网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
For security reasons, an administrator is asked to modify the system to prevent someone from leaving a terminal logged in. To enable a five minute timeout for all users, what would need to be done to accomplish this task?()
A

Add the following line to /etc/environment:  TMOUT=300

B

Add the following lines to /.profile  TMOUT=5  export TMOUT

C

Execute the following command:  chuser -u ALL -a TIMEOUT=5M

D

Execute the following command:  chsec -u ALL -a TIMEOUT=600


参考答案

参考解析
解析: 暂无解析
更多 “单选题For security reasons, an administrator is asked to modify the system to prevent someone from leaving a terminal logged in. To enable a five minute timeout for all users, what would need to be done to accomplish this task?()A Add the following line to /etc/environment:  TMOUT=300B Add the following lines to /.profile  TMOUT=5  export TMOUTC Execute the following command:  chuser -u ALL -a TIMEOUT=5MD Execute the following command:  chsec -u ALL -a TIMEOUT=600” 相关考题
考题 You are the administrator of a Windows 2000 network. You need to store secured files for your company's accounting and legal departments on a Windows 2000 Professional computer.You want to accomplish the following goals:1. Enable users in both departments to access their own files from the network2. Enable users in the accounting department to view the legal accounting department's documents3. Prevent users in the legal department from being able to view the accounting department's documents4. Enable managers within the company to access and modify both the accounting and the legal department's filesYou take the following actions:1. Create two shared folders named Accounting and Legal2. Create three groups named Accounting, Legal, and Management3. Allow the Accounting group modify permission on the Accounting folder4. Allow the Legal group modify permission on the Legal folders.5. Allow the Management group modify permission on both the Accounting and Legal folders.Which result or results do these actions produce? (Choose all that apply)A.Users in both departments can access to their own files from the network.B.Users in the accounting department can view the legal department's documents.C.Users in the legal department cannot view the accounting department's documents.D.Company managers can access and modify both departments' files.

考题 Which action changes the default editor for ALL users on the system from vi to edit of the following?()A、Issue the command:  export EDITOR=/usr/bin/editB、Modify /.profile and change the EDITOR variable to /usr/bin/editC、Modify /etc/environment and add  EDITOR=/usr/bin/edit  export EDITORD、Modify /etc/security/defaults and change the EDITOR value to /usr/bin/edit

考题 You need to prevent a custom application from connecting to the Internet. What should you do?()A、From Windows Firewall, add a program.B、From Windows Defender, modify the Allowed items list.C、From Windows Firewall with Advanced Security, create an inbound rule.D、From Windows Firewall with Advanced Security, create an outbound rule.

考题 You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. Three member servers are configured as terminal servers. All three host confidential data. Currently, all network users are full-time employees, and all network users are allowed to log on to the terminal servers. TestKing hires 25 temporary employees. You create a user account for each one. You need to ensure that only full-time employees are allowed to log on to the terminal servers. What should you do?()A、Modify the Default Domain Group Policy object (GPO).Configure a computer-level policy to prevent the temporary employees from connecting to the terminal servers.B、Modify the Default Domain Group Policy object (GPO). Enable the user-level Terminal Server setting Sets rules for remote control of Terminal Services user sessions.C、On the Terminal Services Profile tab of the user properties for each account, disable the option to log on to terminal servers.D、In the security policy for domain controllers, disable the computer-level Terminal Server setting Allow users to connect remotely using the terminal server.

考题 A system administrator wants to configure a system so that all new users will be put into the database group by default. How would this be accomplished?()A、remove all other groups from the systemB、run the command mkuser -default "GROUP=database"C、change the default group in /usr/lib/security/mkuser.defaultD、edit /etc/security/group to move all users to the database stanza

考题 For security reasons, an administrator is asked to modify the system to prevent someone from leaving a terminal logged in. To enable a five minute timeout for all users, what would need to be done to accomplish this task?()A、Add the following line to /etc/environment:  TMOUT=300B、Add the following lines to /.profile  TMOUT=5  export TMOUTC、Execute the following command:  chuser -u ALL -a TIMEOUT=5MD、Execute the following command:  chsec -u ALL -a TIMEOUT=600

考题 For security reasons, an administrator is asked to modify the system to prevent someone from  leaving a terminal logged in.  Which of the following options would enable a five minute timeout for all users()A、Add the following line to /etc/environment: TMOUT=300B、Add the following lines to /.profile TMOUT=5 export TMOUTC、Run the following command: chuser -u ALL -a TIMEOUT=5MD、Run the following command: chsec -u ALL -a TIMEOUT=600

考题 A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()A、/etc/security/limitsB、/etc/security/mkuser.sysC、/etc/security/privD、/etc/security/user

考题 You need to prevent users from storing cookies that come from the www.contoso.com Web site. The solution must allow users to browse to the www.contoso.com Web site. What should you do?()A、Add an entry to the Lmhosts file. B、From the local area connection, add a DNS suffix.C、From Internet Explorer, modify the Privacy settings.D、From Internet Explorer, modify the Manage Add-ons settings. 

考题 You have a server that runs Windows Server 2008. You need to prevent the server from establishing communication sessions to other computers by using TCP port 25. What should you do()A、 From Windows Firewall, add an exceptionB、 From windows Firewall enable the block all incoming connections optionC、 From the Windows Firewall with Advanced Security snap-in, create an inbound ruleD、 From the Windows Firewall with Advanced Security snap-in, create an outbound rule.

考题 You are the domain administrator for TestKing's Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional. A newly installed server was added to your domain. You need to administer this server remotely from your client computer. You need to configure the new server to ensure that it can be administered remotely. What should you do?()A、Install Terminal Server Licensing. Restart the server.B、Modify the system properties for the server. Enable Remote Desktop for the server by selecting the Allow users to connect remotely to this system check box.C、Start the Remote Access Connection Manager service and then configure the service to start automatically.D、Modify your user account properties to enable you to connect to the terminal server

考题 You are an enterprise administrator for Cer-tech .com. The company runs Windows Server 2008 on all theservers on the network. The company has many remote users One of the servers on the network calledServer01 has the Terminal Services Gateway (TS Gateway) role installed on it. The remote users of thecompany need to connect remotely to desktop computers located in their offices through the gateway. Toensure secure connection to the gateway, you created a security group named RemoteUsersGrp1 for theremote users who need to connect to computers in their offices. Which of the following options would youchoose to enable the remote users to connect to the TS Gateway? ()A、Create a resource authorization policy.B、Create a client authorization policy.C、Create a Group Policy object enable the Set TS Gateway authentication method properties to Ask forcredentials,use Basic protocol.D、Add the RemoteUsersGrp1 security group and enable Device redirection.

考题 You have a portable computer that runs Windows 7. The computer is joined to a domain. Multiple users logon to the computer. You need to prevent the computer from displaying the username of the last user whologged on. What should you do?()A、From Control Panel, modify the User Profiles settings.B、From Control Panel, modify the Personalization settings.C、From the local computer policy, add a policy template.D、From the local computer policy, modify the local security policy.

考题 Your network consists of a single Active Directory domain. You have a terminal server that runs Windows Server 2003 Service Pack 2 (SP2). You need to prevent users from establishing multiple Remote Desktop connections to the server. What should you do? ()A、Install and configure Terminal Server Licensing.B、From Terminal Services Manager, modify the user sessions.C、From Terminal Services Configuration, modify the server settings.D、From Active Directory Users and Computers, modify the Sessions settings for each user account.

考题 You have a server that runs the Terminal Services Gateway (TS Gateway) role service. Users need to connect remotely through the gateway to desktop computers located in their offices.  You create a security group named Remote1 for the users who need to connect to computers in their offices.  You need to enable the users to connect to the TS Gateway. What should you do?()A、Add the Remote1 security group to the local remote desktop users group on the TS Gateway server.B、Create a client authorization policy. Add the Remote1 security group and enable Device redirection.C、Create a resource authorization policy. Add the Remote1 security group and enable Users to connect to any resource.D、Create a Group Policy object and enable the Set TS Gateway authentication method properties to Ask for credentials, use Basic protocol. Apply the policy to the TS Gateway server.

考题 You have a computer named Computer1 that runs Windows XP Professional. Computer1 is a member of a workgroup. You need to prevent all users from encrypting files on Computer1. What should you do?() A、For all files, deny the Take ownership permission to the Everyone group. B、From the Local Security Policy, modify the Encrypting File System (EFS) properties.C、From the Certificates snap-in, delete the recovery agent certificate. D、From the Certificates snap-in, delete all trusted root certification authority (CA) certificates. 

考题 You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all client computers run Windows XP Professional. Terminal Services is installed on a member server named Terminal1 with default settings. Users in the editing department are members of a group named Editors. When these users try to make a Terminal Services connection to Terminal1, they receive the following error message: "The local policy of this system does not permit you to logon interactively". You need to enable members of the Editors group to establish Terminal Services sessions on Terminal1. What should you do?()A、Enable the Allow users to connect remotely to this computer option on Terminal1.B、Add the Editors group to the Remote Desktop Users group on Terminal1.C、Configure the RDP-Tcp connection properties on Terminal1 to assign the Allow - Full Control permission to the Editors group.D、Add the Editors group to the Remote Desktop Users group in Active Directory.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003.   The network contains servers that have Terminal Server enabled. The terminal servers host legacy applications that currently require users to be members of the Power Users group.   A new requirement in the company’s written security policy states that the Power Users group must be empty on all resource servers.   You need to maintain the ability to run the legacy applications on the terminal servers when the new security requirement is implemented.   What should you do?  ()A、 Add the Domain Users global group to the Remote Desktop Users built-in group in the domain.  B、 Add the Domain Users global group to the Remote Desktop Users local group on each terminal server.C、 Modify the Compatws.inf security template settings to allow members of the local Users group to run the applications. Import the security template into the Default Domain Controllers Policy Group Policy object (GPO).D、 Modify the Compatws.inf security template settings to allow members of the local Users group to run the applications. Apply the modified template to each terminal server.

考题 You have a server that runs Windows Server 2003 Service Pack 2 (SP2). You enable Remote Desktop on the server and add 10 users to the Remote Desktop Users group. Users report that they occasionally receive an error message indicating that Terminal Server has reached the maximum number of connections. You need to ensure that all 10 users can establish Remote Desktop connections to the server concurrently. What should you do?()A、From Add or Remove Programs, add the Terminal Server component.B、From Add or Remove Programs, add the Connection Point Services component.C、From the Terminal Services Configuration console, modify the Maximum connections setting.D、From the Terminal Services Configuration console, modify the Restrict each user to one session setting.

考题 单选题A system administrator wants to configure a system so that all new users will be put into the database group by default. How would this be accomplished?()A remove all other groups from the systemB run the command mkuser -default GROUP=databaseC change the default group in /usr/lib/security/mkuser.defaultD edit /etc/security/group to move all users to the database stanza

考题 单选题For security reasons, an administrator is asked to modify the system to prevent someone from  leaving a terminal logged in.  Which of the following options would enable a five minute timeout for all users()A Add the following line to /etc/environment: TMOUT=300B Add the following lines to /.profile TMOUT=5 export TMOUTC Run the following command: chuser -u ALL -a TIMEOUT=5MD Run the following command: chsec -u ALL -a TIMEOUT=600

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003.   The network contains servers that have Terminal Server enabled. The terminal servers host legacy applications that currently require users to be members of the Power Users group.   A new requirement in the company’s written security policy states that the Power Users group must be empty on all resource servers.   You need to maintain the ability to run the legacy applications on the terminal servers when the new security requirement is implemented.   What should you do?  ()A  Add the Domain Users global group to the Remote Desktop Users built-in group in the domain.  B  Add the Domain Users global group to the Remote Desktop Users local group on each terminal server.C  Modify the Compatws.inf security template settings to allow members of the local Users group to run the applications. Import the security template into the Default Domain Controllers Policy Group Policy object (GPO).D  Modify the Compatws.inf security template settings to allow members of the local Users group to run the applications. Apply the modified template to each terminal server.

考题 单选题You have a server that runs Windows Server 2003 Service Pack 2 (SP2). You enable Remote Desktop on the server and add 10 users to the Remote Desktop Users group. Users report that they occasionally receive an error message indicating that Terminal Server has reached the maximum number of connections. You need to ensure that all 10 users can establish Remote Desktop connections to the server concurrently. What should you do?()A From Add or Remove Programs, add the Terminal Server component.B From Add or Remove Programs, add the Connection Point Services component.C From the Terminal Services Configuration console, modify the Maximum connections setting.D From the Terminal Services Configuration console, modify the Restrict each user to one session setting.

考题 单选题A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()A /etc/security/limitsB /etc/security/mkuser.sysC /etc/security/privD /etc/security/user

考题 单选题You have a server that runs Windows Server 2008. You need to prevent the server from establishing communication sessions to other computers by using TCP port 25. What should you do()A  From Windows Firewall, add an exceptionB  From windows Firewall enable the block all incoming connections optionC  From the Windows Firewall with Advanced Security snap-in, create an inbound ruleD  From the Windows Firewall with Advanced Security snap-in, create an outbound rule.

考题 单选题What must an administrator do to prevent new telnet users from connecting to the system?()A rmdev -l /dev/ptsB touch /etc/nologinC chdev -l sys0 -a nologinD chuser -a login=false ALL

考题 单选题Your network consists of a single Active Directory domain. You have a terminal server that runs Windows Server 2003 Service Pack 2 (SP2). You need to prevent users from establishing multiple Remote Desktop connections to the server. What should you do? ()A Install and configure Terminal Server Licensing.B From Terminal Services Manager, modify the user sessions.C From Terminal Services Configuration, modify the server settings.D From Active Directory Users and Computers, modify the Sessions settings for each user account.