When setting security permissions on a folder, which of the following properties apply?()A、Guest users are allowed changed permissions.B、All sub-folders inherit the most restrictive permissions within the folder.C、All sub-folders within that folder are gi

题目

When setting security permissions on a folder, which of the following properties apply?()

  • A、Guest users are allowed changed permissions.
  • B、All sub-folders inherit the most restrictive permissions within the folder.
  • C、All sub-folders within that folder are given a password.
  • D、By default, read permissions are denied on all files within the folder.

相似考题
更多“When setting security permission”相关问题
  • 第1题:

    Which of the following is true when Bob, a technician, is setting default security permissions on a folder?()

    • A、There are no significant changes to other files.
    • B、The created folder inherits the most restrictive permissions within the folder.
    • C、The permissions are inherited by all files and folders within that folder.
    • D、All folders within that folder are given a restrictive password.

    正确答案:C

  • 第2题:

    Which file contains the attributes used to setup a new user account when executing ‘mkuser’ without any flags?()

    • A、/etc/security/user
    • B、/etc/security/passwd
    • C、/etc/security/mkuser.sys
    • D、/etc/security/mkuser.default

    正确答案:D

  • 第3题:

    You are developing a Windows Communication Foundation (WCF) service. You need to enable security auditing for all events. What should you do?()

    • A、Set the serviceAuthorizationAuditLevel setting to Success and the messageAuthenticationAuditLevel setting to Success.
    • B、Set the messageAuthenticationAuditLevel setting to Success and the auditLogLocation setting to Application.
    • C、Set the serviceAuthorizationAuditLevel setting to SuccessAndFailure and the messageAuthenticationAuditLevel setting to SuccessAndFailure.
    • D、Set the messageAuthenticationAuditLevel setting to SuccessAndFailure and the auditLogLocation setting to Security.

    正确答案:C

  • 第4题:

    You need to configure the local security policy setting to request a user name and password when you make changes to the computer system.  What should you do?()

    • A、Enable the Password must meet complexity requirements setting.
    • B、Enable the User Account Control: Detect application installations and prompt for elevation setting.
    • C、Configure the Interactive logon: Prompt user to change password before expiration setting to a value between 1 and 999.
    • D、Configure the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval mode setting to the Prompt for credentials option.

    正确答案:D

  • 第5题:

    Your company, A. Datum Corporation, has a single Active Directory domain named intranet.adatum.com. The  domain has two domain controllers that run Windows Server 2008 R2 operating system. The  domain controllers also run DNS servers.   The intranet.adatum.com DNS zone is configured as an Active Directory-integrated zone with the  Dynamic updates setting configured to Secure only. A new corporate security policy requires that  the intranet.adatum.com DNS zone must be updated only by domain controllers or member  servers.   You need to configure the intranet.adatum.com zone to meet the new security policy requirement.     Which two actions should you perform()

    • A、Remove the Authenticated Users account from the Security tab of the intranet.adatum.com DNS zone properties.
    • B、Assign the SELF Account Deny on Write permission on the Security tab of the intranet.adatum.com DNS zone prop
    • C、Assign the server computer accounts the Allow on Write All Properties permission on the Security tab of the intrane
    • D、Assign the server computer accounts the Allow on Create All Child Objects permission on the Security tab of the int

    正确答案:A,D

  • 第6题:

    You need to design an access control and permission strategy for user objects in Active Directory.What should you do?()

    • A、Make the members of the AdvancedSupport security group members of the Domain Admins security group
    • B、Give each desktop support technician permission to reset passwords for the top-level OU that contains user accounts at their own location
    • C、Delegate full control over all OUs that contain user accounts to all AllSupport  security group
    • D、Change the permissions on the domain object and its child objects so that the BasicSupport security group is denied permissions. Then, add a permission to each OU that contains user accounts that allows AllSupport security group members to reset passwords in that OU

    正确答案:B

  • 第7题:

    单选题
    You have a computer that runs Windows 7. The computer contains a folder named C:/data. You use Advanced Sharing to share C:/data by using the default share permissions. When a user tries to access theshare over the network, he gets an Access is Denied error message. You need to ensure that the user canaccess the share.  What should you do?()
    A

    Allow file and printer sharing through Windows Firewall.

    B

    Change the network location from a Public network to a Home or Work network.

    C

    From the Security settings of the folder, assign the user the Read NTFS permission.

    D

    From the Advanced Sharing settings of the folder, assign the user the Read share permission.


    正确答案: C
    解析: 暂无解析

  • 第8题:

    单选题
    When the ship security alert system is activated, it shall not()
    A

    initiate a ship-to-shore security alert

    B

    transmit a ship-to-shore security alert

    C

    initiate an alert identifying the ship, its location

    D

    raise a security alarm on-board the ship indicating that the ship is under threat


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    Your company has an Active Directory domain. You install an Enterprise Root certification authority (CA) on a member server named Server1. You need to ensure that only the Security Manager is authorized to revoke certificates that are supplied by Server1. What should you do()
    A

    Remove the Request Certificates permission from the Domain Users group.

    B

    Remove the Request Certificated permission from the Authenticated Users group.

    C

    Assign the Allow - Manage CA permission toonly  the Security Manager user Account.

    D

    Assign the Allow - Issue and Manage Certificates permission to only the Security Manger user account


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    When setting security permissions on a folder, which of the following properties apply?()
    A

    Guest users are allowed changed permissions.

    B

    All sub-folders inherit the most restrictive permissions within the folder.

    C

    All sub-folders within that folder are given a password.

    D

    By default, read permissions are denied on all files within the folder.


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). You enable auditing for failed logon attempts on all domain controllers. You need to ensure that a record of failed logon attempts is retained for 90 days on all domain controllers. What should you do?()
    A

    From the Security Templates snap-in, open the hisecdc template. Modify the Retain System Log setting.

    B

    From the Security Templates snap-in, open the securedc template. Modify the Retain Security Log setting.

    C

    Open the Default Domain Policy. Modify the Retain System Log setting.

    D

    Open the Default Domain Controller Policy. Modify the Retain Security Log setting.


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    When _____ why he walked in without permission, he just stared at us and saidnothing.
    A

    asking

    B

    asked

    C

    being asked

    D

    to be asked


    正确答案: C
    解析:

  • 第13题:

    An administrator has purchased monitoring software that can be configured to alert administrators when hardware and applications are having issues.  All devices are configured with SNMP, but the administrator wants to further secure the SNMP traffic.  Which of the following settings would BEST provide additional monitoring security?()

    • A、Setting up a custom community name
    • B、Configuring the network to block traffic on port 161
    • C、Configuring the Windows Firewall to block port 161
    • D、Setting SNMP to read only on the devices
    • E、Installing new MIBs

    正确答案:A,D

  • 第14题:

    What are three methods to reduce Mysql server exposure to remote connections?()

    • A、Setting — skip-networking when remote connections are not required
    • B、Using the sql_mode=STRICT_SECURE after connections are established for encrypted communications
    • C、Setting specific GRANT privilege to limit remote authentication
    • D、Setting – mysql_secure_configuration to enable paranoid mode
    • E、Using SSL when transporting data over remote networks

    正确答案:A,C,E

  • 第15题:

    A user named Marie uses a Windows 2000 Professional computer named Client1 to process payroll records. Marie reports that she can no longer run her financial applications. You determine that file permissions have been applied incorrectly to her computer. You want to configure Client1 to have the same security configuration and file permission settings that were applied when the computer was installed.  What should you do?()

    • A、Grant usersFull Controlpermission to the C drive and all child folders
    • B、Use the Recovery Console to restore system files
    • C、Use Security Configuration and Analysis to apply the Secure security template to Client1
    • D、Use Security Configuration and Analysis to apply the Default security template to Client 1

    正确答案:D

  • 第16题:

    You are the administrator of your company’s network. You use Security Templates to configure a Security Policy on the Windows 2000 Professional Computers in the Sales organizational unit (OU). You notice that the Computers in the Sales OU are not downloading the Security Policy settings. On each computer, the Security Policy appears in the Local Computer Policy, but is not listed as the effective policy. You want all computers in the Sales OU to have the Security Policy listed as the effective policy. How should you accomplish this task? ()

    • A、Use Security Templates to correct the setting and export the security file.
    • B、Use Security Configuration and Analysis to import the security setting. Then create a Group policy object (GPO) for the Sales QU.
    • C、Use Secedit /RefreshPolicy Machine_Policy command.
    • D、Use the Basicwk.inf security file settings, save the security file, and then import the fileto theComputers.

    正确答案:C

  • 第17题:

    Your  company,  A.  Datum  Corporation,  has  a  single  Active  Directory  domain  named  intranet.adatum.com. The domain has two domain controllers that run Windows Server 2008 R2  operating system. The domain controllers also run DNS servers.  The intranet.adatum.com DNS zone is configured as an Active Directoryintegrated zone with the  Dynamic updates setting configured to Secure only.  A new corporate security policy requires that the intranet.adatum.com DNS zone must be updated only by  domain controllers or member servers.  You need to configure the intranet.adatum.com zone to meet the new security policy requirement.  Which two actions should you perform()

    • A、Remove the Authenticated Users account from the Security tab of the intranet.adatum.com DNS zone  properties.
    • B、Assign the SELF Account Deny on Write permission on the Security tab of the intranet.adatum.com  DNS zone properties.
    • C、Assign the server computer accounts the Allow on Write All Properties permission on the Security tab  of the intranet.adatum.com DNS zone properties.
    • D、Assign the server computer accounts the Allow on Create All Child Objects permission on the Security  tab of the intranet.adatum.com DNS zone properties.

    正确答案:A,D

  • 第18题:

    单选题
    You are the administrator of a Windows 2000 network.  You upgrade five computers in the sales department to Windows 2000 Professional. You then apply the Basicwk.inf security template to the upgraded computers. The remaining computers in the sales department are using Windows NT Workstation 4.0. When users log on to the Windows 2000 Professional computers they report that they are unable to run the company’s database application.  When the users log on to Windows NT Workstation 4.0 computers they are able to run the database application.  You want the users of Windows 2000 Professional computers to be able to run the database application.  What should you do? ()
    A

    Apply the Securews.inf security template to the computers.

    B

    Apply the Compatsws.inf security template to the computers.

    C

    Delete the Basicwk.inf security template file from the computers.

    D

    For each user account, grant Read permission to the database application and its associated files.

    E

    Use the System Policy Editor to configure a new security policy for the database application.


    正确答案: B
    解析: 暂无解析

  • 第19题:

    单选题
    Which file contains the attributes used to setup a new user account when executing ’mkuser’ without any flags?()
    A

    /etc/security/user

    B

    /etc/security/passwd

    C

    /etc/security/mkuser.sys

    D

    /etc/security/mkuser.default


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    Your company has a single Active Directory domain. All servers run Windows Server 2008. You install an iSCSI storage area network (SAN) for a group of file servers.  Corporate security policy requires that all data communication to and from the iSCSI SAN must be as secure as possible.  You need to implement the highest security available for communications to and from the iSCSI SAN. What should you do?()
    A

    Create a Group Policy object (GPO) to enable the System objects: Strengthen default permission ofinternal systems objects setting.

    B

    Create a Group Policy object (GPO) to enable the System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing setting.

    C

    Implement IPsec security in the iSCSI Initiator Properties. Set up inbound and outbound rules by using Windows Firewall.

    D

    Implement mutual Microsoft Challenge Handshake Authentication Protocol (MS-CHAPv2) authentication in the iSCSI Initiator Properties. Set up inbound and outbound rules by using Windows Firewall.


    正确答案: C
    解析: 暂无解析

  • 第21题:

    单选题
    What action should you be prepared to take when verifying a security solution?()
    A

    having alternative addressing and VLAN schemes

    B

    having a rollback plan in case of unwanted or unexpected results

    C

    running a test script against all possible security threats to insure that the solution will mitigate all potential threats

    D

    isolating and testing each security domain individually to insure that the security design will meet overall requirements when placed into production as an entire system


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    You are the administrator of your company’s network. A user name Andrew has limited dexterity, which prevents him from using standard keyboard when completing his daily tasks. You configure Windows 2000 Professional to use sticky keys and screen keyboard options. You save the accessibility options to a shared folder on the local hard disk of Andrews’s computer. You want to configure the same options for another user Peter. You log on to Peter’s computer using his local user account and you access the folder over the network from Peter’s computer. You select the .acw file from the shared folder to set up Peter’s computer to use the accessibility option. You receive an error message as follows: " There was a problem running the file when running the accessibility wizard". What should you do to install the accessibility features on Peter’s computer?()
    A

    Copy the .acw file to the c;/documents/setting/default user folder

    B

    Save the accessibility option to the floppy disk and change the permission to allow full control  of the file

    C

    Resume the setting for the option by using utility manager, then copy the file to Peter’s local  profile folder

    D

    Change the permission of the .acw file in the folder to allow access for Peter’s user account. 


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    Which statement correctly describes network security settings in Cisco Network Assistant for the Catalyst Express 500 Switch?()
    A

    The LOW setting enables broadcast storm control, but has no effect on the number of devices that can connect to a switch port

    B

    The LOW setting enables broadcast storm control and limits the number of devices that can connect to a switch port.

    C

    The LOW setting disables broadcast storm control but limits the number of devices that can connect to a switch port

    D

    The default network setting is HIGH


    正确答案: D
    解析: 暂无解析