When setting security permissions on a folder, which of the following properties apply?()A、Guest users are allowed changed permissions.B、All sub-folders inherit the most restrictive permissions within the folder.C、All sub-folders within that folder are given a password.D、By default, read permissions are denied on all files within the folder.

When setting security permissions on a folder, which of the following properties apply?()

  • A、Guest users are allowed changed permissions.
  • B、All sub-folders inherit the most restrictive permissions within the folder.
  • C、All sub-folders within that folder are given a password.
  • D、By default, read permissions are denied on all files within the folder.

相关考题:

You are developing a Windows Communication Foundation (WCF) service.You need to enable security auditing for all events.What should you do?() A. Set the serviceAuthorizationAuditLevel setting to Success and the messageAuthenticationAuditLevel setting to Success.B. Set the messageAuthenticationAuditLevel setting to Success and the auditLogLocation setting to Application.C. Set the serviceAuthorizationAuditLevel setting to SuccessAndFailure and the messageAuthenticationAuditLevel setting to SuccessAndFailure.D. Set the messageAuthenticationAuditLevel setting to SuccessAndFailure and the auditLogLocation setting to Security.

在应用程序中用到设备震动时需要使用什么权限?() A.android.hardware.permission.VIBRATEB.android.permission.hardware.VIBRATEC.android.security.VIBRATED.android.permission.VIBRATE

What are the three main types of networks that must be considered when defining a security policy?

Which statement correctly describes network security settings in Cisco Network Assistant for the Catalyst Express 500 Switch?()A、The LOW setting enables broadcast storm control, but has no effect on the number of devices that can connect to a switch portB、The LOW setting enables broadcast storm control and limits the number of devices that can connect to a switch port.C、The LOW setting disables broadcast storm control but limits the number of devices that can connect to a switch portD、The default network setting is "HIGH"

Which of the following is true when Bob, a technician, is setting default security permissions on a folder?()A、There are no significant changes to other files.B、The created folder inherits the most restrictive permissions within the folder.C、The permissions are inherited by all files and folders within that folder.D、All folders within that folder are given a restrictive password.

An administrator has purchased monitoring software that can be configured to alert administrators when hardware and applications are having issues.  All devices are configured with SNMP, but the administrator wants to further secure the SNMP traffic.  Which of the following settings would BEST provide additional monitoring security?()A、Setting up a custom community nameB、Configuring the network to block traffic on port 161C、Configuring the Windows Firewall to block port 161D、Setting SNMP to read only on the devicesE、Installing new MIBs

Which file contains the attributes used to setup a new user account when executing ‘mkuser’ without any flags?()A、/etc/security/userB、/etc/security/passwdC、/etc/security/mkuser.sysD、/etc/security/mkuser.default

What are three methods to reduce Mysql server exposure to remote connections?()A、Setting — skip-networking when remote connections are not requiredB、Using the sql_mode=STRICT_SECURE after connections are established for encrypted communicationsC、Setting specific GRANT privilege to limit remote authenticationD、Setting – mysql_secure_configuration to enable paranoid modeE、Using SSL when transporting data over remote networks

You are developing a Windows Communication Foundation (WCF) service. You need to enable security auditing for all events. What should you do?()A、Set the serviceAuthorizationAuditLevel setting to Success and the messageAuthenticationAuditLevel setting to Success.B、Set the messageAuthenticationAuditLevel setting to Success and the auditLogLocation setting to Application.C、Set the serviceAuthorizationAuditLevel setting to SuccessAndFailure and the messageAuthenticationAuditLevel setting to SuccessAndFailure.D、Set the messageAuthenticationAuditLevel setting to SuccessAndFailure and the auditLogLocation setting to Security.

A user named Marie uses a Windows 2000 Professional computer named Client1 to process payroll records. Marie reports that she can no longer run her financial applications. You determine that file permissions have been applied incorrectly to her computer. You want to configure Client1 to have the same security configuration and file permission settings that were applied when the computer was installed.  What should you do?()A、Grant usersFull Controlpermission to the C drive and all child foldersB、Use the Recovery Console to restore system filesC、Use Security Configuration and Analysis to apply the Secure security template to Client1D、Use Security Configuration and Analysis to apply the Default security template to Client 1

You need to configure the local security policy setting to request a user name and password when you make changes to the computer system.  What should you do?()A、Enable the Password must meet complexity requirements setting.B、Enable the User Account Control: Detect application installations and prompt for elevation setting.C、Configure the Interactive logon: Prompt user to change password before expiration setting to a value between 1 and 999.D、Configure the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval mode setting to the Prompt for credentials option.

You are the administrator of your company’s network. You use Security Templates to configure a Security Policy on the Windows 2000 Professional Computers in the Sales organizational unit (OU). You notice that the Computers in the Sales OU are not downloading the Security Policy settings. On each computer, the Security Policy appears in the Local Computer Policy, but is not listed as the effective policy. You want all computers in the Sales OU to have the Security Policy listed as the effective policy. How should you accomplish this task? ()A、Use Security Templates to correct the setting and export the security file.B、Use Security Configuration and Analysis to import the security setting. Then create a Group policy object (GPO) for the Sales QU.C、Use Secedit /RefreshPolicy Machine_Policy command.D、Use the Basicwk.inf security file settings, save the security file, and then import the fileto theComputers.

Your company, A. Datum Corporation, has a single Active Directory domain named intranet.adatum.com. The  domain has two domain controllers that run Windows Server 2008 R2 operating system. The  domain controllers also run DNS servers.   The intranet.adatum.com DNS zone is configured as an Active Directory-integrated zone with the  Dynamic updates setting configured to Secure only. A new corporate security policy requires that  the intranet.adatum.com DNS zone must be updated only by domain controllers or member  servers.   You need to configure the intranet.adatum.com zone to meet the new security policy requirement.     Which two actions should you perform()A、Remove the Authenticated Users account from the Security tab of the intranet.adatum.com DNS zone properties.B、Assign the SELF Account Deny on Write permission on the Security tab of the intranet.adatum.com DNS zone propC、Assign the server computer accounts the Allow on Write All Properties permission on the Security tab of the intraneD、Assign the server computer accounts the Allow on Create All Child Objects permission on the Security tab of the int

Your  company,  A.  Datum  Corporation,  has  a  single  Active  Directory  domain  named  intranet.adatum.com. The domain has two domain controllers that run Windows Server 2008 R2  operating system. The domain controllers also run DNS servers.  The intranet.adatum.com DNS zone is configured as an Active Directoryintegrated zone with the  Dynamic updates setting configured to Secure only.  A new corporate security policy requires that the intranet.adatum.com DNS zone must be updated only by  domain controllers or member servers.  You need to configure the intranet.adatum.com zone to meet the new security policy requirement.  Which two actions should you perform()A、Remove the Authenticated Users account from the Security tab of the intranet.adatum.com DNS zone  properties.B、Assign the SELF Account Deny on Write permission on the Security tab of the intranet.adatum.com  DNS zone properties.C、Assign the server computer accounts the Allow on Write All Properties permission on the Security tab  of the intranet.adatum.com DNS zone properties.D、Assign the server computer accounts the Allow on Create All Child Objects permission on the Security  tab of the intranet.adatum.com DNS zone properties.

You need to design an access control and permission strategy for user objects in Active Directory.What should you do?()A、Make the members of the AdvancedSupport security group members of the Domain Admins security groupB、Give each desktop support technician permission to reset passwords for the top-level OU that contains user accounts at their own locationC、Delegate full control over all OUs that contain user accounts to all AllSupport  security groupD、Change the permissions on the domain object and its child objects so that the BasicSupport security group is denied permissions. Then, add a permission to each OU that contains user accounts that allows AllSupport security group members to reset passwords in that OU

单选题You are the administrator of a Windows 2000 network.  You upgrade five computers in the sales department to Windows 2000 Professional. You then apply the Basicwk.inf security template to the upgraded computers. The remaining computers in the sales department are using Windows NT Workstation 4.0. When users log on to the Windows 2000 Professional computers they report that they are unable to run the company’s database application.  When the users log on to Windows NT Workstation 4.0 computers they are able to run the database application.  You want the users of Windows 2000 Professional computers to be able to run the database application.  What should you do? ()AApply the Securews.inf security template to the computers.BApply the Compatsws.inf security template to the computers.CDelete the Basicwk.inf security template file from the computers.DFor each user account, grant Read permission to the database application and its associated files.EUse the System Policy Editor to configure a new security policy for the database application.

单选题You have a computer that runs Windows 7. The computer contains a folder named C:/data. You use Advanced Sharing to share C:/data by using the default share permissions. When a user tries to access theshare over the network, he gets an Access is Denied error message. You need to ensure that the user canaccess the share.  What should you do?()AAllow file and printer sharing through Windows Firewall.BChange the network location from a Public network to a Home or Work network.CFrom the Security settings of the folder, assign the user the Read NTFS permission.DFrom the Advanced Sharing settings of the folder, assign the user the Read share permission.

单选题Which file contains the attributes used to setup a new user account when executing ’mkuser’ without any flags?()A/etc/security/userB/etc/security/passwdC/etc/security/mkuser.sysD/etc/security/mkuser.default

单选题When the ship security alert system is activated, it shall not()Ainitiate a ship-to-shore security alertBtransmit a ship-to-shore security alertCinitiate an alert identifying the ship, its locationDraise a security alarm on-board the ship indicating that the ship is under threat

单选题Your company has a single Active Directory domain. All servers run Windows Server 2008. You install an iSCSI storage area network (SAN) for a group of file servers.  Corporate security policy requires that all data communication to and from the iSCSI SAN must be as secure as possible.  You need to implement the highest security available for communications to and from the iSCSI SAN. What should you do?()ACreate a Group Policy object (GPO) to enable the System objects: Strengthen default permission ofinternal systems objects setting.BCreate a Group Policy object (GPO) to enable the System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing setting.CImplement IPsec security in the iSCSI Initiator Properties. Set up inbound and outbound rules by using Windows Firewall.DImplement mutual Microsoft Challenge Handshake Authentication Protocol (MS-CHAPv2) authentication in the iSCSI Initiator Properties. Set up inbound and outbound rules by using Windows Firewall.

单选题Your company has an Active Directory domain. You install an Enterprise Root certification authority (CA) on a member server named Server1. You need to ensure that only the Security Manager is authorized to revoke certificates that are supplied by Server1. What should you do()ARemove the Request Certificates permission from the Domain Users group.BRemove the Request Certificated permission from the Authenticated Users group.CAssign the Allow - Manage CA permission toonly  the Security Manager user Account.DAssign the Allow - Issue and Manage Certificates permission to only the Security Manger user account

单选题What action should you be prepared to take when verifying a security solution?()Ahaving alternative addressing and VLAN schemesBhaving a rollback plan in case of unwanted or unexpected resultsCrunning a test script against all possible security threats to insure that the solution will mitigate all potential threatsDisolating and testing each security domain individually to insure that the security design will meet overall requirements when placed into production as an entire system

单选题When setting security permissions on a folder, which of the following properties apply?()AGuest users are allowed changed permissions.BAll sub-folders inherit the most restrictive permissions within the folder.CAll sub-folders within that folder are given a password.DBy default, read permissions are denied on all files within the folder.

单选题You are the administrator of your company’s network. A user name Andrew has limited dexterity, which prevents him from using standard keyboard when completing his daily tasks. You configure Windows 2000 Professional to use sticky keys and screen keyboard options. You save the accessibility options to a shared folder on the local hard disk of Andrews’s computer. You want to configure the same options for another user Peter. You log on to Peter’s computer using his local user account and you access the folder over the network from Peter’s computer. You select the .acw file from the shared folder to set up Peter’s computer to use the accessibility option. You receive an error message as follows: " There was a problem running the file when running the accessibility wizard". What should you do to install the accessibility features on Peter’s computer?()ACopy the .acw file to the c;/documents/setting/default user folderBSave the accessibility option to the floppy disk and change the permission to allow full control  of the fileCResume the setting for the option by using utility manager, then copy the file to Peter’s local  profile folderDChange the permission of the .acw file in the folder to allow access for Peter’s user account.

单选题Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). You enable auditing for failed logon attempts on all domain controllers. You need to ensure that a record of failed logon attempts is retained for 90 days on all domain controllers. What should you do?()AFrom the Security Templates snap-in, open the hisecdc template. Modify the Retain System Log setting.BFrom the Security Templates snap-in, open the securedc template. Modify the Retain Security Log setting.COpen the Default Domain Policy. Modify the Retain System Log setting.DOpen the Default Domain Controller Policy. Modify the Retain Security Log setting.

单选题Which statement correctly describes network security settings in Cisco Network Assistant for the Catalyst Express 500 Switch?()AThe LOW setting enables broadcast storm control, but has no effect on the number of devices that can connect to a switch portBThe LOW setting enables broadcast storm control and limits the number of devices that can connect to a switch port.CThe LOW setting disables broadcast storm control but limits the number of devices that can connect to a switch portDThe default network setting is HIGH

单选题When _____ why he walked in without permission, he just stared at us and saidnothing.AaskingBaskedCbeing askedDto be asked