单选题Your companys security policy requires complex passwords.   You have a comma delimited file named import.csv that contains user account information.    You need to create user accounts in the domain by using the import.csv file. You also need to ensure that  the new user accounts are set to use default passwords and are disabled.  What should you do()AModify the userAccountControl attribute to disabled. Run the csvde i  k f import.csv command. Run  the DSMOD utility to set default passwords for the user accounts.BModify the userAccountControl attribute to accounts disabled. Run the csvde  f import.csv command.  Run the DSMOD utility to set default passwords for the user accounts.CModify the userAccountControl attribute to disabled. Run the wscript import.csv command. Run the  DSADD utility to set default passwords for the imported user accounts.DModify the userAccountControl attribute to disabled. Run the ldifde i  f import.csv command. Run the  DSADD utility to set passwords for the imported user accounts.

单选题
Your companys security policy requires complex passwords.   You have a comma delimited file named import.csv that contains user account information.    You need to create user accounts in the domain by using the import.csv file. You also need to ensure that  the new user accounts are set to use default passwords and are disabled.  What should you do()
A

Modify the userAccountControl attribute to disabled. Run the csvde i  k f import.csv command. Run  the DSMOD utility to set default passwords for the user accounts.

B

Modify the userAccountControl attribute to accounts disabled. Run the csvde  f import.csv command.  Run the DSMOD utility to set default passwords for the user accounts.

C

Modify the userAccountControl attribute to disabled. Run the wscript import.csv command. Run the  DSADD utility to set default passwords for the imported user accounts.

D

Modify the userAccountControl attribute to disabled. Run the ldifde i  f import.csv command. Run the  DSADD utility to set passwords for the imported user accounts.


参考解析

解析: 暂无解析

相关考题:

Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()A. Source IP and browserB. Source IP and certificateC. Certificate and Host CheckerD. Host Checker and source IP

Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" >"Sensors" >"Sensor Event Policies" >[rule name] to accomplish this?()A. IgnoreB. Replace users roleC. Terminate user sessionD. Disable user account

Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2008 R2. All servers run Windows Server 2008 R2.   A corporate security policy requires complex passwords for user accounts that have administrator  privileges. You need to design a strategy that meets the following requirements: èEnsures that administrators use complex passwords   èMinimizes the number of servers required to support the solution What should you include in your design?()A、Implement Network Access Protection (NAP).B、Implement Active Directory Rights Management Services (AD RMS).C、Create a new Password Settings Object (PSO) for administrator accounts.D、Create a new child domain in the forest. Move all non-administrator accounts to the new domain.Configure a complex password policy in the root domain.

Which statement describes the behavior of a security policy?()A、The implicit default security policy permits all traffic.B、Traffic destined to the device itself always requires a security policy.C、Traffic destined to the device’s incoming interface does not require a security policy.D、The factory-default configuration permits all traffic from all interfaces.

Your corporate network has a member server named RAS1 that runs Windows Server 2008 R2. You configure RAS1 to use the Routing and Remote Access Services (RRAS).The companys remote access policy allows members of the Domain Users group to dial in to RAS1. The company issues smart cards to all employees.You need to ensure that smart card users are able to connect to RAS1 by using a dial-up connection.What should you do?()A、Install the Network Policy Server (NPS) server role on RAS1.B、Create a remote access policy that requires users to authenticate by using SPAP.C、Create a remote access policy that requires users to authenticate by using EAP-TLS.D、Create a remote access policy that requires users to authenticate by using MS-CHAP v2.

You need to design security changes that provide maximum protection for customer data and courier assignments.What should you do?()A、Create a separate domain for courier authenticationB、Implement smart card authentication for business office users and couriers, upgrading client operating systems as needed. Modify the Web kiosks to require smart card presence for continued accessC、Modify the Default Domain Policy Group Policy object (GPO) so that couriers must use complex user account passwords. Require all couriers to change their passwords the next time they log on to the Web applicationD、Use Encrypting File System (EFS) to encrypt all files that contain customer data

Your corporate network has a member server named RAS1 that runs Windows Server 2008. You configure RAS1 to use the Routing and Remote Access Service (RRAS) The companys remote access policy allows members of the Domain Users group to dial in to RAS1. The company issues smart cards to all employees. You need to ensure that smart card users are able to connect to RAS1 by using a dial-up connection. What should you do?()A、 Install the Network Policy Server (NPS) on the RAS1 serverB、 Create a remote access policy that requires users to authenticate by using SPAPC、 Create a remote access policy that requires users to authenticate by using EAP-TLSD、 Create a remote access policy that requires users to authenticate by using MS-CHAP v2

You are the administrator of your company’s network. You use Security Templates to configure a Security Policy on the Windows 2000 Professional Computers in the Sales organizational unit (OU). You notice that the Computers in the Sales OU are not downloading the Security Policy settings. On each computer, the Security Policy appears in the Local Computer Policy, but is not listed as the effective policy. You want all computers in the Sales OU to have the Security Policy listed as the effective policy. How should you accomplish this task? ()A、Use Security Templates to correct the setting and export the security file.B、Use Security Configuration and Analysis to import the security setting. Then create a Group policy object (GPO) for the Sales QU.C、Use Secedit /RefreshPolicy Machine_Policy command.D、Use the Basicwk.inf security file settings, save the security file, and then import the fileto theComputers.

Your company’s security policy requires complex passwords.   You have a comma delimited file named import.csv that contains user account information. You  need to create user accounts in the domain by using the import.csv file.   You also need to ensure that the new user accounts are set to use default passwords and are  disabled.     What should you do()A、Modify the userAccountControl attribute to disabled. Run the csvde -i -k -f import.csv command. Run the DSMOD utilityB、Modify the userAccountControl attribute to accounts disabled. Run the csvde -f import.csv command. Run the DSMOD utilityC、Modify the userAccountControl attribute to disabled. Run the wscript import.csv command. Run the DSADD utilityD、Modify the userAccountControl attribute to disabled. Run the ldifde -i -f import.csv command. Run the DSADD utility

You deploy mobile devices that run Microsoft Windows Mobile 5.0.   Company security policy requires an authentication process that is stronger than a user name and password combination.   You need to ensure that Microsoft ActiveSync sessions use an authentication process that meets the company security policy.   What should you do?()A、Deploy a two-factor authentication process.B、Deploy a single-factor authentication process.C、Deploy a simple PIN policy for the Windows Mobilebased devices.D、Deploy a complex PIN policy for the Windows Mobilebased devices.

You have an Exchange 2010 organization.  Your companys security policy states that all connections to Outlook Web App (OWA) must use smartcard authentication.  You need to recommend a solution to meet the security policy requirements.  Which two possible ways to achieve this goal should you recommend?()A、Require certificate-based authentication for all Internet-facing Client Access servers.B、Require Windows Integrated Authentication for all Internet-facing Client Access servers.C、Deploy an Edge Transport server, and then disable Windows Integrated Authentication.D、Deploy a server that runs Microsoft Internet Security and Acceleration (ISA) Server,and then  enableKerberos constrained delegation.

You have an Exchange Server 2010 organization.  You have a global security group named Legal that contains all the members of your companys legaldepartment.  The companys security policy states that the Legal group must be able to search all mailboxes for e-mailmessages that contain specific keywords.  You need to recommend a solution for the organization that complies with the security policy.  What should you include in the solution?()A、a Discovery Management role groupB、a legal holdC、administrator audit loggingD、Mailbox journaling

You have an Exchange Server 2010 organization.  Your companys security policy states that users must not be able to encrypt e-mail messages by usingOutlook Web App (OWA).  You need to recommend a client access solution that meets the requirements of the security policy.  What should you include in the solution?()A、managed folder mailbox policiesB、multiple OWA virtual directoriesC、OWA segmentationD、WebReady Document Viewing

You upgrade your computer from Windows NT Workstation to a Windows 2000 Professional computer. Your computer is a member of justtalks.com domain. Prior to this upgrade your computer was configured by a system policy to require at-least a 12 alphanumeric character password. After the upgrade your computer will not apply security policy. What should you do?()A、Use secedit.exe to refresh the security policy.B、Use the local computer policy to configure the local security policy.C、Use security configuration and analysis to support the security files as a .pol file.D、Use computer management to configure the security policy setting.

单选题Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()ASource IP and browserBSource IP and certificateCCertificate and Host CheckerDHost Checker and source IP

单选题Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" "Sensors" "Sensor Event Policies" [rule name] to accomplish this?()AIgnoreBReplace users roleCTerminate user sessionDDisable user account

单选题Which statement describes the behavior of a security policy?()AThe implicit default security policy permits all traffic.BTraffic destined to the device itself always requires a security policy.CTraffic destined to the device’s incoming interface does not require a security policy.DThe factory-default configuration permits all traffic from all interfaces.

多选题Your company uses SQL Server 2005. You are implementing a series of views that are used in ad hoc queries. The views are used to enforce your companys security policy of abstracting data.  Some of these views perform slowly. You create indexes on those views to increase performance, while still maintaining the companys security policy. One of the views returns the current date as one of the columns. The view returns the current date by using the GETDATE( ) function. This view does not allow you to create an index. You need to create an index on the view.  Which two actions should you perform?()ARemove all deterministic function calls from within the view.BRemove all nondeterministic function calls from within the view.CSchema-bind all functions that are called from within the view.DCreate the view and specify the WITH CHECK OPTION clause.