In computer security, AAA stands for authentication, authorization and accounting. Which optionabout the AAA authentication enable default group radius enable command is correct?()A、If the radius server returns an error, the enable password will be usedB、If the radius server returns a ’failed’ message, the enable password will be usedC、The command login authentication group will associate the AM authentication to a specifiedinterfaceD、If the group database is unavailable, the radius server will be used

In computer security, AAA stands for authentication, authorization and accounting. Which optionabout the AAA authentication enable default group radius enable command is correct?()

  • A、If the radius server returns an error, the enable password will be used
  • B、If the radius server returns a ’failed’ message, the enable password will be used
  • C、The command login authentication group will associate the AM authentication to a specifiedinterface
  • D、If the group database is unavailable, the radius server will be used

相关考题:

网络空间安全的发展历程错误的是() A.通信安全阶段ComSAFE(Communication Safe)B.计算机安全阶段CompSEC(Computer Security)C.信息技术安全阶段ITSEC(IT Security)D.通信保密阶段ComSEC(Communication Security)

Virus Security Software is designed to detect, eliminate or quarantine computer viruses before they are able to harm a computer or server networked system.A.AntiB.InvadeC.InroadD.Aggression

● One of the basic rules of computer security is to change your (73) regularly.(73)A. nameB. computerC. deviceD. password

One of the basic rules of computer security is to change your ______ regularly.A.nameB.computerC.deviceD.PasswordA.B.C.D.

One of the basic rules of computer security is to change your(73)regularly.A.nameB.computerC.deviceD.password

The major technical areas of computer security are usually represented by the initials CIA(71),integrity,and authentication or availability.A.confidentialityB.confidentC.secretD.safety

Computer( )focuses on protecting information ,hardware ,and software from unauthorized use and damage.A.network B.virus C.security D.architecture

Which of the following is NOT true of security attacks?[A] Employees will keep up with security polices and awareness if they are highly-trained.[B] The rate of security attacks appears faster than the growth of the Internet.[C] One's computer system will never be secure.[D] Vulnerabilities can go through phones, wireless devices, and network appliances

●The (75)is designed specifically as a security system for preventing unauthorized communications between one computer network and another computer network.(75)A.firewallB.protocolC.hackerD.virus

UCLA had taken away all Social Security numbers from common usage to ensure the computer security.

What is the resulting action when you click on the lock computer button on the Windows Security Dialog Box?()A、Computer is locked.B、Applications continue to run.C、Computer is Shut Down.D、Computer is not locked.E、Applications are frozen.F、The monitor is closed down.

You are auditing some events on your Windows 2000 Professional computer. You make changes in the system time of this computer. Under what event will this log be generated in the event viewer? ()A、Privilege UseB、Object UseC、Security Settings UseD、System Use

A user named Marie uses a Windows 2000 Professional computer named Client1 to process payroll records. Marie reports that she can no longer run her financial applications. You determine that file permissions have been applied incorrectly to her computer. You want to configure Client1 to have the same security configuration and file permission settings that were applied when the computer was installed.  What should you do?()A、Grant usersFull Controlpermission to the C drive and all child foldersB、Use the Recovery Console to restore system filesC、Use Security Configuration and Analysis to apply the Secure security template to Client1D、Use Security Configuration and Analysis to apply the Default security template to Client 1

You are the administrator of the Corp arborshoes.com domain. Users in the domain run Windows 2000 Professional on their desktop computers.   A user named Katrin in the Sales organizational unit (OU) reports that her mouse is not working correctly. You log on to the domain from Katrin’s computer by using the domain Administrator account. You use Device Manager to display the current information for the mouse driver.   You discover that Katrin’s computer is using an older version of the mouse driver. You have current drivers furnished by the manufacturer of the mouse. You install the current driver by using Device manager and restart the computer.   You test the mouse and it is still not functioning correctly. You view Device Manger and notice that the display of the current driver indicates that the previous driver is still uninstalled.   You want to be able to install the correct mouse driver. What should you do? ()A、Set the Sales OU policy for security to warn and allow the installation to override the local security defaults. B、Set the domain policy for security to block but allow the installation to override the local and Sales OU security defaults. C、Set the Local Computer Policy for security on Katrin’s computer to warn but allow the installation to override the domain and the Sales OU security defaults. D、Disable plug and play on Katrin’s computer. Restart the computer and manually set up the system resources for the mouse.

You are the administrator of your company’s network. Ten Windows 2000 Professional computers are located in the Research department. The computers contain highly confidential information. You want the 10 computers to be able to communicate with other Windows 2000 Professional computers on the network. However, you do not want them to communicate with computers that are not running Windows 2000, including those that are running Windows 95, Windows 98 and Windows NT.  You want to configure a security policy on each computer to ensure that the confidential information is secure. What should you do?()A、Use Security Configuration and Analysis to import the Hisecws.inf security template file to modify the default security settings.B、Use security templates to create a security template file and import the security settings to modify the default security settings.C、Use the local computer policy to disable the access to this computer from the network option.D、Use Secedit.exe to reconfigure the computers’ default security settings to not allow anonymous access to the computers.

You have a combined Windows 2000 and Windows 98 network that contain sensitive data. You want to utilize as many new Windows 2000 security features as possible. You want to customize a security policy on each computer to ensure that data is kept confidential and secured. Allcomputers must still be able to communicate with each other over the network. What should you do?()A、Use the security configuration and analysis console to improve the HISECWS security  template file.B、Use the local computer policy to disable the access this computer from the network option.C、Use SECEDIT to reconfigure the computer default security settings to not allow anonymous  access to the computer.D、Create a policy that excludes write access to the windows 2000 computers then apply the  policy to all non-windows 2000 computers.E、None of the above, Windows 9X systems cannot be secured using security template files.

You are the administrator of your company’s network. You use Security Templates to configure a Security Policy on the Windows 2000 Professional Computers in the Sales organizational unit (OU). You notice that the Computers in the Sales OU are not downloading the Security Policy settings. On each computer, the Security Policy appears in the Local Computer Policy, but is not listed as the effective policy. You want all computers in the Sales OU to have the Security Policy listed as the effective policy. How should you accomplish this task? ()A、Use Security Templates to correct the setting and export the security file.B、Use Security Configuration and Analysis to import the security setting. Then create a Group policy object (GPO) for the Sales QU.C、Use Secedit /RefreshPolicy Machine_Policy command.D、Use the Basicwk.inf security file settings, save the security file, and then import the fileto theComputers.

You are the network administrator for ExamSheet.  Computers on your network run Windows 2000 Professional, Windows NT Workstation 4.0 and Windows 98. Ten Windows 2000 Professional computers are located in the research department. These computers contain highly confidential information. You want the 10 Windows 2000 Professional computers to be able to communicate only with other Windows 2000 computers.  What should you do?()A、On the research computers use the Local Computer Policy to disable theAccess this computer  from the networkoption.B、Use Security Configuration and Analysis to apply the Highly Secure security template to the research computers.C、Add the users of the research computers to the Power Users group on each computer.D、On the research computers configure the security settings to prevent anonymous access.

Your network contains a computer named Computer1 that runs Windows 7.You need to verify if Computer1 has active DirectAccess connections to the network.What should you do?()A、From Network Connections, right-click the active network connection, and then click Status.B、From Network Connections, select the active network connection, and then click Diagnose this connection.C、From Windows Firewall with Advanced Security, click Monitoring, and then click Connection Security Rules.D、From Windows Firewall with Advanced Security, click Monitoring, click Security Associations, and then click Main Mode.

You upgrade your computer from Windows NT Workstation to a Windows 2000 Professional computer. Your computer is a member of justtalks.com domain. Prior to this upgrade your computer was configured by a system policy to require at-least a 12 alphanumeric character password. After the upgrade your computer will not apply security policy. What should you do?()A、Use secedit.exe to refresh the security policy.B、Use the local computer policy to configure the local security policy.C、Use security configuration and analysis to support the security files as a .pol file.D、Use computer management to configure the security policy setting.

You upgrade five computers in the Finance organizational unit (OU) from Windows NT Workstation 4.0 to Windows 2000 Professional. The computers are used by members of the Finance OU to run financial Applications. All five computers are configured to have the default security settings. A user named Helene reports that she can no longer log run the financial applications on her Windows 2000 Professional computer. Prior to the upgrade, Helene was able to run the financial applications on her computer. Helene is a member of the local Users group. You want the financial applications to run on her computer. What should you do?()A、 Use Computer Management to configure separate memory space for each financial application on Helene’s computer.B、 Use Security Templates to edit the Security Policy to include the financial application onHelene’s computer. Then add Helene’s user account to the Power Users group on Helene’s computer.C、 Use Security Configuration and Analysis to reconfigure the default security policy .inf to allow financial  applications to run on Helene’s computer.D、 Use Secedit.exe to apply the Compatws.inf security template on Helene’s Security Policy toloosen the permissions for the local Users group on Helene’s computer.

单选题You have a standalone computer that runs Windows 7. Multiple users share the computer. You need toensure that you can read the content of all encrypted files on the computer.  What should you do?()ARun the Certificates Enrollment wizard and then run Certutil.exe importpfx.BRun the Certificates Enrollment wizard and then run Certutil.exe installcert.CRun Cipher.exe /r and then add a data recovery agent from the local security policy.DRun Cipher.exe /rekey and then import a security template from the local security policy.

单选题You are the network administrator for ExamSheet.net.  You have implemented the Hisecws.inf security template on all the Windows 2000 Professional computers in your network by using a GPO. A user has received a driver and utility software for the internal SCSI controller on his computer. The SCSI controller is not currently on the HCL. He uses the manufacturer provided CD to install the driver and the utility. He restarts the computer and reports that the internal SCSI controller is not working correctly.  You want to allow all users to install this driver on their client computers. You want to accomplish this task with the least amount of administrative effort. What should you do?()AModify the GPO to change the Driver Signing option. BRun theSigverifcommand on each client computer.CReconfigure the Driver Signing option on each client computer. Install the driver on each client     computer. Reapply the security template settings on each client computer.DModify the Hisecws.inf security template on each client computer to change the Driver Signing     option.EModify the Hisecws.inf security template on the domain controller to change the Driver Signing     option.

单选题You are the network administrator for ExamSheet.net. You administer ExamSheet’s Windows 2000 network. You upgrade 10 computers in the Accounting department from Windows NT Workstation 4.0 to Windows 2000 Professional. All of the upgraded computers are configured to have the default security settings. For security purposes you want to ensure that these computers can only communicate with other Windows 2000 computers.  What should you do?()AOn each computer configure separate memory spaces for each financial and credit applications.BApply Highly Secure security template to the local security policy of the computers in the Accounting department.CApply Compatible security template to the local security policy of the computers in the Accounting department.DAdd each user account to the Power Users group on that user’s computer.

单选题You have two computers named Computer1 and Computer2 that run Windows 7. You need to ensure thatComputer2 has exactly the same firewall rules as Computer1.  What should you do on Computer1?()ARun Winrm.exe quickconfig.BFrom Windows Firewall with Advanced Security, select Export Policy.CFrom Windows Firewall with Advanced Security, click Inbound Rules and then click Export List.DOpen Local Security Policy. Right-click IP Security Policies on Local Computer and then click Export List.

单选题You need to design a method to monitor the security configuration of the IIS server to meet the requirements in the written security policy. What should you do?()ALog on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the IIS server computer accountBRun the Microsoft Baseline Security Analyzer (MBSA) on the IIS server and scan for vulnerabilities in Windows and IIS checksCRun Security Configuration and Analysis to analyze the IIS server’s security settings by using a custom security templateDOn the IIS server, run the gpresult command from a command prompt and analyze the output

单选题You have a portable computer that runs Windows 7. The computer is joined to a domain. Multiple users logon to the computer. You need to prevent the computer from displaying the username of the last user whologged on. What should you do?()AFrom Control Panel, modify the User Profiles settings.BFrom Control Panel, modify the Personalization settings.CFrom the local computer policy, add a policy template.DFrom the local computer policy, modify the local security policy.

单选题You have a computer named Computer1 that runs Windows 7. Computer1 has a shared printer. You needto configure Computer1 so that only Administrators are authorized to shut down the computer.  What should you do?()AFrom User Accounts, modify the user profiles settings.BFrom User Accounts, modify the User Account Control (UAC) settings.CFrom the local computer policy, modify the Security Options.DFrom the local computer policy, modify the User Rights Assignment.