单项选择题
A.Run the Secedit.exe command in validation mode and specify the new security template.
B.Run the Secedit.exe command in configuration mode and specify the new security template.
C.Use the Security Configuration and Analysis console to import both templates into a security database, and then perform an Analyze operation.
D.Use the Security Configuration and Analysis console to import both templates into a security database, and then perform a Configure operation.
多项选择题 You are the desktop administrator for your company. The companys network contains 500 Windows XP Professional computers. The information security department releases a new security template named NewSec.inf. You import NewSec.inf into a security database named NewSec.sdb. You analyze the result, and you review the changes that the template makes. You examine the security policies that are defined in NewSec.inf. You discover that the settings in NewSec.inf have not been implemented on your computer. You need to ensure that the settings in NewSec.inf overwrite the settings in your computers local security policy. What are two possible ways to achieve this goal?()
单项选择题 You are the desktop administrator for your company. The companys network consists of a single Microsoft Windows NT domain. The network contains 2,000 Windows XP Professional computers. The information security department releases a new security template named NewSecurity.inf. You are instructed to apply the new template to all 2,000 Windows XP Professional computers. You use the Security Configuration and Analysis console to import NewSecurity.inf into a security database named NewSec.sdb. You copy NewSec.sdb to a folder named Sec on a server named Server1. You need to apply NewSecurity.inf to the Windows XP Professional computers. What should you do?()
单项选择题 You are the desktop administrator for Contoso, Ltd. The companys network contains 1,000 Windows XP Professional computers, which are members of a single Active Directory domain. The computers hard disks are formatted as NTFS. The companys software developers release a new custom application. The application uses a .dll file named AppLib.dll, which is installed in a folder named \Program Files\Contoso\OpsApp. The companys help desk technicians report that several users experience problems when they use the application because the AppLib.dll file was deleted on their client computers. The companys software developers recommend that you modify the file permissions on AppLib.dll so that users have only Read permission on the file. You need to ensure that all users have only Read permission on the AppLib.dll file on all 1,000 Windows XP Professional computers. What should you do?()