单选题You are a network administrator of an organization. Maria and John are your network assistant. You have grant then the rights to modify the user properties in the computer management. You want to audit the modification in user accounts. What should you do?()ATurn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.BTurn on auditing for objects in the Local Security Policy and Select 'Object Access'. CUse Windows Explorer to turn on auditing for the specific files.DHave the administrator for domains log you on as an administrator and enable auditing for a  specific file.ETurn on auditing for objects in the Local Security Policy and Select 'Account Management'.FAllow only one account at a time to log on to your shared folder. Check the event viewer to  see who logged on.

单选题
You are a network administrator of an organization. Maria and John are your network assistant. You have grant then the rights to modify the user properties in the computer management. You want to audit the modification in user accounts. What should you do?()
A

Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.

B

Turn on auditing for objects in the Local Security Policy and Select 'Object Access'. 

C

Use Windows Explorer to turn on auditing for the specific files.

D

Have the administrator for domains log you on as an administrator and enable auditing for a  specific file.

E

Turn on auditing for objects in the Local Security Policy and Select 'Account Management'.

F

Allow only one account at a time to log on to your shared folder. Check the event viewer to  see who logged on. 


参考解析

解析: 暂无解析

相关考题:

You are the network administrator setting up the IP network for a new branch office. You need at least 5 networks with 25 hosts each. You have been allocated a /24 network.Which prefix length will satisfy the given requirements?()A./24B./26C./27D./28

You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()A、STPB、GVRPC、SNMPD、VTPE、DHCP

You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. TestKing.com makes use of Microsoft Exchange Server messagingsolution. During the course of day you receive an instruction from the CIO to deploy a database availability group(DAG) within the organization. You thus decide to recommend disk configuration for the servers in the organization whilst keeping the costs to a minimum. What should you do?()A、You should recommend 15000 RPM SAS hard disks in a Fiber Channel(FC)Storage Area Network(SAN).B、You should recommend 7200 RPM SATA hard disks in a direct Attach Storage (DAS).C、You should recommend 15000 RPM SAS hard disks in a Network Attached Storage (NAS).D、You should recommend 7200 RPM SATA hard disks in a Network Attached Storage (NAS).

You are designing a strategy to upgrade the DHCP servers after the new Active Directory structure is in place.  Who can authorize the DHCP servers?()A、 Chief information officerB、 IT support staff in BostonC、 IT support staff in New YorkD、 Network administrator in ChicagoE、 Network administrator in New York

You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()A、RepeaterB、Wireless routerC、HubD、Wireless network adapter

You are the network administrator setting up the IP network for a new branch office. You need at least 5 networks with 25 hosts each. You have been allocated a /24 network.Which prefix length will satisfy the given requirements?()A、/24B、/26C、/27D、/28

You work as the exchange administrator at Testking.com. The TestKing.com network contains an Exchange Server 2010 Organization. You are responsible for managing the Exchange network for TestKing.com. Currently Microsoft Office Outlook is used by all TestKing.com users to connect to their mailboxes. Thecompliance policy of the organization states that a copy of messages sent to the Finance department fromthe Internet is archived. The archived e-mails need to be stored on a third-party archival server. You areinstructed to recommend a solution that will comply with the set criteria. What should you do?()A、You should include Retention Policies.B、You should include Transport Protection Rules.C、You should include Personal archives.D、You should include Journal rules.

You work as the exchange administrator at TestKing.com. The TestKing.com network contains anExchange Server 2010 Organization. You are responsible for managing the Exchange network forTestKing.com. You are in the process of deploying an Edge Transport server named TESTKING-EX01 into the organization. During the course of the day you receive an instruction from management to implement amessages hygiene solution. Management wants you to: * Ensure that TESTKING-EX01 blocks e-mails sent to invalid address in the organization. * Ensure that clients receive e-mail from external recipients that is added to their Sage Senders Lists. What should you do?()A、Your best option would be to create Send connectors.B、Your best option would be to configure EdgeSync synchronization.C、Your best option would be to enable sender filtering.D、Your best option would be to configure real time block lists (RBLs).

You have an Exchange Server 2010 organization.  You plan to delegate Exchange administrative rights to some users in the organization.  You need to recommend a solution that tracks all changes made to the Exchange organization.  What should you include in the solution?()A、administrator audit loggingB、circular loggingC、diagnostic loggingD、Windows Security Auditing

All of the client computers in your company’s network are Windows 2000 portable computers. A usernamed Maria stores Sales files in her My Documents folder. She uses these files when she travels.  Mariainforms you that when she takes her portable computer to trade shows, she can access some of the Salesfiles but not all of them. When her portable computer is connected to the network at the office, she canaccess all of the files.You need to enable Maria to access all of the files in her My Documents folder when she is working remotely.  What should you do? ()A、 Allow Maria full control permissions on the %systemroot%/Documents and Settings/Maria/My      Documents folder. B、 Allow Maria full control permissions on the %systemroot%/ Documents and Settings/All Users/My Documents folder. C、 Configure Maria’s computer to automatically copy the entire contents of her network My Documents folder to her offline files folder. D、 Configure Maria’s computer to automatically copy the entire contents of her network My  Documents folder to her local My Documents folder.

You recently upgraded all Windows NT Workstation 4.0 computers to Windows 2000 Professional. You want to give a new employee named Maria the ability to back up files, share resources, and install programs on a client computer that she shares with other users. You do not want Maria to be able to read other users’ files.   What should you do to accomplish these goals?()A、Add Maria’s user account to the system group.B、Add Maria’s user account to the interactive group.C、Add Maria’s user account to the power user group.D、Add Maria’s user account to the administrators group.E、Add Maria’s user account to the Backup Operators group.

You have an Exchange Server 2010 organization.  You plan to deploy a database availability group (DAG).  You need to recommend disk configurations for the servers in the organization. The solution must minimize costs.  What should you recommend?()A、7200 RPM SATA hard disks in a Direct Attach Storage (DAS)B、7200 RPM SATA hard disks in a Network Attached Storage (NAS)C、15000 RPM SAS hard disks in a Network Attached Storage (NAS)D、15000 RPM SAS hard disks in a Fibre Channel (FC) Storage Area Network (SAN)

Maria has been set up as an assistant to the administrator. Users of your network are complaining that Maria has been opening their files and editing them. She needs to perform backups and installations of programs, and setting up of printers.   How do you fix the problem with the minimum amount of effort, yet allowing her to accomplish the assigned tasks? ()A、Remove her Administrator privilege and give her Power Users and Backup Operators.B、Leave her as Administrator and make deny on Users’ files.C、Remove her administrator privileges and assign her Server Operators.D、Remove her administrator privileges and assign her Power Users and Replicator. E、Tell her that she isn’t allowed to tamper with other users files.

You are the administrator of a Windows 2000 Professional computer. A user named Maria assists you in performing some administrative tasks. Maria is a member of local Administrators group. Users report that Maria has been viewing and changing their files.  You want Maria to be able to install programs, perform backups and manage printers, but not to view, change or read other users’ files for which permission has not been granted. You want to set up Maria’s account to have minimal rights and permission. You want to accomplish this with least amount of administrative effort.  What should you do?  ()A、 Leave Maria in the local Administrators group.  Limit her rights by using Local Policies.B、 Leave Maria in the local Administrators group. Change the NTFS provision on other users’ files to deny Maria’s request.C、 Remove Maria from the local Administrators group. Add her to both the Power Users group and Backup Operators group.D、 Remove Maria from local Administrators group.  Add her to Power User group.  Then grant her NTFS Read permission on the files to be backed up.

You are a network administrator of an organization. Maria and John are your network assistant. You have grant then the rights to modify the user properties in the computer management. You want to audit the modification in user accounts. What should you do?()A、Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.B、Turn on auditing for objects in the Local Security Policy and Select 'Object Access'. C、Use Windows Explorer to turn on auditing for the specific files.D、Have the administrator for domains log you on as an administrator and enable auditing for a  specific file.E、Turn on auditing for objects in the Local Security Policy and Select 'Account Management'.F、Allow only one account at a time to log on to your shared folder. Check the event viewer to  see who logged on.

You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the week you receive an instruction from the CIO to stop internal users from sending e-mail messages containing the words "Classified Data" to users outside the organization. What should you do?()A、You should consider creating a message classification.B、You should consider creating a Transport rule.C、You should consider creating a Send connector.D、You should consider creating a managed folder mailbox policy.

You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. You are responsible for managing the Exchange network forTestKing.com. All servers on the TestKing.com network are configured to run Exchange Server 2010.At present the network is separated from the Internet by means of a firewall. You receive an instructionform management to ensure that customers from the Internet to use Outlook Anywhere, Outlook Web App(OWA), Exchange ActivSync as well as IMAP4 over Secure Sockets Layer (SSL). You thus need todetermine the TCP ports that you need to open. What should you do?()A、You should consider opening port 25, port 80, port 143 as well as port 3269.B、You should consider opening port 25, port 443 as well as port 993.C、You should consider opening port 80, port 143, port 443 as well as port 389.D、You should consider opening port 26, port 443 as well as port 995.

You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. TestKing.com has its headquarters in Stockholm where you arelocated. The TestKing.com network contains a Hub Transport server that has anti-spam agents installed. Youreceive instruction from management to assign the administration of the Exchange 201 organization to agroup named KingSecruity. To ensure productivity you need to make sure that users belonging to thisgroup are able to manage anti-spam setting in the organization. You should thus ensure that your solutionreduces the number of permissions that are assigned to KingSecurity. What should you do?()A、You should consider assigning the Organization Management role group.B、You should consider assigning the Server Management role group.C、You should consider assigning the Hygiene Management role group.D、You should consider assigning the Records Management role group.

You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. TestKing.com has its headquarters in Stockholm where you are located.The TestKing.com network contains a database availability group (DAG). You receive an instruction fromthe management to devise a Mailbox database security solution for the organization. Management wantsthe read/write performance to be maximized as well as ensuring that any access to the database isprohibited in the event of theft. What should you do?()A、You should recommend that management make use of DAG network encryption.B、You should recommend that management make use of Encrypted File System (EFS)C、You should recommend that management make use of Windows BitLocker Drive Encryption.D、You should recommend that management make use of Rights Management Service RMS.

多选题You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. TestKing.com makes use of Microsoft Exchange Server messagingsolution. During the course of day you receive an instruction from the CIO to deploy a database availability group(DAG) within the organization. You thus decide to recommend disk configuration for the servers in the organization whilst keeping the costs to a minimum. What should you do?()AYou should recommend 15000 RPM SAS hard disks in a Fiber Channel(FC)Storage Area Network(SAN).BYou should recommend 7200 RPM SATA hard disks in a direct Attach Storage (DAS).CYou should recommend 15000 RPM SAS hard disks in a Network Attached Storage (NAS).DYou should recommend 7200 RPM SATA hard disks in a Network Attached Storage (NAS).

单选题You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()ASTPBGVRPCSNMPDVTPEDHCP

单选题You work as the exchange administrator at Testking.com. The TestKing.com network contains an Exchange Server 2010 Organization. You are responsible for managing the Exchange network for TestKing.com. Currently Microsoft Office Outlook is used by all TestKing.com users to connect to their mailboxes. Thecompliance policy of the organization states that a copy of messages sent to the Finance department fromthe Internet is archived. The archived e-mails need to be stored on a third-party archival server. You areinstructed to recommend a solution that will comply with the set criteria. What should you do?()AYou should include Retention Policies.BYou should include Transport Protection Rules.CYou should include Personal archives.DYou should include Journal rules.

单选题You are the network administrator for . You are the administrator of a Windows Server 2003 computer named TestKing8. You log on to TestKing8 and attempt to access the network. You discover that the server is not communicationg on the network. You discover that a service pack and an updated network adapter driver were installed on TestKing8 the previous night. A complete backup, including the System State data, was performed before the service pack and the driver were installed. You need to restore network communications. What should you do first?()AUse Roll Back Driver to reinstall the previous driver for the network adapter.BUse the Backp or Restore Wizard to restore the backup from the previous night.CRestart TestKing8 by using Last Known Good Configuration option.DUse the Registry Editor to delete the registry settings for the network adapter driver.

单选题You are the administrator of a Windows 2000 Professional computer. A user named Maria assists you in performing some administrative tasks. Maria is a member of local Administrators group. Users report that Maria has been viewing and changing their files.  You want Maria to be able to install programs, perform backups and manage printers, but not to view, change or read other users’ files for which permission has not been granted. You want to set up Maria’s account to have minimal rights and permission. You want to accomplish this with least amount of administrative effort.  What should you do?  ()A Leave Maria in the local Administrators group.  Limit her rights by using Local Policies.B Leave Maria in the local Administrators group. Change the NTFS provision on other users’ files to deny Maria’s request.C Remove Maria from the local Administrators group. Add her to both the Power Users group and Backup Operators group.D Remove Maria from local Administrators group.  Add her to Power User group.  Then grant her NTFS Read permission on the files to be backed up.

单选题You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. TestKing.com has its headquarters in Stockholm where you are located.The TestKing.com network contains a database availability group (DAG). You receive an instruction fromthe management to devise a Mailbox database security solution for the organization. Management wantsthe read/write performance to be maximized as well as ensuring that any access to the database isprohibited in the event of theft. What should you do?()AYou should recommend that management make use of DAG network encryption.BYou should recommend that management make use of Encrypted File System (EFS)CYou should recommend that management make use of Windows BitLocker Drive Encryption.DYou should recommend that management make use of Rights Management Service RMS.

单选题You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. TestKing.com has its headquarters in Stockholm where you arelocated. The TestKing.com network contains a Hub Transport server that has anti-spam agents installed. Youreceive instruction from management to assign the administration of the Exchange 201 organization to agroup named KingSecruity. To ensure productivity you need to make sure that users belonging to thisgroup are able to manage anti-spam setting in the organization. You should thus ensure that your solutionreduces the number of permissions that are assigned to KingSecurity. What should you do?()AYou should consider assigning the Organization Management role group.BYou should consider assigning the Server Management role group.CYou should consider assigning the Hygiene Management role group.DYou should consider assigning the Records Management role group.

单选题You have an Exchange Server 2010 organization.  You plan to deploy a database availability group (DAG).  You need to recommend disk configurations for the servers in the organization. The solution must minimize costs.  What should you recommend?()A7200 RPM SATA hard disks in a Direct Attach Storage (DAS)B7200 RPM SATA hard disks in a Network Attached Storage (NAS)C15000 RPM SAS hard disks in a Network Attached Storage (NAS)D15000 RPM SAS hard disks in a Fibre Channel (FC) Storage Area Network (SAN)

单选题All of the client computers in your company network are Windows 2000 portable computers. A user named Maria stores Sales files in her My Documents folder. She uses these files when she travels. Maria informs you that when she takes her portable computer to trade shows, she can access some of the Sales files but not all of them. When her portable computer is connected to the network at the office, she can access all of the files. You need to enable Maria to access all of the files in her My Documents folder when she is working remotely. What should you do?()A Allow Maria full control permissions on the %systemroot%/documents and settings/Maria/MyDocuments folderB Allow Maria full control permissions on the %systemroot%/documents and settings/all  users/My Documents folderC Configure Maria’s computer to automatically copy the entire contents of her network My  Documents folder to her offline files folder.D Configure Maria’s computer to automatically copy the entire contents of her network My  Documents folder to her local My Documents folder.