网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
You discover audit log entries that report attempts to log on to your computer. You need to be notified of all logon attempts that occur on your computer. What should you do?()
- A、Enable the Problem Reporting feature for all users.
- B、Configure a custom view to monitor failed logon events on your computer.
- C、Use the Computer Management console to connect to your computer from another computer and monitor the audit logs.
- D、In the Event Viewer window, attach a task to a failed logon event. Configure this task to send an e-mail message to your e-mail account.
参考答案
更多 “ You discover audit log entries that report attempts to log on to your computer. You need to be notified of all logon attempts that occur on your computer. What should you do?()A、Enable the Problem Reporting feature for all users.B、Configure a custom view to monitor failed logon events on your computer.C、Use the Computer Management console to connect to your computer from another computer and monitor the audit logs.D、In the Event Viewer window, attach a task to a failed logon event. Configure this task to send an e-mail message to your e-mail account.” 相关考题
考题
A Windows Communication Foundation (WCF) service is required to log all authorization attempts to the Windows Event Log. You need to configure a behavior and apply it to the service to support this requirement. Which behavior should you configure and apply?()A. service Authentication ManagerB. service AuthorizationC. service CredentialsD. service Security Audit
考题
You are an administrator of Ezonexam.com's network. You want to perform. routine upgrades on your Windows 2000 Server computer. You use your non-administrator user account in the domain to logon to the server.You want to upgrade all of the critical system files and patches on the server in the shortest possible time.What should you do?A.Use Windows Update.B.Run System File Checker.C.Log on as administrator and run Windows Update.D.Log on as administrator and run System File Checker.
考题
You discover audit log entries that report attempts to log on to your computer. You need to be notified of all logon attempts that occur on your computer.What should you do?()
A.AB.BC.CD.D
考题
You enable the Windows Sidebar feature on your computer. You discover that you are unable to access the desktop icons that appear beneath the Windows Sidebar feature. You need to access these desktop icons.What are two possible ways to achieve this goal?()A.AB.BC.CD.DE.E
考题
Your company has an Active Directory directory service domain. All servers run Windows Server 2003. You are developing a security monitoring plan. You must monitor the files that are stored in a specific directory on a member server. You have the following requirements. Log all attempts to access the files.Retain log information until the full weekly backup occurs. You need to ensure that the security monitoring plan meets the requirements. What should your plan include?()A、 Configure a directory service access audit policy. Increase the maximum size of the security log.B、 Configure a directory service access audit policy. Set the system log to overwrite events older than 7 days.C、 Configure an object access audit policy for the directory. Increase the maximum size of the system log.D、 Configure an object access audit policy for the directory. Set the security log to overwrite events older than 7 days.
考题
You enable the Windows Sidebar feature on your computer. You discover that you are unable to access the desktop icons that appear beneath the Windows Sidebar feature. You need to access these desktop icons. What are two possible ways to achieve this goal?()A、Close the Windows Sidebar feature.B、Move all the Windows Sidebar gadgets to the desktop.C、Move the Windows Sidebar feature to the opposite side.D、Remove all gadgets from the Windows Sidebar feature.E、Configure the Windows Sidebar feature to bring all gadgets to the front.
考题
You set up Really Simple Syndication (RSS) subscription feeds on your computer. You need to view the RSS subscription feed in XML format. What should you do?()A、Disable the Turn on feed reading view option.B、Enable the Always use Clear Type for HTML option.C、Configure the RSS feed to be sent to your e-mail client.D、Enable the Automatically download attached files option.
考题
You are an administrator of a small business network. You have one dial-up account at an ISP and want all computers on your network connect to the Internet. You have enabled Internet connection sharing. You do not want to initiate this connection automatically when a request for Internet reaches your computer. What should you do? ()A、You should uncheck “Enable on demand dialingB、Enable on-demand dialingC、Enable sharing a modem on one computer on the networkD、Configure a DHCP ServerE、Disable Internet Connection Sharing
考题
You are the desktop administrator for your company's sales department. The IT manager for the sales department needs to distribute three custom applications to the department's Windows XP Professional computers. She deploys these applications by using Group Policy. Some users report that they must log on several times before the newly deployed applications are present on their computers. You need to ensure that all software is deployed the next time the users log on. What should you do?()A、Enable the Always wait for the network at computer startup and logon policy.B、Enable the Always use classic logon policy. C、Enable the Turn off background refresh of Group Policy policy.D、Enable the Group Policy slow link detection policy.
考题
You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers. You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized. You need to configure Server1 to log the details of access attempts by VPN users. What should you do? ()A、 Configure the system event log to Do not overwrite.B、 In IAS, in Remote Access Logging, enable the Authentication requests setting.C、 Configure the Remote Access server to Log all events.D、 Create a custom remote access policy and configure it for Authentication-Type.
考题
You need to design a method to log changes that are made to servers and domain controllers. You also need to track when administrators modify local security account manager objects on servers. What should you do?()A、Enable failure audit for privilege user and object access on all servers and domain controllersB、Enable success audit for policy change and account management on all servers and domain controllersC、Enable success audit for process tracking and logon events on all servers and domain controllersD、Enable failure audit for system events and directory service access on all servers and domain controllers
考题
You have a computer that runs Windows 7. Multiple users log on to your computer. You enable auditing ona folder stored on your computer. You need to ensure that each access to the folder is logged. What should you do?()A、Start the Problem Steps Recorder.B、From Event Viewer, modify the properties of the Security log.C、From the local Group Policy, configure the Audit object access setting.D、From the local Group Policy, configure the Audit directory service Access setting.
考题
You need to identify all failed logon attempts on the domain controllers. What should you do()A、Run Event Viewer.B、View the Netlogon.log file.C、Run the Security Configuration Wizard.D、View the Security tab on the domain controller computer object.
考题
You have 15 computers that run Windows 7. You need to implement a monitoring solution that meets thefollowing requirements. Sends an e-mail notification when an application error is logged in the event log Runs a script to restart the computer if an application error occurs between 17:00 and 07:00 Minimizes the administrative effort required to monitor applications. What should you do?()A、On all the computers, configure a custom view. Configure a custom task for the application error events.B、On a computer, configure a custom view to display the application errors. Configure a custom task forthe application error events.C、On a central computer, configure an event subscription. On all of the computers, configure a customtask in the Forwarded Events log.D、On all the computers, configure an event subscription to a central computer. On the central computer,configure a custom task in the Forwarded Events log.
考题
You are the network administrator for your company. The network consists of a single Active Directory domain named . All domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. All client computer accounts are stored in the Computer container. A user named Peter reports that he cannot log on to the domain from his computer. Peter receives the logon message shown in the exhibit. Exhibit: Logon Message Your account is configured to prevent you from using this computer. Please try another computer. You need to enable Peter to log on. What should you do?()A、Create an account for Peter's computer in the Computers container.B、Grant the Log on locally user right to Peter's user account.C、Enable Peter's user account.D、Change the properties of Peter's user account so he can log on to any computer.
考题
A Windows Communication Foundation (WCF) service is required to log all authorization attempts to the Windows Event Log. You need to configure a behavior and apply it to the service to support this requirement. Which behavior should you configure and apply?()A、service Authentication ManagerB、service AuthorizationC、service CredentialsD、service Security Audit
考题
You need to identify all failed logon attempts on the domain controllers. What should you do()A、Run Event Viewer.B、View the Netlogon.log file.C、Run the Security Configuration Wizard.D、iew the Security tab on the domain controller computer object.
考题
Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). You enable auditing for failed logon attempts on all domain controllers. You need to ensure that a record of failed logon attempts is retained for 90 days on all domain controllers. What should you do? ()A、From the Security Templates snap-in, open the hisecdc template. Modify the Retain System Log setting.B、From the Security Templates snap-in, open the securedc template. Modify the Retain Security Log setting.C、Open the Default Domain Policy. Modify the Retain System Log setting.D、Open the Default Domain Controller Policy. Modify the Retain Security Log setting.
考题
You have 15 computers that run Windows 7. You need to implement a monitoring solution that meets the following requirements.Sends an e-mail notification when an application error is logged in the event log .Runs a script to restart the computer if an application error occurs between 17.00 and 07.00 .Minimizes the administrative effort required to monitor applications. What should you do?()A、On all the computers,configure a custom view. Configure a custom task for the application error events.B、On a computer,configure a custom view to display the application errors. Configure a custom task for the application error events.C、On a central computer, configure an event subscription. On all of the computers, configure a custom task in the Forwarded Events log.D、On all the computers,configure an event subscription to a central computer. On the central computer,configure a custom task in the Forwarded Events log.
考题
You need to design a method to configure the servers in the development department to meet the requirements of the chief information officer. What should you do?()A、Use error reporting on all servers in the development department to report errors for a custom applicationB、Configure all servers in the development department so that they do not require the CTRL+ALT+DELTE keys to pressed in order to log on interactively to the serverC、Create a Group Policy object (GPO) and link it to the development department’s Servers OU. Configure the GPO with an interactive logon policy to display a message for users who attempt to log onD、Configure the screen saver on all servers in the development department to require a password
考题
Your network consists of a single Active Directory domain. You have a member server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).You need to record all attempts by domain users and local users to log on to Server1. What should you do?()A、In the Default Domain Controller Policy, enable success and failure for the Audit logon events policy setting.B、In the Default Domain Controller Policy, enable success and failure for the Audit account logon events policy setting.C、In the Local Security Policy on Server1, enable success and failure for the Audit logon events policy.D、In the Local Security Policy on Server1, enable success and failure for the Audit account logon events policy setting.
考题
单选题You need to design a method to configure the servers in the development department to meet the requirements of the chief information officer. What should you do?()A
Use error reporting on all servers in the development department to report errors for a custom applicationB
Configure all servers in the development department so that they do not require the CTRL+ALT+DELTE keys to pressed in order to log on interactively to the serverC
Create a Group Policy object (GPO) and link it to the development department’s Servers OU. Configure the GPO with an interactive logon policy to display a message for users who attempt to log onD
Configure the screen saver on all servers in the development department to require a password
考题
单选题Your network consists of a single Active Directory domain. You have a member server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).You need to record all attempts by domain users and local users to log on to Server1. What should you do?()A
In the Default Domain Controller Policy, enable success and failure for the Audit logon events policy setting.B
In the Default Domain Controller Policy, enable success and failure for the Audit account logon events policy setting.C
In the Local Security Policy on Server1, enable success and failure for the Audit logon events policy.D
In the Local Security Policy on Server1, enable success and failure for the Audit account logon events policy setting.
考题
多选题You enable the Windows Sidebar feature on your computer. You discover that you are unable to access the desktop icons that appear beneath the Windows Sidebar feature. You need to access these desktop icons. What are two possible ways to achieve this goal?()AClose the Windows Sidebar feature.BMove all the Windows Sidebar gadgets to the desktop.CMove the Windows Sidebar feature to the opposite side.DRemove all gadgets from the Windows Sidebar feature.EConfigure the Windows Sidebar feature to bring all gadgets to the front.
考题
单选题You discover audit log entries that report attempts to log on to your computer. You need to be notified of all logon attempts that occur on your computer. What should you do?()A
Enable the Problem Reporting feature for all users.B
Configure a custom view to monitor failed logon events on your computer.C
Use the Computer Management console to connect to your computer from another computer and monitor the audit logs.D
In the Event Viewer window, attach a task to a failed logon event. Configure this task to send an e-mail message to your e-mail account.
考题
单选题You need to identify all failed logon attempts on the domain controllers. What should you do()A
Run Event Viewer.B
View the Netlogon.log file.C
Run the Security Configuration Wizard.D
iew the Security tab on the domain controller computer object.
考题
单选题You are the network administrator for your company. The network consists of a single Active Directory domain named . All domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. All client computer accounts are stored in the Computer container. A user named Peter reports that he cannot log on to the domain from his computer. Peter receives the logon message shown in the exhibit. Exhibit: Logon Message Your account is configured to prevent you from using this computer. Please try another computer. You need to enable Peter to log on. What should you do?()A
Create an account for Peter's computer in the Computers container.B
Grant the Log on locally user right to Peter's user account.C
Enable Peter's user account.D
Change the properties of Peter's user account so he can log on to any computer.
热门标签
最新试卷