Phishing
Smurf attack
Denial of service
Man-in-the-middle
第1题:
A user receives an email slating that their account was compromised and there is a need to verify account credentials by submitting the correct information on a website. Which of the following security threats is occurring?()
第2题:
A user received an email from their bank asking them to login and verify their personal information.The user complies and fills in the requested information. Days later the user notices their checking account is empty. This is a result of which of the following?()
第3题:
An administrator runs clstat on a cluster node and receives the following response: ’Can not get Cluster Information.’ Which of the following daemons may need to be started in order to correct this problem?()
第4题:
The default domain GPO in your company is configured by using the following account policy settings: - Minimum password length: 8 characters - Maximum password age: 30 days - Enforce password history: 12 passwords remembered - Account lockout threshold: 3 invalid logon attempts .Account lockout duration: 30 minutes You install Microsoft SQL Server on a computer named Server1 that runs Windows Server 2008 R2. The SQL Server application uses a service account named SQLSrv. The SQLSrv account has domain user rights. The SQL Server computer fails after running successfully for several weeks. The SQLSrv user account is not locked out. You need to resolve the server failure and prevent recurrence of the failure. Which two actions should you perform()
第5题:
You are planning the configuration of SQL1.You need to use the most appropriate Windows account for the SQL Server service. Which account should you use?()
第6题:
topsvcs
clinfoES
snmpinfo
clsmuxpdES
第7题:
a domain user account
a local user account
the NETWORK SERVICE account
the LOCAL SYSTEM account
第8题:
Phishing
Smurf attack
Denial of service
Man-in-the-middle
第9题:
Modify the properties of the user account to set the account to never expire.
Modify the properties of the user account to extend the Logon Hours setting.
Modify the properties of the user account to set the password to never expire.
Modify the default domain policy to decrease the account lockout duration.
第10题:
Enable the Password must meet complexity requirements setting.
Enable the User Account Control: Detect application installations and prompt for elevation setting.
Configure the Interactive logon: Prompt user to change password before expiration setting to a value between 1 and 999.
Configure the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval mode setting to the Prompt for credentials option.
第11题:
Implement preventative measures.
Close the issue.
Document the outcome.
Question other users to make sure they are not having the same issue
第12题:
dbclean -object account -type obsolete -db dbname -days daysold
dbclean -table account -type obsolete -db dbname -days daysold
dbclean -object organization -type account -db dbname -days daysold
dbclean -object user -type account -db dbname -days daysold
第13题:
Which of the following security threats involves making phone calls?()
第14题:
An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again. Which of the following is the NEXT step that the administrator should take?()
第15题:
An administrator wants to delete an account object using the Database Cleanup utility. Which of the following is the correct syntax to perform this task?()
第16题:
Your company has an Active Directory domain. A user attempts to log on to the domain from a client computer and receives the following message: "This user account has expired Ask your administrator to reactivate the account." You need to ensure that the user is able to log on to the domain. What should you do()
第17题:
The default domain GPO in your company is configured by using the following account policy settings: ( Minimum password length: 8 characters .Maximum password age: 30 days. Enforce password history: 12 passwords remembered .Account lockout threshold: 3 invalid logon attempts .Account lockout duration: 30 minutes You install Microsoft SQL Server on a computer named Server1 that runs Windows Server 2008 R2. The SQL Server application uses a service account named SQLSrv. The SQLSrv account has domain user rights. The SQL Server computer fails after running successfully for several weeks. The SQLSrv user account is not locked out. You need to resolve the server failure and prevent recurrence of the failure. Which two actions should you perform()
第18题:
Reset the password of the SQLSrv user account.
Configure the local security policy on Server1 to grant the Logon as a service right on the SQLSrv user
Configure the properties of the SQLSrv account to Password never expires.
Configure the properties of the SQLSrv account to User cannot change password.
Configure the local security policy on Server1 to explicitly grant the SQLSrv user account the allow logon locally user right.
第19题:
Modify the properties of the PSO.
Modify the account options of the User1 account.
Modify the security settings of the User1 account.
Modify the password policy of the Default Domain Policy Group Policy object (GPO).
第20题:
Spam
Phishing
Adware
A Trojan
第21题:
Guest user account
Limited user account
Power user account
Administrator user account
第22题:
Reset the password of the SQLSrv user account.
Configure the local security policy on Server1 to grant the Logon as a service right on the SQLSrv user account.
Configure the properties of the SQLSrv account to Password never expires.
Configure the properties of the SQLSrv account to User cannot change password.
Configure the local security policy on Server1 to explicitly grant the SQLSrv user account the Allow logon locally us
第23题:
the credentials of a privileged account on the Active directory server
the credentials of any account on the Active directory server
the credentials of the account (created by the S-Series) on the Active directory server when the domain is joined
the S-Series administrative account