对
错
第1题:
A.am going to return
B.will return
C.am to return
D.should return
第2题:
Why is it necessary to warn engine room personnel before activating the fixed CO2 system?
A.To make them aware there is a fire
B.To let them know they should leave the engine room
C.To prevent possible injury from frostbite
D.To make them aware that ventilation will automatically stop
第3题:
第4题:
In order to understand a text well, it is absolutely necessary to understand every word in the first place.()
A对
B错
第5题:
What are two important approaches to communicate when identifying a customer’s security risks? (Choose two.) ()
第6题:
You are the network administrator for your company. The network consists of a single Active Directory forest. The forest consists of 19 Active Directory domains. Fifteen of the domains contain Windows Server 2003 domain controllers. The functional level of all the domains is Windows 2000 native. The network also consists of a single Microsoft Exchange 2000 Server organization. You need to create groups that can be used only to send e-mail messages to user accounts throughout the company. You want to achieve this goal by using the minimum amount of replication traffic and minimizing the size of the Active Directory database. You need to create a plan for creating e-mail groups for your company. What should you do?()
第7题:
You are a network administrator for your company. The network consists of a single Active Directory domain. A user named Mary works in the information technology security department. Mary is a member of the ITSecurity global group. Mary reports that no one in the ITSecurity global group can access the security log from the console of a computer named Server1. You need to grant the ITSecurity global group the minimum rights necessary to view the security log on Server1. How should you modify the local security policy?()
第8题:
Create one global group named G_Executives. Make all executives user accounts members of that group.
Create two global groups named G_Executives and one universal group named U_Executives. Make the two global members of U_Executives. Make the executive user accounts members of the appropriate global group.
Create three global groups named G_NY_Executives and G_Chi_Executives and G_Executives. Make G_NY_Executives and G_Chi_Executives members of G_Executives. Make the executive user accounts members of the appropriate global group.
Create one domain local group named DL_Executives. Make all executive user accounts members of that group.
第9题:
对
错
第10题:
对
错
第11题:
Smaller companies are at less risk than larger enterprises, so their security needs are not as great.
Business strategy should directly relate to the security policy and budget.
The designated security expert should report to the IT department, since that is where thesolution will be implemented.
Security should be a continuous process.
Security solutions should come from multiple vendors to make it easier to coordinate security events from the point of origin.
第12题:
what
which
that
why
第13题:
A、accustomed
B、used
C、conventional
D、adjusted
第14题:
is one kind of software absolutely necessary for every computer.
A.Operating System
B.Word processing
C.Keyboard
D.Center Processing Unit
第15题:
第16题:
In order to understand a text well, it is absolutely necessary to understand every word in the first place.()
第17题:
You are designing a security group strategy to meet the business and technical requirements. What should you do?()
第18题:
You are a network administrator for TestKing. The network consists of a single Active Directory domain named testking.com. A user named Mrs. King works in the information technology (IT) security department. Mrs. King is a member of the ITSecurity global group. Mrs. King reports that no one in the ITSecurity global group can access the security log from the console of a computer named Testking1. You need to grant the ITSecurity global group the minimum rights necessary to view the security log on Testking1. How should you modify the local security policy?()
第19题:
You are a network administrator for your company. The network consists of a single Active Directory domain. A user named Mary works in the information technology (IT) security department. Mary is a member of the ITSecurity global group. Mary reports that no one in the ITSecurity global group can access the security log from the console of a computer named Server1. You need to grant the ITSecurity global group the minimum rights necessary to view the security log on Server1. How should you modify the local security policy?()
第20题:
Assign the Generate security audits user right to the ITSecurity global group.
Assign the Manage auditing and security logs user right to the ITSecurity global group.
Assign the Allow logon through Terminal Services user right to the ITSecurity global group.
Assign the Act as part of the operating system user right to the ITSecurity global group.
第21题:
Assign the Generate security audits user right to the ITSecurity global group.
Assign the Manage auditing and security logs user right to the ITSecurity global group.
Assign the Allow logon through Terminal Services user right to the ITSecurity global group.
Assign the Act as part of the operating system user right to the ITSecurity global group.
第22题:
what
which
that
why
第23题:
Assign the Generate security audits user right to the ITSecurity global group.
Assign the Manage auditing and security logs user right to the ITSecurity global group.
Assign the Allow logon through Terminal Services user right to the ITSecurity global group.
Assign the Act as part of the operating system user right to the ITSecurity global group.
第24题:
it also would be rendering the earth uninhabitable
rendering the earth uninhabitable
might have uninhabitably rendered the earth
render the earth uninhabitable
would also have rendered the earth uninhabitable