网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
A user has used all of the allowed logon attempts for the userid. Which command can be used to reset the unsuccessful_login_count to 0 for that user?()
A
usrck
B
chsec
C
chuser
D
passwd
参考答案
参考解析
解析:
暂无解析
更多 “单选题A user has used all of the allowed logon attempts for the userid. Which command can be used to reset the unsuccessful_login_count to 0 for that user?()A usrckB chsecC chuserD passwd” 相关考题
考题
Which of the following statements is used to revoke all DML privileges on table EMPLOYEE from user TOM?()
A.REVOKE ALL PRIVILEGES FROM USER tomB.REVOKE ALL ON EMPLOYEE FROM USER tomC.REVOKE EXECUTE ON EMPLOYEE FROM USER tomD.REVOKE PRIVILEGES ON EMPLOYEE FROM USER tom
考题
You discover audit log entries that report attempts to log on to your computer. You need to be notified of all logon attempts that occur on your computer.What should you do?()
A.AB.BC.CD.D
考题
When using the Tivoli Dynamic Workload Console, which monitor tasks are available to the user?()A、 all those that have been created by all usersB、 just those created by the user in the current sessionC、 all those created by the user and shared with user’s login groupD、 just those where the connection engine specifies the user’s logon
考题
Which of the following is the BEST way to ensure that all users receive a mapping to multiple shared drives?()A、Configure individual user accountsB、Logon scriptsC、Local policyD、Set NTFS permissions
考题
You have configured the Odyssey Access Client with a profile which has the "Disable Server Verification" setting cleared.What will be the result if the device certificate on the MAG Series device has expired and the user attempts to authenticate?()A、The user will be instructed to call the network administrator.B、The user will fail authentication.C、The user will be prompted to install a new device certificate on the MAG Series device.D、The user will successfully authenticate and have full network access.
考题
The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()A、On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policyB、On all client computers, implement logon auditing for all user account logonsC、On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policyD、On all domain controllers, implement logon auditing for all user account logons
考题
Your company has an Active Directory directory service domain. All servers run Windows Server 2003. All domain controllers are configured to audit specific events. You are developing a security monitoring plan for the domain controllers. You must back up the following information. Local logon attemptsDomain logon attemptsSecurity update installation attempts You need to specify the appropriate log files to back up. Which files should you specify? ()A、 AppEvent.Evt and NTDS.EvtB、 NTDS.Evt and SecEvent.EvtC、 SecEvent.Evt and SysEvent.EvtD、 AppEvent.Evt and SysEvent.Evt
考题
Which of the following is the BEST way to make sure the network printer is automatically installed when the user logs on?()A、Log onto the user’s computer as a local administrator and install the printer.B、Make sure the user has permission to print to the printer.C、Create and implement a logon script.D、After the user has logged on, install the printer.
考题
A user attempts to login to a bookmarked site but is prompted for their social security number,mother’s maiden name and date of birth. Which of the following has MOST likely happened?()A、The website has updated the security policies.B、The user’s identity has been stolen.C、The browser has been hijacked.D、The user typed the website address incorrectly.
考题
Which of the following is the MOST important reason for referencing the HCL?()A、 To ensure that all hardware being used has previously been testedB、 To ensure that all hardware being used has the latest firmwareC、 To ensure that all hardware being used is the most energy efficientD、 To ensure that all hardware being used can be upgraded in the future
考题
If a user attempts to go to a website and notices the URL has changed, which of the following attacks is MOST likely the cause?()A、DLL injectionB、DDoS attackC、DNS poisoningD、ARP poisoning
考题
A user has used all of the allowed logon attempts for the userid. Which command can be used to reset the unsuccessful_login_count to 0 for that user?()A、usrckB、chsecC、chuserD、passwd
考题
Which statement is true about the database and database-user used during installation of IMS Server?()A、A preexisting database user may be used but a new database has to be created during installation.B、A preexisting database may be used but a new database user has to be created during installation.C、A preexisting database and user may be used or a new database and user are created during installation.D、A preexisting database and user cannot be used; a new database and user are created during installation.
考题
Which of the following statements is used to revoke all DML privileges on table EMPLOYEE from user TOM?()A、REVOKE ALL PRIVILEGES FROM USER tomB、REVOKE ALL ON EMPLOYEE FROM USER tomC、REVOKE EXECUTE ON EMPLOYEE FROM USER tomD、REVOKE PRIVILEGES ON EMPLOYEE FROM USER tom
考题
Your database initialization parameter file has the following entry: SEC_MAX_FAILED_LOGIN_ATTEMPTS=3 Which statement is true regarding this setting?()A、 It drops the connection after the specified number of login attempts fail for any user.B、 It is enforced only if the password profile is enabled for the user.C、 It locks the user account after the specified number of attempts.D、 It drops the connection after the specified number of login attempts fail only for users who have the SYSDBA privilege.
考题
You discover audit log entries that report attempts to log on to your computer. You need to be notified of all logon attempts that occur on your computer. What should you do?()A、Enable the Problem Reporting feature for all users.B、Configure a custom view to monitor failed logon events on your computer.C、Use the Computer Management console to connect to your computer from another computer and monitor the audit logs.D、In the Event Viewer window, attach a task to a failed logon event. Configure this task to send an e-mail message to your e-mail account.
考题
You are designing a strategy for migrating the UNIX user accounts to Active Directory. Which three actions should you perform?()A、 Import the user accounts as inetOrgPerson objects.B、 Import the user accounts into Active Directory by using the Ldifde command-line tool.C、 Export all user accounts from the UNIX servers to a text file.D、 Export all user accounts and their passwords from the UNIX servers to a text file. Encrypt this file to achieve extra security.E、 Assign random passwords to each user object, and securely distribute the password to the users.F、 Create the same strong password for each user object, and require users to change their passwords at first logon.G、 Instruct users to use the same name and password as they used on the UNIX servers.
考题
Your company has an Active Directory domain. A user attempts to log on to the domain from a client computer and receives the following message: "This user account has expired Ask your administrator to reactivate the account." You need to ensure that the user is able to log on to the domain. What should you do()A、Modify the properties of the user account to set the account to never expire.B、Modify the properties of the user account to extend the Logon Hours setting.C、Modify the properties of the user account to set the password to never expire.D、Modify the default domain policy to decrease the account lockout duration.
考题
Devin, a user on your Windows 2000 network, complains that when he tries logging on locally to his Windows 2000 Professional computer an error message is displayed. ‘The local Policy of this Computer does not allow interactive logons’ Devin is sure that he has used the correct username and password. What is the most likely cause of this problem?()A、The local user account is disabled.B、The logon rights have been modified.C、The local user account password is case-sensitive.D、The local user account username is incorrect.
考题
单选题When using the Tivoli Dynamic Workload Console, which monitor tasks are available to the user?()A
all those that have been created by all usersB
just those created by the user in the current sessionC
all those created by the user and shared with user’s login groupD
just those where the connection engine specifies the user’s logon
考题
单选题A user attempts to login to a bookmarked site but is prompted for their social security number,mother’s maiden name and date of birth. Which of the following has MOST likely happened?()A
The website has updated the security policies.B
The user’s identity has been stolen.C
The browser has been hijacked.D
The user typed the website address incorrectly.
考题
多选题The default domain GPO in your company is configured by using the following account policy settings: - Minimum password length: 8 characters - Maximum password age: 30 days - Enforce password history: 12 passwords remembered - Account lockout threshold: 3 invalid logon attempts .Account lockout duration: 30 minutes You install Microsoft SQL Server on a computer named Server1 that runs Windows Server 2008 R2. The SQL Server application uses a service account named SQLSrv. The SQLSrv account has domain user rights. The SQL Server computer fails after running successfully for several weeks. The SQLSrv user account is not locked out. You need to resolve the server failure and prevent recurrence of the failure. Which two actions should you perform()AReset the password of the SQLSrv user account.BConfigure the local security policy on Server1 to grant the Logon as a service right on the SQLSrv user account.CConfigure the properties of the SQLSrv account to Password never expires.DConfigure the properties of the SQLSrv account to User cannot change password.EConfigure the local security policy on Server1 to explicitly grant the SQLSrv user account the Allow logon locally us
考题
单选题You are a network administrator for TestKing. The network consists of a single Active Directory domain named testking.com. All servers run Windows Server 2003. All client computers run Windows XP Professional. A server named Testking32 contains a folder that is shared as ManagerData$. A global group named AllManagers has permission to access the shared folder. A user reports that he needs access to the ManagerData$ shared folder. You add his user account to the All Managers global group. When the user attempts to connect to the shared folder by typing //Testking32/ManagerData$/ , he receives the following error message: "//Testking32/ManagerData$/ is not accessible. You might not have permissions to use the network resource. Contact the administrator of this server to find out if you have access permissions. Access is denied. You need to ensure that the user can access the ManagerData$ shared folder on Testking32. What should you do?()A
Instruct the user to type //Testking32/ManagerData/ when he attempts to access the folder.B
Add the Anonymous Logon group to the ACL for the ManagerData$ shared folder.C
Select the Replace permission entries on all child object with entries shown here that apply to child objects check box.D
Instruct the user to log off and log on again before he accesses the folder.
考题
单选题A company has completed two acquisitions over the previous year. Each of the acquired companies was allowed to keep its own independent authentication server. The network administrator has been asked to roll out the Junos Pulse Access Control Service to users within the original company along with each of the two acquired organizations.The administrator configures three authentication realms, one for each independent authentication server, and associates them all with a single sign-in policy. All of the client endpoints are running Junos Pulse on their Windows XP desktops. When a user signs in to the Junos Pulse Access Control Service, which statement is correct?()A
The first authentication realm that was added to the sign-in policy is used by default.B
The user is allowed to choose the correct authentication realm from a list presented by Junos Pulse.C
When Junos Pulse is initially installed on the desktop, it must be configured with the correct realm.D
This is not an allowed configuration; the administrator should configure separate sign-in policies for each realm.
考题
单选题The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()A
On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policyB
On all client computers, implement logon auditing for all user account logonsC
On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policyD
On all domain controllers, implement logon auditing for all user account logons
考题
单选题Devin, a user on your Windows 2000 network, complains that when he tries logging on locally to his Windows 2000 Professional computer an error message is displayed. ‘The local Policy of this Computer does not allow interactive logons’ Devin is sure that he has used the correct username and password. What is the most likely cause of this problem?()A
The local user account is disabled.B
The logon rights have been modified.C
The local user account password is case-sensitive.D
The local user account username is incorrect.
考题
单选题Which of the following is the MOST important reason for referencing the HCL?()A
To ensure that all hardware being used has previously been testedB
To ensure that all hardware being used has the latest firmwareC
To ensure that all hardware being used is the most energy efficientD
To ensure that all hardware being used can be upgraded in the future
考题
单选题Which statement is true about the database and database-user used during installation of IMS Server?()A
A preexisting database user may be used but a new database has to be created during installation.B
A preexisting database may be used but a new database user has to be created during installation.C
A preexisting database and user may be used or a new database and user are created during installation.D
A preexisting database and user cannot be used; a new database and user are created during installation.
热门标签
最新试卷