. When users log on to the Windows 2000 Professional computers they report that they are unable to run the company’s database application.  When the users log on to Windows NT Workstation 4.0 computers they are able to run the database application.  You want the users of Windows 2000 Professional computers to be able to run the database application.  What should you do? ()A Apply the Securews.inf security template to the computers.B Apply the Compatsws.inf security template to the computers.C Delete the Basicwk.inf security template file from the computers.D For each user account, grant Read permission to the database application and its associated files.E Use the System Policy Editor to configure a new security policy for the database application.

考题 单选题You are the administrator of your company's network. You want to configure a Security Policy for the Windows 2000 Professional Computers that are in the sales department.   On one of the computers, you use Security Templates to configure the Security Policy based on the desired security settings. You then export those settings to an .inf file that will be used on all of the Computers in the sales department. You want to configure each Computer to have a customized Security Policy. What steps should you follow in order to achieve your goal?()A Use Secedit.exe to import the security settings from the .inf file to the computers in the sales department.B Use a text editor to change the default security settings to the desired security settings. Then export those settings to the Computers in the sales department.C Create an organizational unit (OU) named Sales. Add the users in the sales department to the Sales OU. Then apply the security template to the users in the Sales OU.D Create an organizational unit (OU) named Sales. Add the computers in the sales department to the Sales OU. Then apply the security template to computers in the Sales OU.

考题 多选题You are the administrator of Company.com’s Windows 2000 Network.  Your routed TCP/IP network consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. All computers are in the Company.com domain. Your network uses TCP/IP as the only network protocol. You are installing 10 new Windows 2000 Professional computers. You want to enable the new computers to use host names to connect to shared resources on the network. You configure a TCP/IP address, a gateway address and a subnet mask on each new computer.   You want to complete the configuration to allow the computers to communicate on the network.  What should you do?()AConfigure a HOSTS file.BConfigure a LMHOSTS file.CConfigure a WINS server database.DConfigure a DHCP server address.EConfigure at least one DNS address.

考题 单选题You are the desktop administrator for one of your company's branch offices. The network in your branch office contains 100 Windows XP Professional computers. The computers are configured with the Compatws.inf security template. One of the network administrators in the company's main office creates a new security template named CompanySec.inf. The new template is designed to be applied to each of the company's Windows XP Professional computers. The users in your branch office have different security requirements from the users in the main office. You need to find out whether the new security template will violate the security requirements of the users in the branch office. What should you do?()A Run the Secedit.exe command in validation mode and specify the new security template.B Run the Secedit.exe command in configuration mode and specify the new security template. C Use the Security Configuration and Analysis console to import both templates into a security database, and then perform an Analyze operation. D Use the Security Configuration and Analysis console to import both templates into a security database, and then perform a Configure operation. 

考题 单选题You are the administrator of your company’s network. Ten Windows 2000 Professional computers are located in the Research department. The computers contain highly confidential information. You want the 10 computers to be able to communicate with other Windows 2000 Professional computers on the network. However, you do not want them to communicate with computers that are not running Windows 2000, including those that are running Windows 95, Windows 98 and Windows NT.  You want to configure a security policy on each computer to ensure that the confidential information is secure. What should you do?()A Use Security Configuration and Analysis to import the Hisecws.inf security template file to modify the default security settings.B Use security templates to create a security template file and import the security settings to modify the default security settings.C Use the local computer policy to disable the access to this computer from the network option.D Use Secedit.exe to reconfigure the computers’ default security settings to not allow anonymous access to the computers.

考题 单选题You upgrade all client computers in your network to Windows 2000 Professional. Then you apply the basicwk.inf security template to the computers. Now, none of the users can run the company’s database application. What should you do?()A Apply the compactws.inf security template to the computers.B Delete the basicwk.inf security template file from the computers.C Use the system policy editor to configure a new security policy for the database application.D For each user account, allow read permission to the database application and in associated files.

考题 单选题You are the network administrator for ExamSheet.  Computers on your network run Windows 2000 Professional, Windows NT Workstation 4.0 and Windows 98. Ten Windows 2000 Professional computers are located in the research department. These computers contain highly confidential information. You want the 10 Windows 2000 Professional computers to be able to communicate only with other Windows 2000 computers.  What should you do?()A On the research computers use the Local Computer Policy to disable theAccess this computer  from the networkoption.B Use Security Configuration and Analysis to apply the Highly Secure security template to the research computers.C Add the users of the research computers to the Power Users group on each computer.D On the research computers configure the security settings to prevent anonymous access.

考题 单选题You are the network administrator for The network consists of a single Active Directory domain The domain contains 25 Windows server 2003 computers and 5,000 Windows 2000 Professional computers. You install and configure Software Update Services (SUS) on a server named TestKingSrv. All client computer accounts are in the Clients organizational unit (OU). You create a Group Policy object (GPO) named SUSupdates and link it to the Clients OU. You configure the SUSupdates GPO so that client computers obtain security updates from TestKingSrv. Three days later, you examine the Windowsupdate.log file on several client computers and discover that they have downloaded Windows security updates from only You need to configure all client computers to download Windows security updates from TestKingSrv. What should you do?()A Open the SUSupdates GPO and configure the Configure Automatic Update policy to assign the Auto download and notify for install setting for Windows security updates.B Open the SUSupdates GPO and configure the Configure Automatic Update policy to assign the Auto download and schedule the install setting for Windows security updates.C Create software distribution policy for the SUSupdates GPO that assigns the package WUAU22.msi to all client computers. Restart all client computers.D On all client computers, configure the UseWUServer registry value to enable Automatic Updates to use TestKingSrv.

考题 单选题You are the administrator of your company’s network. You use Security Templates to configure a Security Policy on the Windows 2000 Professional Computers in the Sales organizational unit (OU). You notice that the Computers in the Sales OU are not downloading the Security Policy settings. On each computer, the Security Policy appears in the Local Computer Policy, but is not listed as the effective policy. You want all computers in the Sales OU to have the Security Policy listed as the effective policy. How should you accomplish this task? ()A Use Security Templates to correct the setting and export the security file.B Use Security Configuration and Analysis to import the security setting. Then create a Group policy object (GPO) for the Sales QU.C Use Secedit /RefreshPolicy Machine_Policy command.D Use the Basicwk.inf security file settings, save the security file, and then import the fileto theComputers.

考题 单选题You are the network administrator for Company. Many of the employees in the sales department travel on a regular basis and needs to dial into the company network from their Windows 2000 Professional portable computers. Your company recently implemented a new computing security policy that mandates all remote connections be established by a two-way authentication method. You configure a Windows 2000 Server computer to run Routing and Remote Access to meet the requirements of the new security policy. Employees who travel report they can no longer initiate a dial-up connection. You need to give employees who travel the ability to dial in to the company network. What should you do? ()A Configure the dial-up connection on all of the portable computers to use L2TP.B Configure the dial-up connection on all of the portable computers to use MS-CHAP v2.C Apply the Compatws.inf Security Template to all of the portable computers.D Apply the Hisecws.inf Security Template to all of the portable computers.