欢迎来到牛牛题库网 牛牛题库官网
logo
全部科目 > 微软认证考试 > MCP > MCP(70-210)

单项选择题

You are the administrator of your company’s network. Ten Windows 2000 Professional computers are located in the Research department. The computers contain highly confidential information. You want the 10 computers to be able to communicate with other Windows 2000 Professional computers on the network. However, you do not want them to communicate with computers that are not running Windows 2000, including those that are running Windows 95, Windows 98 and Windows NT.  You want to configure a security policy on each computer to ensure that the confidential information is secure. What should you do?()

A.Use Security Configuration and Analysis to import the Hisecws.inf security template file to modify the default security settings.
B.Use security templates to create a security template file and import the security settings to modify the default security settings.
C.Use the local computer policy to disable the access to this computer from the network option.
D.Use Secedit.exe to reconfigure the computers’ default security settings to not allow anonymous access to the computers.

点击查看答案

相关考题

单项选择题
You upgrade five computers in the Finance organizational unit (OU) from Windows NT Workstation 4.0 to Windows 2000 Professional. The computers are used by members of the Finance OU to run financial Applications. All five computers are configured to have the default security settings. A user named Helene reports that she can no longer log run the financial applications on her Windows 2000 Professional computer. Prior to the upgrade, Helene was able to run the financial applications on her computer. Helene is a member of the local Users group. You want the financial applications to run on her computer. What should you do?()

A. Use Computer Management to configure separate memory space for each financial application on Helene’s computer.
B. Use Security Templates to edit the Security Policy to include the financial application onHelene’s computer. Then add Helene’s user account to the Power Users group on Helene’s computer.
C. Use Security Configuration and Analysis to reconfigure the default security policy .inf to allow financial  applications to run on Helene’s computer.
D. Use Secedit.exe to apply the Compatws.inf security template on Helene’s Security Policy toloosen the permissions for the local Users group on Helene’s computer.

微信小程序免费搜题
微信扫一扫,加关注免费搜题

微信扫一扫,加关注免费搜题