网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

You have a computer that runs Windows 7. Multiple users log on to your computer. You enable auditing ona folder stored on your computer. You need to ensure that each access to the folder is logged.  What should you do?()

  • A、Start the Problem Steps Recorder.
  • B、From Event Viewer, modify the properties of the Security log.
  • C、From the local Group Policy, configure the Audit object access setting.
  • D、From the local Group Policy, configure the Audit directory service Access setting.

参考答案

更多 “ You have a computer that runs Windows 7. Multiple users log on to your computer. You enable auditing ona folder stored on your computer. You need to ensure that each access to the folder is logged.  What should you do?()A、Start the Problem Steps Recorder.B、From Event Viewer, modify the properties of the Security log.C、From the local Group Policy, configure the Audit object access setting.D、From the local Group Policy, configure the Audit directory service Access setting.” 相关考题
考题 You discover audit log entries that report attempts to log on to your computer. You need to be notified of all logon attempts that occur on your computer.What should you do?() A.AB.BC.CD.D

考题 Your computer uses both wired and wireless network connections. The networks are not connected to each other.You disallow incoming connections in Microsoft Windows Firewall. You create a shared folder. Users on the wireless network cannot access the shared folder. You need to allow access to the shared folder from the wireless network. You also need to maintain the security of the wired network.What should you do?()A.AB.BC.CD.D

考题 Remote users are unable to connect to a shared folder on your computer. You need to allow access to the shared folder.What are the two possible ways to achieve this goal?() A.AB.BC.CD.D

考题 You install a custom application on a computer that runs Microsoft Windows XP. The application stores each user’s data in the %programfiles%\app1\data folder on the computer. You install the custom application on a computer that runs Windows Vista.On the Windows Vista computer, you back up the %programfiles%\app1\data folder and notice that the backup contains no data.You need to back up the application’s user data on the Windows Vista computer.What should you do?()A.AB.BC.CD.D

考题 You use a Windows 2000 Professional desktop computer. The corporate product information is stored on this computer. You want other users on the network to be able to read the product information on your computer. You use Windows Explorer to share the product information folder on the network. You want Sales staff to be able to keep a copy of the product information on their portable computers when they travel. Other users should not be able to synchronize the product information.  What should you do?()A、Use Synchronization manager to configure synchronization to occur when users are connected to the LAN connection.B、Use Windows Explorer to grant Sales Staff Special access for the reports on the network share.C、Use Windows Explorer to enable automatic caching for documents on the network share.D、Create a new share for the Sales users only and enable caching on that share only.

考题 You have a share on your local computer. This share contains some sensitive applications in theform of .exe files. You want to audit the users who are trying to execute these programs. What should you do?()A、Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.B、Turn on auditing for objects in the Local Security Policy and Select 'Object Access'.C、Use Windows Explorer to turn on auditing for the specific files. D、Have the administrator for domains log you on as an administrator and enable auditing for a  specific file.E、Turn on auditing for objects in the Local Security Policy and Select 'Account Management'.F、Allow only one account at a time to log on to your shared folder. Check the event viewer to  see who logged on. 

考题 You use a shared Windows 2000 Professional Computer. You notice, that some of your Microsoft Word documents that were on the local hard drive have been deleted. You restore the documents from a recent backup. Now, you want to be able to track all users who access your Word documents in the future. What should you do? ()A、Enable the local Group Policy for auditing object access events that are successful.B、Enable the local Group Policy for auditing object access events that are unsuccessful.C、Enable the local Group Policy for auditing process tracking events that are successful.D、Enable the local Group Policy for auditing process tracking events that are unsuccessful. E、Use Windows 2000 Explorer, to enable auditing for your files.F、Run the diskperf - y command. Use System Monitor to examine the logical I/O counter.  Restart the Computer.

考题 You have a stand-alone computer that runs Windows XP Professional. Five users use the computer. Each user has a local user account. The user accounts are member of only the Users group. You need to share a document between all users of the computer. What should you do?() A、Copy the file to the Shared Documents folder. B、Copy the file to the My Documents folder of the local administrator. C、Copy the file to the %SystemRoot%/CSC folder. Add all user accounts to the guests group.D、Enable Offline File and Folder Caching. Copy the file to the %SystemRoot%/CSC folder.

考题 You are the administrator of a computer named Computer1 that runs Windows 7. Several users shareComputer1. The users plan to encrypt files on the computer. You need to ensure that you can access allencrypted files on the computer.  What should you do first?()A、At a command prompt, run Cipher.exe.B、At a command prompt, run Certutil.exe.C、From the local computer policy, modify the User Rights Assignment.D、From User Accounts, run the Manage your file encryption certificates wizard.

考题 You have a computer that runs Windows XP Professional. The computer is part of a workgroup. You need to configure advanced NTFS permissions on a folder stored on the computer. What should you do first? ()A、Run cipher.exe.B、Disable simple file sharing.C、Enable folder encryption for the folder.D、Request that an administrator adds your user account to the local Power Users group.

考题 You discover audit log entries that report attempts to log on to your computer. You need to be notified of all logon attempts that occur on your computer.  What should you do?()A、Enable the Problem Reporting feature for all users.B、Configure a custom view to monitor failed logon events on your computer.C、Use the Computer Management console to connect to your computer from another computer and monitor the audit logs.D、In the Event Viewer window, attach a task to a failed logon event. Configure this task to send an e-mail message to your e-mail account.

考题 Your network contains a computer that runs Windows XP Professional. Multiple users share the computer. You create a custom user profile on the computer. You need to ensure that all new users of the computer receive the custom user profile. What should you do?() A、Run the Files and Settings Transfer Wizard.B、At the command prompt, run scanstate.exe. C、Use the Copy To function from the User Profiles settings. D、Rename the folder that contains the custom user profile to winnt_user. 

考题 Your computer runs Microsoft Windows XP Professional. You share your computer with two other co-workers.  You purchase a new computer. You install Microsoft Windows Vista on the new computer.  You need to migrate the following content from the old computer to the new computer: All system and program settings  All users settings  Only the content in the C:///Appdata folder  Which tool should you use? ()A、File and Settings Transfer wizardB、Application Compatibility toolkitC、Windows Automated Installation toolkitD、Microsoft Windows Easy Transfer wizard

考题 You configure your Windows 2000 Professional portable computer to redirect your My Documents folder to your home folder. You want to ensure that you can access all of your files in you’re my Documents folder when you are not connected to the network. What should you do?()A、Use Windows Explorer to enable offline files.B、Use Windows Explorer to create shortcut to access offline files folder as desktop.C、Use Windows Explorer to configure the properties of your home folder to be available offline.D、Use synchronization manager to configure your home folder to be available offline.E、Create a shortcut in my network places to access your home folder.

考题 You have a computer that runs Windows 7. Multiple users log on to the computer. The computer has fiveremovable devices. You need to ensure that users can only access removable  devices that have beenpreviously installed on the computer.  What should you modify in the Local Group Policy ?()A、Enable the Prevent redirection of USB devices setting.B、Enable the Prevent installation of removable devices setting.C、Disable the WPD Devices: Deny read access setting.D、Disable the Allow administrators to override Device Installation Restriction policies setting.

考题 Your company plans to distribute an application to all of its client computers by using GroupPolicy. You save a file named setup.msi to a local folder on the domain controller. You assign the Authenticated Users group the Read and Read  Execute permissions for the folder. You create a new Group Policy  object (GPO) and a new Computer Configuration software installation package, and you point the package to the setup.msi file in the local folder. You link the GPO to an organizational unit (OU) that contains a computer object for a test client computer. When you log on to the test client computer, you  notice that the application is not installed. You need to ensure that the application is installed on the test computer.  What should you do?()A、 Modify the permissions on the folder that contains the setup.msi file so that authenticated users have the List Folder Contents permission. Log off the client computer and then log on.B、 Modify the permissions on the folder that contains the setup.msi file so that authenticated users have the List Folder Contents permission. Restart the client computer.C、 Place the setup.msi file into a shared folder. Modify the software installation package to point to the shared folder. Log off the client computer and then log on.D、 Place the setup.msi file into a shared folder. Modify the software installation package to point to the shared folder. Restart the client computer.

考题 You have stored confidential financial data in a shared folder named AccSecured on your Windows 2000 Professional computer. Your company hires an intern named Richard.  You create a subfolder named intern, which Richard needs to access. You want to allow Richard access to the intern subfolder only. You create a user account named intern. You want to allow the intern user account the ability to update, create, and delete files within the intern folder. You need to prevent Richard from accessing any other files or folders within the AccSecured folder.  What should you do?()A、 Map a network drive to the AccSecuredintern folder from Richard’s computer. B、 Map a network drive to the AccSecured shared folder from Richard’s computer. C、 Allow the intern user account modify permissions on the intern subfolder. D、 Allow the intern user account traverse folder/execute file permission on the AccSecured  folder. E、 Allow the intern user account list folder content permission on the AccSecured folder.  Remove read extended attributes and read permissions.

考题 You have a share on your local computer. Someone has been intentionally damaging your files.  You want to be able to know which account is doing this. What do you do? ()A、Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'. B、Turn on auditing for objects in the Local Security Policy and Select 'Object Access'. C、Use Windows Explorer to turn on auditing for the specific files. D、Have the administrator for domains log you on as an administrator and enable auditing for a  specific file. E、Turn on auditing for objects in the Local Security Policy and Select 'Account Management'. F、Allow only one account at a time to log on to your shared folder. Check the event viewer to  see who logged on.

考题 单选题You have a computer that runs Windows XP Professional. The computer is part of a workgroup. You need to configure advanced NTFS permissions on a folder stored on the computer. What should you do first? ()A Run cipher.exe.B Disable simple file sharing.C Enable folder encryption for the folder.D Request that an administrator adds your user account to the local Power Users group.

考题 单选题You have a computer that runs Windows 7. Multiple users share the computer. The computer contains afolder named C:/folder1. You need to identify all of the encrypted files in C:/folder1. Which command shouldyou run?()A Cipher C:///folder1B Dir C:///folder1 /OEC Fsutil C:///folder1D Wfs C:///folder1

考题 多选题You have a share on your local computer. Someone has been intentionally damaging your files.  You want to be able to know which account is doing this. What do you do? ()ATurn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.BTurn on auditing for objects in the Local Security Policy and Select 'Object Access'.CUse Windows Explorer to turn on auditing for the specific files.DHave the administrator for domains log you on as an administrator and enable auditing for a  specific file.ETurn on auditing for objects in the Local Security Policy and Select 'Account Management'.FAllow only one account at a time to log on to your shared folder. Check the event viewer to  see who logged on.

考题 单选题You have a share on your local computer. This share contains some sensitive applications in theform of .exe files. You want to audit the users who are trying to execute these programs. What should you do?()A Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.B Turn on auditing for objects in the Local Security Policy and Select 'Object Access'.C Use Windows Explorer to turn on auditing for the specific files. D Have the administrator for domains log you on as an administrator and enable auditing for a  specific file.E Turn on auditing for objects in the Local Security Policy and Select 'Account Management'.F Allow only one account at a time to log on to your shared folder. Check the event viewer to  see who logged on. 

考题 单选题You have a computer that runs Windows 7. Multiple users log on to your computer. You enable auditing ona folder stored on your computer. You need to ensure that each access to the folder is logged.  What should you do?()A Start the Problem Steps Recorder.B From Event Viewer, modify the properties of the Security log.C From the local Group Policy, configure the Audit object access setting.D From the local Group Policy, configure the Audit directory service Access setting.

考题 单选题Your company plans to distribute an application to all of its client computers by using GroupPolicy. You save a file named setup.msi to a local folder on the domain controller. You assign the Authenticated Users group the Read and Read  Execute permissions for the folder. You create a new Group Policy  object (GPO) and a new Computer Configuration software installation package, and you point the package to the setup.msi file in the local folder. You link the GPO to an organizational unit (OU) that contains a computer object for a test client computer. When you log on to the test client computer, you  notice that the application is not installed. You need to ensure that the application is installed on the test computer.  What should you do?()A  Modify the permissions on the folder that contains the setup.msi file so that authenticated users have the List Folder Contents permission. Log off the client computer and then log on.B  Modify the permissions on the folder that contains the setup.msi file so that authenticated users have the List Folder Contents permission. Restart the client computer.C  Place the setup.msi file into a shared folder. Modify the software installation package to point to the shared folder. Log off the client computer and then log on.D  Place the setup.msi file into a shared folder. Modify the software installation package to point to the shared folder. Restart the client computer.

考题 单选题You have a computer that runs Windows 7. Multiple users log on to the computer. The computer has fiveremovable devices. You need to ensure that users can only access removable  devices that have beenpreviously installed on the computer.  What should you modify in the Local Group Policy ?()A Enable the Prevent redirection of USB devices setting.B Enable the Prevent installation of removable devices setting.C Disable the WPD Devices: Deny read access setting.D Disable the Allow administrators to override Device Installation Restriction policies setting.

考题 单选题You share a folder named Folder1 on a computer that runs Windows XP Professional. Users report that they cannot access the folder from other computers on the network. You verify that all users can access Folder1 when logged on to the computer. You need to ensure that all users can access Folder1 from the network. What should you do?()A On Folder1, modify the share permissions.B On Folder1, modify the NTFS permissions.C Add all local user accounts to the Guests group. D Add all local user accounts to the Network Configuration Operators group.

考题 单选题Your computer runs Microsoft Windows XP Professional. You share your computer with two other co-workers.  You purchase a new computer. You install Microsoft Windows Vista on the new computer.  You need to migrate the following content from the old computer to the new computer: All system and program settings  All users settings  Only the content in the C:///Appdata folder  Which tool should you use? ()A File and Settings Transfer wizardB Application Compatibility toolkitC Windows Automated Installation toolkitD Microsoft Windows Easy Transfer wizard