单选题You need to design a method to log changes that are made to servers and domain controllers. You also need to track when administrators modify local security account manager objects on servers. What should you do?()AEnable failure audit for privilege user and object access on all servers and domain controllersBEnable success audit for policy change and account management on all servers and domain controllersCEnable success audit for process tracking and logon events on all servers and domain controllersDEnable failure audit for system events and directory service access on all servers and domain controllers

单选题
You need to design a method to log changes that are made to servers and domain controllers. You also need to track when administrators modify local security account manager objects on servers. What should you do?()
A

Enable failure audit for privilege user and object access on all servers and domain controllers

B

Enable success audit for policy change and account management on all servers and domain controllers

C

Enable success audit for process tracking and logon events on all servers and domain controllers

D

Enable failure audit for system events and directory service access on all servers and domain controllers


参考解析

解析: 暂无解析

相关考题:

You create a Web application. The Web application enables users to change fields in their personal profiles. Some of the changes are not persisting in the database. You need to raise a custom event to track each change that is made to a user profile so that you can locate the error.Which event should you use? ()A. WebAuditEventB. WebEventManagerC. WebBaseEventD. WebRequestEvent

Which method would you use to undo the changes made by a particular transaction without affecting the changes made by other transactions?() A. point-in-time recoveryB. execute the ROLLBACK command with transaction numberC. flashback the database to before the transaction was committedD. determine all the necessary undo SQL statements from FLASHBACK_TRANSACTION_QUERY and use them for recovery

You use two user accounts for your computer: standard user and administrator. You log on to your computer as standard user but are unable to make advanced configuration changes. You need to make advanced configuration changes while you are logged on as a standard user.What should you do?()A.AB.BC.CD.D

Redo log files are multiplexed in your database. The disk in which you have one of the redo log members is highly fragmented. In the process of defragmentation you lose the redo log member, which is not a member of the current group. How would you recover from the loss of the redo log member?()A、SMON would automatically restore the lost file.B、You would need to restore the whole database from the last backup.C、You would need to restore the file from the last full database backup.D、You would need to use flashback technology to restore the lost redo log member.E、You would need to use Recovery Manager (RMAN) to restore the lost redo log member.F、You would need to restore the missing log file by copying one of the remaining files from the same group.

You want to use the Flashback Transaction Query feature to identify all the changes made to your database within a specific time period. What is a prerequisite for using the Flashback Transaction Query feature?()A、 You must use automatic undo management in the database.B、 You must configure OMF in your database.C、 You must configure ASM for storing the datafiles.D、 You must multiplex the online redo log file.

Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows Vista computers.  You are planning to deploy Windows 7 and a custom application.   You have the following requirements:   The application must be available to only a specific group of users. You must be able to monitor application usage.   You need to design a deployment method for the custom application that meets the requirements.  Which deployment method should you use in your design?()A、software installation in Group PolicyB、startup scripts in Group PolicyC、Microsoft Application Virtualization (App-V)D、baseline Windows 7 image that includes the custom application

You need to design a method to deploy security configuration settings to servers. What should you do?()A、Run the Resultant Set of Policy wizard with a Windows Management Instrumentation (WMI) filter on each department’s Server OUB、Log on to each server and use local policy to configure and manage the security settingsC、Create a customer security template. Log on to a domain controller and run the seceditcommand to import the security templateD、Create a customer security template. Create a GPO and import the security template. Link the GPO to each department’s Server OU

Which method would you use to undo the changes made by a particular transaction without affecting the changes made by other transactions?()A、point-in-time recoveryB、execute the ROLLBACK command with transaction numberC、flashback the database to before the transaction was committedD、determine all the necessary undo SQL statements from FLASHBACK_TRANSACTION_QUERY and use them for recovery

Your network consists of a single Active Directory domain. All domain controllers run Windows  Server 2008 R2.     Auditing is configured to log changes made to the Managed By attribute on group objects in an  organizational unit named OU1.   You need to log changes made to the Description attribute on all group objects in OU1 only.     What should you do()A、Run auditpol.exe.B、Modify the auditing entry for OU1.C、Modify the auditing entry for the domain.D、Create a new Group Policy object (GPO). Enable the Audit account management policy setting link the GPO to OU1.

You need to design a method to log changes that are made to servers and domain controllers. You also need to track when administrators modify local security account manager objects on servers. What should you do?()A、Enable failure audit for privilege user and object access on all servers and domain controllersB、Enable success audit for policy change and account management on all servers and domain controllersC、Enable success audit for process tracking and logon events on all servers and domain controllersD、Enable failure audit for system events and directory service access on all servers and domain controllers

You need to design a method to address the chief information officer’s security concerns. What should you do?()A、Configure Windows Management Instrumentation (WMI) filtering options in the Default Domain Policy GPOB、Use the gpresult commandC、Use Mbsacli.exeD、Configure software restriction policy options in the Default Domain Policy GPO

You are developing a custom-collection class.You need to create a method in your class. You need to ensure that the method you create in your class returns a type that is compatible with the Foreach statement. Which criterion should the method meet?()A、The method must return a type of either IEnumerator or IEnumerable.B、The method must return a type of IComparable.C、The method must explicitly contain a collection.D、The method must be the only iterator in the class.

You need to make structural changes to the cube. You also need to ensure that appropriate aggregations are created after the changes are made. What should you do?()A、Record a weeks user activity by using SQL Profiler. Apply structural changes. Replay the activity and then run the Usage Based Optimization Wizard.B、Apply structural changes. Run the Database Engine Tuning Advisor.C、Apply structural changes. Run the Usage Based Optimization Wizard.D、Record a weeks user activity by using SQL Profiler. Apply structural changes. Run the Database Engine Tuning Advisor.

You plan to deploy a Virtual Desktop Infrastructure (VDI). You need to ensure that all of the changes made to the virtual machines (VMs) in the VDI are discarded when users log off of their session. What should you include in the deployment?()A、mandatory profilesB、a virtual desktop poolC、roaming profilesD、personal virtual desktops

You create a Web application. The Web application enables users to change fields in their personal profiles. Some of the changes are not persisting in the database. You need to raise a custom event to track each change that is made to a user profile so that you can locate the error. Which event should you use?()A、WebAuditEventB、WebEventManagerC、WebBaseEventD、WebRequestEvent

单选题You are a database administrator for your company. The company uses a SQL Server 2005 database. A full backup of the database is made each night. Transaction log backups are made each morning and each afternoon. You notice that the database transaction log file grows very large throughout the day. You need to minimize the size of the transaction log file. You also need to minimize data loss in the event of a failure. What should you do?()ADecrease the amount of time between transaction log backups.BConfigure the database to use the simple recovery model.CConfigure the RECOVERY INTERVAL option to be a smaller value.DRun DBCC SHRINKFILE on the transaction log file.

单选题You enter configuration mode with the configure command. You need to abort the changes that you have made and start again with a fresh copy of the active configuration. Which command should you use?()Arollback 0Bload activeCreset configDclear candidate config

单选题You need to design a method to configure the servers in the development department to meet the requirements of the chief information officer. What should you do?()AUse error reporting on all servers in the development department to report errors for a custom applicationBConfigure all servers in the development department so that they do not require the CTRL+ALT+DELTE keys to pressed in order to log on interactively to the serverCCreate a Group Policy object (GPO) and link it to the development department’s Servers OU. Configure the GPO with an interactive logon policy to display a message for users who attempt to log onDConfigure the screen saver on all servers in the development department to require a password

单选题You are developing a Windows Presentation Foundation (WPF) application.You need to display HTML content from a Web page on the WPF form. What should you do?()AAdd a FlowDocumentReader control to the design surface. Then create a FlowDocument control.BAdd a DocumentViewer control to the design surface. Then create a FixedDocument control.CAdd a WebBrowser control to the design surface. Then use the Navigate method to navigate the URI object.DAdd a ContentControl control to the design surface. Then reference a WebClient object to return an HTML string.

单选题You need to design a method to deploy security configuration settings to servers. What should you do?()ARun the Resultant Set of Policy wizard with a Windows Management Instrumentation (WMI) filter on each department’s Server OUBLog on to each server and use local policy to configure and manage the security settingsCCreate a customer security template. Log on to a domain controller and run the seceditcommand to import the security templateDCreate a customer security template. Create a GPO and import the security template. Link the GPO to each department’s Server OU

单选题Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2008. Auditing is configured to log changes made to the Managed By attribute on group objects in an organizational unit named OUI. You need to log changes made to the Description attribute on all group objects in OUI only. What should you do()ARun auditpol.exe.BModify the auditing entry for OUI.CModify the auditing entry for the domain.DCreate a new Group PolicyObject (GPO). Enable Audit account management policy setting. Link the GPO to OUI.

单选题You plan to deploy a Virtual Desktop Infrastructure (VDI). You need to ensure that all of the changes made to the virtual machines (VMs) in the VDI are discarded when users log off of their session. What should you include in the deployment?()Amandatory profilesBa virtual desktop poolCroaming profilesDpersonal virtual desktops

单选题Your network consists of a single Active Directory domain. All domain controllers run Windows Server  2008 R2. Auditing is configured to log changes made to the Managed By attribute on group objects in an  organizational unit named OU1.    You need to log changes made to the Description attribute on all group objects in OU1 only.  What should you do()ARun auditpol.exe.BModify the auditing entry for OU1.CModify the auditing entry for the domain.DCreate a new Group Policy object (GPO). Enable the Audit account management policy setting. Link  the GPO to OU1.

单选题Which method would you use to undo the changes made by a particular transaction without affecting the changes made by other transactions?()A point-in-time recoveryB execute the ROLLBACK command with transaction numberC flashback the database to before the transaction was committedD determine all the necessary undo SQL statements from FLASHBACK_TRANSACTION_QUERY and use them for recovery

单选题You discover that the schema changes that were recently made to your SQL Server 2005 database have caused your Web site to stop functioning. It is unclear who made the changes. TestKing.com now mandates that all changes to the database schema be tracked. You need to implement a mechanism that will track schema changes in your database.  What should you do?()AImplement a stored procedure that writes data about schema changes to a log table.BImplement DDL AFTER triggers that write user and schema information to a log table.CImplement a DML INSTEAD OF trigger that writes data about schema changes to a log table.DImplement a DML AFTER trigger that writes data about schema changes to a log table.

单选题You have an Exchange Server 2010 organization.  You plan to delegate Exchange administrative rights to some users in the organization.  You need to recommend a solution that tracks all changes made to the Exchange organization.  What should you include in the solution?()Aadministrator audit loggingBcircular loggingCdiagnostic loggingDWindows Security Auditing

单选题You are developing a custom-collection class.You need to create a method in your class. You need to ensure that the method you create in your class returns a type that is compatible with the Foreach statement. Which criterion should the method meet?()AThe method must return a type of either IEnumerator or IEnumerable.BThe method must return a type of IComparable.CThe method must explicitly contain a collection.DThe method must be the only iterator in the class.

单选题Your company has client computers that run Windows XP Professional.   You are planning to install Windows 7 Enterprise on the existing client computers.    You need to design a user state migration strategy that minimizes network bandwidth and server use when user data is being migrated.   What should you do?()AUse the Refresh Computer method and a hard-link migration store.BUse the Refresh Computer method and a compressed migration store.CUse the Replace Computer method and a hard-link migration store.DUse the Replace Computer method and a compressed migration store.