网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You are auditing some events on your Windows 2000 Professional computer. You make changes in the system time of this computer. Under what event will this log be generated in the event viewer? ()
A

Privilege Use

B

Object Use

C

Security Settings Use

D

System Use


参考答案

参考解析
解析: 暂无解析
更多 “单选题You are auditing some events on your Windows 2000 Professional computer. You make changes in the system time of this computer. Under what event will this log be generated in the event viewer? ()A Privilege UseB Object UseC Security Settings UseD System Use” 相关考题
考题 You are developing a Windows Communication Foundation (WCF) service.You need to enable security auditing for all events.What should you do?() A. Set the serviceAuthorizationAuditLevel setting to Success and the messageAuthenticationAuditLevel setting to Success.B. Set the messageAuthenticationAuditLevel setting to Success and the auditLogLocation setting to Application.C. Set the serviceAuthorizationAuditLevel setting to SuccessAndFailure and the messageAuthenticationAuditLevel setting to SuccessAndFailure.D. Set the messageAuthenticationAuditLevel setting to SuccessAndFailure and the auditLogLocation setting to Security.

考题 You are the administrator of Ezonexam.com's Windows 2000 network.Your computer is configured to use both Windows 2000 Professional and Windows NT Workstation 4.0 Service Pack 3. Your computer has three hard disks: Disk 0, Disk1, and Disk2. Windows NT Workstation 4.0 is installed on Disk 0. Windows 2000 Professional is installed on Disk1. You want to store your project files on Disk2. You configure Disk2 as a basic volume and format the volume as NTFS in Windows 2000 Professional. You then start Windows NT Workstation 4.0. You find that you cannot access your project files.You want to be able to access your project files when using either of the operating systems.What should you do?A.Upgrade Windows NT Workstation 4.0 to Service Pack 4 or later.B.Configure Disk 2 as a dynamic volume then format as an NTFS partition.C.Configure Disk 2 to use Encrypting File System (EFS).D.Configure Disk 2 as a basic volume and format the volume as FAT32.

考题 Your Microsoft Windows Tablet PC does not recognize some characters correctly from your input device.You need to ensure that the Windows Tablet PC recognizes all characters correctly.What should you do?()A.AB.BC.CD.D

考题 Your computer runs Microsoft Windows 2000 with Service Pack 3.You need to upgrade your computer to Microsoft Windows Vista. You must achieve this goal without reinstalling the applications.What should you do?()A.AB.BC.CD.D

考题 You attach a USB camera to your Windows 2000 Professional computer. Windows 2000 Professional detects the camera and prompts you to install the manufacturer’s device driver. You do it, and then you restart the computer. When Win2000 Professional loads, you notice that your USB keyboard does not respond. You suspect that the camera drivers are not certified for Win2000 Professional. You want to configure your computer to enable your use keyboard and to prevent uncertified drivers from being installed in the future. What should you do? ()A、Configure Windows 2000 Professional to enable driver signing.B、Configure Windows 2000 Professional to disable driver signing.C、Start the computer by using the recovery console, restore the system state data.D、Start the computer in safe mode, replace the camera driver with a Windows 2000 Professional driver by using Device Manager.E、Start the computer in debug mode, replace the camera driver with a Windows 2000 Professional driver by using Device Manager.

考题 You have a share on your local computer. This share contains some sensitive applications in theform of .exe files. You want to audit the users who are trying to execute these programs. What should you do?()A、Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.B、Turn on auditing for objects in the Local Security Policy and Select 'Object Access'.C、Use Windows Explorer to turn on auditing for the specific files. D、Have the administrator for domains log you on as an administrator and enable auditing for a  specific file.E、Turn on auditing for objects in the Local Security Policy and Select 'Account Management'.F、Allow only one account at a time to log on to your shared folder. Check the event viewer to  see who logged on. 

考题 You are developing a Windows Communication Foundation (WCF) service. You need to enable security auditing for all events. What should you do?()A、Set the serviceAuthorizationAuditLevel setting to Success and the messageAuthenticationAuditLevel setting to Success.B、Set the messageAuthenticationAuditLevel setting to Success and the auditLogLocation setting to Application.C、Set the serviceAuthorizationAuditLevel setting to SuccessAndFailure and the messageAuthenticationAuditLevel setting to SuccessAndFailure.D、Set the messageAuthenticationAuditLevel setting to SuccessAndFailure and the auditLogLocation setting to Security.

考题 Windows NT 4.0 is currently on the system you are using, and you want to install Windows 2000 Professional. Windows NT 4.0 is currently on an NFTS partition.  For some reason you have decided that you are not going to upgrade, but rather, you are going to run this in a dual boot fashion.  What do you need to do? ()A、Can’t be done.B、You need to put Windows 2000 on a separate partition from Windows NT 4.0C、You need to put Windows 2000 on the same partition as Windows NT 4.0.D、You need to upgrade Windows NT 4.0 to SP4.

考题 You have an Exchange Server 2010 organization.  You plan to delegate Exchange administrative rights to some users in the organization.  You need to recommend a solution that tracks all changes made to the Exchange organization.  What should you include in the solution?()A、administrator audit loggingB、circular loggingC、diagnostic loggingD、Windows Security Auditing

考题 Your network consists of a single Active Directory domain. All domain controllers run Windows Server  2008 R2.   You need to plan an auditing strategy that meets the following requirements: èAudits all changes to Active Directory Domain Services (AD?DS) èStores all auditing data in a central location. What should you include in your plan?()A、Configure an audit policy for the domain. Configure Event Forwarding.B、Configure an audit policy for the domain controllers. Configure Data Collector Sets.C、Implement Windows Server Resource Manager (WSRM) in managing mode.D、Implement Windows Server Resource Manager (WSRM) in accounting mode.

考题 You are a network administrator of an organization. Maria and John are your network assistant. You have grant then the rights to modify the user properties in the computer management. You want to audit the modification in user accounts. What should you do?()A、Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.B、Turn on auditing for objects in the Local Security Policy and Select 'Object Access'. C、Use Windows Explorer to turn on auditing for the specific files.D、Have the administrator for domains log you on as an administrator and enable auditing for a  specific file.E、Turn on auditing for objects in the Local Security Policy and Select 'Account Management'.F、Allow only one account at a time to log on to your shared folder. Check the event viewer to  see who logged on. 

考题 Most of the Windows 2000 Professional clients on your network use the TCP/IP Protocol to communicate with Server. You want to increase network performance. Where do you change the binding order of your protocols? ()A、On the Windows 2000 Server, set TCP/IP for the Server service at the top.B、On the Windows 2000 Professional computers, set TCP/IP for the Workstation service at the top.C、On the Windows 2000 Server, set TCP/IP for the Workstation service at the top.D、On the Windows 2000 Professional computers, set TCP/IP for the Server service at the top.

考题 You are the network administrator for ExamSheet.net. You administer ExamSheet's Windows 2000 network. You want to update the device driver for the network adapter in your Windows 2000 Professional computer. You log on the computer by using the local Administrator account. You use Device Manager to verify that the network adapter is installed on your computer. You select the Driver tab and Update Driver option, and install a new driver from the network adapter manufacturer. You restart the computer. After displaying the Windows 2000 Professional startup screen, your computer displays aCkernel stop error message. You want to configure your computer to start successfully.  Which two methods can you use to resolve the problem?()A、Perform an emergency repair of the system from the Windows 2000 Professional CD-ROM by     using the Emergency Repair Disk for the computer.B、Restart the computer. In the Recovery Console, use the Extract utility to reinstall the loopback     driver from the Windows 2000 Professional CD-ROM.C、Restart the computer by using the last know good configuration.D、Restart the computer in safe mode and reinstall the original network adapter driver. E、Restart the computer and disable Plug and Play in the computer BIOS.

考题 单选题Your network consists of a single Active Directory domain. You have a member server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You need to track all authentication attempts on Server1. What should you do? ()A Enable auditing of logon event events in Server1’s local policy.B Enable auditing of logon event events in the Default Domain Controller Policy.C Enable auditing of account logon event events in Server1’s local policy.D Enable auditing of account logon event events in the Default Domain Controller Policy.

考题 单选题You have updated the modem driver on your Windows 2000 Professional computer. You restart your computer. Immediately after you log on, you receive a stop error. You need to start Windows 2000. What must you do? ()A Restart the computer in Safe Mode. Uninstall the modem driver.B Restart the computer by using the last known good configuration.C Restart the computer in Recovery Console. Replace the new Modem.inf file with the old modem.inf file.D Start the computer from the Windows 2000 startup floppy disks. Repair the registry.E Start the computer from the Windows 2000 startup floppy disks. Repair the system files.

考题 多选题You have a share on your local computer. Someone has been intentionally damaging your files.  You want to be able to know which account is doing this. What do you do? ()ATurn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.BTurn on auditing for objects in the Local Security Policy and Select 'Object Access'.CUse Windows Explorer to turn on auditing for the specific files.DHave the administrator for domains log you on as an administrator and enable auditing for a  specific file.ETurn on auditing for objects in the Local Security Policy and Select 'Account Management'.FAllow only one account at a time to log on to your shared folder. Check the event viewer to  see who logged on.

考题 单选题You have a share on your local computer. This share contains some sensitive applications in theform of .exe files. You want to audit the users who are trying to execute these programs. What should you do?()A Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.B Turn on auditing for objects in the Local Security Policy and Select 'Object Access'.C Use Windows Explorer to turn on auditing for the specific files. D Have the administrator for domains log you on as an administrator and enable auditing for a  specific file.E Turn on auditing for objects in the Local Security Policy and Select 'Account Management'.F Allow only one account at a time to log on to your shared folder. Check the event viewer to  see who logged on. 

考题 多选题You configure your Windows 2000 Professional portable computer to redirect your My Documents folder to your home folder. You want to ensure that you can access all of your files in you’re my Documents folder when you are not connected to the network. What should you do?()AUse Windows Explorer to enable offline files.BUse Windows Explorer to create shortcut to access offline files folder as desktop.CUse Windows Explorer to configure the properties of your home folder to be available offline.DUse synchronization manager to configure your home folder to be available offline.ECreate a shortcut in my network places to access your home folder.

考题 单选题In your production database, data manipulation language (DML) operations are executed on the SALES table.You have noticed some dubious values in the SALES table during the last few days. You are able to track users, actions taken, and the time of the action for this particular period but the changes in data are not tracked.You decide to keep track of both the old data and new data in the table along with the user information.  Whataction would you take to achieve this task()A Apply fine-grained auditing.B Implement value-based auditing.C Impose standard database auditing to audit object privileges.D Impose standard database auditing to audit SQL statements.

考题 单选题You are the network administrator for Company.com.  Your computer has a CD-ROM drive attached to a SCSI adapter. You plan to upgrade your computer from Windows NT Workstation 4.0 to Windows 2000 Professional. You determine that the SCSI adapter is not included on the current Hardware Compatibility List (HCL) and that the original SCSI drivers that you used for Windows NT are not compatible with Windows 2000 Professional.   You want to upgrade your computer to Windows 2000 Professional. What should you do?()A  Replace the SCSI adapter card with a Windows 2000 Professional compatible SCSI adapter.     Start the installation from the Windows 2000 Professional CD-ROM.     Add the new adapter card drivers when you are prompted. B  Obtain Windows 2000 drivers from the SCSI adapter manufacturer.     Copy the drivers to C:/Winnt folder.      Start the installation from the Windows 2000 Professional CD-ROM. C  Obtain Windows 2000 drivers from the SCSI adapter manufacturer.     Start the installation by using the Windows 2000 Professional CD-ROM-     Add the new adapter card drivers when you are prompted. D  Modify Config.sys to use your existing SCSI adapter and existing CD-ROM drive.      Using Windows NT 4.0, start the installation by running Winnt32.exe from the I386 folder on      the Windows 2000 Professional CD-ROM.

考题 多选题You are a network administrator for ExamSheet.net’s Windows 2000 network. Your computer has Windows 2000 Professional installed. Your office has a power utage while you are running the Windows 2000 disk defragmenter. When you restart your computer, you receive the following error message: "Bad or missing operating system". You want your computer to start properly. You want to do this with least amount of administrative effort. What should you do?()AReinstall the operating systemBStart the computer by using the Windows 2000 Professional CD-ROM.CUse the Recovery Console to repair the Master Boot Record.DUse the Emergency Repair Disk to repair the Master Boot Record.

考题 单选题Windows NT 4.0 is currently on the system you are using, and you want to install Windows 2000 Professional. Windows NT 4.0 is currently on an NFTS partition.  For some reason you have decided that you are not going to upgrade, but rather, you are going to run this in a dual boot fashion.  What do you need to do? ()A Can’t be done.B You need to put Windows 2000 on a separate partition from Windows NT 4.0C You need to put Windows 2000 on the same partition as Windows NT 4.0.D You need to upgrade Windows NT 4.0 to SP4.

考题 单选题You want to upgrade your MS Windows 98 computer to Windows 2000 professional. Before the actual installation, you want to know whether your system’s hardware or software is compatible with Windows 2000 professional or not.   What you will do. ()A Consult the HCL.B See the online documentation of Windows 2000 professional. C Run WINNT32/CHECKUPGRADEONLY.D Consult the technical support team of Windows 2000.

考题 单选题You are the administrator of Company.com’s Windows 2000 network.   Your computer is configured to use both Windows 2000 Professional and Windows NT Workstation 4.0 Service Pack 3. Your computer has three hard disks: Disk 0, Disk1, and Disk2. Windows NT Workstation 4.0 is installed on Disk 0. Windows 2000 Professional is installed on Disk1. You want to store your project files on Disk2. You configure Disk2 as a basic volume and format the volume as NTFS in Windows 2000 Professional. You then start Windows NT Workstation 4.0. You find that you cannot access your project files.  You want to be able to access your project files when using either operating systems.   What should you do?()A Upgrade Windows NT Workstation 4.0 to Service Pack 4 or later.B Configure Disk 2 as a dynamic volume then format as an NTFS partition.C Configure Disk 2 to use Encrypting File System (EFS).D Configure Disk 2 as a basic volume and forma the volume as FAT32.

考题 单选题As the administrator of your company’s network you are asked to upgrade several Windows NT 4.0 computers to Windows 2000 Professional.  All user settings and application settings must be preserved. Most applications currently running are compatible with Windows 2000 and all the Windows NT 4.0 computers meet the minimum hardware requirements. After you upgrade several computers to Windows 2000 Professional, you find that some applications did not upgrade properly.   What utilities and/or applications should be disabled (or removed) before upgrading?()A Custom printer third-party software.B APM and Anti-virus softwareC All Non-Microsoft ProductsD All 32-bit applicationsE Third-party video drivers

考题 多选题You use a shared Windows 2000 Professional Computer. You notice, that some of your Microsoft Word documents that were on the local hard drive have been deleted. You restore the documents from a recent backup. Now, you want to be able to track all users who access your Word documents in the future. What should you do? ()AEnable the local Group Policy for auditing object access events that are successful.BEnable the local Group Policy for auditing object access events that are unsuccessful.CEnable the local Group Policy for auditing process tracking events that are successful.DEnable the local Group Policy for auditing process tracking events that are unsuccessful.EUse Windows 2000 Explorer, to enable auditing for your files.FRun the diskperf - y command. Use System Monitor to examine the logical I/O counter.  Restart the Computer.

考题 单选题Most of the Windows 2000 Professional clients on your network use the TCP/IP Protocol to communicate with Server. You want to increase network performance. Where do you change the binding order of your protocols? ()A On the Windows 2000 Server, set TCP/IP for the Server service at the top.B On the Windows 2000 Professional computers, set TCP/IP for the Workstation service at the top.C On the Windows 2000 Server, set TCP/IP for the Workstation service at the top.D On the Windows 2000 Professional computers, set TCP/IP for the Server service at the top.