Your network consists of a single Active Directory domain that contains two domain controllers. Both domain controllers run Windows Server 2003 Service Pack 2 (SP2).
Auditing of successful account logon events is enabled on all computers in the domain.
You need to identify the last time a specific user logged on to the domain.
What should you do?()
A. Examine the System Event Log on the user’s computer.
B. Examine the System Event Log on both domain controllers.
C. Examine the Security Event Log on both domain controllers.
D. Examine the Application Event Log on the user’s computer.
您可能感兴趣的试卷
你可能感兴趣的试题
Your network consists of a single Active Directory domain. All servers run Windows Server 2003
Service Pack 2 (SP2).
You enable auditing for failed logon attempts on all domain controllers.
You need to ensure that a record of failed logon attempts is retained for 90 days on all domain controllers.
What should you do?()
A. From the Security Templates snap-in, open the hisecdc template. Modify the Retain System Log setting.
B. From the Security Templates snap-in, open the securedc template. Modify the Retain Security Log setting.
C. Open the Default Domain Policy. Modify the Retain System Log setting.
D. Open the Default Domain Controller Policy. Modify the Retain Security Log setting.
Your network consists of a single Active Directory domain. All network servers run Windows Server
2003 Service Pack 2 (SP2).
The domain includes two global groups named ResearchManagers and ResearchUsers.
You create a share named ResearchData. On the ResearchData share, you assign the Change
permission to ResearchUsers and ResearchManagers.
The ResearchData folder contains a file named ResearchConfidential.rtf. The permissions for
ResearchConfidential.rtf are configured as shown in the exhibit. (Click the Exhibit button.)
Members of ResearchUsers report that when they try to open ResearchConfidential.rtf, they receive an
access denied message. Users report that they can add and modify other files in ResearchData.
You need to ensure that ResearchUsers members can open ResearchConfidential.rtf. The solution must
prevent ResearchUsers members from modifying the file.
What should you do?()
A. On ResearchData, enable permission inheritance.
B. On ResearchConfidential.rtf, enable permission inheritance.
C. On ResearchData, assign the Read permission to ResearchUsers.
D. On ResearchConfidential.rtf, assign the Read permission to ResearchUsers.
Your network consists of a single Active Directory domain. All network servers run Windows Server
2003 Service Pack 2 (SP2).
You create a folder named CorporateData. You share the folder as CorpData and assign the Change
permission to the Domain Users group.
In the CorporateData folder, you create a folder named HumanResources. On the HumanResources
folder, you assign the Modify permission to a global group named HRUsers. You share the
HumanResources folder as HRData.
You confirm that all users in the domain can view the files in the HRData share.
You need to ensure that only HRUsers and administrators can access files in the HRData share. The
solution must maintain user access to the CorpData share.
What should you do? ()
A. On the CorpData share, assign the Read permission to Domain Users.
B. On the CorpData share, remove Domain Users and assign the Change permission to HRUsers.
C. On the CorporateData folder, disable permission inheritance and remove the inherited permissions.
D. On the HumanResources folder, disable permission inheritance and remove the inherited permissions.
Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). The primary group for all users is Domain Users.
You share a folder named Data. The shared folder is located on a server named Server1.
A user in the Research group named User1 reports that she cannot access files in the Data shared folder.
You verify that User1 is not listed in the access control list of the shared folder.
You examine the properties of the User1 account. The properties are shown in the exhibit. (Click the
Exhibit button.)
Other members of the Research group can add and modify files in the Data shared folder.
You need to ensure that User1 can access files in the Data shared folder.
What should you do? ()
A. Remove User1 from the IT group.
B. Assign the Change permission to User1.
C. Remove User1 from the Domain Users group.
D. Add User1 to the Server Operators group on Server1.
Your network consists of a single Active Directory domain. All servers run Windows Server 2003
Service Pack 2 (SP2).
You have two global groups named Research and ResearchManagers. The Research group contains all
users in a department named Research. The ResearchManagers group contains all managers in the
Research department. All members of the ResearchManagers group are members of the Research
group.
You create a shared folder named Research. The permissions for the Research share are shown in the
exhibit. (Click the Exhibit button.)
You need to modify the share permissions to ensure that only members of the ResearchManagers group
can add and modify files over the network.
What should you do? ()
A. Remove the Domain Users group.
B. Change the permission assigned to the Research group to Allow - Read.
C. Remove the Research group. Change the Domain Users permission to Allow - Change.
D. Remove the Research group. Add the ResearchManagers group and assign the group Allow - Change permission.
Your network consists of a single Active Directory domain. The domain includes a group named
SalesUsers.
You have a file server that runs Windows Server 2003 Service Pack 2 (SP2).
The server has a folder named CorpData. You share the CorpData folder and assign the Domain Users
group the Full Control share permission.
In the CorpData folder, you create a folder named Sales.
You need to configure security for the Sales folder to meet the following requirements:
·Members of the SalesUsers group must be able to read, create, and modify all files and folders.
·All other users must be able to view items in the folder.
What should you do? ()
A. On the Sales folder, block permission inheritance and remove permissions. Assign the Allow - Modify permission to the SalesUsers group.
B. On the Sales folder, block permission inheritance and copy permissions. On the Sales folder, assign the Allow - Modify permission to the SalesUsers group.
C. On the CorpData share, change the share permission for Domain Users to Read. On the Sales folder, assign the Allow - Modify permissions to the SalesUsers group.
D. On the CorpData folder, block permission inheritance and remove permissions. In the Sales folder, assign the Allow - Modify permissions to the SalesUsers group.
Your network consists of a single Active Directory domain. All servers run Windows Server 2003
Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3).
On a file server, you have a shared folder named Data. The Data folder has the permissions shown in the following table.
You need to ensure that members of a group named Sales can modify content in the Data share. Sales group members must only be allowed to delete files that they create.
Which additional permission should you assign to the Sales group?()
A. On the Data folder, allow the Write permission.
B. On the Data folder, allow the Modify permission.
C. On the Data share, allow the Change permission.
D. On the Data share, allow the Full Control permission.
Your network consists of a single Active Directory domain. All servers run Windows Server 2003
Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3).
You have a user account named User1.
You need to identify which permissions User1 has on a file.
What should you do? ()
A. At a command prompt, run Net file.
B. At a command prompt, run Attrib.exe.
C. From the file properties, view the Summary settings.
D. From the file properties, view the Advanced Security settings.
最新试题
You are the network administrator for your company. All network servers runWindows Server 2003.You install and configure Software Update Services (SUS) on a server namedServer1. You configure the following settings:1. Do not use a proxy server for Internet access.2. Synchronize directly from the Microsoft Windows Update servers.3. Automatically approve new versions of previously approved updates.4. Save updates in a local folder.You back up the SUS configuration and schedule a daily synchronization procedurefor Server1.Later the same day, Server1 fails. You use the original names and locations torestore Windows Server 2003, IIS 6.0, and SUS.Now you need to fully restore the SUS configuration, without overwriting any otherdata.What should you do?()
You are the network administrator for The network consists of asingle Active Directory domain named All domain controllers runWindows Server 2003, and all client computers run Windows XP Professional. Eachdomain server has a locally attached tape device.You need to back up each domain controller. Your backup process must fulfil thefollowing requirements:a. System recovery must be possible in the event of server failure.b. The system configuration and all current dynamic disk configurations must bebacked up.c. Other data partitions do not need to be backed up.What should you do?()
You are the network administrator for the Beijing office of TestKing. A branchoffice is located in Cairo. The DNS servers in both locations run Windows Server2003.The network uses two DNS namespaces internally. They are namedpublishing.testking.com and testking.com. The locations of the primary nameservers are shown in the following table.The Beijing office contains some servers that are registered in the testking.com zoneand other that are registered in the publishing.testking.com zone. All computers inthe Beijing office are configured to use the local DNS server as their preferred DNSserver. The two offices are connected only by using a VPN through the Internet.Various network problems occasionally result in loss of connectivity between thetwo offices.Firewalls prevent the DNS servers in both offices from receiving queries from theInternet.You need to configure the DNS server in the Beijing office to allow successfulresolution of all queries from the Beijing office for names in thepublishing.testking.com namespace, even when the VPN link between the Beijingand Cairo offices fails.What should you configure on the DNS server in the Beijing office?()
You are the network administrator for TestKing. The network consists of a singleActive Directory domain.A member server named Testking1 runs Windows Server 2003 and SoftwareUpdate Services (SUS). You perform a full backup of Testking1 every night.Testking1 fails unexpectedly and cannot be restarted. As a result, automatic updatesare no longer distributed within the domain.You need to restore the functionality of Testking1.First, you install Windows Server 2003 on a new computer and configure it as amember server. You name the new computer Testking1 and install all IIScomponents that were installed on the original Testking1. Then you install SUS andobtain the most recent successful backup of the original Testking1.Which two additional actions should you perform?() (Each correct answer presentspart of the solution. Choose two.)
You are the administrator of a Windows Server 2003 computer named Testking1.An application on Testking1 gradually uses more and more memory until it causesTestking1 to stop responding. If you restart the application before it uses theavailable memory, there is no interruption of user services.You need to configure Testking1 to notify you when it encounters a low-memorycondition.What should you do?()
You are the domain administrator for TestKing's Active Directory domain. Allservers run Windows Server 2003. All client computers run Windows XPProfessional.A newly installed server was added to your domain. You need to administer thisserver remotely from your client computer.You need to configure the new server to ensure that it can be administeredremotely.What should you do?()
You are the network administrator for Test King. All network servers run WindowsServer 2003.You perform a full backup of the network every Monday. You perform incrementalbackups on Tuesday, Wednesday, Thursday, and Friday. Backups are alwaysperformed at 1:00 A.M.On Friday afternoon, a user accidentally deletes a file.You need to restore the file.What should you do?()
You are the network administrator for The network consists of a single Active Directory domain named.You configure a new Windows Server 2003 file server named TestKingSrv1.You restore user files from a tape backup, and you create a logon script that maps driveletters to shared files on TestKingSrv1.Users report that they cannot access TestKingSrv1 through the drive mappings youcreated. Users also report that TestKingSrv1 does not appear in My NetworkPlaces.You log on to TestKingSrv1 and confirm that the files are present and that theNTFS permissions and share permissions are correct. You cannot access anynetwork resources. You run the ipconfig command and see the following output.You need to configure the TCP/IP properties on TestKingSrv1 to resolve theproblem.What should you do?()
You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all client computers run Windows XP Professional.You are required to implement a backup strategy for all five servers on the network. You use the Backup Utility to schedule nightly backup jobs. You create a domain user account named BackupSvc, and add it to the local Backup Operators group on all file servers. The scheduled backup jobs will use BackupSvc to log on to the network Nightly backups occur successfully for six weeks. Then, nightly backups fail on all servers. When you examine the event log of one server, you discover that thepassword for BackupSvc is expired. You reset the password and select the Password never expires option for BackupSvc.The next day, you discover that the previous night's backup failed on all file servers.You need to ensure that the next night's backup is successful.Which two actions should you perform? (Each correct answer presents part of thesolution.() Choose two)
You are the network administrator for The network consists of asingle Active Directory domain named The domain contains WindowsServer 2003 computers and Windows XP Professional computers.All confidential company files are stored on a file server named TestKing1. Thewritten company security states that all confidential data must be stored andtransmitted in a secure manner. To comply with the security policy, you enableEncrypting File System (EFS) on the confidential files. You also add EFScertificates to the data decryption field (DDF) of the confidential files for the userswho need to access them.While performing network monitoring, you notice that the confidential files that arestored on TestKing1 are being transmitted over the network without encryption.You must ensure that encryption is always used when the confidential files onTestKing1 are stored and transmitted over the network.What are two possible ways to accomplish this goal?() (Each correct answer presentsa complete solution. Choose two)