网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which of the following would be used to monitor unauthorized access to data files?()
A

Performance Log and Alerts

B

Event Viewer

C

Security Configuration and Analysis

D

IP Security Monitor


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which of the following would be used to monitor unauthorized access to data files?()A Performance Log and AlertsB Event ViewerC Security Configuration and AnalysisD IP Security Monitor” 相关考题
考题 Which of the following tools can an administrator use to get a server baseline?() A. System Resource MonitorB. Microsoft Baseline Security Analyzer (MBSA)C. Replication MonitorD. Performance Monitor

考题 Which of the following protocols should be used to monitor network performance?() A.SNTPB.SMTPC.HTTPD.SNMP

考题 Which of the following management types can be used to deploy appropriate quality-of-servicesolutions to make the most efficient use of bandwidth?()A、Fault managementB、Accounting managementC、Operations managementD、Performance managementE、Security managementF、Configuration management

考题 Which VMS Security Monitor tool allows you to monitor data for patterns of attacks from onemachine to a list of targets?  ()A、 Advanced Correlation EngineB、 Advanced Notification EngineC、 CiscoWorks DashboardD、 Management Center for CSA

考题 Which two commands can be used to monitor firewall user authentication?()A、show access firewall-authenticationB、show security firewall-authentication usersC、show security audit logD、show security firewall-authentication history

考题 You need to design a monitoring strategy to meet business requirements for data on servers in the production department. What should you do?()A、Use the Microsoft Baseline Security Analyzer (MBSA) to scan for Windows vulnerabilities on all servers in the production departmentB、Run Security and Configuration Analysis to analyze the security settings of all servers in the production departmentC、Enable auditing for data on each server in the production department. Run System Monitor on all servers in the production department to create a counter log that tracks activity for the Objects performance objectD、Create a Group Policy Object (GPO) that enables auditing for object access and link it to the product department’s Servers OU. Enable auditing for data on each server in the production department

考题 Your company has an Active Directory directory service domain. All servers run Windows Server 2003. You are developing a security monitoring plan. You must monitor the files that are stored in a specific directory on a member server. You have the following requirements. Log all attempts to access the files.Retain log information until the full weekly backup occurs. You need to ensure that the security monitoring plan meets the requirements.  What should your plan include?()A、 Configure a directory service access audit policy. Increase the maximum size of the security log.B、 Configure a directory service access audit policy. Set the system log to overwrite events older than 7 days.C、 Configure an object access audit policy for the directory. Increase the maximum size of the system log.D、 Configure an object access audit policy for the directory. Set the security log to overwrite events older than 7 days.

考题 A customer wants to check whether they have the necessary tools enabled to prevent intrusions andvirus attacks on a Windows Vista workstation. Which of the following tools can be used to display thecurrent configuration? ()A、Security CenterB、Event Viewer Security logC、Windows DefenderD、Windows Firewall

考题 A user reports that each day some files are deleted from the department share. The administrator needs to find who deleted these files.  Which of the following actions should the administrator perform?()A、 Enable audit object access and specify files and folders to monitor using Task Manager.B、 Enable audit policy change and specify files and folders to monitor using Windows Explorer.C、 Enable audit object access and specify files and folders to monitor using Windows Explorer.D、 Open Performance Monitor and monitor folder activity.

考题 Which of the following protocols should be used to monitor network performance?()A、SNTPB、SMTPC、HTTPD、SNMP

考题 Which of the following tools can an administrator use to get a server baseline?()A、System Resource MonitorB、Microsoft Baseline Security Analyzer (MBSA)C、Replication MonitorD、Performance Monitor

考题 Which of the following would be used to monitor unauthorized access to data files?()A、Performance Log and AlertsB、Event ViewerC、Security Configuration and AnalysisD、IP Security Monitor

考题 Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A、HoneynetB、HoneypotC、Vulnerability scannerD、Network based IDS

考题 Which of the following WLM commands should be used to monitor performance on a system running wlm?()A、 wlmcntrlB、 wlmstatC、 wlmcheckD、 wlmassign

考题 Your network contains a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).  You create a domain account named Admin1. You need to configure the security for Admin1 to meet the following requirements: Allow Admin1 to monitor events in the system event log and the application event logAllow Admin1 to create and view counter logs in Performance MonitorMinimize the user rights assigned to Admin1 To .which group should you add Admin1?()A、Power Users.B、Administrators.C、Performance Log Users.D、Performance Monitor Users.

考题 Your network contains a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You create a domain account named Admin1.  You need to configure the security for Admin1 to meet the following requirements:  (1)Allow Admin1 to monitor events in the system event log and the application event log  (2)Allow Admin1 to create and view counter logs in Performance Monitor  (3)Minimize the user rights assigned to Admin1  To which group should you add Admin1?()A、Power UsersB、AdministratorsC、Performance Log UsersD、Performance Monitor Users

考题 You need to receive an e-mail message whenever a domain user account is locked out.   Which tool should you use()A、Active Directory Administrative CenterB、Event ViewerC、Resource MonitorD、Security Configuration Wizard

考题 单选题Which of the following protocols should be used to monitor network performance?()A SNTPB SMTPC HTTPD SNMP

考题 单选题A user reports that each day some files are deleted from the department share. The administrator needs to find who deleted these files.  Which of the following actions should the administrator perform?()A  Enable audit object access and specify files and folders to monitor using Task Manager.B  Enable audit policy change and specify files and folders to monitor using Windows Explorer.C  Enable audit object access and specify files and folders to monitor using Windows Explorer.D  Open Performance Monitor and monitor folder activity.

考题 单选题Your company has an Active Directory directory service domain. All servers run Windows Server 2003. You are developing a security monitoring plan. You must monitor the files that are stored in a specific directory on a member server. You have the following requirements. Log all attempts to access the files.Retain log information until the full weekly backup occurs. You need to ensure that the security monitoring plan meets the requirements.  What should your plan include?()A  Configure a directory service access audit policy. Increase the maximum size of the security log.B  Configure a directory service access audit policy. Set the system log to overwrite events older than 7 days.C  Configure an object access audit policy for the directory. Increase the maximum size of the system log.D  Configure an object access audit policy for the directory. Set the security log to overwrite events older than 7 days.

考题 单选题You need to design a monitoring strategy to meet business requirements for data on servers in the production department. What should you do?()A Use the Microsoft Baseline Security Analyzer (MBSA) to scan for Windows vulnerabilities on all servers in the production departmentB Run Security and Configuration Analysis to analyze the security settings of all servers in the production departmentC Enable auditing for data on each server in the production department. Run System Monitor on all servers in the production department to create a counter log that tracks activity for the Objects performance objectD Create a Group Policy Object (GPO) that enables auditing for object access and link it to the product department’s Servers OU. Enable auditing for data on each server in the production department

考题 单选题Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A HoneynetB HoneypotC Vulnerability scannerD Network based IDS

考题 单选题Your network contains a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).  You create a domain account named Admin1. You need to configure the security for Admin1 to meet the following requirements: Allow Admin1 to monitor events in the system event log and the application event logAllow Admin1 to create and view counter logs in Performance MonitorMinimize the user rights assigned to Admin1 To .which group should you add Admin1?()A Power Users.B Administrators.C Performance Log Users.D Performance Monitor Users.

考题 单选题Your network contains a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You create a domain account named Admin1.  You need to configure the security for Admin1 to meet the following requirements:  (1)Allow Admin1 to monitor events in the system event log and the application event log  (2)Allow Admin1 to create and view counter logs in Performance Monitor  (3)Minimize the user rights assigned to Admin1  To which group should you add Admin1?()A Power UsersB AdministratorsC Performance Log UsersD Performance Monitor Users

考题 单选题Which of the following would be used to monitor unauthorized access to data files?()A Performance Log and AlertsB Event ViewerC Security Configuration and AnalysisD IP Security Monitor

考题 单选题Which VMS Security Monitor tool allows you to monitor data for patterns of attacks from onemachine to a list of targets?  ()A  Advanced Correlation EngineB  Advanced Notification EngineC  CiscoWorks DashboardD  Management Center for CSA

考题 单选题Which of the following WLM commands should be used to monitor performance on a system running wlm?()A  wlmcntrlB  wlmstatC  wlmcheckD  wlmassign

考题 单选题Your network contains a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). Server1 has IPSec enabled. Several users report that they cannot connect to Server1. You need to see how many IPSec connection attempts failed due to authentication failures. What should you do?()A From IP Security Monitor, view the Main Mode Statistics.  B From Microsoft Baseline Security Analyzer, scan Server1.  C From the Security event log, view the events from the IPSec source.  D From System Monitor, add the IPSec V4 Driver : Active Security Associations counter.