搜题
用户您好, 请在下方输入框内搜索其它题目:
搜题
题目内容 (请给出正确答案)
提问人:网友 发布时间:
【单项选择题】

You are a network administrator for TestKing. The network consists of a single Active Directory domain named testking.com.<br /> A user named Mrs. King works in the information technology (IT) security department. Mrs. King is a member of the ITSecurity global group. Mrs. King reports that no one in the ITSecurity global group can access the security log from the console of a computer named Testking1.<br /> You need to grant the ITSecurity global group the minimum rights necessary to view the security log on Testking1.<br /> How should you modify the local security policy?()<p> You are a network administrator for TestKing. The network consists of a single Active Directory domain named testking.com.<br /> A user named Mrs. King works in the information technology (IT) security department. Mrs. King is a member of the ITSecurity global group. Mrs. King reports that no one in the ITSecurity global group can access the security log from the console of a computer named Testking1.<br /> You

A、A. Assign the Generate security audits user right to the ITSecurity global group.

B、B. Assign the Manage auditing and security logs user right to the ITSecurity global group.

C、C. Assign the Allow logon through Terminal Services user right to the ITSecurity global group.

D、D. Assign the Act as part of the operating system user right to the ITSecurity global group.

更多“You are a network administrator for TestKing. The network consists of a single Active Directory domain named testking.com.<br /> A user named Mrs. King works in the information technology (IT) security department. Mrs. King is a member of the ITSecurity global group. Mrs. King reports that no one in the ITSecurity global group can access the security log from the console of a computer named Testking1.<br /> You need to grant the ITSecurity global group the minimum rights necessary to view the security log on Testking1.<br /> How should you modify the local security policy?()<p> You are a network administrator for TestKing. The network consists of a single Active Directory domain named testking.com.<br /> A user named Mrs. King works in the information technology (IT) security department. Mrs. King is a member of the ITSecurity global group. Mrs. King reports that no one in the ITSecurity global group can access the security log from the console of a computer named Testking1.<br /> You ”相关的问题
第4题

A、Both Gateway Load Balancing Protocoland Hot Stand by Router Protocol  B、Gateway Load Balancing Protocol  C、Virtual Router Redundancy Protocol  D、Hot Stand by Router Protocol  

点击查看答案
第8题

A、Configure all access points to use 802.1X authentication.  B、Configure all portable computers to use MS-CHAP v2 authentication.  C、Use the Group Policy Management Console to access the wireless Group Policy settings, and enable the Prevent connections to ad-hoc networks option.  D、Use the Group Policy Management Console to access the wireless Group Policy settings, and disable the Prevent connections to infrastructure networks option.  

点击查看答案
第9题

A、Configure all access points to use 802.1x authentication.  B、Configure all protable computers to use MS-CHAP v2 authentication.  C、Use the group policy management console to access the wireless group policy settings, and enable the prevent connections to ad-hoc network option.  D、Use the group policy management console to access the wireless group policy settings, and disable the prevent connections to infrastructure networks option.  

点击查看答案
第10题

A、Configure all access points to use 802.1x authentication.  B、Configure all protable computers to use MS-CHAP v2 authentication.  C、Use the group policy management console to access the wireless group policy settings, and enable the prevent connections to ad-hoc network option.  D、Use the group policy management console to access the wireless group policy settings, and disable the prevent connections to infrastructure networks option.  

点击查看答案
客服
TOP

请使用微信扫码支付

订单号:
遇到问题请联系在线客服