网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You need to configure the local security policy setting to request a user name and password when you make changes to the computer system.  What should you do?()
A

Enable the Password must meet complexity requirements setting.

B

Enable the User Account Control: Detect application installations and prompt for elevation setting.

C

Configure the Interactive logon: Prompt user to change password before expiration setting to a value between 1 and 999.

D

Configure the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval mode setting to the Prompt for credentials option.


参考答案

参考解析
解析: 暂无解析
更多 “单选题You need to configure the local security policy setting to request a user name and password when you make changes to the computer system.  What should you do?()A Enable the Password must meet complexity requirements setting.B Enable the User Account Control: Detect application installations and prompt for elevation setting.C Configure the Interactive logon: Prompt user to change password before expiration setting to a value between 1 and 999.D Configure the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval mode setting to the Prompt for credentials option.” 相关考题
考题 Your network contains a server that has the SNMP Service installed.You need to configure the SNMP security settings on the server.Which tool should you use?()A、Local Security PolicyB、ScwC、SeceditD、Services console

考题 Your network contains a server named Server1 that runs Windows Server 2008 R2.You have a user named User1.You need to ensure that User1 can view the events in the Security event log. The solution must minimize the number of rights assigned to User1. What should you do?()A、In Event Viewer, filter the Security log.B、In Event Viewer, configure the properties of the Security log.C、In the Local Security Policy console, modify the Security Options.D、In the Registry Editor, add a Security Descriptor Definition Language (SDDL) value.

考题 You need to design a security strategy for VPN2. Your solution must meet business requirements. What should you do?()A、Create and configure a new security template. Import the template into the Default Domain Policy Group Policy object (GPO)B、Install Internet Authentication Service (IAS) on RAS1. Configure VPN2 to be the RADIUS client of RAS1. Configure the remote access policy on VPN2C、Create and configure a new security template. Import the template into the local policy on VPN2D、Move VPN2 into the VPN Servers OU. Configure the remote access policy on VPN2

考题 You are the administrator of a SQL Server 2005 computer named SQL1. You create a security template that disables unnecessary services. The template is appropriate only for SQL1. You need to ensure that the security template is applied to SQL1. Your solution must ensure that the template automatically overrides any manual configuration changes made by other administrators within an hour. What should you do?()A、Use the SQL Server Surface Area Configuration tool to import the security template.B、Use the Local Security Policy editor to import the security template into the Local Security Policy object.C、Configure Task Scheduler to import the security template by using Secedit.exe. Configure the task to run every half hour.D、Configure Task Scheduler to run the Microsoft Baseline Security Analyzer tool every half hour.

考题 You need to design a method to implement account policies that meets the requirements in the written security policy. What should you do?()A、Create a GPO and link it to the New York OU, to the Denver OU, and to the Dallas OU.Configure the GPO with the required account policy settingsB、On all computers in the domain, configure the Local Security Policy7 with the required account policy settingsC、Configure the Default Domain Policy GPO with the required account policy settingsD、Configure the Default Domain Controllers Policy GPO with the required account policy settings

考题 You need to design a method to address the chief information officer’s security concerns. What should you do?()A、Configure Windows Management Instrumentation (WMI) filtering options in the Default Domain Policy GPOB、Use the gpresult commandC、Use Mbsacli.exeD、Configure software restriction policy options in the Default Domain Policy GPO

考题 Your network consists of a single Active Directory domain. All domain controllers run Windows  Server 2008 R2.     The Audit account management policy setting and Audit directory services access setting are  enabled for the entire domain.     You need to ensure that changes made to Active Directory objects can be logged. The logged  changes must include the old and new values of any attributes.     What should you do()A、Enable the Audit account management policy in the Default Domain Controller Policy.B、Run auditpol.exe and then configure the Security settings of the Domain Controllers OU.C、Run auditpol.exe and then enable the Audit directory service access setting in the Default Domain policy.D、From the Default Domain Controllers policy, enable the Audit directory service access setting and enable directory

考题 Your company has an Active Directory domain. You have a server that runs Windows Server 2008. The Terminal Services role is installed on the server.  The company security policy does not allow users to copy and paste information to a local computer during a Terminal Services session.  You deploy the remote application named APP1.  You need to configure Terminal Services to meet the security requirement. What should you do?()A、Enable the Use temporary folders per session option.B、Change the Security Encryption Level to FIPS Compliant.C、Deselect the Clipboard option in the RDP Settings for the published application.D、Disable the Drive option in the RDP-Tcp Client Setting properties for the server.

考题 You have a computer that runs Windows 7. Multiple users log on to your computer. You enable auditing ona folder stored on your computer. You need to ensure that each access to the folder is logged.  What should you do?()A、Start the Problem Steps Recorder.B、From Event Viewer, modify the properties of the Security log.C、From the local Group Policy, configure the Audit object access setting.D、From the local Group Policy, configure the Audit directory service Access setting.

考题 You need to configure the local security policy setting to request a user name and password when you make changes to the computer system.  What should you do?()A、Enable the Password must meet complexity requirements setting.B、Enable the User Account Control: Detect application installations and prompt for elevation setting.C、Configure the Interactive logon: Prompt user to change password before expiration setting to a value between 1 and 999.D、Configure the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval mode setting to the Prompt for credentials option.

考题 You are the administrator of your company’s network. You use Security Templates to configure a Security Policy on the Windows 2000 Professional Computers in the Sales organizational unit (OU). You notice that the Computers in the Sales OU are not downloading the Security Policy settings. On each computer, the Security Policy appears in the Local Computer Policy, but is not listed as the effective policy. You want all computers in the Sales OU to have the Security Policy listed as the effective policy. How should you accomplish this task? ()A、Use Security Templates to correct the setting and export the security file.B、Use Security Configuration and Analysis to import the security setting. Then create a Group policy object (GPO) for the Sales QU.C、Use Secedit /RefreshPolicy Machine_Policy command.D、Use the Basicwk.inf security file settings, save the security file, and then import the fileto theComputers.

考题 Your portable computer has two 512-MB memory modules installed in the only two memory slots available.  You need to improve the speed of your computer.  What should you do? ()A、Adjust the processor scheduling to optimize for background services.B、Connect a USB flash drive to the computer. Enable the ReadyBoost feature.C、Configure the virtual memory file to exist on the same drive as the operating system.D、Configure the local security policy setting of the computer to clear the virtual page file upon shutdown.

考题 You need to design a method to enable remote encryption on Server5. What should you do?()A、Configure the editor’s user account properties to enable Store password using reversible encryptionB、Configure the editor’s user account properties to enable Use DES encryption for this accountC、Configure the Local Security Policy on Server to enable the System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing security policyD、Configure the Server5 computer account properties to enable Trust computer for delegation

考题 Your company has an organizational unit named Production. The Production organizational unit has achild organizational unit named RD. You create a GPO named Software Deployment and link it to the  Production organizational unit. You create a shadow group for the RD organizational unit.   You need to deploy an application to users in the Production organizational unit.  You also need to ensure  that the application is not deployed to users in the RD organizational unit.    What are two possible ways to achieve this goal()A、Configure the Enforce setting on the software deployment GPO.B、Configure the Block Inheritance setting on the RD organizational unit.C、Configure the Block Inheritance setting on the Production organizational unit.D、Configure security filtering on the Software Deployment GPO to Deny Apply group policy for the RD  security group.

考题 You are the network administrator for The network consists of a single Active Directory domain The domain contains 25 Windows server 2003 computers and 5,000 Windows 2000 Professional computers. You install and configure Software Update Services (SUS) on a server named TestKingSrv. All client computer accounts are in the Clients organizational unit (OU). You create a Group Policy object (GPO) named SUSupdates and link it to the Clients OU. You configure the SUSupdates GPO so that client computers obtain security updates from TestKingSrv. Three days later, you examine the Windowsupdate.log file on several client computers and discover that they have downloaded Windows security updates from only You need to configure all client computers to download Windows security updates from TestKingSrv. What should you do?()A、Open the SUSupdates GPO and configure the Configure Automatic Update policy to assign the Auto download and notify for install setting for Windows security updates.B、Open the SUSupdates GPO and configure the Configure Automatic Update policy to assign the Auto download and schedule the install setting for Windows security updates.C、Create software distribution policy for the SUSupdates GPO that assigns the package WUAU22.msi to all client computers. Restart all client computers.D、On all client computers, configure the UseWUServer registry value to enable Automatic Updates to use TestKingSrv.

考题 You upgrade your computer from Windows NT Workstation to a Windows 2000 Professional computer. Your computer is a member of justtalks.com domain. Prior to this upgrade your computer was configured by a system policy to require at-least a 12 alphanumeric character password. After the upgrade your computer will not apply security policy. What should you do?()A、Use secedit.exe to refresh the security policy.B、Use the local computer policy to configure the local security policy.C、Use security configuration and analysis to support the security files as a .pol file.D、Use computer management to configure the security policy setting.

考题 Your company has a server that runs Windows Server 2008 R2. Active Directory Certificate Services  (AD CS) is configured as a standalone Certification Authority (CA) on the server. You need to audit changes to the CA configuration settings and the CA security settings. Which two tasks should you perform()A、Configure auditing in the Certification Authority snap-in.B、 Enable  auditing  of  successful  and  failed  attempts  to  change  permissions  on  files  in  the %SYSTEM32%/CertSrv directory.C、Enable auditing of successful and failed attempts to write to files in the %SYSTEM32%/CertLog directory.D、Enable the Audit object access setting in the Local Security Policy for the Active Directory Certificate  Services (AD CS) server.

考题 Your network consists of a single Active Directory domain. You have a member server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).You need to record all attempts by domain users and local users to log on to Server1. What should you do?()A、In the Default Domain Controller Policy, enable success and failure for the Audit logon events policy setting.B、In the Default Domain Controller Policy, enable success and failure for the Audit account logon events policy setting.C、In the Local Security Policy on Server1, enable success and failure for the Audit logon events policy.D、In the Local Security Policy on Server1, enable success and failure for the Audit account logon events policy setting.

考题 单选题You need to design a method to implement account policies that meets the requirements in the written security policy. What should you do?()A Create a GPO and link it to the New York OU, to the Denver OU, and to the Dallas OU.Configure the GPO with the required account policy settingsB On all computers in the domain, configure the Local Security Policy7 with the required account policy settingsC Configure the Default Domain Policy GPO with the required account policy settingsD Configure the Default Domain Controllers Policy GPO with the required account policy settings

考题 单选题Your network contains a server named Server1 that runs Windows Server 2008 R2.You have a user named User1.You need to ensure that User1 can view the events in the Security event log. The solution must minimize the number of rights assigned to User1. What should you do?()A In Event Viewer, filter the Security log.B In Event Viewer, configure the properties of the Security log.C In the Local Security Policy console, modify the Security Options.D In the Registry Editor, add a Security Descriptor Definition Language (SDDL) value.

考题 单选题You have a standalone computer that runs Windows 7. Multiple users share the computer. You need toensure that you can read the content of all encrypted files on the computer.  What should you do?()A Run the Certificates Enrollment wizard and then run Certutil.exe importpfx.B Run the Certificates Enrollment wizard and then run Certutil.exe installcert.C Run Cipher.exe /r and then add a data recovery agent from the local security policy.D Run Cipher.exe /rekey and then import a security template from the local security policy.

考题 单选题You need to design a method to deploy security configuration settings to servers. What should you do?()A Run the Resultant Set of Policy wizard with a Windows Management Instrumentation (WMI) filter on each department’s Server OUB Log on to each server and use local policy to configure and manage the security settingsC Create a customer security template. Log on to a domain controller and run the seceditcommand to import the security templateD Create a customer security template. Create a GPO and import the security template. Link the GPO to each department’s Server OU

考题 单选题You need to configure the local security policy setting to request a user name and password when you make changes to the computer system.  What should you do?()A Enable the Password must meet complexity requirements setting.B Enable the User Account Control: Detect application installations and prompt for elevation setting.C Configure the Interactive logon: Prompt user to change password before expiration setting to a value between 1 and 999.D Configure the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval mode setting to the Prompt for credentials option.

考题 单选题Your network consists of a single Active Directory domain. You have a member server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).You need to record all attempts by domain users and local users to log on to Server1. What should you do?()A In the Default Domain Controller Policy, enable success and failure for the Audit logon events policy setting.B In the Default Domain Controller Policy, enable success and failure for the Audit account logon events policy setting.C In the Local Security Policy on Server1, enable success and failure for the Audit logon events policy.D In the Local Security Policy on Server1, enable success and failure for the Audit account logon events policy setting.

考题 单选题Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 hosts a custom application named App1. App1 is accessible on TCP port 5000.You need to encrypt App1 data on the network.What should you do?()A From the Local Security Policy console, configure the Security Options.B From the Local Security Policy console, configure the Application Control Policies.C From the Windows Firewall with Advanced Security console, create an inbound rule.D From the Windows Firewall with Advanced Security console, create a connection security rule.

考题 单选题You are the network administrator for The network consists of a single Active Directory domain The domain contains 25 Windows server 2003 computers and 5,000 Windows 2000 Professional computers. You install and configure Software Update Services (SUS) on a server named TestKingSrv. All client computer accounts are in the Clients organizational unit (OU). You create a Group Policy object (GPO) named SUSupdates and link it to the Clients OU. You configure the SUSupdates GPO so that client computers obtain security updates from TestKingSrv. Three days later, you examine the Windowsupdate.log file on several client computers and discover that they have downloaded Windows security updates from only You need to configure all client computers to download Windows security updates from TestKingSrv. What should you do?()A Open the SUSupdates GPO and configure the Configure Automatic Update policy to assign the Auto download and notify for install setting for Windows security updates.B Open the SUSupdates GPO and configure the Configure Automatic Update policy to assign the Auto download and schedule the install setting for Windows security updates.C Create software distribution policy for the SUSupdates GPO that assigns the package WUAU22.msi to all client computers. Restart all client computers.D On all client computers, configure the UseWUServer registry value to enable Automatic Updates to use TestKingSrv.

考题 单选题You are the administrator of a SQL Server 2005 computer named SQL1. You create a security template that disables unnecessary services. The template is appropriate only for SQL1. You need to ensure that the security template is applied to SQL1. Your solution must ensure that the template automatically overrides any manual configuration changes made by other administrators within an hour. What should you do?()A Use the SQL Server Surface Area Configuration tool to import the security template.B Use the Local Security Policy editor to import the security template into the Local Security Policy object.C Configure Task Scheduler to import the security template by using Secedit.exe. Configure the task to run every half hour.D Configure Task Scheduler to run the Microsoft Baseline Security Analyzer tool every half hour.

考题 单选题You need to configure Active Directory to implement the new password policy for the HR department. What should you do?()A Create a new child domain named hr.ad.margiestravel.com in the existing forest. Move the resources from the HR OU to this new domain. Add the appropriate security settings in the Default Domain Policy for this new domain.B Add the appropriate security settings to the current Default Domain Policy.C Add the appropriate security settings to the local security policy of SQL1.D Set the SQL server check_policy and check_expiration options to On when creating all user accounts.