Your network consist

题目

Your network consists of a single Active Directory domain. You have a member server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).You need to record all attempts by domain users and local users to log on to Server1. What should you do?()

  • A、In the Default Domain Controller Policy, enable success and failure for the Audit logon events policy setting.
  • B、In the Default Domain Controller Policy, enable success and failure for the Audit account logon events policy setting.
  • C、In the Local Security Policy on Server1, enable success and failure for the Audit logon events policy.
  • D、In the Local Security Policy on Server1, enable success and failure for the Audit account logon events policy setting.
参考答案和解析
正确答案:C
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()

A.A

B.B

C.C

D.D


参考答案:C

第2题:

You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()

  • A、STP
  • B、GVRP
  • C、SNMP
  • D、VTP
  • E、DHCP

正确答案:D

第3题:

A sensor network is ( ) of a large number of sensor nodes that are densely deployed ( ) inside the phenomenon or very close to it.

A.part B.consist C.consisted D.composed A.either B.from C.at D.of


正确答案:D,A

第4题:

Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()

  • A、 core layer
  • B、 bridging two VLANs on one switch
  • C、 between two Layer 2 devices with trunking
  • D、 between two Layer 2 devices without trunking

正确答案:C,D

第5题:

You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()

  • A、Repeater
  • B、Wireless router
  • C、Hub
  • D、Wireless network adapter

正确答案:D

第6题:

You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter.Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.You need to configure the wireless connection to allow your computer to discover other computers.What should you do?()

A.A

B.B

C.C

D.D


参考答案:A

第7题:

Which two statements about common network attacks are true?()

  • A、Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.
  • B、Access attacks can consist of password attacks,ping sweeps,port scans,and man-in-the-middle attacks.
  • C、Access attacks can consist of packet sniffers,ping sweeps,port scans,and man-in-the-middle attacks.
  • D、Reconnaissance attacks can consist of password attacks,trust exploitation,port redirection and Internet information queries.
  • E、Reconnaissance attacks can consist of packet sniffers,port scans,ping sweeps,and Internet information queries.
  • F、Reconnaissance attacks can consist of ping sweeps,port scans,man-in-middle attacks and Internet information queries.

正确答案:A,E

第8题:

Your wireless network is not listed in the Connect to a network window of your computer. You need to connect to your wireless network.Which two actions should you perform?()

A.A

B.B

C.C

D.D

E.E


参考答案:C, D

第9题:

Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system .Which two of these are characteristics of an IDS sensor?()

  • A、 has a permissive interface that is used to monitor networks
  • B、 is an active device in the traffic path
  • C、 passively listens to network traffic
  • D、 has a promiscuous interface that is used to monitor the network

正确答案:C,D

第10题:

You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker.  You need to prevent your co-worker from modifying your wireless network profile.  What should you do?()

  • A、Disable the Connect even if the network is not broadcasting option.
  • B、In the Network and Sharing Center window, click the Diagnose and repair option.
  • C、Set the default wireless profile type to the Use all-users only profile (recommended) option. Recreate the wireless network.
  • D、Set the default wireless profile type to the Use all-users and per-user profiles option. Recreate the wireless network by using the Save this network for me only option.

正确答案:D

更多相关问题