单选题You are changing the security settings of a file named MyData.xml.You need to preserve the existing inherited access rules.You also need to prevent the access rules from inheriting changes in the future.   Which code segment should you use?()A AB BC CD D

单选题
You are changing the security settings of a file named MyData.xml.You need to preserve the existing inherited access rules.You also need to prevent the access rules from inheriting changes in the future.   Which code segment should you use?()
A

A

B

B

C

C

D

D


参考解析

解析: 暂无解析

相关考题:

You are developing a Windows Communication Foundation (WCF) service that will be hosted in Microsoft Internet Services (IIS) 7.0.The service must be hosted in an IIS application named Info. You need to enable this service to be hosted in IIS by changing the web.config file.Witch XML segment should you add to the web.config file?()A.B.C.D.

You work as an application developer at Contoso.com. You use Microsoft .NET Framework 3.5 and Microsoft ADO.NET to develop an application. The user name and password that is kept by the connection string is stored directly in the code of the application. You want to make sure that the password in the connection string is as protected.   What should you do? ()A、 Add the connection string to the Settings.settings file.B、 Add connection string to the Web.config file and use protected configuration.C、 Use the TRUE setting in the Persist Security Info keyword.D、 Use the FALSE setting in the Persist Security Info keyword

You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains 50 application servers that run Windows Server 2003.   The security configuration of the application servers is not uniform. The application servers were deployed by local administrators who configured the settings for each of the application servers differently based on their knowledge and skills. The application servers are configured with different authentication methods, audit settings, and account policy settings.   The security team recently completed a new network security design. The design includes a baseline configuration for security settings on all servers. The baseline security settings use the Hisecws.inf predefined security template. The design also requires modified settings for servers in an application role. These settings include system service startup requirements, renaming the administrator account, and more stringent account lockout policies. The security team created a security template named Application.inf that contains the modified settings.   You need to plan the deployment of the new security design. You need to ensure that all security settings for the application servers are standardized, and that after the deployment, the security settings on all application servers meet the design requirements.   What should you do? ()A、 Apply the Setup security.inf template first, the Hisecws.inf template next, and then the Application.inf template.B、 Apply the Application.inf template and then the Hisecws.inf template.C、 Apply the Application.inf template first, the Setup security.inf template next, and then the Hisecws.inf template.D、 Apply the Setup security.inf template and then the Application.inf template.

You are the network administrator for your company. The network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2003. The domain contains an organizational unit (OU) named Servers that contains all of the company’s Windows Server 2003 resource servers. The domain also contains an OU named Workstations that contains all of the company’s Windows XP Professional client computers.   You configure a baseline security template for resource servers named Server.inf and a baseline security template for client computers named Workstation.inf. The Server.inf template contains hundreds of settings, including file and registry permission settings that have inheritance propagation enabled. The Workstation.inf template contains 20 security settings, none of which contain file or registry permissions settings.  The resource servers operate at near capacity during business hours.   You need to apply the baseline security templates so that the settings will be periodically enforced. You need to accomplish this task by using the minimum amount of administrative effort and while minimizing the performance impact on the resource servers.   What should you do?  ()A、 Create a Group Policy object (GPO) and link it to the domain. Import both the Server.inf and the Workstation.inf templates into the GPO.B、 Import both the Server.inf and the Workstation.inf templates into the Default Domain Policy Group Policy object (GPO).C、 On each resource server, create a weekly scheduled task to apply the Server.inf settings during off-peak hours by using the secedit command. Create a Group Policy object (GPO) and link it to the Workstations OU. Import the Workstation.inf template into the GPO.D、 On each resource server, create a weekly scheduled task to apply the Server.inf settings during off-peak hours by using the secedit command. Import the Workstation.inf template into the Default Domain Policy Group Policy object (GPO).

You are the desktop administrator for your company. The company's network contains 500 Windows XP Professional computers. The information security department releases a new security template named NewSec.inf. You import NewSec.inf into a security database named NewSec.sdb. You analyze the result, and you review the changes that the template makes. You examine the security policies that are defined in NewSec.inf. You discover that the settings in NewSec.inf have not been implemented on your computer. You need to ensure that the settings in NewSec.inf overwrite the settings in your computer's local security policy. What are two possible ways to achieve this goal?()A、Run the Secedit /configure /db C:/NewSec.sdb command.B、Run the Secedit /refreshpolicy machine_policy command.C、Copy NewSec.inf to the C:/Windows/Inf folder. D、Copy NewSec.sdb to the C:/Windows/System32/Microsoft/Protect folder. E、Use the Security Configuration and Analysis console to open NewSec.sdb and then to perform a Configure operation. F、Use the Security Configuration and Analysis console to export NewSec.sdb to the Defltwk.inf security template.

Your company has an Active Directory domain and an organizational unit. The organizational unit  is named Web. You configure and test new security settings for Internet Information Service (IIS)  servers on a server named IISServerA.     You need to deploy the new security settings only on the IIS servers that are members of the  Web organizational unit.     What should you do()A、Run secedit /configure /db iis.inf from the command prompt on IISServera, and then run secedit /configure /db webB、Export the settings on IISServera to create a security template. Import the security template into a gpo and link theC、Export the settings on IISServera to create a security template. Run secedit /configure /db webou.inf from the commD、Import the hisecws.inf file template into a gpo and link the gpo to the Web organizational unit.

Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3). You have a user account named User1. You need to identify which permissions User1 has on a file. What should you do? ()A、At a command prompt, run Net file.B、At a command prompt, run Attrib.exe.C、From the file properties, view the Summary settings.D、From the file properties, view the Advanced Security settings.

Your network contains an Active Directory domain named contoso.com. All user accounts are in an organizational unit (OU) named Employees. You create a Group Policy object (GPO) named GP1.You link GP1 to the Employees OU.You need to ensure that GP1 does not apply to the members of a group named Managers. What should you configure?()A、The Security settings of EmployeesB、The WMI filter for GP1C、The Block Inheritance option for EmployeesD、The Security settings of GP1

You have a single Active Directory directory service forest with one domain. You have an existing  top-level organizational unit (OU) named Sales. You are planning to create a new top-level OU named  Training. The Sales and Training OUs must have the same security and auditing settings. You need to  identify the security permissions and audit settings for the Sales OU so that you can delegate the same  permissions for the Training OU.  What should you do first?()A、 Use the Delegation of Control Wizard.B、 Use the Security Configuration Wizard.C、 Run the dsacls command.D、 Run the xcacls command.

A user named Marie uses a Windows 2000 Professional computer named Client1 to process payroll records. Marie reports that she can no longer run her financial applications. You determine that file permissions have been applied incorrectly to her computer. You want to configure Client1 to have the same security configuration and file permission settings that were applied when the computer was installed.  What should you do?()A、Grant usersFull Controlpermission to the C drive and all child foldersB、Use the Recovery Console to restore system filesC、Use Security Configuration and Analysis to apply the Secure security template to Client1D、Use Security Configuration and Analysis to apply the Default security template to Client 1

You are the administrator of your company’s network. Ten Windows 2000 Professional computers are located in the Research department. The computers contain highly confidential information. You want the 10 computers to be able to communicate with other Windows 2000 Professional computers on the network. However, you do not want them to communicate with computers that are not running Windows 2000, including those that are running Windows 95, Windows 98 and Windows NT.  You want to configure a security policy on each computer to ensure that the confidential information is secure. What should you do?()A、Use Security Configuration and Analysis to import the Hisecws.inf security template file to modify the default security settings.B、Use security templates to create a security template file and import the security settings to modify the default security settings.C、Use the local computer policy to disable the access to this computer from the network option.D、Use Secedit.exe to reconfigure the computers’ default security settings to not allow anonymous access to the computers.

You have two servers named Server1 and Server2 that run Windows Server 2003 Service Pack 2 (SP2).On Server1, you install an application that runs as a service named App1. App1 will save files to a file share on Server2.You perform the following actions:  (1)Create a domain account named App1Service.  (2)Set the password for App1Service.  (3)Create a file share on Server2.  (4)Grant App1Service the Allow - Change share permission.  You need to ensure that App1 can save files to the share on Server2. What should you do?()A、From the Services snap-in, configure the Log On settings.B、From the Services snap-in, configure the Recovery settings. C、From Local Security Policy, disable the Network access: Shares that can be accessed anonymously setting. D、From Local Security Policy, disable the Network access: Let Everyone permissions apply to anonymous users setting.

You are the administrator of your company’s network. You use Security Templates to configure a Security Policy on the Windows 2000 Professional Computers in the Sales organizational unit (OU). You notice that the Computers in the Sales OU are not downloading the Security Policy settings. On each computer, the Security Policy appears in the Local Computer Policy, but is not listed as the effective policy. You want all computers in the Sales OU to have the Security Policy listed as the effective policy. How should you accomplish this task? ()A、Use Security Templates to correct the setting and export the security file.B、Use Security Configuration and Analysis to import the security setting. Then create a Group policy object (GPO) for the Sales QU.C、Use Secedit /RefreshPolicy Machine_Policy command.D、Use the Basicwk.inf security file settings, save the security file, and then import the fileto theComputers.

You are the network administrator for Test King. The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. The Default Domain Policy has been modified by importing a security template file, which contain several security settings. A server named TestKing1 cannot run a program that us functioning on other similarly configured servers. You need to find out whether additional security settings have been added to the local security policy on TestKing1. To troubleshoot, you want to use a tool to compare the current security settings on TestKing1 against the security template file in order to automatically identify any settings that might have been added to the local security policy. Which tool should you run on TestKing1?()A、Microsoft Baseline Security Analyzer (MBSA)B、Security Configuration and Analysis consoleC、gpresult.exeD、Resultant Set of Policy console in planning mode

Your network contains an Active Directory domain named contoso.com.You run nslookup.exe as shown in the following Command Prompt window. You need to ensure that you can use Nslookup to list all of the service location (SRV) resource records for  contoso.com. What should you modify()A、the root hints of the DNS serverB、the security settings of the zoneC、the Windows Firewall settings on the DNS serverD、the zone transfer settings of the zone

You are the network administrator in the New York office of TestKing. The company network consists of a single Active Directory domain The New York office currently contains one Windows Server 2003 file server named TestKingA. All file servers in the New York office are in an organizational unit (OU) named New York Servers. You have been assigned the Allow - Change permission for a Group Policy object (GPO) named NYServersGPO, which is linked to the New York Servers OU. The written company security policy states that all new servers must be configured with specified predefined security settings when the servers join the domain. These settings differ slightly for the various company offices. You plan to install Windows Sever 2003, on 15 new computers, which all functions as file servers. You will need to configure the specified security settings on the new file servers. TestKingA currently has the specified security settings configured in its local security policy. You need to ensure that the security configuration of the new file servers is identical to that of TestKingA. You export a copy of TestKingA's local security policy settings to a template file. You need to configure the security settings of the new servers, and you want to use the minimum amount of administrative effort. What should you do?()A、Use the Security Configuration and Analysis tool on one of the new servers to import the template file.B、Use the default Domain Security Policy console on one of the new servers to import the template file.C、Use the Group Policy Editor console to open NYServersGPO and import the template file.D、Use the default Local Security Policy console on one of the new servers to import the template file.

Your network contains an Active Directory domain named contoso.com. All client computer accounts are in an organizational unit (OU) named AllComputers. Client computers run either Windows 7 or Windows 8.You create a Group Policy object (GPO) named GP1. You link GP1 to the AllComputers OU.You need to ensure that GP1 applies only to computers that have more than 8 GB of memory. What should you configure?()A、The Security settings of AllComputersB、The Security settings of GP1C、The WMI filter for GP1D、The Block Inheritance option for AllComputers

You are developing an application to create a new file on the local file system.You need to define specific security settings for the file. You must deny the file inheritance of any default security settings during creation.What should you do?()A、Create the file by using a new FileStream object by passing the FileSecurity object as a parameter to the FileStream constructor.B、Create a new FileSecurity object.C、Apply the permissions by using the File class.D、Create a new FileSystem Access Rule object for each permission that you need,and add each rule to the FileSecurity object.E、Create a new FileSystem Audit Rule object and add it to the FileSecurity object.

单选题You are the network administrator for the Berlin office of The company network consists of a single Active Directory domain named The Berlin office contains 15 file servers that contain confidential files. All the file servers run either Windows Server 2003 or Windows 2000 Server. All the file servers are in the BerlinFilePrint organizational unit (OU). TestKing's security department sets a rule that specifies the size and retention settings for the Security event log of all file servers. The rule also specified that local administrators on servers cannot override the changes you make to the settings for the Security event log. You need to define a method to modify the Security event log settings on each file server in the Berlin office in order to meet the states requirements. What should you do?()AModify the local security policy on each file server.Define the size and retention settings for the Security event log.BCreate a security template on one of the file servers by using the Security Configuration and Analysis tool. Define the size and retention settings for the Security event log in the template. Import the security template into the local security policy of the other 14 file servers.CUse Event Viewer to modify the event log properties on each file server. Define the size and retention settings for the Security event log.DCreate a new Group Policy object (GPO) and link it to the BerlinFilePrint OU. In the GPO, define the size and retention settings for the Security event log.

单选题Your network contains an Active Directory domain named contoso.com. All user accounts are in an organizational unit (OU) named Employees. You create a Group Policy object (GPO) named GP1.You link GP1 to the Employees OU.You need to ensure that GP1 does not apply to the members of a group named Managers. What should you configure?()AThe Security settings of EmployeesBThe WMI filter for GP1CThe Block Inheritance option for EmployeesDThe Security settings of GP1

单选题Your network contains an Active Directory domain named contoso.com. All client computer accounts are in an organizational unit (OU) named AllComputers. Client computers run either Windows 7 or Windows 8.You create a Group Policy object (GPO) named GP1. You link GP1 to the AllComputers OU.You need to ensure that GP1 applies only to computers that have more than 8 GB of memory. What should you configure?()AThe Security settings of AllComputersBThe Security settings of GP1CThe WMI filter for GP1DThe Block Inheritance option for AllComputers

单选题You are the network administrator for Test King. The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. The Default Domain Policy has been modified by importing a security template file, which contain several security settings. A server named TestKing1 cannot run a program that us functioning on other similarly configured servers. You need to find out whether additional security settings have been added to the local security policy on TestKing1. To troubleshoot, you want to use a tool to compare the current security settings on TestKing1 against the security template file in order to automatically identify any settings that might have been added to the local security policy. Which tool should you run on TestKing1?()AMicrosoft Baseline Security Analyzer (MBSA)BSecurity Configuration and Analysis consoleCgpresult.exeDResultant Set of Policy console in planning mode

多选题You are developing an application to create a new file on the local file system.You need to define specific security settings for the file. You must deny the file inheritance of any default security settings during creation.What should you do?()ACreate the file by using a new FileStream object by passing the FileSecurity object as a parameter to the FileStream constructor.BCreate a new FileSecurity object.CApply the permissions by using the File class.DCreate a new FileSystem Access Rule object for each permission that you need,and add each rule to the FileSecurity object.ECreate a new FileSystem Audit Rule object and add it to the FileSecurity object.

多选题You have a single Active Directory directory service forest named contoso.com. You create baseline  security settings for a group of computers, and you store the settings in a database. You deploy thebaseline security settings. You need to confirm that the security settings on one of the computers are  applied correctly.  What are two possible commands that you can run to achieve this goal?()AseceditBgpupdateCnetdomDscwcmd

单选题You are the administrator of your company's network. You want to configure a Security Policy for the Windows 2000 Professional Computers that are in the sales department.   On one of the computers, you use Security Templates to configure the Security Policy based on the desired security settings. You then export those settings to an .inf file that will be used on all of the Computers in the sales department. You want to configure each Computer to have a customized Security Policy. What steps should you follow in order to achieve your goal?()AUse Secedit.exe to import the security settings from the .inf file to the computers in the sales department.BUse a text editor to change the default security settings to the desired security settings. Then export those settings to the Computers in the sales department.CCreate an organizational unit (OU) named Sales. Add the users in the sales department to the Sales OU. Then apply the security template to the users in the Sales OU.DCreate an organizational unit (OU) named Sales. Add the computers in the sales department to the Sales OU. Then apply the security template to computers in the Sales OU.

单选题Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3). You have a user account named User1. You need to identify which permissions User1 has on a file. What should you do? ()AAt a command prompt, run Net file.BAt a command prompt, run Attrib.exe.CFrom the file properties, view the Summary settings.DFrom the file properties, view the Advanced Security settings.

多选题Your network contains an Active Directory domain named contoso.com. The domain contains 20 computer accounts in an organizational unit (OU) named OU1. A user account named User1 is in an OU named OU2.You are configuring a Group Policy object (GPO) named GPO1. You need to assign User1 the Backup files and directories user right to all of the computer accounts in OU1.Which two actions should you perform?()ALink GPO1 to OU1BLink GPO1 to OU2.CModify the Delegation settings of GPO1.DFrom User Configuration in GPO1, modify the security settings.EFrom Computer Configuration in GPO1, modify the security settings