单选题You need to identify each help desk user who bypasses the new corporate security policy. What should you do?()AConfigure Audit Special Logon and define Special Groups.BConfigure Audit Other Privilege Use Events and define Special Groups.CConfigure Audit Sensitive Privilege Use and configure auditing for the HelpDesk group.DConfigure Audit Object Access and modify the auditing settings for the HelpDesk group.
单选题
You need to identify each help desk user who bypasses the new corporate security policy. What should you do?()
A
Configure Audit Special Logon and define Special Groups.
B
Configure Audit Other Privilege Use Events and define Special Groups.
C
Configure Audit Sensitive Privilege Use and configure auditing for the HelpDesk group.
D
Configure Audit Object Access and modify the auditing settings for the HelpDesk group.
参考解析
解析:
暂无解析
相关考题:
A call logging process would be used by a technician in order to:() A. assign the appropriate status level for the problem.B. create records which enable user authentication.C. help maintain a balanced workload for the help desk technicians.D. identify common problems among many users.
You send a remote assistance invitation for help.You need to open a personal document without allowing the help desk to view the document. You also need to ensure that the remote assistance session remains connected.What should you do?()A.AB.BC.CD.D
You are a network administrator for Your network consists of a single Active Directory domain named All servers run Windows Server 2003.A help desk user reports that a user object was accidentally deleted and the user can no longer log on to the domain and access resources. You confirm that the user object was included in the most recent backup.You need to enable the user to log on to the domain. You must ensure that the user retains access to resources.What should you do?()A. Install a new domain controller. Install Active Directory from media by using the most recent backup. Manually initiate replication.B. Decrease the garbage collection interval. Perform a nonauthorative restoration of Active Directory by using the most recent backup.C. Perform a nonauthorative restoration of Active Directory by using the most recent backup. Authoritatively restore the user object that was deleted.D. Re-create a user object that has the same user principal name (UPN) as the user object that was deleted. Authoritatively restore this user object.
You are the network administrator for . All network servers run Windows Server 2003. A server named TestKing6 functions as a file server. All client computers run Windows XP Professional and are members of the domain. TestKing.com periodically hires temporary employees. You need to prepare a custom user profile for all temporary employees. You log on to a client computer as an administrator, and you configure the desktop settings. You copy the profile to a folder named //TestKing6/Profiles/Temp_profile. You rename the Ntuser.dat file in the //TestKing6/Profiles/Temp_profile folder to Ntuser.man. You create three new user accounts for the temporary employees. The user accounts are named temp_user1, temp_user2, and temp_user3. You need to configure the temporary user accounts to receive the new desktop settings that you created on TestKing6. The temporary employees must not be allowed to retain customized desktop settings? What should you do?()A、Specify a user profile path of //TestKing6/Profiles/username for each of the three user accounts.B、Specify a user profile path of //TestKing6/Profiles/username.man for each of the three user accounts.C、Specify a home folder path of //TestKing6/Profiles/username for each of the three user accounts.D、Specify a user profile path of //TestKing6/Profiles/Temp_profile for each of the three user accounts.E、Specify a user profile path of //TestKing6/Profiles/Temp_profile.man for each of the three user accounts.
A call logging process would be used by a technician in order to:()A、assign the appropriate status level for the problem.B、create records which enable user authentication.C、help maintain a balanced workload for the help desk technicians.D、identify common problems among many users.
Your network contains an Active Directory domain. The domain contains three domain controllers. One of the domain controllers fails. Seven days later, the help desk reports that it can no longer create user accounts. You need to ensure that the help desk can create new user accounts. Which operations master role should you seize()A、domain naming masterB、infrastructure masterC、primary domain controller (PDC) emulatorD、RID masterE、schema master
You are the network administrator for Blue Yonder Airlines. You plan to create an Active Directory domain named blueyonderairlines.com that will have a functional level of Windows Server 2003. Your company has one main office and four branch offices, which are all located in one country. A central security department in the main office is responsible for creating and administering all user accounts in all offices. Each office has a local help desk department that is responsible for resetting passwordswithin the individual department’s office only. All user accounts are located in the default Users container. You need to create an organizational unit (OU) structure to support the delegation of authority requirements. You want to minimize the amount of administrative effort required to maintain the environment. What should you do?()A、 Create a toplevel OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a separate child OU for each office under BlueYonderAirlines_Users. Move the user accounts of all employees in each office to the child OU for that office.B、 Create a toplevel OU named Main_Office under the blueyonderairlines.com domain. Move the user accounts of all users in the main office to the Main_Office OU.Create a separate child OU for each branch office under the Main_Office OU. Move the user accounts of all users in each branch office to the child OU for that office.C、 Create a toplevel OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a child OU named Central_Security under BlueYonderAirlines_Users. Move the user accounts of the central security department users to the Central_Security OU.Create a child OU named Help_Desk under BlueYonderAirlines_Users. Move the user accounts of the help desk users to the Help_Desk OU.D、 Create a toplevel OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a child OU named Central_Security under BlueYonderAirlines_Users. Move the user accounts of the central security department users to the Central_Security OU.Create a separate child OU under BlueYonderAirlines_Users for each office. Move the user accounts of the help desk users in each office to the child OU for that office.
You are creating a Windows Forms application by using the .Net Framework 3.5.You plan to display detailed help instructions for each control in the form.You create a help file.You configure a HelpProvider component on the form.You need to display the help file for the control that is focused when the F1 key is pressed.Which method of the HelpProvider class should you call for each control?()A、SetShowHelpB、SetHelpStringC、SetHelpKeywordD、SetHelpNavigator
You create 200 new user accounts. The users are located in six different sites. New users report that they receive the following error message when they try to log on: "The username or password is incorrect." You confirm that the user accounts exist and are enabled. You also confirm that the user name and password information supplied are correct. You need to identify the cause of the failure. You also need to ensure that the new users are able to log on Which utility should you run()A、RsdiagB、RstoolsC、RepadminD、Active Directory Domains and Trusts
You need to recommend an administrative solution for the help desk technicians that meets the museum’s technical requirements What should you recommend?()A、Add the help desk technicians to the Domain Admins group.B、Add the help desk technicians to the Accounts Operators group.C、Assign permissions for the Groups OU and the Branch1 OU to the help desk technicians.D、Assign permissions for the domain object and the Users container to the help desk technicians.
You need to identify each help desk user who bypasses the new corporate security policy. What should you do?()A、Configure Audit Special Logon and define Special Groups.B、Configure Audit Other Privilege Use Events and define Special Groups.C、Configure Audit Sensitive Privilege Use and configure auditing for the HelpDesk group.D、Configure Audit Object Access and modify the auditing settings for the HelpDesk group.
You are the network administrator for The network consists of a single Active Directory domain named The functional level of the domain is Windows Server 2003. Some user accounts have expiring passwords and some do not. You need to identify all user accounts that do not have expiring passwords. You need to modify the password property to allow the passwords on these accounts to expire. You must complete this task by using the minimum amount of administrative effort. First, you create a saved query to obtain a list of all user accounts that do not have expiring passwords. What should you do next?()A、Export the query results to a comma-delimited file. Use a CSVDE script to modify the password property of each user account.B、From the Results pane of the query, select all user accounts and modify their password properties simultaneously.C、Export the query results to a comma-delimited file. Use an LDIFDE script to modify the password property of each user account.D、From the Results pane of the query, select each user account and modify the password property, one by one.
单选题A user receives a call from someone reporting to be from the help desk who asks for their password. The user discovers later that the caller did not work for the help desk. Which of the following describes this type of exploit?()APhishing scamBSocial engineeringCMan-in-the-MiddleDShoulder surfing
单选题You are the help desk manager for your company. The company network consists of a single Active Directory domain. All client computers run Windows XP Professional. All help desk technicians are members of the Help Desk Technicians group. They use Remote Assistance to remotely control user sessions to provide online support and training to users. The users currently use Windows Messenger to submit Remote Assistance invitations to the help desk technicians. You want to reduce the time required for help desk technicians to respond to Remote Assistance requests. To accomplish this goal, you want to configure the client computers to allow help desk technicians to establish a Remote Assistance session with a client computer without requiring an invitation from a user. What should you do?()AIn the Default Domain Policy, set the Remote Assistance - Solicited Remote Assistance policy setting to Disabled. BIn the Default Domain Policy, set the Remote Assistance - Offer Remote Assistance policy setting to Enabled and add the Help Desk Technicians group to the Helpers list. CIn each computer's Local Security Policy, grant the Help Desk Technicians group the Allow logon through Terminal Services user right. DIn the System properties for each computer, select the Allow users to connect remotely to this computer option, and add the Help Desk Technicians group to the list of allowed users.
单选题You are the network administrator for Blue Yonder Airlines. You plan to create an Active Directory domain named blueyonderairlines.com that will have a functional level of Windows Server 2003. Your company has one main office and four branch offices, which are all located in one country. A central security department in the main office is responsible for creating and administering all user accounts in all offices. Each office has a local help desk department that is responsible for resetting passwordswithin the individual department’s office only. All user accounts are located in the default Users container. You need to create an organizational unit (OU) structure to support the delegation of authority requirements. You want to minimize the amount of administrative effort required to maintain the environment. What should you do?()A Create a toplevel OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a separate child OU for each office under BlueYonderAirlines_Users. Move the user accounts of all employees in each office to the child OU for that office.B Create a toplevel OU named Main_Office under the blueyonderairlines.com domain. Move the user accounts of all users in the main office to the Main_Office OU.Create a separate child OU for each branch office under the Main_Office OU. Move the user accounts of all users in each branch office to the child OU for that office.C Create a toplevel OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a child OU named Central_Security under BlueYonderAirlines_Users. Move the user accounts of the central security department users to the Central_Security OU.Create a child OU named Help_Desk under BlueYonderAirlines_Users. Move the user accounts of the help desk users to the Help_Desk OU.D Create a toplevel OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a child OU named Central_Security under BlueYonderAirlines_Users. Move the user accounts of the central security department users to the Central_Security OU.Create a separate child OU under BlueYonderAirlines_Users for each office. Move the user accounts of the help desk users in each office to the child OU for that office.
单选题You have an Exchange Server 2010 organization. You have a group named Help Desk that contains all the help desk users in the organization. You need to ensure that the Help Desk group can manage all the mailboxes and mail-enabled contacts in the organization. The solution must minimize the number of permissions assigned to the Help Desk group. Which management role should you assign to the Help Desk group?()AMail RecipientsBMail Recipient CreationCOrganization Client AccessDRecipient Policies
单选题You are the network administrator for your company. The network consists of a single Active Directorydomain. The functional level of the domain is Windows Server 2003.Some user accounts have expiring passwords and some do not. You need to identify all user accounts that do not have expiring passwords. You need to modify the passwordproperty to allow the passwords on these accounts to expire. You must complete this task by using the minimum amount of administrative effort.First, you create a saved query to obtain a list of all user accounts that do not have expiring passwords.What should you do next? ()AExport the query results to a comma-delimited file. Use a CSVDE script to modify the password property of each user account.BFrom the Results pane of the query, select all user accounts and modify their password properties simultaneously.CExport the query results to a comma-delimited file. Use an LDIFDE script to modify the password property of each user account.DFrom the Results pane of the query, select each user account and modify the password property, one by one.
单选题You are a security administrator for your company. The network consists of a single Active Directory domain. Servers run either Windows Server 2003 or Windows 2000 Server. All client computers run Windows XP Professional. The company’s written security policy states that user accounts must be locked if an unauthorized user attempts to guess the users, passwords. The current account policy locks out a user after two invalid password attempts in five minutes. The user remains locked out until the account is reset by an administrator. Users frequently call the help desk to have their account unlocked. Calls related to account lockout constitute 25 percent of help desk calls. You need to reduce the number of help desk calls related to account lockout. What should you do?()A Modify the Default Domain Controllers Policy Group Policy object(GPO). Increase the maximum lifetime for serviceB Modify the Default Domain Policy Group Policy object(GPO). Configure an account lockout threshold of 10.C Modify the Default Domain Controllers Policy Group Policy object(GPO). Disable the enforcement of user logon resD Modify the Default Domain Policy Group Policy object(GPO). Increase the minimum password age.
单选题You send a remote assistance invitation for help. You need to open a personal document without allowing the help desk to view the document. You also need to ensure that the remote assistance session remains connected. What should you do? ()APress the ESC key.BClick the Pause option.CClick the Stop Sharing option.DMinimize the remote assistance session window.
单选题You need to identify which tool the help desk users must use to perform administrative tasks. Which tool should you identify?()ARemoteAppBRemote AssistanceCRemote DesktopDRemote Server Administration Tools (RSAT)
单选题You are a network administrator for Your network consists of a single Active Directory domain named All servers run Windows Server 2003. A help desk user reports that a user object was accidentally deleted and the user can no longer log on to the domain and access resources. You confirm that the user object was included in the most recent backup. You need to enable the user to log on to the domain. You must ensure that the user retains access to resources. What should you do?()AInstall a new domain controller. Install Active Directory from media by using the most recent backup. Manually initiate replication.BDecrease the garbage collection interval. Perform a nonauthorative restoration of Active Directory by using the most recent backup.CPerform a nonauthorative restoration of Active Directory by using the most recent backup. Authoritatively restore the user object that was deleted.DRe-create a user object that has the same user principal name (UPN) as the user object that was deleted. Authoritatively restore this user object.
单选题You are the network administrator for The network includes three office locations. Each office has one Windows Server 2003 computer that functions as a file and print server. This server hosts home folders for network users. In each office, a single printer is installed on the file and print server. The local help desk technicians have the necessary permissions to manage printers. A user named King notifies the local help desk that his documents are not printing. A help desk technician finds a list of documents waiting in the print queue. No user can successfully print. The technician cannot delete documents from the queue. You need to restore printing capabilities. What should you do?()AInstall a second instance of the printer. Redirect the original printer to the new printer.BStop and restart the Print Spooler service. Ask users to resubmit the documents for printing.CPause the printer. Reconfigure the print queue to hold mismatched documents. Unpause the printer.DInstall a second instance of the printer. Delete the original printer. Direct King to resubmit the documents for printing.