You perform a security audit of a server named DC1. You install the Microsoft Network Monitor 3.0 application on DC1.You plan to capture all the LDAP traffic that comes to and goes from the server between 20:00 and 07:00 the next day and save it to the E:/data.cap file. You create a scheduled task. You add a new Start a program action to the task.You need to add the application name and the application arguments to the new action. What should you do?()
第1题:
You installed Oracle Database 11g afresh. Which statements are true regarding the default audit settings in this database?()
第2题:
You need to design a method to log changes that are made to servers and domain controllers. You also need to track when administrators modify local security account manager objects on servers. What should you do?()
第3题:
You have a computer that runs Windows 7. Multiple users log on to your computer. You enable auditing ona folder stored on your computer. You need to ensure that each access to the folder is logged. What should you do?()
第4题:
Your company has a server that runs Windows Server 2008. Certification Services is configured as a stand-alone Certification Authority (CA) on the server. You need to audit changes to the CA configuration settings and the CA security settings. Which two tasks should you perform()
第5题:
You need to identify each help desk user who bypasses the new corporate security policy. What should you do?()
第6题:
Your network consists of a single Active Directory domain. You have a member server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).You need to record all attempts by domain users and local users to log on to Server1. What should you do?()
第7题:
In the Default Domain Controller Policy, enable success and failure for the Audit logon events policy setting.
In the Default Domain Controller Policy, enable success and failure for the Audit account logon events policy setting.
In the Local Security Policy on Server1, enable success and failure for the Audit logon events policy.
In the Local Security Policy on Server1, enable success and failure for the Audit account logon events policy setting.
第8题:
IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats
detailed security device specifications
results from pilot network testing
results from a network audit
第9题:
Configure a directory service access audit policy. Increase the maximum size of the security log.
Configure a directory service access audit policy. Set the system log to overwrite events older than 7 days.
Configure an object access audit policy for the directory. Increase the maximum size of the system log.
Configure an object access audit policy for the directory. Set the security log to overwrite events older than 7 days.
第10题:
Link the GPO to the domain and enable System Events option
Link the GPO to the domain and enable Audit Object Access option
Link the GPO to the Domain Controllers and enable Audit Object Access option
Link the GPO to the Domain Controllers and enable Audit Process tracking option
Perform all of the above actions
第11题:
In Local Group Policy, modify the audit policy.
In Local Group Policy, modify the system audit policy.
From the Windows Firewall with Advanced Security properties, set the logging settings to Log successfulconnections.
From the Windows Firewall with Advanced Security properties, set the Data Protection (Quick Mode)IPSec settings to Advanced.
第12题:
You need to design an audit strategy for Southbridge Video. Your solution must meet business requirements.What should you do?()
第13题:
Certkiller .com has organizational units in the Active Directory domain. There are 10 servers in the organizational unit called Security. As an administrator at Certkiller .com, you generate a Group Policy Object (GPO) and link it to the Security organizational unit. What should you do to monitor the network connections to the servers in Security organizational unit()
第14题:
You have an Exchange Server 2010 organization. You have a global security group named Legal that contains all the members of your companys legaldepartment. The companys security policy states that the Legal group must be able to search all mailboxes for e-mailmessages that contain specific keywords. You need to recommend a solution for the organization that complies with the security policy. What should you include in the solution?()
第15题:
You are an administrator at Certkiller .com. Certkiller has a network of 5 member servers acting as file servers. It has an Active Directory domain. You have installed a software application on the servers. As soon as the application is installed, one of the member servers shuts down itself. To trace and rectify the problem, you create a Group Policy Object (GPO). You need to change the domain security settings to trace the shutdowns and identify the cause of it. What should you do to perform this task()
第16题:
You are the administrator of a SQL Server 2005 computer named SQL1. SQL1 is a member of a Microsoft Active Directory domain. You do not have any rights or privileges to perform domain administration. However, you have been granted membership in the local Administrators group on SQL1. You perform most of the management of SQL1 from your administrative workstation. However, for security reasons, you want to track all attempts for interactive logons and network connections to SQL1. What should you do?()
第17题:
Configure auditing in the Certification Authority snap-in.
Enable auditing of successful and failed attempts to change permissions on files in the %SYSTEM32%/CertSrv directory.
Enable auditing of successful and failed attempts to write to files in the %SYSTEM32%/CertLog directory.
Enable the Audit object access setting in the Local Security Policy for the Active Directory Certificate Services (AD CS) server.
第18题:
The audit trail is stored in an operating system file.
Auditing is disabled for all privileges.
The audit trail is stored in the database.
Auditing is enabled for all privileges.
Auditing is enabled for certain privileges related to database security.
第19题:
Create a new display filter and apply the filter to the capture.
Create a new capture filter and apply the filter to the capture.
Populate the aliases table and apply the aliases to the capture.
Configure the network monitor application to enable the enable converstations option, recapture the data to a new file.
第20题:
administrator audit logging
circular logging
diagnostic logging
Windows Security Auditing
第21题:
Active Directory delegation
Authorization Manager role assignment
local security groups on the Hyper-V server
local security groups on the VMs