网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

在“systemroot/Security/Templates”中存在若干个扩展名为.inf的文件,该类文件是()。

  • A、临时文件
  • B、预定义安全模板
  • C、配置文件模板
  • D、审核文件模板

参考答案

更多 “在“systemroot/Security/Templates”中存在若干个扩展名为.inf的文件,该类文件是()。A、临时文件B、预定义安全模板C、配置文件模板D、审核文件模板” 相关考题
考题 You are the domain administrator for Ezonexam.com. The network contains a Windows 2000 domain and two Windows NT domains. The Windows 2000 domain trusts each of the Windows NT domains, and the Windows NT domains trust the Windows 2000 domain.You are required to configure one of the Windows 2000 domain controllers named Ezonexam4 to support several legacy applications that are not Windows 2000 certified.What should you do? (Select two. Each answer specifies a complete solution).A. On Ezonexam4, type secedit /configure /db secedit.sdb /cfgC:\winnt\security\templates\hisecdc.inf /overwrite.B. On Ezonexam4, type secedit /configure /db secedit.sdb /cfgC:\winnt\security\templatescompatws.inf /overwrite.C. On Ezonexam4, use the Security Configuration and Analysis snap-in to apply the Compatws.inf security template.D. On Ezonexam4, use the Security Configuration and Analysis snap-in to apply the Hisecdc.infE. On Ezonexam4, use the Security Templates snap-in to open the Compatws.inf security template.F. On Ezonexam4, use the Security Templates snap-in to open the Hisecdc.inf security template.

考题 When creating a network security solution, which two pieces of information should you have previously obtained to assist in designing the solution? ()A、a list of existing network applications currently in use on the networkB、network audit results to uncover any potential security holesC、a planned Layer 2 design solutionD、a proof-of-concept planE、device configuration templates

考题 在安装Smarty模板时,用来存储Smarty模板的目录和配置文件目录的两个属性是()。A、templates、configs_dirB、templates、configsC、templates_dir、configsD、template_dir、configs_dir

考题 Windows NT中哪个文件夹存放SAM文件()。A、/%Systemroot%B、/%Systemroot%/system32/samC、/%Systemroot%/system32/configD、/%Systemroot%/config

考题 在Windows瘫痪下的注册表处理.可在DOS下运行()程序并创建ASR软盘,把在%SystemRoot%Repair目录下找到你的注册表备份复制到另一个地方A、BackupB、CopyC、%SystemRoot%RepairD、%SystemRoot%System32Config

考题 你想跟踪DNS的活动,于是便打开DNS服务器的日志。在缺省情况下,DNS日志文件位于什么地方()A、%SystemRoot%/DNS/dns.logB、%SystemRoot%/System32/DNS/dns.logC、%SystemRoot%/System32/LOGS/dns.logD、%SystemRoot%/LOGS/dns.log

考题 在一个Windows 2000的服务器上安装了活动目录。在安装时,你没有指定数据库所在的位置。在缺省情况下,活动目录数据库应处于以下哪一个位置()A、%SystemRoot%/NTDSB、/NTDSC、%SystemRoot%/system32/NTDSD、%SystemRoot%/system32/ActiveDirectory

考题 默认配置喜爱,IIS的日志被存储在()目录中。A、%systemroot%/system32/logfiles/w3svcB、%systemroot%/logs/w3svcC、%systemroot%/logfiles/w3svc

考题 You are the administrator of your company’s network. Ten Windows 2000 Professional computers are located in the Research department. The computers contain highly confidential information. You want the 10 computers to be able to communicate with other Windows 2000 Professional computers on the network. However, you do not want them to communicate with computers that are not running Windows 2000, including those that are running Windows 95, Windows 98 and Windows NT.  You want to configure a security policy on each computer to ensure that the confidential information is secure. What should you do?()A、Use Security Configuration and Analysis to import the Hisecws.inf security template file to modify the default security settings.B、Use security templates to create a security template file and import the security settings to modify the default security settings.C、Use the local computer policy to disable the access to this computer from the network option.D、Use Secedit.exe to reconfigure the computers’ default security settings to not allow anonymous access to the computers.

考题 You are the administrator of your company’s network. You use Security Templates to configure a Security Policy on the Windows 2000 Professional Computers in the Sales organizational unit (OU). You notice that the Computers in the Sales OU are not downloading the Security Policy settings. On each computer, the Security Policy appears in the Local Computer Policy, but is not listed as the effective policy. You want all computers in the Sales OU to have the Security Policy listed as the effective policy. How should you accomplish this task? ()A、Use Security Templates to correct the setting and export the security file.B、Use Security Configuration and Analysis to import the security setting. Then create a Group policy object (GPO) for the Sales QU.C、Use Secedit /RefreshPolicy Machine_Policy command.D、Use the Basicwk.inf security file settings, save the security file, and then import the fileto theComputers.

考题 You have a server that runs Windows Server 2003 Service Pack 2 (SP2).You need to compare the current security settings of the server to a security template. Which tool should you use?()A、Security Templates snap-in B、Group Policy Management Console C、Security Configuration and Analysis snap-in D、Microsoft Baseline Security Analyzer (MBSA)

考题 You have two stand-alone servers named Server1 and Server2. Both servers run Windows Server 2003 Service Pack 2 (SP2).On Server1, you save the local security policy as a template. You need to import the template to Server2. What should you run on Server2?()A、the Security Templates snap-inB、the Security Configuration WizardC、the Microsoft Baseline Security AnalyzerD、the Security Configuration and Analysis snap-in

考题 你是 TestKing.com 的一位安全管理人。网络由一个独立的名叫 testking.com活动目录域组成。所有的服务器运行Windows Server  2003。一个名为TestKing3的服务器不是这个域的成员。其他的所有服务器都是这个域的成员。TestKing.com的书面安全策略要求:所有的服务器必须有确定的安全设置,包括详细的事件日志设置和注册许可设置。被要求的安全设置在一个名为TestKing.inf的安全模板中被详细说明。你需要应用来自TestKing.inf安全模板的设置到TEstKing3。你应该怎么做?()A、在TEstKing3上,从Administrative Tools菜单中打开Local Security Policy,然后使用Import Policy指令来输入TestKing.infB、在TEstKing3上,打开Local Security Policy,然后选择Security Settings。使用Import Policy指令来输入TestKing.infC、在TEstKing3上,打开Security Configuration and Analysis。使用Import Template指令来输入TestKing.inf,然后运行Configure Computer Now指令D、在TEstKing3上,复制TestKing.inf到Systemroot/Security/Templates文件夹E、在TEstKing3上,复制TestKing.inf到Systemroot/System32/组Policy/Machine 文件夹

考题 单选题默认配置喜爱,IIS的日志被存储在()目录中。A %systemroot%/system32/logfiles/w3svcB %systemroot%/logs/w3svcC %systemroot%/logfiles/w3svc

考题 单选题你是 TestKing.com 的一位安全管理人。网络由一个独立的名叫 testking.com活动目录域组成。所有的服务器运行Windows Server  2003。一个名为TestKing3的服务器不是这个域的成员。其他的所有服务器都是这个域的成员。TestKing.com的书面安全策略要求:所有的服务器必须有确定的安全设置,包括详细的事件日志设置和注册许可设置。被要求的安全设置在一个名为TestKing.inf的安全模板中被详细说明。你需要应用来自TestKing.inf安全模板的设置到TEstKing3。你应该怎么做?()A 在TEstKing3上,从Administrative Tools菜单中打开Local Security Policy,然后使用Import Policy指令来输入TestKing.infB 在TEstKing3上,打开Local Security Policy,然后选择Security Settings。使用Import Policy指令来输入TestKing.infC 在TEstKing3上,打开Security Configuration and Analysis。使用Import Template指令来输入TestKing.inf,然后运行Configure Computer Now指令D 在TEstKing3上,复制TestKing.inf到Systemroot/Security/Templates文件夹E 在TEstKing3上,复制TestKing.inf到Systemroot/System32/组Policy/Machine 文件夹

考题 单选题You have a server that runs Windows Server 2003 Service Pack 2 (SP2). You need to compare the current security settings of the server to a security template. Which tool should you use?()A Security Templates snap-inB Group Policy Management ConsoleC Security Configuration and Analysis snap-inD Microsoft Baseline Security Analyzer (MBSA)

考题 单选题You are the desktop administrator for one of your company's branch offices. The network in your branch office contains 100 Windows XP Professional computers. The computers are configured with the Compatws.inf security template. One of the network administrators in the company's main office creates a new security template named CompanySec.inf. The new template is designed to be applied to each of the company's Windows XP Professional computers. The users in your branch office have different security requirements from the users in the main office. You need to find out whether the new security template will violate the security requirements of the users in the branch office. What should you do?()A Run the Secedit.exe command in validation mode and specify the new security template.B Run the Secedit.exe command in configuration mode and specify the new security template. C Use the Security Configuration and Analysis console to import both templates into a security database, and then perform an Analyze operation. D Use the Security Configuration and Analysis console to import both templates into a security database, and then perform a Configure operation. 

考题 单选题Your network contains an Active Directory domain named contoso.com.     You need to create a central store for the Group Policy Administrative templates.     What should you do()A Run dfsrmig.exe /createglobalobjects.B Run adprep.exe /domainprep /gpprep.C Copy the %SystemRoot%/PolicyDefinitions folder to the //contoso.com/SYSVOL/contoso.com/Policies folder.D Copy the %SystemRoot%/System32/GroupPolicy folder to the //contoso.com/SYSVOL/contoso.com/Policies folder

考题 单选题You are the administrator of your company's network. You want to configure a Security Policy for the Windows 2000 Professional Computers that are in the sales department.   On one of the computers, you use Security Templates to configure the Security Policy based on the desired security settings. You then export those settings to an .inf file that will be used on all of the Computers in the sales department. You want to configure each Computer to have a customized Security Policy. What steps should you follow in order to achieve your goal?()A Use Secedit.exe to import the security settings from the .inf file to the computers in the sales department.B Use a text editor to change the default security settings to the desired security settings. Then export those settings to the Computers in the sales department.C Create an organizational unit (OU) named Sales. Add the users in the sales department to the Sales OU. Then apply the security template to the users in the Sales OU.D Create an organizational unit (OU) named Sales. Add the computers in the sales department to the Sales OU. Then apply the security template to computers in the Sales OU.

考题 单选题You have two stand-alone servers named Server1 and Server2. Both servers run Windows Server 2003 Service Pack 2 (SP2).On Server1, you save the local security policy as a template. You need to import the template to Server2. What should you run on Server2?()A the Security Templates snap-inB the Security Configuration WizardC the Microsoft Baseline Security AnalyzerD the Security Configuration and Analysis snap-in

考题 单选题Windows NT中哪个文件夹存放SAM文件()。A /%Systemroot%B /%Systemroot%/system32/samC /%Systemroot%/system32/configD /%Systemroot%/config

考题 单选题You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. All client computers run Windows XP Professional, and all client computer objects are store din the Clients organizational unit (OU). Client computers receive critical security patches from servers at Microsoft. A server named Testking1 runs Software Update Services (SUS). You enable Testking1 to obtain and store security patches for distribution on the internal network. Now you need to ensure that all client computers receive future security patches from Testking1 only. You open the Group Policy object (GPO) for the Clients OU. Which setting should you configure?()A Computer Configuration/Software Settings/Software InstallationB User Configuration/Software Settings/Software InstallationC Computer Configuration/Administrative Templates/Windows Components/Windows InstallerD User Configuration/Administrative Templates/Windows Components/Windows InstallerE Computer Configuration/Administrative Templates/Windows Components/Windows UpdateF User Configuration/Administrative Templates/Windows Components/Windows Update

考题 单选题Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). You enable auditing for failed logon attempts on all domain controllers. You need to ensure that a record of failed logon attempts is retained for 90 days on all domain controllers. What should you do?()A From the Security Templates snap-in, open the hisecdc template. Modify the Retain System Log setting.B From the Security Templates snap-in, open the securedc template. Modify the Retain Security Log setting.C Open the Default Domain Policy. Modify the Retain System Log setting.D Open the Default Domain Controller Policy. Modify the Retain Security Log setting.

考题 单选题Which statement regarding the implementation of an IDP policy template is true?()A IDP policy templates are automatically installed as the active IDP policy.B IDP policy templates are enabled using a commit script.C IDP policy templates can be downloaded without an IDP license.D IDP policy templates are included in the factory-default configuration.

考题 单选题在“systemroot/Security/Templates”中存在若干个扩展名为.inf的文件,该类文件是()。A 临时文件B 预定义安全模板C 配置文件模板D 审核文件模板

考题 多选题You are designing a security strategy for the infrastructure servers at the resorts.Which two actions should you perform?(Each correct answer presents part of the solution. Choose two)()APlace all infrastructure servers in subnets that cannot exchange information with the InternetBEstablish a custom security template that contains unique required settings for each combination of services that run on the infrastructure serversCUse Group Policy objects (GPOs) to apply the custom security template or templates to the Infrastructure serversDEdit the local policy settings to configure each individual server

考题 多选题When creating a network security solution, which two pieces of information should you have previously obtained to assist in designing the solution? ()Aa list of existing network applications currently in use on the networkBnetwork audit results to uncover any potential security holesCa planned Layer 2 design solutionDa proof-of-concept planEdevice configuration templates