网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
以下哪些不能通过配置log来输出()
- A、Main
- B、Debug-Trace
- C、Statistics
- D、Security
参考答案
更多 “以下哪些不能通过配置log来输出()A、MainB、Debug-TraceC、StatisticsD、Security” 相关考题
考题
Your network contains a server named Server1 that runs Windows Server 2008 R2.You have a user named User1.You need to ensure that User1 can view the events in the Security event log. The solution must minimize the number of rights assigned to User1.What should you do?()A. In Event Viewer, filter the Security log.B. In Event Viewer, configure the properties of the Security log.C. In the Local Security Policy console, modify the Security Options.D. In the Registry Editor, add a Security Descriptor Definition Language (SDDL) value.
考题
Which CLI command provides a summary of what the content-filtering engine has blocked?()
A. show security utm content-filtering statisticsB. show security flow sessionC. show security flow statisticsD. show security utm content-filtering summary
考题
以下属于OMCG功能的为()。
A.Alarm SurveillanceB.Security ManagementC.Event and log ManagementD.Measurements
考题
Your company has an Active Directory directory service domain. All servers run Windows Server 2003. You are developing a security monitoring plan. You must monitor the files that are stored in a specific directory on a member server. You have the following requirements. Log all attempts to access the files.Retain log information until the full weekly backup occurs. You need to ensure that the security monitoring plan meets the requirements. What should your plan include?()A、 Configure a directory service access audit policy. Increase the maximum size of the security log.B、 Configure a directory service access audit policy. Set the system log to overwrite events older than 7 days.C、 Configure an object access audit policy for the directory. Increase the maximum size of the system log.D、 Configure an object access audit policy for the directory. Set the security log to overwrite events older than 7 days.
考题
Which CLI command provides a summary of what the content-filtering engine has blocked?()A、show security utm content-filtering statisticsB、show security flow sessionC、show security flow statisticsD、show security utm content-filtering summary
考题
在完成VTP配置之后,在验证VTP的配置中,以下命令错误的有()。A、show vtp statusB、shwo vtp countersC、shwo vtp statisticsD、shwo vtp status countersE、shwo vtp statistics counters
考题
阅读以下程序:inta=5,b=0,c=0;if(a==b+c)printf(“***/n”);elseprintf(“$$$/n”);以上程序()。A、有语法错不能通过编译B、可以通过编译但不能通过连接C、输出***D、输出$$$
考题
You need to design a method to deploy security configuration settings to servers. What should you do?()A、Run the Resultant Set of Policy wizard with a Windows Management Instrumentation (WMI) filter on each department’s Server OUB、Log on to each server and use local policy to configure and manage the security settingsC、Create a customer security template. Log on to a domain controller and run the seceditcommand to import the security templateD、Create a customer security template. Create a GPO and import the security template. Link the GPO to each department’s Server OU
考题
以下属于OMCG功能的为()。A、Alarm SurveillanceB、Security ManagementC、Event and log ManagementD、Measurements
考题
Which of the following would be used to monitor unauthorized access to data files?()A、Performance Log and AlertsB、Event ViewerC、Security Configuration and AnalysisD、IP Security Monitor
考题
You need to design a strategy to ensure that all servers are in compliance with the business requirements for maintaining security patches. What should you do?()A、Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the domainB、Log on to each server and run Security Configuration and Analysis to analyze the security settings by using a custom security templateC、Create a logon script to run the secedit command to analyze all servers in the domainD、Run the Microsoft Baseline Security Analyzer (MBSA) on a server to scan for Windows vulnerabilities on all servers in the domain
考题
You are the network administrator for the Berlin office of The company network consists of a single Active Directory domain named The Berlin office contains 15 file servers that contain confidential files. All the file servers run either Windows Server 2003 or Windows 2000 Server. All the file servers are in the BerlinFilePrint organizational unit (OU). TestKing's security department sets a rule that specifies the size and retention settings for the Security event log of all file servers. The rule also specified that local administrators on servers cannot override the changes you make to the settings for the Security event log. You need to define a method to modify the Security event log settings on each file server in the Berlin office in order to meet the states requirements. What should you do?()A、Modify the local security policy on each file server.Define the size and retention settings for the Security event log.B、Create a security template on one of the file servers by using the Security Configuration and Analysis tool. Define the size and retention settings for the Security event log in the template. Import the security template into the local security policy of the other 14 file servers.C、Use Event Viewer to modify the event log properties on each file server. Define the size and retention settings for the Security event log.D、Create a new Group Policy object (GPO) and link it to the BerlinFilePrint OU. In the GPO, define the size and retention settings for the Security event log.
考题
单选题Your network contains a server named Server1 that runs Windows Server 2008 R2.You have a user named User1.You need to ensure that User1 can view the events in the Security event log. The solution must minimize the number of rights assigned to User1. What should you do?()A
In Event Viewer, filter the Security log.B
In Event Viewer, configure the properties of the Security log.C
In the Local Security Policy console, modify the Security Options.D
In the Registry Editor, add a Security Descriptor Definition Language (SDDL) value.
考题
单选题Which of the following is typically collected during the server baselining process?()A
The vendor documentation and knowledgebaseB
Compliance of local lawsC
Server performance statisticsD
Microsoft Baseline Security Analyzer output
考题
判断题在js中用console.log()来表示弹出框的输出。()A
对B
错
热门标签
最新试卷