单项选择题

A.On the computer, save and clear the security log, set the CrashOnAuditFail setting to 1, and restart the computer. 
B.On the computer, modify the local audit policy so that system events are not audited, set the CrashOnCtrlScroll setting to 1, and restart the computer. 
C.In the domain, modify Marc's Logon Workstations list to include the name of the computer.
D.In the domain, modify Marc's account properties to unlock the account. 

相关考题

单项选择题 You are the administrator of 30 Windows XP Professional computers. The computers are not members of a domain. Users of the Windows XP Professional computers encrypt files on the local computers. A user named Stephen reports that he cannot remember his current password. However, he does remember his previous password. Before he changed to his current password, Stephen created a password reset disk. You want to ensure that Stephen can log on to his Windows XP Professional computer again, and that he can open the encrypted files. What should you do?()

单项选择题 You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? ()

单项选择题 You are the desktop administrator for one of your companys branch offices. The network in your branch office contains 100 Windows XP Professional computers. The computers are configured with the Compatws.inf security template. One of the network administrators in the companys main office creates a new security template named CompanySec.inf. The new template is designed to be applied to each of the companys Windows XP Professional computers. The users in your branch office have different security requirements from the users in the main office. You need to find out whether the new security template will violate the security requirements of the users in the branch office. What should you do?()