单项选择题
A.Use Computer Management to configure separate memory spaces for each financial application on Helena’s Computer.
B.Use Security Templates to edit the Security Policy to include the financial applications on Helena’s Computer. Then add Helena’s user account to the Power User Group on Helena’s Computer.
C.Use Security Configuration and Analysis to reconfigure the default security policy .inf file to allow the finance applications to run on Helena’s Computer.
D.Use secedit.exe to apply the Compatws.inf security template to Helena’s Security Policy to loose the permission for the Local User group on Helena’s Computer.
单项选择题 You upgrade 11 computers in the accounting department from Windows NT Workstation 4.0 to Windows 2000 Professional. All of the upgraded computers are configured to have the default security settings. After the upgrade, users in the accounting department report that they can no longer run any financial or credit applications on their computers. You want all accounting department users to be able to run these applications. You want to allow only the rights that allow users to run the applications. What should you do?()
单项选择题 Youaretheadministratorofyourcompany’snetwork.YouuseSecurityTemplatestoconfigureaSecurityPolicyontheWindows2000ProfessionalComputersintheSalesorganizationalunit(OU).YounoticethattheComputersintheSalesOUarenotdownloadingtheSecurityPolicysettings.Oneachcomputer,theSecurityPolicyappearsintheLocalComputerPolicy,butisnotlistedastheeffectivepolicy.YouwantallcomputersintheSalesOUtohavetheSecurityPolicylistedastheeffectivepolicy.Howshouldyouaccomplishthistask?()
单项选择题 YouareauditingsomeeventsonyourWindows2000Professionalcomputer.Youmakechangesinthesystemtimeofthiscomputer.Underwhateventwillthislogbegeneratedintheeventviewer?()