单选题You need to create a Password Settings object (PSO). Which tool should you use()AActive Directory Users and ComputersBADSI EditCGroup Policy Management ConsoleDNtdsutil
单选题
You need to create a Password Settings object (PSO). Which tool should you use()
A
Active Directory Users and Computers
B
ADSI Edit
C
Group Policy Management Console
D
Ntdsutil
参考解析
解析:
暂无解析
相关考题:
Your network consists of a single Active Directory domain. User accounts for engineering department are located in an OU named Engineering. You need to create a password policy for the engineering department that is different from your domain password policy. What should you do()A、Create a new GPO. Link the GPO to the Engineering OU.B、Create a new GPO. Link the GPO to the domain. Block policy inheritance on all OUs except for the Engineering OU.C、Create a global security group and add all the user accounts for the engineering department to the group. Create a new Password Policy Object (PSO) and apply it to the group.D、Create a domain local security group and add all the user accounts for the engineering department to the group. From the Active Directory Users and Computer console, select the group and run the Delegation of Control Wizard.
Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2008 R2. All servers run Windows Server 2008 R2. A corporate security policy requires complex passwords for user accounts that have administrator privileges. You need to design a strategy that meets the following requirements: èEnsures that administrators use complex passwords èMinimizes the number of servers required to support the solution What should you include in your design?()A、Implement Network Access Protection (NAP).B、Implement Active Directory Rights Management Services (AD RMS).C、Create a new Password Settings Object (PSO) for administrator accounts.D、Create a new child domain in the forest. Move all non-administrator accounts to the new domain.Configure a complex password policy in the root domain.
You have an Exchange Server 2010 organization.You need to prevent users from changing their password by using Outlook Web App (OWA).What should you do?()A、Create a Group Policy Object.B、Create an Outlook Web App Mailbox policy.C、Modify the authentication settings of the OWA virtual directory.D、Modify the authentication settings of the IISADMPWD virtual directory.
Your network contains an Active Directory forest. The functional level of the forest is Windows Server 2008 R2. Your companys corporate security policy states that the password for each user account must be changed at least every 45 days. You have a user account named Service1. Service1 is used by a network application named Application1. Every 45 days, Application1 fails. After resetting the password for Service1, Application1 runs properly. You need to resolve the issue that causes Application1 to fail. The solution must adhere to the corporate security policy. What should you do()A、Run the Set-ADAccountControl cmdlet.B、Run the Set-ADServiceAccount cmdlet.C、Create a new password policy.D、Create a new Password Settings object (PSO).
Your network contains an Active Directory forest. The forest contains one domain and three sites. Each site contains two domain controllers. All domain controllers are DNS servers. You create a new Active Directory-integrated zone. You need to ensure that the new zone is replicated to the domain controllers in only one of the sites. What should you do first()A、Modify the NTDS Site Settings object for the site.B、Modify the replication settings of the default site link.C、Create an Active Directory connection object.D、Create an Active Directory application directory partition.
Your company has a main office and a branch office. The network contains an Active Directory domain. The main office contains a writable domain controller named DC1. The branch office contains a read-only domain controller (RODC) named DC2. You discover that the password of an administrator named Admin1 is cached on DC2. You need to prevent Admin1s password from being cached on DC2. What should you do()A、Modify the NTDS Site Settings.B、Modify the properties of the domain.C、Create a Password Setting object (PSO).D、Modify the properties of DC2s computer account.
Your network contains an Active Directory domain. The domain contains two sites named Site1 and Site2. Site1 contains four domain controllers. Site2 contains a read-only domain controller (RODC). You add a user named User1 to the Allowed RODC Password Replication Group. The WAN link between Site1 and Site2 fails. User1 restarts his computer and reports that he is unable to log on to the domain. The WAN link is restored and User1 reports that he is able to log on to the domain. You need to prevent the problem from reoccurring if the WAN link fails. What should you do()A、Create a Password Settings object (PSO) and link the PSO to User1’s user account.B、Create a Password Settings object (PSO) and link the PSO to the Domain Users group.C、Add the computer account of the RODC to the Allowed RODC Password Replication Group.D、Add the computer account of User1’s computer to the Allowed RODC Password Replication Group.
Your network contains an Active Directory forest. The forest contains an Acitve Directory site for a remote office. The remote site contains a read-only domain controller (RODC). You need to configure the RODC to store only the password of users in the remote site. What should you do()A、Create a Paasword Settings object (PSO).B、Modify the Partial-Attribute-Set attribute of the forest.C、Add the users accounts of the remote site users to the Allowed RODC Password Replication Group.D、Add the users accounts of users who are not in the remote site to the Denied RODC Password Replication Group.
You need to configure the security settings for the new app servers. Which two actions should you perform?()A、Create a Group policy object (GPO) for the web servers.B、Create a Group policy object (GPO) for the database servers.C、Modify the Default Domain Policy.D、Modify the Default Domain Controllers Policy.
You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains 10 domain controllers and 50 servers in application server roles. All servers run Windows Server 2003. The application servers are configured with custom security settings that are specific to their roles as application servers. Application servers are required to audit account logon events, object access events, and system events. Application servers are required to have passwords that meet complexity requirements, to enforce password history, and to enforce password aging. Application servers must also be protected against man-in-the-middle attacks during authentication. You need to deploy and refresh the custom security settings on a routine basis. You also need to be able to verify the custom security settings during audits. What should you do? ()A、 Create a custom security template and apply it by using Group Policy.B、 Create a custom IPSec policy and assign it by using Group Policy.C、 Create and apply a custom Administrative Template.D、 Create a custom application server image and deploy it by using RIS.
You create a Password Settings object (PSO). You need to apply the PSO to a domain user named User1. What should you do()A、Modify the properties of the PSO.B、Modify the account options of the User1 account.C、Modify the security settings of the User1 account.D、Modify the password policy of the Default Domain Policy Group Policy object (GPO).
You need to recommend a solution for managing the service accounts for SQL1 and SQL2. The solution must meet the company’s security requirements. What should you include in the recommendation?()A、a custom password filterB、a Password Settings object (PSO)C、managed service accountsD、manual password changes
Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2008 R2. All domain controllers run Windows Server 2008 R2. A corporate policy requires that the users from the research department have higher levels of account and password security than other users in the domain. You need to recommend a solution that meets the requirements of the corporate policy. Your solution must minimize hardware and software costs. What should you recommend?()A、Create a new Active Directory site. Deploy a Group Policy object (GPO) to the site.B、Create a new Password Settings Object (PSO) for the research department’s usersC、Create a new organizational unit (OU) named Research in the existing domain. Deploy a Group Policy object (GPO) to the Research OU.D、Create a new domain in the forest.Add the research department’s user accounts to the new domain.Configure a new security policy in the new domain.
You discover that a particular group of settings named UserPreferences changes.You need to store the UserPreference settings to prevent affecting other applications. Which two actions should you perform?()A、Use the Properties.USerPreferences objectB、Use the Properties.Settings.Default.Userprefences objectC、Use the ConfigurationManager.AppSettings object during runtimeD、Create the settings by using Application scopeE、Create the settings by using User scope
You are developing an application to create a new file on the local file system.You need to define specific security settings for the file. You must deny the file inheritance of any default security settings during creation.What should you do?()A、Create the file by using a new FileStream object by passing the FileSecurity object as a parameter to the FileStream constructor.B、Create a new FileSecurity object.C、Apply the permissions by using the File class.D、Create a new FileSystem Access Rule object for each permission that you need,and add each rule to the FileSecurity object.E、Create a new FileSystem Audit Rule object and add it to the FileSecurity object.
You have Active Directory Certificate Services (AD CS) deployed. You create a custom certificate template. You need to ensure that all of the users in the domain automatically enroll for a certificate based on the custom certificate template. Which two actions should you perform()A、In a Group Policy object (GPO), configure the autoenrollment settings.B、In a Group Policy object (GPO), configure the Automatic Certificate Request Settings.C、On the certificate template, assign the Read and Autoenroll permission to the Authenticated Users group.D、On the certificate template, assign the Read, Enroll, and Autoenroll permission to the Domain Users group.
多选题You have Active Directory Certificate Services (AD CS) deployed. You create a custom certificate template. You need to ensure that all of the users in the domain automatically enroll for a certificate based on the custom certificate template. Which two actions should you perform()AIn a Group Policy object (GPO), configure the autoenrollment settings.BIn a Group Policy object (GPO), configure the Automatic Certificate Request Settings.COn the certificate template, assign the Read and Autoenroll permission to the Authenticated Users group.DOn the certificate template, assign the Read, Enroll, and Autoenroll permission to the Domain Users group.
单选题You need to create a Password Settings object (PSO). Which tool should you use()AActive Directory Users and ComputersBADSI EditCGroup Policy Management ConsoleDNtdsutil
多选题You discover that a particular group of settings named UserPreferences changes.You need to store the UserPreference settings to prevent affecting other applications. Which two actions should you perform?()AUse the Properties.USerPreferences objectBUse the Properties.Settings.Default.Userprefences objectCUse the ConfigurationManager.AppSettings object during runtimeDCreate the settings by using Application scopeECreate the settings by using User scope
单选题You have an Exchange Server 2010 organization.You need to prevent users from changing their password by using Outlook Web App (OWA).What should you do?()ACreate a Group Policy Object.BCreate an Outlook Web App Mailbox policy.CModify the authentication settings of the OWA virtual directory.DModify the authentication settings of the IISADMPWD virtual directory.
多选题You are developing an application to create a new file on the local file system.You need to define specific security settings for the file. You must deny the file inheritance of any default security settings during creation.What should you do?()ACreate the file by using a new FileStream object by passing the FileSecurity object as a parameter to the FileStream constructor.BCreate a new FileSecurity object.CApply the permissions by using the File class.DCreate a new FileSystem Access Rule object for each permission that you need,and add each rule to the FileSecurity object.ECreate a new FileSystem Audit Rule object and add it to the FileSecurity object.
单选题Your company has a main office and a branch office. The network contains an Active Directory domain. The main office contains a writable domain controller named DC1. The branch office contains a read-only domain controller (RODC) named DC2. You discover that the password of an administrator named Admin1 is cached on DC2. You need to prevent Admin1s password from being cached on DC2. What should you do()AModify the NTDS Site Settings.BModify the properties of the domain.CCreate a Password Setting object (PSO).DModify the properties of DC2s computer account.
单选题You are the administrator of a Microsoft Windows Server 2003 computer named SQL1. SQL1 runs SQL Server 2005 and is a member of a Microsoft Active Directory domain named Contoso.com. The domain is configured with all of the default settings. Several members of the information security team have requested access to SQL1. The information security team uses the Microsoft Windows XP Professional, Linux, and Macintosh operating systems to perform vulnerability assessments. The information security team members ask you to create two new logon accounts for their use. They would like the logon accounts to have the following user names and passwords: User name/password for first account: pentest/P@ssw0rdUser name/password for second account: hacktest/password You need to provide the information security team with the requested access to SQL1. Which Transact-SQL script should you use?()ACREATE LOGIN pentestWITH PASSWORD = 'P@ssw0rd' CREATE LOGIN hacktestWITH PASSWORD = 'password'BCREATE LOGIN pentestWITH PASSWORD = 'P@ssw0rd' CREATE LOGIN hacktestWITH PASSWORD = 'password',CHECK_POLICY = OFFCCREATE LOGIN pentestWITH PASSWORD = 'P@ssw0rd' CREATE LOGIN hacktestWITH PASSWORD = 'password'[HASHED]DCREATE LOGIN [CONTOSO/pentest]FROM WINDOWS CREATE LOGIN [CONTOSO/hacktest]FROM WINDOWS
单选题Your network consists of a single Active Directory domain. User accounts for engineering department are located in an OU named Engineering. You need to create a password policy for the engineering department that is different from your domain password policy. What should you do()ACreate a new GPO. Link the GPO to the Engineering OU.BCreate a new GPO. Link the GPO to the domain. Block policy inheritance on all OUs except for the Engineering OU.CCreate a global security group and add all the user accounts for the engineering department to the group. Create a new Password Policy Object (PSO) and apply it to the group.DCreate a domain local security group and add all the user accounts for the engineering department to the group. From the Active Directory Users and Computer console, select the group and run the Delegation of Control Wizard.
单选题Your network contains an Active Directory forest. The forest contains an Acitve Directory site for a remote office. The remote site contains a read-only domain controller (RODC). You need to configure the RODC to store only the password of users in the remote site. What should you do()ACreate a Paasword Settings object (PSO).BModify the Partial-Attribute-Set attribute of the forest.CAdd the users accounts of the remote site users to the Allowed RODC Password Replication Group.DAdd the users accounts of users who are not in the remote site to the Denied RODC Password Replication Group.
多选题You need to create a trigger to locate the Product report in the Rpt_Server, run the report, and test the status of the report. Which three built-ins would you use to accomplish this task?()ARUN_PRODUCTBSET_REPORT_OBJECT_PROPERTYCRUN_REPORT_OBJECTDFIND_REPORT_OBJECTEREPORT_OBJECT_STATUSFCOPY_REPORT_OBJECT_OUTPUT
单选题Your network contains an Active Directory domain. The domain contains two sites named Site1 and Site2. Site1 contains four domain controllers. Site2 contains a read-only domain controller (RODC). You add a user named User1 to the Allowed RODC Password Replication Group. The WAN link between Site1 and Site2 fails. User1 restarts his computer and reports that he is unable to log on to the domain. The WAN link is restored and User1 reports that he is able to log on to the domain. You need to prevent the problem from reoccurring if the WAN link fails. What should you do()ACreate a Password Settings object (PSO) and link the PSO to User1’s user account.BCreate a Password Settings object (PSO) and link the PSO to the Domain Users group.CAdd the computer account of the RODC to the Allowed RODC Password Replication Group.DAdd the computer account of User1’s computer to the Allowed RODC Password Replication Group.
单选题You need to recommend a solution for managing the service accounts for SQL1 and SQL2. The solution must meet the company’s security requirements. What should you include in the recommendation?()Aa custom password filterBa Password Settings object (PSO)Cmanaged service accountsDmanual password changes