单项选择题
You are the network administrator for Company Inc. Two users named Eric and Julia share a Windows 2000 Professional computer. Eric’s user account is a member of the local Administrators group. Eric needs to share files with Julia. Eric wants Julia to be able to change any of the shared files and to create her own files if necessary. Eric wants to prevent Julia from changing the permissions on files that Eric creates. To accomplish his goal, Eric creates a folder named C:\Data. He changes the NTFS permission on C:\Data to allow his local user account Full Control permissions and to allow Julia’s local user account default permissions. Eric places 10 files in the folder. When Julia logs on to the computer using her local user account and opens a file in C:\Data, she cannot save the changes to the file. Julia also cannot create any new files in the folder. You need to help Eric configure the correct permissions of C:\Data. What should you instruct Eric to do? ()
A.Add Julia’s user account to the local Power Users group.
B.Add Julia’s user account to the local Administrators group.
C.Allow Julia’s user account Write permissions to C:\Data.
D.Allow Julia’s user account Full Control permission to C:\Data.
相关考题
-
单项选择题
You are the administrator of a Windows 2000 network. A user named Carlos configures a shared folder named Technical_Data on his Windows 2000 Professional computer. Carlos wants to audit access to the Technical_Data folder and track any attempts to delete files. Carlos configures auditing for Technical_Data, as shown in the exhibit. The Security Log on Carlos’s computer is set to a maximum log file size of 512 KB and to overwrite events as needed. The next day Carlos reports that files were deleted from the Folder. However, no events were generated in his computer’s Security Log. Carlos needs to discover who is deleting files on his computer. What should you do?()
A.Restart the Security Accounts Manager Service.
B.Modify the Security Log size settings to set the file size to 2,048 KB.
C.In the Local Security Policy setting for Audit Object Access, select the Success and Failurecheck boxes.
D.In the Auditing Entry dial box for Technical_Data, select the Change button and change Everyone to Authenticated Users. -
单项选择题
YouarethenetworkadministratorforCompany.Lauraisasalesrepresentativeforthecompany.ShetravelsonaregularbasisanddialsintothecompanynetworkfromherWindows2000Professionalportablecomputer.Companyrecentlyimplementedanewcomputingsecuritypolicythatmandatesallremoteconnectionsbeestablishedbyatwo-wayauthenticationmethod.YouconfigureaWindows2000ServercomputertorunRoutingandRemoteAccessServerforWindows2000tomeettherequirementsofthenewsecuritypolicy.Laurareportsshenowcannotinitiateadial-upconnection.Lauraneedstodialintothecompanynetwork.Whatshouldyoudo?()
A.Apply the Hisecws.inf Security Template to Laura’s computer.
B.Apply the Compatws.inf Security Template to Laura’s computer.
C.Instruct Laura to configure her dial-up connection to use multi-link.
D.Instruct Laura to configure her dial-up connection to use MS-CHAP v2.
E.Instruct Laura to configure her dial-up connections to use L2TP. -
问答题
You are the desktop administrator for Company Inc. The company’s network contains 500 Windows2000 Professional computers.The information security department releases new security requirements. The new requirements statethat the Telnet service may not be started on any company-owned client computer.You need to create a new security template that prevents the Telnet service from starting on companyownedclient computers. You open the Security Configuration and Analysis console on your Windows2000 Professional computer.Which portion of the console do you need to configure?To answer, click the appropriate container in the Security Configuration and Analysis console.
