单项选择题
A.Add Julia’s user account to the local Power Users group.
B.Add Julia’s user account to the local Administrators group.
C.Allow Julia’s user account Write permissions to C:\Data.
D.Allow Julia’s user account Full Control permission to C:\Data.
单项选择题 You are the administrator of a Windows 2000 network. A user named Carlos configures a shared folder named Technical_Data on his Windows 2000 Professional computer. Carlos wants to audit access to the Technical_Data folder and track any attempts to delete files. Carlos configures auditing for Technical_Data, as shown in the exhibit. The Security Log on Carlos’s computer is set to a maximum log file size of 512 KB and to overwrite events as needed. The next day Carlos reports that files were deleted from the Folder. However, no events were generated in his computer’s Security Log. Carlos needs to discover who is deleting files on his computer. What should you do?()
单项选择题 YouarethenetworkadministratorforCompany.Lauraisasalesrepresentativeforthecompany.ShetravelsonaregularbasisanddialsintothecompanynetworkfromherWindows2000Professionalportablecomputer.Companyrecentlyimplementedanewcomputingsecuritypolicythatmandatesallremoteconnectionsbeestablishedbyatwo-wayauthenticationmethod.YouconfigureaWindows2000ServercomputertorunRoutingandRemoteAccessServerforWindows2000tomeettherequirementsofthenewsecuritypolicy.Laurareportsshenowcannotinitiateadial-upconnection.Lauraneedstodialintothecompanynetwork.Whatshouldyoudo?()
问答题 You are the desktop administrator for Company Inc. The company’s network contains 500 Windows2000 Professional computers.The information security department releases new security requirements. The new requirements statethat the Telnet service may not be started on any company-owned client computer.You need to create a new security template that prevents the Telnet service from starting on companyownedclient computers. You open the Security Configuration and Analysis console on your Windows2000 Professional computer.Which portion of the console do you need to configure?To answer, click the appropriate container in the Security Configuration and Analysis console.