单项选择题

You are the administrator of 10 Windows XP Professional computers for your company. The computers are members of a Windows 2000 domain. Because the computers are used in a public area in the cafeteria, you audit all security events on the computers. A user named Marc reports that he was using one of the Windows XP Professional computers when the computer suddenly shut down with a STOP error. When the computer restarted, Marc attempted to log on by using the same user name and password that he used before. Marc received the following error message: "Your account is configured to prevent you from using this computer. Please try another computer." Marc states that he did not do anything to cause the STOP error to occur. You want to ensure that Marc can use this computer.
What should you do?() 

A.On the computer, save and clear the security log, set the CrashOnAuditFail setting to 1, and restart the computer. 
B.On the computer, modify the local audit policy so that system events are not audited, set the CrashOnCtrlScroll setting to 1, and restart the computer. 
C.In the domain, modify Marc's Logon Workstations list to include the name of the computer.
D.In the domain, modify Marc's account properties to unlock the account. 


您可能感兴趣的试卷

你可能感兴趣的试题

1.单项选择题

You are the administrator of 30 Windows XP Professional computers. The computers are not members of a domain. Users of the Windows XP Professional computers encrypt files on the local computers. A user named Stephen reports that he cannot remember his current password. However, he does remember his previous password. Before he changed to his current password, Stephen created a password reset disk. You want to ensure that Stephen can log on to his Windows XP Professional computer again, and that he can open the encrypted files.
What should you do?() 

A.Reset Stephen's password and instruct Stephen to log on with the new password.
B.Reset Stephen's password and then use the password reset disk.
C.Instruct Stephen to log on with his previous password. 
D.Instruct Stephen to use the password reset disk to set a new password on his account.
E.Use the Forgotten Password Wizard to create a new password reset disk for Stephen.
F.Use this disk to set a new password on Stephen's account.

3.单项选择题

You are the desktop administrator for one of your company's branch offices. The network in your branch office contains 100 Windows XP Professional computers. The computers are configured with the Compatws.inf security template. One of the network administrators in the company's main office creates a new security template named CompanySec.inf. The new template is designed to be applied to each of the company's Windows XP Professional computers. The users in your branch office have different security requirements from the users in the main office. You need to find out whether the new security template will violate the security requirements of the users in the branch office.
What should you do?()

A.Run the Secedit.exe command in validation mode and specify the new security template.
B.Run the Secedit.exe command in configuration mode and specify the new security template. 
C.Use the Security Configuration and Analysis console to import both templates into a security database, and then perform an Analyze operation. 
D.Use the Security Configuration and Analysis console to import both templates into a security database, and then perform a Configure operation. 

4.多项选择题

You are the desktop administrator for your company. The company's network contains 500 Windows XP Professional computers. The information security department releases a new security template named NewSec.inf. You import NewSec.inf into a security database named NewSec.sdb. You analyze the result, and you review the changes that the template makes. You examine the security policies that are defined in NewSec.inf. You discover that the settings in NewSec.inf have not been implemented on your computer. You need to ensure that the settings in NewSec.inf overwrite the settings in your computer's local security policy.
What are two possible ways to achieve this goal?()

A.Run the Secedit /configure /db C:\NewSec.sdb command.
B.Run the Secedit /refreshpolicy machine_policy command.
C.Copy NewSec.inf to the C:\Windows\Inf folder. 
D.Copy NewSec.sdb to the C:\Windows\System32\Microsoft\Protect folder. 
E.Use the Security Configuration and Analysis console to open NewSec.sdb and then to perform a Configure operation. 
F.Use the Security Configuration and Analysis console to export NewSec.sdb to the Defltwk.inf security template. 

5.单项选择题

You are the desktop administrator for your company. The company's network consists of a single Microsoft Windows NT domain. The network contains 2,000 Windows XP Professional computers. 
The information security department releases a new security template named NewSecurity.inf. You are instructed to apply the new template to all 2,000 Windows XP Professional computers. You use the Security Configuration and Analysis console to import NewSecurity.inf into a security database named NewSec.sdb. You copy NewSec.sdb to a folder named Sec on a server named Server1. You need to apply NewSecurity.inf to the Windows XP Professional computers.
What should you do?() 

A.Use the Security Configuration and Analysis console to export a template named NewSec.inf from NewSec.sdb. Copy NewSec.inf to each client computer. 
B.Write a logon script that copies NewSec.sdb to the %systemroot%\System32 folder on each client computer. 
C.Copy NewSec.sdb to the Netlogon shared folder on each domain controller. 
D.Write a logon script that runs the Secedit /configure /db \\Server1\Sec\NewSec.sdb command. Apply the logon script to all domain user accounts. 

6.单项选择题

You are the desktop administrator for Contoso, Ltd. The company's network contains 1,000 Windows XP Professional computers, which are members of a single Active Directory domain. The computers' hard disks are formatted as NTFS. The company's software developers release a new custom application. The application uses a .dll file named AppLib.dll, which is installed in a folder named \Program Files\Contoso\OpsApp. The company's help desk technicians report that several users experience problems when they use the application because the AppLib.dll file was deleted on their client computers. The company's software developers recommend that you modify the file permissions on AppLib.dll so that users have only Read permission on the file. You need to ensure that all users have only Read permission on the AppLib.dll file on all 1,000 Windows XP Professional computers.
What should you do?() 

A.Write a logon script that moves the AppLib.dll file into the %systemroot%\System32 folder.
B.Ensure that Windows File Protection is enabled on all 1,000 Windows XP Professional computers.
C.Apply the logon script to all domain user accounts. 
D.Use the Security Configuration and Analysis console to create a new security template that modifies the file permissions on AppLib.dll. 
E.Use Active Directory Group Policy to import and apply the template to all 1,000 Windows XP Professional computers. 
F.Repackage the custom application in a Windows Installer package. 

7.单项选择题

You are the desktop administrator for one of your company's branch offices. The network in the branch office contains 20 Windows XP Professional computers. Windows XP Professional was installed on the computers by using a RIS image. The computers also use a security template named Standard.inf, which you created and applied to the computers. The company's information security department releases a new security template named Corporate.inf. You are instructed to apply Corporate.inf to all 20 Windows XP Professional computers in your office. You are also instructed to make a list of all policies that are defined in Corporate.inf but that are not already enforced on the Windows XP Professional computers. You import Corporate.inf into the Security Configuration and Analysis console on your Windows XP Professional computer. The analysis is shown in the exhibit.

You need to document the security policies that will be enforced for the first time when Corporate.inf is applied to the computers in your office.
Which policies should you document?()

A.the policies that are displayed with an X or an exclamation point in the analysis
B.the policies that are displayed with a check mark in the analysis 
C.the policies that are displayed as Enabled in the Computer Setting column
D.the policies that are displayed as Disabled in the Computer Setting column

8.单项选择题

You are the administrator of the Windows XP Professional portable computers that are used by your company's sales representatives. The computers are members of a Windows 2000 domain. A Windows 2000 Server computer named Server1 contains the sales data used by the sales representatives in a shared folder named Data. When sales representatives travel, they use the Offline Files feature to access the files in the \\Server1\Data shared folder. You want to ensure that the offline files on the portable computers are not accessible by unauthorized persons, in the event that a portable computer is lost.
What should you do?() 

A.Instruct the sales representatives to configure the permissions on the offline files on their portable computers to allow access for only their user accounts. 
B.On Server1, configure the permissions on all files in the Data shared folder to allow access for only the sales representatives. 
C.Use a Group Policy object (GPO) to enable the Encrypt the Offline Files cache option for the portable computers. 
D.On the portable computers, enable encryption of the %systemroot%\CSC folder.
E.Apply this setting to the folder and files in the CSC folder.
F.On Server1, encrypt all files in the Data shared folder. 

9.单项选择题

You are a help desk technician for your company. All users have Windows XP Professional computers. Ten users run a custom application named Finance on their computers. Finance stores user passwords in a file named Passwords.ini. By default, the Passwords.ini file is stored in a folder named C:\Winnt\App1.  The location and name of the file can be changed by an administrator. Each Passwords.ini file is unique. Each computer contains a single logical drive, which is drive C and is formatted as NTFS. In order to comply with a new company security policy, you need to ensure that the Passwords.ini files are encrypted.
What should you do?()

A.In the properties of the C:\Winnt\App1 folder, use Windows Explorer to select the option to encrypt the contents of the folder. Accept the default settings on the Confirm Attributes Changes dialog box. 
B.Ask a network administrator to share a new encrypted folder named PassFiles on a network server and to permit users to read the files contained within the folder. Copy the Passwords.ini file from each computer into the PassFiles folder. On each computer, configure Finance to use the Passwords.ini file in the PassFiles folder.
C.Create a folder named C:\Files. Copy the Passwords.ini file to the C:\Files folder. In the properties of the C:\Files folder, select the option to encrypt the contents of the folder. Accept the default settings on the Confirm Attributes Changes dialog box. Configure Finance to use the C:\Files\Passwords.ini file. 
D.Create a folder named C:\Files. Move the Passwords.ini file to the C:\Files folder. Instruct the user of each computer to open the properties of the C:\Files folder and select the option to encrypt the contents of the folder. Accept the default settings on the Confirm Attributes Changes dialog box. Configure Finance to use the C:\Files\Passwords.ini file. 

10.单项选择题

You are the administrator of a Windows XP Professional computer named Pro1.  The computer is connected to the Internet. Pro1 provides Internet access to eight other Windows XP Professional computers that are connected to Pro1. You enable Internet Connection Sharing (ICS) and Internet Connection Firewall (ICF) on Pro1. You run an application named App1 on Pro1.  App1 communicates with an online training company on the Internet. In order to display an online seminar, the training company needs to contact the App1 application at port 5800. You want to ensure that the training company can connect to the App1 application.
What should you do?()

A.Configure ICF to enable the Internet Control Message Protocol (ICMP) Allow redirect option. Then start the App1 application that opens port 5800.  
B.Create a new service definition named App1.  Use port 5800 as the external and internal port number. 
C.Edit the %systemroot%\System32\Drivers\Etc\Services file on Pro1 to include a service definition named App1 for port 5800.  
D.Change the TCP/IP settings on Pro1 to enable TCP/IP filtering. Permit network traffic on port 5800. 

最新试题

You network contains a server named Server1. You have a computer named Computer1 that runs Windows XP Professional. Employees log on to Computer1 by using local user accounts. You need to configure the user profiles on Computer1 to be stored on Server1.What should you do?() 

题型:单项选择题

You need to prevent users from storing cookies that come from the www.contoso.com Web site. The solution must allow users to browse to the www.contoso.com Web site. What should you do?()

题型:单项选择题

You network contains a Web site named www.contoso.com. The Web site is configured as shown in the exhibit.Your user account has write permissions to the c:\inetpub\wwwroot folder on the Web server. You need to copy files to www.contoso.com.What should you do first?() 

题型:单项选择题

You network contains two domains named contoso.com and nwtraders.com. A single DNS server hosts both DNS zones. The DNS server has an IP address of 10. 10. 0. 10.  You have 100 computers that run Windows XP Professional. The computers are members of the contoso.com domain. All computers have static IP addresses. The network does not contain a WINS server. You need to ensure that users can access servers in both domains by using single-label host names.What should you do on the client computers?() 

题型:单项选择题

You have a computer that runs Windows XP Professional Service Pack 2 (SP2). A remote user has a computer that runs Windows XP Professional SP2. The remote user experiences several errors while attempting to install an application. You need to remotely observe the actions the user performs.What should you do first?() 

题型:单项选择题

Your network contains a Web server named server1. contoso.com. All client computers on the network run Windows XP Professional. Server1. contoso.com is located in a remote site. You suspect a communication problem between a computer and server1. contoso.com. You need to view the amount of packet loss occurring on each network segment between the computer and server1. contoso.com.What should you do?() 

题型:单项选择题

You have a computer that runs Windows XP Professional. Two users named User1 and User2 share the computer. User1 and User2 encrypt files on the computer. User1 encrypts a file named file1. doc. You need ensure that both User1 and User2 can view the contents of file1. doc.What should you instruct User1 to do?() 

题型:单项选择题

You have a computer that runs Windows XP Professional. The computer has the following hardware installed: 3 GB page file, 2. 4 GHz processor, 2 GB of physical memory, 20 GB hard disk that has 1 GB of free space You need to enable hibernation support on the computer.What should you do first?() 

题型:单项选择题

You have a computer named Computer1 that runs Windows XP Professional. Computer1 is a member of a workgroup. You need to prevent all users from encrypting files on Computer1.What should you do?() 

题型:单项选择题

Your network contains a stand-alone certification authority (CA) and a Web server. The Web server hosts a secure Web site. The Web site uses a server certificate that was issued from the CA. Users report that they receive a certificate warning message when they connect to the Web site. You need to prevent users from receiving the certificate warning message when they connect to the Web site.What should you do from the Internet Options in Internet Explorer?() 

题型:单项选择题