Your network consists of a single Active Directory domain. You have a member server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).You need to record all attempts by domain users and local users to log on to Server1. What should you do?(

题目

Your network consists of a single Active Directory domain. You have a member server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).You need to record all attempts by domain users and local users to log on to Server1. What should you do?()

  • A、In the Default Domain Controller Policy, enable success and failure for the Audit logon events policy setting.
  • B、In the Default Domain Controller Policy, enable success and failure for the Audit account logon events policy setting.
  • C、In the Local Security Policy on Server1, enable success and failure for the Audit logon events policy.
  • D、In the Local Security Policy on Server1, enable success and failure for the Audit account logon events policy setting.

相似考题
更多“Your network consist”相关问题
  • 第1题:

    You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()

    • A、STP
    • B、GVRP
    • C、SNMP
    • D、VTP
    • E、DHCP

    正确答案:D

  • 第2题:

    You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()

    • A、Repeater
    • B、Wireless router
    • C、Hub
    • D、Wireless network adapter

    正确答案:D

  • 第3题:

    Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()

    • A、 core layer
    • B、 bridging two VLANs on one switch
    • C、 between two Layer 2 devices with trunking
    • D、 between two Layer 2 devices without trunking

    正确答案:C,D

  • 第4题:

    You are the network administrator for ExamSheet.net.  You install Windows 2000 Professional on your portable computer. You use a docking station for your portable computer when you are in the office. You install a ISA-based network adapter in your docking station. You insert your computer into the docking station and start the computer. The network adapter is not detected during the startup process. You obtain a disk that contains the supported driver from the network adapter manufacturer. You want to allow Windows 2000 Professional to use the network adapter. What should you do?()

    • A、Restart the computer in the docking station.
    • B、Run the Add/Remove Hardware wizard.
    • C、Use Device Manager to scan for hardware changes.
    • D、Copy the network adapter driver to the Winnt/Driver Cache/i386 folder.
    • E、Install the new network adapter driver.

    正确答案:B,E

  • 第5题:

    A router that performs Network Address Translation (NAT) is installed between your computer and the Internet.  The router fails. You connect the computer directly to the Internet.  You need to ensure that the computer is connected to the Internet in the most secure manner possible.  What should you do?()

    • A、Enable the Remote Desktop feature in the System Properties dialog box.
    • B、Configure the network category of your network connection to Public.
    • C、Configure the network category of your network connection to Private.
    • D、Enable the Windows Collaboration Computer Name Registration Service exception in Microsoft Windows Firewall.

    正确答案:B

  • 第6题:

    单选题
    You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker.  You need to prevent your co-worker from modifying your wireless network profile.  What should you do?()
    A

    Disable the Connect even if the network is not broadcasting option.

    B

    In the Network and Sharing Center window, click the Diagnose and repair option.

    C

    Set the default wireless profile type to the Use all-users only profile (recommended) option. Recreate the wireless network.

    D

    Set the default wireless profile type to the Use all-users and per-user profiles option. Recreate the wireless network by using the Save this network for me only option.


    正确答案: D
    解析: 暂无解析

  • 第7题:

    单选题
    You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()
    A

    STP

    B

    GVRP

    C

    SNMP

    D

    VTP

    E

    DHCP


    正确答案: D
    解析: 暂无解析

  • 第8题:

    单选题
    You are able to access a Web server from your computer by using the IP address of the Web server. You fail to access the Web server when you use its fully qualified domain name. Other users on your network can access the Web server by using both the IP address and the fully  qualified domain name. You need to access the Web server by using the fully qualified domain name.  What should you do? ()
    A

    Use the Diagnose and repair feature in the Network and Sharing Center.

    B

    At the command prompt, type ipconfig /allcompartments.

    C

    Disable the NetBIOS feature on your network adapter.

    D

    Configure the correct default gateway on the Alternate Configuration tab of your network connection properties dialog box.


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    To establish a communication channel for the telex service in the INMARSAT-Aterminal, you should first().
    A

    establish a communication channel from the CES, via the International Telex Network to the final destination

    B

    set up a communication channel from your SES, via a satellite, to a CES within your ocean region

    C

    set up a channel directly to the addressee at the destination

    D

    establish a channel from your terminal , via the International Telex Network to a CES within your ocean region


    正确答案: C
    解析: 暂无解析

  • 第10题:

    多选题
    You are unable to connect your computer to a wireless network projector. The wireless network projector does not appear in the list of available network projectors provided by the Connect to a Network Projector wizard.  You need to connect to the network projector.  What are two possible ways to achieve this goal?()
    A

    Start the Microsoft Windows Media Center Service Launcher service.

    B

    Enable the File and Printer Sharing Windows Firewall exception.

    C

    Connect your computer to the same subnet as the network projector.

    D

    Type the IP address of the network projector in the Connect to a Network Projector wizard.


    正确答案: B,A
    解析: 暂无解析

  • 第11题:

    多选题
    Your wireless network is not listed in the Connect to a network window of your computer. You need to connect to your wireless network.  Which two actions should you perform?()
    A

    Right-click and click the Diagnose option in the Connect to a network window.

    B

    Set the security type value to No authentication in the wireless network properties dialog box.

    C

    Click the Manually connect to a wireless network option in the Set up a connection or network window.

    D

    In the Wireless Network properties dialog box, click the Connect even if the network is not broadcasting option.

    E

    Configure the correct IP address, subnet mask, and default gateway for the target network in the wireless network connection properties dialog box.


    正确答案: A,D
    解析: 暂无解析

  • 第12题:

    Which two statements about common network attacks are true?()

    • A、Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.
    • B、Access attacks can consist of password attacks,ping sweeps,port scans,and man-in-the-middle attacks.
    • C、Access attacks can consist of packet sniffers,ping sweeps,port scans,and man-in-the-middle attacks.
    • D、Reconnaissance attacks can consist of password attacks,trust exploitation,port redirection and Internet information queries.
    • E、Reconnaissance attacks can consist of packet sniffers,port scans,ping sweeps,and Internet information queries.
    • F、Reconnaissance attacks can consist of ping sweeps,port scans,man-in-middle attacks and Internet information queries.

    正确答案:A,E

  • 第13题:

    Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system .Which two of these are characteristics of an IDS sensor?()

    • A、 has a permissive interface that is used to monitor networks
    • B、 is an active device in the traffic path
    • C、 passively listens to network traffic
    • D、 has a promiscuous interface that is used to monitor the network

    正确答案:C,D

  • 第14题:

    You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker.  You need to prevent your co-worker from modifying your wireless network profile.  What should you do?()

    • A、Disable the Connect even if the network is not broadcasting option.
    • B、In the Network and Sharing Center window, click the Diagnose and repair option.
    • C、Set the default wireless profile type to the Use all-users only profile (recommended) option. Recreate the wireless network.
    • D、Set the default wireless profile type to the Use all-users and per-user profiles option. Recreate the wireless network by using the Save this network for me only option.

    正确答案:D

  • 第15题:

    Your network administrator has assigned you an IP address of 192.168.0.20 with subnet mask of 255.255.255.0.Your network is running in pure Windows 2000 domain. What else should know in order to join your computer to the Windows 2000 domain. ()

    • A、 Address of DHCP server.
    • B、 Address of WINS server.
    • C、 Address of DNS server.
    • D、 Address of default gateway

    正确答案:C

  • 第16题:

    Your network consists of an Active Directory domain named contoso.com. You have a computer namedcomputer1.contoso.com. Your network is configured to use only IPv6. You need to request that a DNS record be created to enable users to connect to your computer by using the name dev.contoso.com.  Which type of record should you request ?()

    • A、A
    • B、AAAA
    • C、HINFO
    • D、NAPTR

    正确答案:B

  • 第17题:

    单选题
    You want to connect your Windows 2000 Professional computer to multiple TCP/IP subnets on your company’s network. Your computer currently has an ISA network adapter installed. You install a second ISA network adapter. After you restart your computer, you notice that the second ISA network adapter is not functioning. What should you do?()
    A

    Set the driver signing option to block.

    B

    Set the driver signing option to ignore.

    C

    In the computer’s BIOS, reserve an unused IRQ for ISA devices.

    D

    In the Device Manager, configure the second ISA network adapter to use an unused IRQ.


    正确答案: D
    解析: 暂无解析

  • 第18题:

    单选题
    As a network engineer at Certpaper.com, you are responsible for Certpaper network. Which will benecessarily taken into consideration when implementing Syslogging in your network?()
    A

    Enable the highest level of Syslogging available to ensure you log all possible event messages

    B

    Use SSH to access your Syslog information

    C

    Log all messages to the system buffer so that they can be displayed when accessing the router

    D

    Syncronize clocks on the network with a protocol such as Network Time Protocol


    正确答案: A
    解析: 暂无解析

  • 第19题:

    单选题
    You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()
    A

    IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats

    B

    detailed security device specifications

    C

    results from pilot network testing

    D

    results from a network audit


    正确答案: C
    解析: 暂无解析

  • 第20题:

    多选题
    Which two statements accurately describe a broadcast domain?()
    A

    Broadcast domains consist of devices that connect to a common switch or hub.

    B

    Broadcast domains consist of a group of devices that can be reached by sending a frame addressed to the Layer 2 broadcast address.

    C

    Broadcast domains require a gateway device such as a router.

    D

    Broadcast domains consist of devices that reside on the same sub-network.


    正确答案: D,B
    解析: 暂无解析

  • 第21题:

    多选题
    Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system.Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()
    A

    core layer

    B

    bridging two VLANs on one switch

    C

    between two Layer 2 devices withtrunking

    D

    between two Layer 2 devices withouttrunking


    正确答案: D,B
    解析: 暂无解析

  • 第22题:

    单选题
    You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter. Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.  You need to configure the wireless connection to allow your computer to discover other computers.  What should you do?()
    A

    Configure the network category of your wireless network connection to Private.

    B

    Configure the network category of your wireless network connection to Public.

    C

    Configure the TCP/IP packet filtering on the wireless network connection.

    D

    Configure the wireless network connection with the appropriate authentication to the router.


    正确答案: A
    解析: 暂无解析