單項(xiàng)選擇題

You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller.
How should you configure the local computer policy on these computers? () 

A.Enable the Require domain controller to unlock policy.
B.Set the Number of previous logons to cache policy to 0.  
C.Remove all user and group accounts from the Log on locally user right. 
D.Remove all user and group accounts from the Access this computer from the network user right. 

題目列表

你可能感興趣的試題

單項(xiàng)選擇題

You are the desktop administrator for one of your company's branch offices. The network in your branch office contains 100 Windows XP Professional computers. The computers are configured with the Compatws.inf security template. One of the network administrators in the company's main office creates a new security template named CompanySec.inf. The new template is designed to be applied to each of the company's Windows XP Professional computers. The users in your branch office have different security requirements from the users in the main office. You need to find out whether the new security template will violate the security requirements of the users in the branch office.
What should you do?()

A.Run the Secedit.exe command in validation mode and specify the new security template.
B.Run the Secedit.exe command in configuration mode and specify the new security template. 
C.Use the Security Configuration and Analysis console to import both templates into a security database, and then perform an Analyze operation. 
D.Use the Security Configuration and Analysis console to import both templates into a security database, and then perform a Configure operation. 

多項(xiàng)選擇題

You are the desktop administrator for your company. The company's network contains 500 Windows XP Professional computers. The information security department releases a new security template named NewSec.inf. You import NewSec.inf into a security database named NewSec.sdb. You analyze the result, and you review the changes that the template makes. You examine the security policies that are defined in NewSec.inf. You discover that the settings in NewSec.inf have not been implemented on your computer. You need to ensure that the settings in NewSec.inf overwrite the settings in your computer's local security policy.
What are two possible ways to achieve this goal?()

A.Run the Secedit /configure /db C:\NewSec.sdb command.
B.Run the Secedit /refreshpolicy machine_policy command.
C.Copy NewSec.inf to the C:\Windows\Inf folder. 
D.Copy NewSec.sdb to the C:\Windows\System32\Microsoft\Protect folder. 
E.Use the Security Configuration and Analysis console to open NewSec.sdb and then to perform a Configure operation. 
F.Use the Security Configuration and Analysis console to export NewSec.sdb to the Defltwk.inf security template. 

微信掃碼免費(fèi)搜題