单选题The new security feature in Vista that prevents programs from running with escalated privileges is called:()AUser Account Control (UAC).BWindows Sidebar.CWindows Defender.DAero Interface.

单选题
The new security feature in Vista that prevents programs from running with escalated privileges is called:()
A

User Account Control (UAC).

B

Windows Sidebar.

C

Windows Defender.

D

Aero Interface.


参考解析

解析: 暂无解析

相关考题:

The PIX Security Appliance feature set is a subset of the ASA Security Appliance feature set. Which two of these features are only supported by an ASA Security Appliance? (Choose two.)()A、 security contextsB、- transparent firewallC、 WebVPND、 Active/Active failoverE、 low latency queuingF、 AIP-SSM intrusion prevention

A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

A customer wants to check whether they have the necessary tools enabled to prevent intrusions andvirus attacks on a Windows Vista workstation. Which of the following tools can be used to display thecurrent configuration? ()A、Security CenterB、Event Viewer Security logC、Windows DefenderD、Windows Firewall

A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

What is a new feature of the Cisco ISR router? ()A、advanced integration moduleB、FICON portsC、Cisco CallManager 5.0 supportD、warm Cisco IOS upgrade feature

Which file contains the attributes used to setup a new user account when executing ‘mkuser’ without any flags?()A、/etc/security/userB、/etc/security/passwdC、/etc/security/mkuser.sysD、/etc/security/mkuser.default

You need to design an audit strategy for Southbridge Video. Your solution must meet business requirements.What should you do?()A、Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPOB、Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPOC、Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPOD、Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPO

You need to identify the features that will be available immediately after the domain migration to the new environment is complete. Which feature or features will be available?()A、Global group nesting.B、Universal group nesting.C、Domain local group nesting.D、Universal security groups.E、Sid history attributes.

You deploy a Microsoft Exchange mobile messaging solution that uses Microsoft Windows Mobile 5.0 with Microsoft Messaging and Security Feature Pack.   The messaging infrastructure is configured to support the remote wipe feature.   When an administrator attempts to perform a remote wipe of a Windows Mobilebased device, the administrator receives a 401 error message.   You need to ensure that the administrator is authorized to perform remote wipes only.   What should you do?()A、Grant the administrator membership in the Domain Administrators group.B、Grant the administrator membership in the Exchange Administrators group.C、Add the new administrator account to the Discretionary Access Control List (DACL) of the Microsoft Exchange ActiveSync Administration folder.D、Select the Directory Security tab of the Exchange Server administration Web site, and then configure Read, Write, and Directory Browsing permissions.

You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com security policy prohibits the employees to send certain words between them.What should you do?()A、The best option is to create an Outlook Protection Rule to comply with the Company.com security policy.B、The best option is to set up a content filtering feature to comply with the Company.com security policy.C、The best option is to create a transport rule to comply with the Company.com security policy.D、The best option is to set up a sender reputation feature to comply with the Company.com security policy.

You are the network administrator in the New York office of TestKing. The company network consists of a single Active Directory domain The New York office currently contains one Windows Server 2003 file server named TestKingA. All file servers in the New York office are in an organizational unit (OU) named New York Servers. You have been assigned the Allow - Change permission for a Group Policy object (GPO) named NYServersGPO, which is linked to the New York Servers OU. The written company security policy states that all new servers must be configured with specified predefined security settings when the servers join the domain. These settings differ slightly for the various company offices. You plan to install Windows Sever 2003, on 15 new computers, which all functions as file servers. You will need to configure the specified security settings on the new file servers. TestKingA currently has the specified security settings configured in its local security policy. You need to ensure that the security configuration of the new file servers is identical to that of TestKingA. You export a copy of TestKingA's local security policy settings to a template file. You need to configure the security settings of the new servers, and you want to use the minimum amount of administrative effort. What should you do?()A、Use the Security Configuration and Analysis tool on one of the new servers to import the template file.B、Use the default Domain Security Policy console on one of the new servers to import the template file.C、Use the Group Policy Editor console to open NYServersGPO and import the template file.D、Use the default Local Security Policy console on one of the new servers to import the template file.

单选题You have a computer that runs Windows 7. You add a new hard disk drive to the computer and create anew NTFS partition. You need to ensure that you can use the Previous Versions feature on the new drive. What should you do?()AFrom Disk Management, convert the new disk to a dynamic disk.BFrom System Properties, configure the System Protection settings.CFrom System and Security, enable BitLocker Drive Encryption (BitLocker).DFrom the properties of the new drive, create a share and modify the caching settings.

单选题Which file contains the attributes used to setup a new user account when executing ’mkuser’ without any flags?()A/etc/security/userB/etc/security/passwdC/etc/security/mkuser.sysD/etc/security/mkuser.default

单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com security policy prohibits the employees to send certain words between them.What should you do?()AThe best option is to create an Outlook Protection Rule to comply with the Company.com security policy.BThe best option is to set up a content filtering feature to comply with the Company.com security policy.CThe best option is to create a transport rule to comply with the Company.com security policy.DThe best option is to set up a sender reputation feature to comply with the Company.com security policy.

多选题You need to identify the features that will be available immediately after the domain migration to the new environment is complete. Which feature or features will be available?()AGlobal group nesting.BUniversal group nesting.CDomain local group nesting.DUniversal security groups.ESid history attributes.

单选题Which of the following Microsoft encryption software provides the HIGHEST level of security for PCs running Windows Vista Enterprise or Ultimate Vista?()ANTFSBWindows Defender for VistaCBitLocker drive encryptionDEFS

单选题The voice VLAN feature has been enabled on a new Company Catalyst switch port.  What is the  effect of this? ()AThe CoS is trusted for 802.1P or 802.1Q tagged traffic.BPortFast is disabled on the port.CPort Security is automatically enabled on a voice VLAN port.DUntagged traffic is sent according to the default CoS priority of the port.ENone of the other alternatives apply

多选题The PIX Security Appliance feature set is a subset of the ASA Security Appliance feature set. Which two of these features are only supported by an ASA Security Appliance? (Choose two.)()Asecurity contextsB- transparent firewallCWebVPNDActive/Active failoverElow latency queuingFAIP-SSM intrusion prevention

单选题In order to strengthen maritime security and prevent and suppress acts of terrorism against shipping, a new, comprehensive security regime for international shipping was set to enter into force in July 2004 The new regime is().AISM CodeBISPS CodeCFSS CodeDIBC Code

单选题You are the desktop administrator for one of your company's branch offices. The network in your branch office contains 100 Windows XP Professional computers. The computers are configured with the Compatws.inf security template. One of the network administrators in the company's main office creates a new security template named CompanySec.inf. The new template is designed to be applied to each of the company's Windows XP Professional computers. The users in your branch office have different security requirements from the users in the main office. You need to find out whether the new security template will violate the security requirements of the users in the branch office. What should you do?()ARun the Secedit.exe command in validation mode and specify the new security template.BRun the Secedit.exe command in configuration mode and specify the new security template. CUse the Security Configuration and Analysis console to import both templates into a security database, and then perform an Analyze operation. DUse the Security Configuration and Analysis console to import both templates into a security database, and then perform a Configure operation.

单选题The university started some new language programs to cater_______ the country's Silk Road Economic Belt.AforBwithCofDfrom

多选题Automatic Consumer Group Switching is an important new feature of the Database Resource Manager. Which three plan directive parameters are used to control this feature?()ASWITCH_TIMEBSWITCH_GROUPCMAX_SESS_POOLDSWITCH_ESTIMATE

单选题Your company has an Active Directory domain. The company runs Terminal Services. All client computers run Windows Vista Service Pack 1.  You need to ensure that users are able to run Windows Media Player 11 during a Terminal Services session.  What should you do?()AInstall the Desktop Experience feature on the Terminal Server.BInstall the Quality Windows Audio Video Experience feature on the Terminal Server.CCreate a new Group Policy object (GPO) by using the Desktop Window Manager template. Configure the Do not allow desktop composition option to True. Apply the GPO to all client computers in the domain.DCreate a new Group Policy object (GPO) that configures the Policy-based QoS option and set the Differential Services Code Point value to 10 for the Windows Media Player 11 executable. Apply the GPO to the Terminal Server.

单选题The purpose of the museum’s new programs is to show _____.Athe management of business by artistsBthe role of art in improving businessCthe education of modern artistsDthe way to design art programs

单选题Your company has client computers that run Windows Vista.   The company plans to upgrade the Windows Vista computers to Windows 7.   The current configuration of all client computers in your company is based on a common Windows Vista image.   Some branch offices use WAN connections to connect to the main office. You have the following requirements:   Transfer all user data from the original Windows Vista installation to the new Windows 7 installation.  Use the least amount of bandwidth while transferring the user data.  Support the same migration strategy for all offices.    You need to design a user state migration strategy that supports the requirements.   What should you do?()AUse the multicast feature of Windows Deployment Services (WDS)BUse the Deployment Image Servicing and Management (DISM) toolCUse the User State Migration Tool (USMT) and a hard-link migration storeDUse Windows PE to perform an offline migration

单选题You need to configure Active Directory to implement the new password policy for the HR department. What should you do?()ACreate a new child domain named hr.ad.margiestravel.com in the existing forest. Move the resources from the HR OU to this new domain. Add the appropriate security settings in the Default Domain Policy for this new domain.BAdd the appropriate security settings to the current Default Domain Policy.CAdd the appropriate security settings to the local security policy of SQL1.DSet the SQL server check_policy and check_expiration options to On when creating all user accounts.

单选题What can be inferred from Paragraph 3?AThe university system of the United States will completely collapse.BThe university system of the United States will be totally restructured.CThe new teacher education programs may not grant students academic degrees in the future.DThe new teacher education programs will follow the usual practice of other professional preparation.