When setting security permissions on a folder, which of the following properties apply?()
第1题:
Which of the following is true when Bob, a technician, is setting default security permissions on a folder?()
第2题:
Which file contains the attributes used to setup a new user account when executing ‘mkuser’ without any flags?()
第3题:
You are developing a Windows Communication Foundation (WCF) service. You need to enable security auditing for all events. What should you do?()
第4题:
You need to configure the local security policy setting to request a user name and password when you make changes to the computer system. What should you do?()
第5题:
Your company, A. Datum Corporation, has a single Active Directory domain named intranet.adatum.com. The domain has two domain controllers that run Windows Server 2008 R2 operating system. The domain controllers also run DNS servers. The intranet.adatum.com DNS zone is configured as an Active Directory-integrated zone with the Dynamic updates setting configured to Secure only. A new corporate security policy requires that the intranet.adatum.com DNS zone must be updated only by domain controllers or member servers. You need to configure the intranet.adatum.com zone to meet the new security policy requirement. Which two actions should you perform()
第6题:
You need to design an access control and permission strategy for user objects in Active Directory.What should you do?()
第7题:
Allow file and printer sharing through Windows Firewall.
Change the network location from a Public network to a Home or Work network.
From the Security settings of the folder, assign the user the Read NTFS permission.
From the Advanced Sharing settings of the folder, assign the user the Read share permission.
第8题:
initiate a ship-to-shore security alert
transmit a ship-to-shore security alert
initiate an alert identifying the ship, its location
raise a security alarm on-board the ship indicating that the ship is under threat
第9题:
Remove the Request Certificates permission from the Domain Users group.
Remove the Request Certificated permission from the Authenticated Users group.
Assign the Allow - Manage CA permission toonly the Security Manager user Account.
Assign the Allow - Issue and Manage Certificates permission to only the Security Manger user account
第10题:
Guest users are allowed changed permissions.
All sub-folders inherit the most restrictive permissions within the folder.
All sub-folders within that folder are given a password.
By default, read permissions are denied on all files within the folder.
第11题:
From the Security Templates snap-in, open the hisecdc template. Modify the Retain System Log setting.
From the Security Templates snap-in, open the securedc template. Modify the Retain Security Log setting.
Open the Default Domain Policy. Modify the Retain System Log setting.
Open the Default Domain Controller Policy. Modify the Retain Security Log setting.
第12题:
asking
asked
being asked
to be asked
第13题:
An administrator has purchased monitoring software that can be configured to alert administrators when hardware and applications are having issues. All devices are configured with SNMP, but the administrator wants to further secure the SNMP traffic. Which of the following settings would BEST provide additional monitoring security?()
第14题:
What are three methods to reduce Mysql server exposure to remote connections?()
第15题:
A user named Marie uses a Windows 2000 Professional computer named Client1 to process payroll records. Marie reports that she can no longer run her financial applications. You determine that file permissions have been applied incorrectly to her computer. You want to configure Client1 to have the same security configuration and file permission settings that were applied when the computer was installed. What should you do?()
第16题:
You are the administrator of your company’s network. You use Security Templates to configure a Security Policy on the Windows 2000 Professional Computers in the Sales organizational unit (OU). You notice that the Computers in the Sales OU are not downloading the Security Policy settings. On each computer, the Security Policy appears in the Local Computer Policy, but is not listed as the effective policy. You want all computers in the Sales OU to have the Security Policy listed as the effective policy. How should you accomplish this task? ()
第17题:
Your company, A. Datum Corporation, has a single Active Directory domain named intranet.adatum.com. The domain has two domain controllers that run Windows Server 2008 R2 operating system. The domain controllers also run DNS servers. The intranet.adatum.com DNS zone is configured as an Active Directoryintegrated zone with the Dynamic updates setting configured to Secure only. A new corporate security policy requires that the intranet.adatum.com DNS zone must be updated only by domain controllers or member servers. You need to configure the intranet.adatum.com zone to meet the new security policy requirement. Which two actions should you perform()
第18题:
Apply the Securews.inf security template to the computers.
Apply the Compatsws.inf security template to the computers.
Delete the Basicwk.inf security template file from the computers.
For each user account, grant Read permission to the database application and its associated files.
Use the System Policy Editor to configure a new security policy for the database application.
第19题:
/etc/security/user
/etc/security/passwd
/etc/security/mkuser.sys
/etc/security/mkuser.default
第20题:
Create a Group Policy object (GPO) to enable the System objects: Strengthen default permission ofinternal systems objects setting.
Create a Group Policy object (GPO) to enable the System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing setting.
Implement IPsec security in the iSCSI Initiator Properties. Set up inbound and outbound rules by using Windows Firewall.
Implement mutual Microsoft Challenge Handshake Authentication Protocol (MS-CHAPv2) authentication in the iSCSI Initiator Properties. Set up inbound and outbound rules by using Windows Firewall.
第21题:
having alternative addressing and VLAN schemes
having a rollback plan in case of unwanted or unexpected results
running a test script against all possible security threats to insure that the solution will mitigate all potential threats
isolating and testing each security domain individually to insure that the security design will meet overall requirements when placed into production as an entire system
第22题:
Copy the .acw file to the c;/documents/setting/default user folder
Save the accessibility option to the floppy disk and change the permission to allow full control of the file
Resume the setting for the option by using utility manager, then copy the file to Peter’s local profile folder
Change the permission of the .acw file in the folder to allow access for Peter’s user account.
第23题:
The LOW setting enables broadcast storm control, but has no effect on the number of devices that can connect to a switch port
The LOW setting enables broadcast storm control and limits the number of devices that can connect to a switch port.
The LOW setting disables broadcast storm control but limits the number of devices that can connect to a switch port
The default network setting is HIGH