Your network consists of a single Active Directory domain. All servers run Windows Server 2003
Service Pack 2 (SP2).
You enable auditing for failed logon attempts on all domain controllers.
You need to ensure that a record of failed logon attempts is retained for 90 days on all domain controllers.
What should you do?()
A. From the Security Templates snap-in, open the hisecdc template. Modify the Retain System Log setting.
B. From the Security Templates snap-in, open the securedc template. Modify the Retain Security Log setting.
C. Open the Default Domain Policy. Modify the Retain System Log setting.
D. Open the Default Domain Controller Policy. Modify the Retain Security Log setting.
您可能感兴趣的试卷
你可能感兴趣的试题
Your network consists of a single Active Directory domain. All network servers run Windows Server
2003 Service Pack 2 (SP2).
The domain includes two global groups named ResearchManagers and ResearchUsers.
You create a share named ResearchData. On the ResearchData share, you assign the Change
permission to ResearchUsers and ResearchManagers.
The ResearchData folder contains a file named ResearchConfidential.rtf. The permissions for
ResearchConfidential.rtf are configured as shown in the exhibit. (Click the Exhibit button.)
Members of ResearchUsers report that when they try to open ResearchConfidential.rtf, they receive an
access denied message. Users report that they can add and modify other files in ResearchData.
You need to ensure that ResearchUsers members can open ResearchConfidential.rtf. The solution must
prevent ResearchUsers members from modifying the file.
What should you do?()
A. On ResearchData, enable permission inheritance.
B. On ResearchConfidential.rtf, enable permission inheritance.
C. On ResearchData, assign the Read permission to ResearchUsers.
D. On ResearchConfidential.rtf, assign the Read permission to ResearchUsers.
Your network consists of a single Active Directory domain. All network servers run Windows Server
2003 Service Pack 2 (SP2).
You create a folder named CorporateData. You share the folder as CorpData and assign the Change
permission to the Domain Users group.
In the CorporateData folder, you create a folder named HumanResources. On the HumanResources
folder, you assign the Modify permission to a global group named HRUsers. You share the
HumanResources folder as HRData.
You confirm that all users in the domain can view the files in the HRData share.
You need to ensure that only HRUsers and administrators can access files in the HRData share. The
solution must maintain user access to the CorpData share.
What should you do? ()
A. On the CorpData share, assign the Read permission to Domain Users.
B. On the CorpData share, remove Domain Users and assign the Change permission to HRUsers.
C. On the CorporateData folder, disable permission inheritance and remove the inherited permissions.
D. On the HumanResources folder, disable permission inheritance and remove the inherited permissions.
Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). The primary group for all users is Domain Users.
You share a folder named Data. The shared folder is located on a server named Server1.
A user in the Research group named User1 reports that she cannot access files in the Data shared folder.
You verify that User1 is not listed in the access control list of the shared folder.
You examine the properties of the User1 account. The properties are shown in the exhibit. (Click the
Exhibit button.)
Other members of the Research group can add and modify files in the Data shared folder.
You need to ensure that User1 can access files in the Data shared folder.
What should you do? ()
A. Remove User1 from the IT group.
B. Assign the Change permission to User1.
C. Remove User1 from the Domain Users group.
D. Add User1 to the Server Operators group on Server1.
Your network consists of a single Active Directory domain. All servers run Windows Server 2003
Service Pack 2 (SP2).
You have two global groups named Research and ResearchManagers. The Research group contains all
users in a department named Research. The ResearchManagers group contains all managers in the
Research department. All members of the ResearchManagers group are members of the Research
group.
You create a shared folder named Research. The permissions for the Research share are shown in the
exhibit. (Click the Exhibit button.)
You need to modify the share permissions to ensure that only members of the ResearchManagers group
can add and modify files over the network.
What should you do? ()
A. Remove the Domain Users group.
B. Change the permission assigned to the Research group to Allow - Read.
C. Remove the Research group. Change the Domain Users permission to Allow - Change.
D. Remove the Research group. Add the ResearchManagers group and assign the group Allow - Change permission.
Your network consists of a single Active Directory domain. The domain includes a group named
SalesUsers.
You have a file server that runs Windows Server 2003 Service Pack 2 (SP2).
The server has a folder named CorpData. You share the CorpData folder and assign the Domain Users
group the Full Control share permission.
In the CorpData folder, you create a folder named Sales.
You need to configure security for the Sales folder to meet the following requirements:
·Members of the SalesUsers group must be able to read, create, and modify all files and folders.
·All other users must be able to view items in the folder.
What should you do? ()
A. On the Sales folder, block permission inheritance and remove permissions. Assign the Allow - Modify permission to the SalesUsers group.
B. On the Sales folder, block permission inheritance and copy permissions. On the Sales folder, assign the Allow - Modify permission to the SalesUsers group.
C. On the CorpData share, change the share permission for Domain Users to Read. On the Sales folder, assign the Allow - Modify permissions to the SalesUsers group.
D. On the CorpData folder, block permission inheritance and remove permissions. In the Sales folder, assign the Allow - Modify permissions to the SalesUsers group.
Your network consists of a single Active Directory domain. All servers run Windows Server 2003
Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3).
On a file server, you have a shared folder named Data. The Data folder has the permissions shown in the following table.
You need to ensure that members of a group named Sales can modify content in the Data share. Sales group members must only be allowed to delete files that they create.
Which additional permission should you assign to the Sales group?()
A. On the Data folder, allow the Write permission.
B. On the Data folder, allow the Modify permission.
C. On the Data share, allow the Change permission.
D. On the Data share, allow the Full Control permission.
Your network consists of a single Active Directory domain. All servers run Windows Server 2003
Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3).
You have a user account named User1.
You need to identify which permissions User1 has on a file.
What should you do? ()
A. At a command prompt, run Net file.
B. At a command prompt, run Attrib.exe.
C. From the file properties, view the Summary settings.
D. From the file properties, view the Advanced Security settings.
Your network consists of a single Active Directory domain. You have a terminal server that runs
Windows Server 2003 Service Pack 2 (SP2).
You need to prevent users from establishing multiple Remote Desktop connections to the server.
What should you do?()
A. Install and configure Terminal Server Licensing.
B. From Terminal Services Manager, modify the user sessions.
C. From Terminal Services Configuration, modify the server settings.
D. From Active Directory Users and Computers, modify the Sessions settings for each user account.
最新试题
You are the network administrator for TestKing. The network contains a WindowsServer 2003 computer named testking1, which hosts a critical business applicationnamed Salesapp. Testking1 has one disk that contains a single NTFS volume.Five days ago, the System State of testking1 was backed up, and an AutomatedSystem Recovery (ASR) backup was created. No additional backups wereperformed. Subsequently, many changes were made to the Salesapp data files.You apply an update to the application, which requires you to restart testking1.Windows startup terminates with a Stop error. You restart the computer and bootto a floppy disk. A utility on this disk gives you read-only access to the NTFS filesystem. You discover that one of the .dll files for the Salesapp application iscorrupted. The corrupted file is stored in the C.\Windows\System32 folder.You need to restore the corrupted file. You need to avoid losing any changes madeto the data files on testking1.What should you do onTestKing1?()
You are the network administrator for The network consists of asingle DNS domain named.You replace a UNIX server with a Windows Server 2003 computer namedTestKing1.TestKing1 is the DNS server and start authority (SOA) for testking.com. A UNIXserver named TestKing2 is the mail server for testking.com.You receive reports that Internet users cannot send e-mail to the testking.comdomain. The host addresses are shown in the following window.You need to ensure that Internet users can send e-mail to the testking.com domain.What should you do?()
You are the network administrator for TestKing. You manage a Windows Server2003 computer named TestKing4 that functions as an application server.TestKing4 will be used for development during the next 30 days. You need to backup all data on TestKing4 every day for the next 30 days.You need to automate the backups of TestKing4 to meet these businessrequirements. You want to achieve this goal by using the minimum amount ofadministrative effort.What should you do?()
You are the network administrator for the Beijing office of TestKing. A branchoffice is located in Cairo. The DNS servers in both locations run Windows Server2003.The network uses two DNS namespaces internally. They are namedpublishing.testking.com and testking.com. The locations of the primary nameservers are shown in the following table.The Beijing office contains some servers that are registered in the testking.com zoneand other that are registered in the publishing.testking.com zone. All computers inthe Beijing office are configured to use the local DNS server as their preferred DNSserver. The two offices are connected only by using a VPN through the Internet.Various network problems occasionally result in loss of connectivity between thetwo offices.Firewalls prevent the DNS servers in both offices from receiving queries from theInternet.You need to configure the DNS server in the Beijing office to allow successfulresolution of all queries from the Beijing office for names in thepublishing.testking.com namespace, even when the VPN link between the Beijingand Cairo offices fails.What should you configure on the DNS server in the Beijing office?()
You are the network administrator for TestKing. The network consists of a singleActive Directory domain. All network servers run Windows Server 2003 and allclient computers run Windows XP Professional.Terminal Services is installed on a member server named Testking1. Currently, 30active terminal server sessions are connected to Testking1. An unforeseen hardwareupgrade will require shutting down the server.You need to provide a two-minute warning about the shutdown to all activeterminal sessions.First, you log on to Testking1 as an administrator.What should you do next?()
You are the network administrator for All network severs runWindows Server 2003. Business hours are 9:00 A.M. to 5:00 P.M., Monday throughFridayA file server named TestKingB is configured to create a shadow copy every morningat 1:00 A.M. TestKingB hosts several shared folders. One shared folder has theconfiguration shown in the following table.For several months, users frequently access both databases in TestKingOrders. OneMonday morning, a user tells you that she needs to edit Receivables.mdb as itexisted at 5:00 P.M. on the previous Thursday.You need to modify TestKingB to enable the appropriate editing. You must ensurethat other users can continue to access current data without interruption.First, you map a drive to \\TestKingB\TestKingOrders.Which two additional actions should you perform? ()(Each correct answer presentspart of the solution. Choose two)
You are the administrator of a Windows Server 2003 computer named Testking1.An application on Testking1 gradually uses more and more memory until it causesTestking1 to stop responding. If you restart the application before it uses theavailable memory, there is no interruption of user services.You need to configure Testking1 to notify you when it encounters a low-memorycondition.What should you do?()
You are the network administrator for your company. All network servers runWindows Server 2003.You install and configure Software Update Services (SUS) on a server namedServer1. You configure the following settings:1. Do not use a proxy server for Internet access.2. Synchronize directly from the Microsoft Windows Update servers.3. Automatically approve new versions of previously approved updates.4. Save updates in a local folder.You back up the SUS configuration and schedule a daily synchronization procedurefor Server1.Later the same day, Server1 fails. You use the original names and locations torestore Windows Server 2003, IIS 6.0, and SUS.Now you need to fully restore the SUS configuration, without overwriting any otherdata.What should you do?()
You are the network administrator for The network consists of asingle Active Directory domain named All network servers runWindows Server 2003.Confidential files are stored on a member server named TK1. The computer objectfor TK1 resides in an organizational unit (OU) named Confidential. A Group Policyobject (GPO) named GPO1 is linked to the Confidential OU.To audit access to the confidential files, you enable auditing on all private folders onTK1.Several days later, you review the audit logs. You discover that auditing is notsuccessful.You need to ensure that auditing occurs successfully.What should you do?()
You are the network administrator in the New York office of TestKing.The company network consists of a single Active Directory domain The New York office currently contains one Windows Server 2003 file server named TestKingA.All file servers in the New York office are in an organizational unit (OU) namedNew York Servers. You have been assigned the Allow - Change permission for aGroup Policy object (GPO) named NYServersGPO, which is linked to the NewYork Servers OU.The written company security policy states that all new servers must be configuredwith specified predefined security settings when the servers join the domain. Thesesettings differ slightly for the various company offices.You plan to install Windows Sever 2003, on 15 new computers, which all functionsas file servers. You will need to configure the specified security settings on the newfile servers.TestKingA currently has the specified security settings configured in its localsecurity policy. You need to ensure that the security configuration of the new fileservers is identical to that of TestKingA. You export a copy of TestKingA's localsecurity policy settings to a template file.You need to configure the security settings of the new servers, and you want to usethe minimum amount of administrative effort.What should you do?()